The Layering Principle and Mobility Performance
|
|
- Silvester Dorsey
- 7 years ago
- Views:
Transcription
1 The Layering Principle and Mobility Performance Teemu Rinta-aho Helsinki University of Technology Telecommunications Software and Multimedia Laboratory Abstract Many current networks provide mobility for end-users, and there exists several different protocols and mechanisms to support this on various networking layers. The number of available wireless and wired networks is increasing. These networks are owned and operated by different administrative entities, with different security and other requirements. More and more terminals are now supporting multiple different networking technologies, e.g. both WLAN and UMTS. Together this leads to a situation where all the protocols operating in a layered networking architecture can not fulfill all of today s mobility and security requirements if they don t co-operate. This paper is an introduction to mobility, layered network architectures and their mobility support mechanisms, and to the idea that some level of coordination between layers is required for a layered network architecture to support efficient mobility. Further measurements and simulations are left for further study. KEYWORDS: mobility, layered network architectures 1 Introduction In section 2 we have a look on mobility: what is actually moving, and how. In section 3 we have a look on network architectures and layering. In section 4 some new ideas on how to improve the protocol stack regarding mobility are presented. In section 5 two systems are compared: another one follows strict layering principles, while another one is more relaxed on this principle, allowing better mobility performance. In section 6 some related and future work are introduced, and in section 7 the paper is concluded. 2 Mobility Today, mobile computing in practice is mostly realized as users of laptop computers connecting to the Internet and their home networks via data services of mobile phone networks or some local WLAN hotspots. This is the traditional view of mobile computing, and represents host mobility, in which a communicating host (together with the user and applications) is moving between different access networks. However, mobility support in general, is the process of handling the needs of the mobile objects. These needs usually are reachability and session continuity. 2.1 What is moving To better understand the problems and requirements of mobile computing, it is first necessary to understand what are the mobile objects and what are their requirements on mobility. At the highest level there are five communicating entities, which can be mobile: users, data, applications, hosts, devices, and networks [2]. Mobility of these objects can be characterized as dynamic relationships between all of them. For example, users and applications may change between hosts, physical storage with the data can be attached to different hosts as well. Hosts, in turn, may change attachment to underlying networks, thus changing locators at network interfaces. In addition, hosts may form groups moving networks which are moving between various networks as well [2]. Therefore, mobility support can be thought, on a high level, to be the process of maintaining these dynamic relationships of mobile objects. Basically the mobility has to take care of mapping different identifiers to locators or other identifiers, maintaining the reachability of the mobile objects, and maintaining session continuity through the mobility events [2]. Let s assume the user in Figure 1 is running Application A, which displays Data K. The application may be e.g. a web browser, or a streaming video client, and the data may be a web page or a video file, respectively. The data is refererred to with an URL. The user is using Host X, which has two network interfaces (NW intf 1 and NW intf 2). Data K is handled by Application D on Host Y, which has also two network interfaces. Let s assume Host X is connecting Application A to Interface 1, which is connected to Network 1 (NW1). On the server side, the path is NW2 -> Interface 3 -> Host Y -> Application D. Now, depending on what types of mobility this network architecture supports, we might have: User Mobility (e.g. User moving from Host X to 1
2 Discovering options Making decisions Execution Triggering events are something that trigger or start the mobility process. Triggering events can happen on any networking layer, or outside the networking stack. Some examples of triggering events are: network cable unplugged Host Y) Figure 1: Mobile objects Content Mobility (e.g. Data K moving from Host Y to Host Z) Application Mobility (e.g. App A moving from Host X to Host Y) Host Mobility (e.g. Host X moving from Intf 1 to Intf 2) Interface Mobility (e.g. NW1 to NW2) Intf 1 moving from Network Mobility (e.g. Hosts X, Y, Z form a network which may move in relation to the other networks 1-4) Interface mobility is what e.g. Mobile IP was created for. When an interface connected to a host changes its IP subnet, Mobile IP updates the home address (= Host s identifier) and care-of address (= Host s location) mapping at the Home Agent and in the Correspondent Nodes. Mobile IP is also good for moving the connections from interface to another. But it does not support the simultaneous usage of multiple interfaces. But what if happens so, that the Data K is physically stored on e.g. a USB memory stick, and is moved to a different physical machine, Host Z. First of all, there is the issue to design whether the serving application moves together with the content, or whether there is another application (App E) that can serve the data to the clients. Another issue is to handle the updates in the bindings of mobile objects, and to update the reachability information. These were just two examples of what could be mobile. The next section takes a look on to the mobility process, common to all types of mobile objects. 2.2 The mobility process Mobility can be seen as a continuous process, which consists of the following steps (see Figure 2): Triggering events signal quality went below threshold a new network interface attached a new networking protocol installed These triggering events indicate a change in the system or network status. After receiving such a triggering event, the system needs to discover the options. For example, if the system gets a link-down event from a network interface driver, there is a need to discover what are the other available network interfaces that fulfill the requirements of the running applications and the preferences set by the user. The collection of application, user and the network preferences can be called a set of policies. A user preference could be e.g. how much money he or she is willing to spend on the services, or the required security level for communications. Applications may have minimum requirements for the communication service to be able to do their job, e.g. streaming HDTV application may require a 100Mbit/s network connection. Networks, service providers and operators may have policies on the use of the available networks. This information may be physically stored on e.g. a SIM card, or it may be updated from the network. However the policies are implemented, the system need to be able to prioritize them and resolve possible conflicts. After discovering the current status of the system, and discovering all the options, a decision whether to perform some actions is needed. This decision can be for example making a handover from an access point to another, or making a handover between different types of network interfaces connected to the same mobile node. The last part of the mobility process is the execution. This usually involves signalling between the networking entities. The used signalling protocol depends on the type of mobility. While SIP may be used for session mobility, MIP could be a better choise for host mobility. In current systems the mobility processes are usually restricted to a certain networking layer. This may cause problems if the mobility process is basing the decisions on inadequate amount of information on the whole system. A prime example is Wireless LAN and IP stack. 2
3 Figure 2: Mobility process In e.g. IEEE networks it is not possible to detect the network layer services that are available via an access point, and no way for the higher layers to control the handovers between of IEEE mobile stations between access points. While the IEEE network interface is looking at the network ID (i.e. a text string) and signal quality, IP layer is interested in end-to-end reachability and applications in QoS. Most mobility protocols like Mobile IP actually only patch a network architecture that was not designed for mobility in the first place. This kind of solutions are easier to accept and deploy, than solutions that solve the problem by changing the architecture, like the Host Identity Protocol [9]. In the following chapter we ll have a closer look on the network architectures and some mobility solutions. 3 Network Architectures and Mobility The chosen network architecture has a great impact on the mobility support the network can offer. Typically current network architectures are based on a layered network model, although some other proposals have been proposed [4], but not yet deployed. 3.1 Layered network model Current packet-based network architectures assume that the communication functions are organized into levels of abstraction called protocol layers, and the metadata that controls the protocols on different layers is organized into protocol headers. In Figure 3 the seven layers of the OSI network model are presented. The idea in the model is that each layer only offers services to the layer just above it, and only uses services of the layer just below it. For example, the network layer offers end-to-end packet delivery to the transport layer, and it is using the data link layer to actually send and receive the frames that carry Figure 3: Seven layers of the OSI model the network packets. The layered protocols in a system form a network stack. Current TCP/IP stacks only realize layers from transport to network, while the ethernet drivers and hardware take care of the lowest two layers. Applications connect to the stack through a sockets API. This kind of layered networking architecture has its pros and cons. One of the biggest arguments for this kind of an architecture is the independence of the layers from each other. A developer may change the protocol residing on a certain layer without affecting the protocols on other layers as long as the interfaces don t change. One drawback of the layered networking architecture is the lack of useful information available from other layers, if strict layering is followed. A simple example: both transport (e.g. TCP) and network layer (e.g. IPv6) protocols could use information from the data link layer (e.g. IEEE ) to enhance their performance. Information could be about the link quality or whether the wireless network adapter has decided to change to another access point. TCP congestion control algorithms could take into account whether the packet loss is on the first hop from the node or somewhere deeper in the network, while IPv6 could check the validity of the IP address immediately after a handover and not wait until a signal is received from its own timers. It is probably possible to have a layered protocol stack and good mobility performance, but the mobility decisions should be done in the right place. Whether the place in the system where the decisions are taken is static (e.g. in IP or in WLAN or outside the protocol stack) or dynamically changing, there is a minimum amount of information that is needed. So, the information may flow inside the stack from layer to another 3
4 Figure 4: Common coordinating function through the service interfaces, or it might be collected to a control plane which is controlling the layers (see Figure 4) as proposed in Ambient Networks [1]. 3.2 Network layer mobility To support mobility in the networking layer, IETF has standardized Mobile IP for both IPv4 [10] and IPv6 [7]. These are extensions to the existing IP architecture and protocols at the network layer that hide mobility from the higher layer protocols and applications. The problem with the existing IP architecture regarding mobility is that the role of the IP address is overloaded it serves both as the identifier and the locator of the end host. Mobile IP solves the problem by having one IP address the home address for identifying the node, and another IP address the care-of address for locating the node. Mobile IP also introduces a special node in the home network (the network where the home address topologically belongs to) a home agent that stores the care-of address to home address binding, and redirects traffic to the mobile node while it s not connected to the home network. If the correspondent node does not support Mobile IP binding updates from the mobile node, then the problem of triangular routing occurs. Mobile IP would make traffic stealing attacks possible, but that, among other security issues has been dealt by adding security features into the protocol. 3.3 Adding the host layer Host Identity architecture [8] is another extension to the IP architecture that provides, among other things, multihoming support. The Host Identity Protocol (HIP) provides a protocol for authentication and setting up security associations between two end-hosts [9]. It uses a new Host Identity (HI) name space, based on public keys. The public keys are typically, but not necessarily, self generated. The cryptographic construct of the public-private key pairs provides strong mechanisms to authenticate remote identities, therefore HIP solves the IP address ownership problem that comes when using Mobile IP. In HIP, the public keys, not IP addresses, are used to identify a host. IP addresses are only used for routing IP packets. This implicitly leads to the situation that when a node receives a packet, it does not matter what is the source IP address, only the HIT (Host Identity Tag) is needed to identify the source of the packet. HIP adds a new layer host layer into the protocol stack between the transport and the network layers. In host layer, the binding between the HIT and a set of locators is managed. The HIP base exchange [XXX ref] is a 4-way handshake protocol that sets up a security association between two end-hosts. After this it is possible to run e.g. IPsec ESP protocol between the end-hosts. An extension to the HIP base exchange is the support for mobility and multi-homing [5]. HIP MM provides host mobility between IP addresses of same or different address families contrary to the Mobile IP, host layer provides mobility between IPv4 and IPv6 for a dual stack mobile node. 4 Enhancing the protocol stack 4.1 Collecting information Decision is based on available information at a time. The more information one has, and the more accurate it is, the better the decision is likely to be. A big part of the mobility process is the decision about handovers (i.e. decision to update mobility states). An isolated layer can t make good decisions as it lacks the knowledge of the needs of protocols running on other layers, application needs, user preferences, operator policies etc. One way to solve the problem is to move the decision making aside the protocol stack. This decision maker obviously needs information from the protocol stack but as well from the user, applications and the network. This information collection is called Trigger Collection in Ambient Networks [11]. Trigger Collection is a part of Trigger Management, which also contains e.g. Trigger Classification and a Trigger Repository. Triggers are caused by Triggering Events, which are events that may lead to an action in the mobility management system. 4.2 Access selection Currently in IEEE (WLAN) networks the mobile station selects the access point based on radio link parameters and the network id broadcasted in special 4
5 Figure 5: The access discovery and selection problem management frames called beacons. This information is, however, inadequate to base the access selection on. The user of the mobile station may have other preferences, such as price, while the applications need to know the available QoS etc. WLAN access points broadcast beacons on a regular basis, normally every 100 milliseconds. Extending the beacons with extra information makes them larger and thus wastes the available bandwidth on the channel. Inserting all desired information into the beacons would therefore not be desirable. One solution is that the beacon is extended only with a special flag which indicates that the access point is capable of delivering extra information before the standard WLAN attachment frames. If the mobile station supports using this extra information, it may send a special information request frame to the access point. The access point can then send the requested extra information in one or more special information reply frames. These information reply frames may contain any information that can help the mobile station to select the access point. The actual attachment process with the access point follows the normal WLAN procedure or as in the Quick NAP proposal (see the next section). This extra information may contain e.g. cryptographic identities list of available services with prices information on roaming partnerships supported security & AAA mechanisms It should be noted, that while this information is transmitted as part of the WLAN access point scanning, it is not useful in the existing WLAN access point selection algorithms, that are only designed with the link layer in mind. By passing this information to a software module which is aware of the whole stack will most likely result in better decisions. We could e.g. have a laptop which has an IPv4 stack and a WLAN interface. The WLAN interface will happily connect to an access point which is connected to an IPv6-only network, if there is just a strong signal to it. To prevent this kind of situations, the access points need to inform the mobile stations which services they offer. Network layer connectivity with IPv4 is one service, IPv6 another. There are two options, either the mobile station is aware of the services the other layers need or prefer, or there is a central process which makes the decisions and controls e.g. selection of the access point. 4.3 Network attachment Attaching to a WLAN access point requires several actions and roundtrips on several protocol layers before the applications at the mobile station can send and receive IP packets. These actions include e.g. authentication and association at link layer, IP address allocation and assignment, router discovery and network layer mobility updates. Performing these actions independently of each other results in suboptimal total system performance with sequential protocol runs and unnecessary timers on various layers. A new architecture, Quick NAP [3] takes the approach of looking at the whole network attachment process as a whole, and not concentrating on a single layer or a single process. Quick NAP provides a new protocol that combines link layer and network layer control functions within the same messages. In short, after the mobile station 5
6 Figure 6: Unoptimized messaging sequence for network attachment has made the decision to connect to the access point, the client initiates an attachment procedure. The first step is to run a Diffie-Hellman exchange to protect all subsequent communications and to authenticate opportunistically. In parallel with the Diffie-Hellman exchange, also third party authentication and authorization exchanges can be initiated (e.g. EAP, web-logins). After the authentication and authorization steps, the client can explicitly request services, e.g. IP network connectivity, IP address allocation or delegations of mobility updates. In the Quick NAP paper is proposed that the WLAN beacon would carry the hash of the access point s identity and also some other information. However, in the WLAN networks the beacon is broadcasted every certain time invertal, and enlarging it takes the bandwidth away from other (e.g. data) frames. Therefore it might be the best to compromise by keeping the beacon small, but using one extra round trip to query the information as described in the previous section. 5 Performance comparison To see the effects of the layering, we take two mobile nodes, both of which run HIP and IPv6. The first node strictly obeys isolated layering and sequential protocol runs, while another one uses cross-layer information like L2 triggers, parallel setup of many layers while attaching to an access network etc. We will compare the relative performance of these systems. Both mobile nodes (MN) have one g WLAN interface to connect to IPv6 access networks. Both nodes are having end-to-end connections to correspondent nodes (CN). Both nodes are using a home network based authentication server (AAA), and updating their location to the HIP Rendezvous Server (RVS). The difference between the two mobile nodes is that the first one is using the state-of the art protocols on each layer, which are not co-operating or sharing information, while the another mobile node uses different sources of information for access selection and a new network attachment protocol that sets up protocols on several layers in parallel. Another difference is that the first mobile node does not support the information extensions of the , while the second mobile does use this information to make better attachment decisions. After the first mobile node has received an beacon, its wireless lan driver checks whether the network id and the AAA settings match and makes the decision on whether to connect. At this stage, the mobile node does not know whether there is network layer connectivity through the access point. The IPv6 router discovery will later notice whether there are any usable IPv6 routers on the link. If there are none, there is no connectivity for the applications until the mobile node attaches to another access point which has IPv6 routers. IPv6 can t tell this to the WLAN driver, as it is on a different layer. The second node instead, can pick a suitable access point, if one is available, by re- 6
7 Figure 7: Optimized messaging sequence for network attachment ceiving extra information from the access points that were qualified by the information in their beacons (see section 4.2). The first node: After doing the attachment to the access point, 802.1X and EAP are used for authentication and authorization, followed by i protocol run to set up link layer encryption. After the link layer has been set up, setting up network layer follows. However, if there is no interaction between the layers, then there will be a delay before the next IPv6 Router Advertisement is received by the mobile node. After the Router Advertisement is received, the mobile node configures itself an IPv6 address and runs IPv6 Duplicate Address Detection with the mandatory one second delay. After the IPv6 address has been verified, HIP notices that the IPv6 address on the interface has been changed, and that triggers HIP to send location update messages to the location server (RVS) and correspondent nodes (CN), and applications can resume their communication (unless the TCP have timed out...). The second node: The second node supports Quick NAP, which integrates network attachment to the WLAN, IPv6 address allocation and mobility updates into just a few messages between the mobile node and the access point. The access point may communicate on behalf of the mobile node with the Access Network (AN) to allocate an IPv6 address from e.g. a DHCPv6 server. It may also forward the AAA signalling to the mobile node s home network, together with the HIP location update messages to the rendez-vous server (RVS). 6 Related and future work IETF has a working group on detecting network attachment (DNA). The purpose of this working group is to create mechanisms for an IPv6 node to detect that its link layer has or may have undergone a change, and whether its IP layer addressing and routing configurations are still valid or have changed [12]. Some of the proposed mechanisms are e.g. link layer triggers where the L2 protocol informs L3 protocols of changes in the link status. IEEE has a working group (Media Independent Handover Services) [6]. The purpose of the working group is to produce a standard way to do handovers between different IEEE 802 protocol family networks and some cellular networks. Work items include trigger collection, access selection, etc. Role-based architectures offer an alternative to the layered architectures [4]. This is a revolutionary shift in thinking and implementing, so it is yet to see if it progresses from the paper level. It is to be analyzed how this kind of architecture would help in supporting different mobility scenarios. Ambient Networks project presents an Ambient Control Space which aims to glue together the existing and new protocols and networks and offers transparent and seamless mobility between different types of networks, different address spaces and different operators. Future work is to implement the proposed enhancements into access selection and network attachment and to measure the effect of those in real systems. 7 Conclusions In section 2 we had a look into mobility, what it is and what could be the objects that are mobile. The conclusion is that the view on what is mobility should be broad when designing the network architecture, to avoid a later need to patch the mobility support in. Mobility can also be seen as a continuous process, where different events trigger different decisions, causing mobility events to happen. Section 3 introduced layered network architectures, and listed some mobility issues. Also two different solutions to add mobility into the IP architectures was presented, namely Mobile IP and HIP. In section 4 some new approaches on enhancing the 7
8 protocol stacks. One of the most important things is how to collect information, and who is using that information. Another enhancement is the extension of IEEE signalling to help selecting the correct access point. Third work that was introduced, was the Quick NAP, which brings more parallelism and therefore speed into the network attachment step. Section 5 presented how strict layering and even decent mobility performance is difficult to combine without some level of co-operation or information exchange between layers. Two example systems with HIP, IPv6 and WLAN were compared. It is clear that with strict layering the mobility performance would be far from the expectations of the end users. Section 6 presented some related and future work. The intention of the author of this paper is to work further on integrating the ideas presented in this paper. The work could include e.g. implementing a prototype and comparing it to existing solutions. [9] R. Moskowitz, P. Nikander, P. Jokela, and T. Henderson. Host Identity Protocol. draft-ietf-hipbase-04.txt, work in progress, October [10] C. Perkins. IP Mobility Support for IPv4, revised. draft-ietf-mip4-rfc3344bis-02.txt, work in progress, October [11] V. Typpö, O. Gonsa, T. Rinta-aho, B. Tharon, and S. Bonjour. Triggering Multi-dimensional Mobility in Ambient Networks. In 14th IST Mobile & Wireless Communications Summit (IST 05), March [12] A. Yegin. Link-layer Event Notifications for Detecting Network Attachments. draft-ietf-dnalink-information-03.txt, work in progress, October Acknowledgements Yuri Ismailov, Jari Arkko, Jukka Ylitalo, Tero Kauppinen, members of the Ambient Networks project. References [1] Ambient Networks Project. D1.5 AN Framework Architecture (IST AN/WP1- D05). Technical report, December [2] Ambient Networks Project. D4.2 Mobility Architecture & Concepts (IST AN/WP4/D4.2). April [3] J. Arkko, P. Eronen, S. Heikkinen, and A. Prasand. Quick NAP - Secure and Efficient Network Access Protocol [4] R. Braden, T. Faber, and M. Handley. From protocol stack to protocol heap: role-based architecture. SIGCOMM Comput. Commun. Rev., 33(1):17 22, [5] T. Henderson. End-Host Mobility and Multihoming with the Host Identity Protocol. draft-ietf-hipmm-02.txt, work in progress, July [6] IEEE Draft IEEE Standard for Local and Metropolitan Area Networks: Media Independent Handover Services (IEEE P802.21/D00.01), July [7] D. Johnson, C. Perkins, and J. Arkko. Mobility Support in IPv6. RFC 3775, June [8] R. Moskowitz and P. Nikander. Host Identity Protocol Architecture. draft-ietf-hip-arch-03.txt, work in progress, August
The Layering Principle and Mobility Performance
The Layering Principle and Mobility Performance Teemu Rinta-aho 30.11.2005 T-110.7190 Research Seminar on Datacommunications Software Contents Introduction Mobility Network Architectures
More informationDynamic Selection of Optimal Wireless Access Service
Dynamic Selection of Optimal Wireless Access Service Teemu inta-aho teemu.rinta-aho@tkk.fi Abstract The number of different wireless access technologies is increasing, as well as the number of players
More informationIntroduction to Mobile IPv6
1 Introduction to Mobile IPv6 III IPv6 Global Summit Moscow Dr. Dimitrios Kalogeras dkalo@grnet.gr GRNET Outline Introduction Relevant Features of IPv6 Major Differences between MIPv4 and MIPv6 Mobile
More informationThreats and Security Analysis for Enhanced Secure Neighbor Discovery Protocol (SEND) of IPv6 NDP Security
Threats and Security Analysis for Enhanced Secure Neighbor Discovery Protocol (SEND) of IPv6 NDP Security Yvette E. Gelogo 1, Ronnie D. Caytiles 1 and Byungjoo Park 1 * 1Multimedia Engineering Department,
More informationMPLS VPN in Cellular Mobile IPv6 Architectures(04##017)
MPLS VPN in Cellular Mobile IPv6 Architectures(04##017) Yao-Chung Chang, Han-Chieh Chao, K.M. Liu and T. G. Tsuei* Department of Electrical Engineering, National Dong Hwa University Hualien, Taiwan, Republic
More informationAn Active Network Based Hierarchical Mobile Internet Protocol Version 6 Framework
An Active Network Based Hierarchical Mobile Internet Protocol Version 6 Framework Zutao Zhu Zhenjun Li YunYong Duan Department of Business Support Department of Computer Science Department of Business
More informationSeamless Handover of Streamed Video over UDP between Wireless LANs
Seamless Handover of Streamed Video over UDP between Wireless LANs Ger Cunningham, Seán Murphy, Liam Murphy Department of Computer Science University College Dublin Dublin, Ireland {ger.munningham,liam.murphy@ucd.ie,
More informationMobility Management Advanced
Mobility Management Advanced Summer Semester 2011 Integrated Communication Systems Group Ilmenau University of Technology Outline Motivation Mobility Management Approaches in the TCP/IP Reference Model
More informationVPN. Date: 4/15/2004 By: Heena Patel Email:hpatel4@stevens-tech.edu
VPN Date: 4/15/2004 By: Heena Patel Email:hpatel4@stevens-tech.edu What is VPN? A VPN (virtual private network) is a private data network that uses public telecommunicating infrastructure (Internet), maintaining
More informationEthernet. Ethernet. Network Devices
Ethernet Babak Kia Adjunct Professor Boston University College of Engineering ENG SC757 - Advanced Microprocessor Design Ethernet Ethernet is a term used to refer to a diverse set of frame based networking
More informationSERVICE DISCOVERY AND MOBILITY MANAGEMENT
Objectives: 1) Understanding some popular service discovery protocols 2) Understanding mobility management in WLAN and cellular networks Readings: 1. Fundamentals of Mobile and Pervasive Computing (chapt7)
More informationTomás P. de Miguel DIT-UPM. dit UPM
Tomás P. de Miguel DIT- 15 12 Internet Mobile Market Phone.com 15 12 in Millions 9 6 3 9 6 3 0 1996 1997 1998 1999 2000 2001 0 Wireless Internet E-mail subscribers 2 (January 2001) Mobility The ability
More informationProcedure: You can find the problem sheet on Drive D: of the lab PCs. 1. IP address for this host computer 2. Subnet mask 3. Default gateway address
Objectives University of Jordan Faculty of Engineering & Technology Computer Engineering Department Computer Networks Laboratory 907528 Lab.4 Basic Network Operation and Troubleshooting 1. To become familiar
More informationCCNA R&S: Introduction to Networks. Chapter 5: Ethernet
CCNA R&S: Introduction to Networks Chapter 5: Ethernet 5.0.1.1 Introduction The OSI physical layer provides the means to transport the bits that make up a data link layer frame across the network media.
More information21.4 Network Address Translation (NAT) 21.4.1 NAT concept
21.4 Network Address Translation (NAT) This section explains Network Address Translation (NAT). NAT is also known as IP masquerading. It provides a mapping between internal IP addresses and officially
More informationFinal for ECE374 05/06/13 Solution!!
1 Final for ECE374 05/06/13 Solution!! Instructions: Put your name and student number on each sheet of paper! The exam is closed book. You have 90 minutes to complete the exam. Be a smart exam taker -
More informationCourse Overview: Learn the essential skills needed to set up, configure, support, and troubleshoot your TCP/IP-based network.
Course Name: TCP/IP Networking Course Overview: Learn the essential skills needed to set up, configure, support, and troubleshoot your TCP/IP-based network. TCP/IP is the globally accepted group of protocols
More informationOverview of Routing between Virtual LANs
Overview of Routing between Virtual LANs This chapter provides an overview of virtual LANs (VLANs). It describes the encapsulation protocols used for routing between VLANs and provides some basic information
More informationTelecommunication Services Engineering (TSE) Lab. Chapter III 4G Long Term Evolution (LTE) and Evolved Packet Core (EPC)
Chapter III 4G Long Term Evolution (LTE) and Evolved Packet Core (EPC) http://users.encs.concordia.ca/~glitho/ Outline 1. LTE 2. EPC architectures (Basic and advanced) 3. Mobility management in EPC 4.
More informationObject Identification for Ubiquitous Networking
Object Identification for Ubiquitous Networking Gyu Myoung Lee 1, Jun Kyun Choi 2, Noel Crespi 1 1 Institut TELECOM SudParis 9 rue Charles Fourier, 91011, Evry France {gm.lee, noel.crespi}@it-sudparis.eu
More informationQuick NAP - Secure and Efficient Network Access Protocol
Quick NAP - Secure and Efficient Network Access Protocol Jari Arkko, Pasi Eronen, Hannes Tschofenig, Seppo Heikkinen and Anand Prasad Ericsson Research NomadicLab, E-Mail: Jari.Arkko@ericsson.com Nokia
More informationFinal Exam. Route Computation: One reason why link state routing is preferable to distance vector style routing.
UCSD CSE CS 123 Final Exam Computer Networks Directions: Write your name on the exam. Write something for every question. You will get some points if you attempt a solution but nothing for a blank sheet
More informationIntroduction Chapter 1. Uses of Computer Networks
Introduction Chapter 1 Uses of Computer Networks Network Hardware Network Software Reference Models Example Networks Network Standardization Metric Units Revised: August 2011 Uses of Computer Networks
More informationBoosting mobility performance with Multi-Path TCP
Boosting mobility performance with Multi-Path TCP Name SURNAME 1, Name SURNAME 2 1 Organisation, Address, City, Postcode, Country Tel: +countrycode localcode number, Fax: + countrycode localcode number,
More informationRARP: Reverse Address Resolution Protocol
SFWR 4C03: Computer Networks and Computer Security January 19-22 2004 Lecturer: Kartik Krishnan Lectures 7-9 RARP: Reverse Address Resolution Protocol When a system with a local disk is bootstrapped it
More informationIP-based Mobility Management for a Distributed Radio Access Network Architecture. helmut.becker@siemens.com
IP-based Mobility Management for a Distributed Radio Access Network Architecture helmut.becker@siemens.com Outline - Definition IP-based Mobility Management for a Distributed RAN Architecture Page 2 Siemens
More informationRESOURCE DISCOVERY IN AD HOC NETWORKS
RESOURCE DISCOVERY IN AD HOC NETWORKS Diane Tang Chih-Yuan Chang Kei Tanaka Mary Baker Technical Report No.: CSL-TR-98-769 August 1998 This project is in part supported by FX Palo Alto Laboratories and
More informationCCT vs. CCENT Skill Set Comparison
Operation of IP Data Networks Recognize the purpose and functions of various network devices such as Routers, Switches, Bridges and Hubs Select the components required to meet a given network specification
More informationWireless Local Area Networks (WLANs)
4 Wireless Local Area Networks (WLANs) Contents Overview...................................................... 4-3 Configuration Options: Normal Versus Advanced Mode.............. 4-4 Normal Mode Configuration..................................
More informationExposing Link-Change Events to Applications
Exposing Link-Change Events to Applications Problem Description As a Mobile Node (MN) handoffs from one Point Of Attachment (POA) to another, the state of its network interface (in the MN) changes: From
More informationMobile Internet Protocol v6 MIPv6
Mobile Internet Protocol v6 MIPv6 A brief introduction Holger.Zuleger@hznet.de 13-dec-2005 Holger Zuleger 1/15 > c Defined by MIPv6 RFC3775: Mobility Support in IPv6 (June 2004) RFC3776: Using IPsec to
More informationMobility Management for IP-based Mobile Networks
Mobility Management for IP-based Mobile Networks H. Becker, N. Gerlich, M. Schopp Siemens Information & Communication Mobile Munich, Germany 1 Overview Introduction to IP-based Radio Access Networks Definition
More informationChapter 9. IP Secure
Chapter 9 IP Secure 1 Network architecture is usually explained as a stack of different layers. Figure 1 explains the OSI (Open System Interconnect) model stack and IP (Internet Protocol) model stack.
More informationSFWR 4C03: Computer Networks & Computer Security Jan 3-7, 2005. Lecturer: Kartik Krishnan Lecture 1-3
SFWR 4C03: Computer Networks & Computer Security Jan 3-7, 2005 Lecturer: Kartik Krishnan Lecture 1-3 Communications and Computer Networks The fundamental purpose of a communication network is the exchange
More informationWireless Mesh Networks under FreeBSD
Wireless Networks under FreeBSD Rui Paulo rpaulo@freebsd.org The FreeBSD Project AsiaBSDCon 2010 - Tokyo, Japan Abstract With the advent of low cost wireless chipsets, wireless mesh networks became much
More informationIP Flow Mobility: Smart Traffic Offload for Future Wireless Networks
1 IP Flow Mobility: Smart Traffic Offload for Future Wireless Networks Antonio de la Oliva, Carlos J. Bernardos, Maria Calderon, Telemaco Melia and Juan Carlos Zuniga Universidad Carlos III de Madrid,
More informationVLANs. Application Note
VLANs Application Note Table of Contents Background... 3 Benefits... 3 Theory of Operation... 4 IEEE 802.1Q Packet... 4 Frame Size... 5 Supported VLAN Modes... 5 Bridged Mode... 5 Static SSID to Static
More informationMIP6 Route Optimization Enhancements
MIP6 Route Optimization Enhancements draft-arkko-mip6-ro-enhancements-00 Jari Arkko, jari.arkko@ericsson.com Christian Vogt, chvogt@tm.uka.de IETF 61, Washington D.C. Mobopts Meeting, November 10, 2004
More informationMobility (and philosophical questions about names and identity) David Andersen CMU CS 15-744. The problem
Mobility (and philosophical questions about names and identity) David Andersen CMU CS 15-744 The problem How to support mobile users What do we mean by support? Make it easy and convenient to effectively
More informationData Networking and Architecture. Delegates should have some basic knowledge of Internet Protocol and Data Networking principles.
Data Networking and Architecture The course focuses on theoretical principles and practical implementation of selected Data Networking protocols and standards. Physical network architecture is described
More informationCharter Text Network Design and Configuration
MIF Charter update proposal MIF WG Charter update proposal summary http://www.ietf.org/mail-archive/web/mif/current/msg02125.html Specific deliverables listed MPVD architecture document Requirement for
More informationAuthentication, Authorization and Accounting (AAA) Protocols
Authentication, Authorization and Accounting (AAA) Protocols Agententechnologien in der Telekommunikation Sommersemester 2009 Babak Shafieian babak.shafieian@dai-labor.de 10.06.2009 Agententechnologien
More informationDynamic Network Interface Selection in Multihomed Mobile Hosts
Dynamic Network Interface Selection in Multihomed Mobile Hosts Jukka Ylitalo, Tony Jokikyyny, Tero Kauppinen, Antti J. Tuominen, Jaakko Laine Abstract Current mobile devices are often equipped with several
More informationIP and Mobility. Requirements to a Mobile IP. Terminology in Mobile IP
IP and Mobility Chapter 2 Technical Basics: Layer Methods for Medium Access: Layer 2 Chapter Wireless Networks: Bluetooth, WLAN, WirelessMAN, WirelessWAN Mobile Telecommunication Networks: GSM, GPRS, UMTS
More informationA Proxy Mobile IP based Layer-3 Handover Scheme for Mobile WiMAX based Wireless Mesh Networks
A Proxy Mobile IP based Layer-3 Handover Scheme for Mobile WiMAX based Wireless Mesh Networks Min-Kim, Jong-min Kim, Hwa-sung Kim Dept. of Electronics and Communications Engineering Kwangwoon University
More informationObjectives of Lecture. Network Architecture. Protocols. Contents
Objectives of Lecture Network Architecture Show how network architecture can be understood using a layered approach. Introduce the OSI seven layer reference model. Introduce the concepts of internetworking
More informationA O T. Heterogeneous Networks and Mobility User Perspective. Agententechnologien in der Telekommunikation Sommersemester 2009. Lecture 4 20.05.
Heterogeneous Networks and Mobility User Perspective Agententechnologien in der Telekommunikation Sommersemester 2009 Thomas Geithner thomas.geithner@dai-labor.de Lecture 4 20.05.2009 Agententechnologien
More informationIPv4 and IPv6 Integration. Formation IPv6 Workshop Location, Date
IPv4 and IPv6 Integration Formation IPv6 Workshop Location, Date Agenda Introduction Approaches to deploying IPv6 Standalone (IPv6-only) or alongside IPv4 Phased deployment plans Considerations for IPv4
More informationMobile IP. Bheemarjuna Reddy Tamma IIT Hyderabad. Source: Slides of Charlie Perkins and Geert Heijenk on Mobile IP
Mobile IP Bheemarjuna Reddy Tamma IIT Hyderabad Source: Slides of Charlie Perkins and Geert Heijenk on Mobile IP IP Refresher Mobile IP Basics 3 parts of Mobile IP: Outline Advertising Care-of Addresses
More informationMobile IPv6: Configuration and Trials
Mobile IPv6: Configuration and Trials Tudor Blaga Technical University of Cluj-Napoca Tudor.Blaga@ com.utcluj.ro Virgil Dobrota Technical University of Cluj-Napoca Virgil.Dobrota@ com.utcluj.ro Daniel
More informationNetwork Access Security. Lesson 10
Network Access Security Lesson 10 Objectives Exam Objective Matrix Technology Skill Covered Exam Objective Exam Objective Number Firewalls Given a scenario, install and configure routers and switches.
More informationInternet, Part 2. 1) Session Initiating Protocol (SIP) 2) Quality of Service (QoS) support. 3) Mobility aspects (terminal vs. personal mobility)
Internet, Part 2 1) Session Initiating Protocol (SIP) 2) Quality of Service (QoS) support 3) Mobility aspects (terminal vs. personal mobility) 4) Mobile IP Session Initiation Protocol (SIP) SIP is a protocol
More informationNetwork Layer: Network Layer and IP Protocol
1 Network Layer: Network Layer and IP Protocol Required reading: Garcia 7.3.3, 8.1, 8.2.1 CSE 3213, Winter 2010 Instructor: N. Vlajic 2 1. Introduction 2. Router Architecture 3. Network Layer Protocols
More informationBehavior Analysis of TCP Traffic in Mobile Ad Hoc Network using Reactive Routing Protocols
Behavior Analysis of TCP Traffic in Mobile Ad Hoc Network using Reactive Routing Protocols Purvi N. Ramanuj Department of Computer Engineering L.D. College of Engineering Ahmedabad Hiteishi M. Diwanji
More informationInternet Control Protocols Reading: Chapter 3
Internet Control Protocols Reading: Chapter 3 ARP - RFC 826, STD 37 DHCP - RFC 2131 ICMP - RFC 0792, STD 05 1 Goals of Today s Lecture Bootstrapping an end host Learning its own configuration parameters
More informationTransport Layer Protocols
Transport Layer Protocols Version. Transport layer performs two main tasks for the application layer by using the network layer. It provides end to end communication between two applications, and implements
More informationMobile IP Part I: IPv4
Mobile IP Part I: IPv4 Raj Jain Washington University in Saint Louis Saint Louis, MO 63130 Jain@cse.wustl.edu These slides are available on-line at: http://www.cse.wustl.edu/~jain/cse574-06/ 12-1 q Mobile
More informationIntroduction to IPv6 and Benefits of IPv6
Introduction to IPv6 and Benefits of IPv6 Ammar Yasir Korkusuz 2012 Bogazici University, Electrical-Electronics Engineering Department MSc. Student EE 545 TERM PROJECT Abstract: IPv6 is a new internet
More informationNetwork Design Best Practices for Deploying WLAN Switches
Network Design Best Practices for Deploying WLAN Switches A New Debate As wireless LAN products designed for the enterprise came to market, a debate rapidly developed pitting the advantages of standalone
More informationIPv6 SECURITY. May 2011. The Government of the Hong Kong Special Administrative Region
IPv6 SECURITY May 2011 The Government of the Hong Kong Special Administrative Region The contents of this document remain the property of, and may not be reproduced in whole or in part without the express
More informationIntroducing Reliability and Load Balancing in Mobile IPv6 based Networks
Introducing Reliability and Load Balancing in Mobile IPv6 based Networks Jahanzeb Faizan Southern Methodist University Dallas, TX, USA jfaizan@engr.smu.edu Hesham El-Rewini Southern Methodist University
More informationIntroduction to IP v6
IP v 1-3: defined and replaced Introduction to IP v6 IP v4 - current version; 20 years old IP v5 - streams protocol IP v6 - replacement for IP v4 During developments it was called IPng - Next Generation
More informationBit Chat: A Peer-to-Peer Instant Messenger
Bit Chat: A Peer-to-Peer Instant Messenger Shreyas Zare shreyas@technitium.com https://technitium.com December 20, 2015 Abstract. Bit Chat is a peer-to-peer instant messaging concept, allowing one-to-one
More informationNetwork Mobility Support Scheme on PMIPv6 Networks
Network Mobility Support Scheme on PMIPv6 Networks Hyo-Beom Lee 1, Youn-Hee Han 2 and Sung-Gi Min 1 1 Dept. of Computer Science and Engineering, Korea University, Seoul, South Korea. sgmin@korea.ac.kr
More informationCSIS 3230. CSIS 3230 Spring 2012. Networking, its all about the apps! Apps on the Edge. Application Architectures. Pure P2P Architecture
Networking, its all about the apps! CSIS 3230 Chapter 2: Layer Concepts Chapter 5.4: Link Layer Addressing Networks exist to support apps Web Social ing Multimedia Communications Email File transfer Remote
More informationLife of a Packet CS 640, 2015-01-22
Life of a Packet CS 640, 2015-01-22 Outline Recap: building blocks Application to application communication Process to process communication Host to host communication Announcements Syllabus Should have
More informationMobility Management 嚴 力 行 高 雄 大 學 資 工 系
Mobility Management 嚴 力 行 高 雄 大 學 資 工 系 Mobility Management in Cellular Systems Cellular System HLR PSTN MSC MSC VLR BSC BSC BSC cell BTS BTS BTS BTS MT BTS BTS BTS BTS HLR and VLR HLR (Home Location Register)
More informationHP and IPv6 Deployment. Bill Medlin HP-UX IPv6 Project Manager
HP and IPv6 Deployment Bill Medlin HP-UX IPv6 Project Manager OUTLINE Why IPv6? Current HP-UX IPv6 Features IPv6 Customer Experience HP-UX and IPv6 Deployment HP Strategy for IPv6 page 2 Why IPv6? Immediate
More informationPacket Level Authentication Overview
Packet Level Authentication Overview Dmitrij Lagutin, Dmitrij.Lagutin@hiit.fi Helsinki Institute for Information Technology HIIT Aalto University School of Science and Technology Contents Introduction
More informationImproved Digital Media Delivery with Telestream HyperLaunch
WHITE PAPER Improved Digital Media Delivery with Telestream THE CHALLENGE Increasingly, Internet Protocol (IP) based networks are being used to deliver digital media. Applications include delivery of news
More information6 Mobility Management
Politecnico di Milano Facoltà di Ingegneria dell Informazione 6 Mobility Management Reti Mobili Distribuite Prof. Antonio Capone Introduction Mobility management allows a terminal to change its point of
More informationComputer Network. Interconnected collection of autonomous computers that are able to exchange information
Introduction Computer Network. Interconnected collection of autonomous computers that are able to exchange information No master/slave relationship between the computers in the network Data Communications.
More informationIT 3202 Internet Working (New)
[All Rights Reserved] SLIATE SRI LANKA INSTITUTE OF ADVANCED TECHNOLOGICAL EDUCATION (Established in the Ministry of Higher Education, vide in Act No. 29 of 1995) Instructions for Candidates: Answer any
More informationOPNET - Network Simulator
Simulations and Tools for Telecommunications 521365S: OPNET - Network Simulator Jarmo Prokkola Project Manager, M. Sc. (Tech.) VTT Technical Research Centre of Finland Kaitoväylä 1, Oulu P.O. Box 1100,
More informationConnecting IPv6 capable Bluetooth Low Energy sensors with the Internet of Things
Connecting IPv6 capable Bluetooth Low Energy sensors with the Internet of Things Johanna Nieminen (Nokia), Future Internet SHOK preconference 30.05.2012 IoT Taxonomy ZigBee 802.5.4 Bluetooth Video RFID
More informationEnabling Multiple Wireless Networks on RV320 VPN Router, WAP321 Wireless-N Access Point, and Sx300 Series Switches
print email Article ID: 4941 Enabling Multiple Wireless Networks on RV320 VPN Router, WAP321 Wireless-N Access Point, and Sx300 Series Switches Objective In an ever-changing business environment, your
More informationInternet Architecture for Robust Mobility. Sangheon Pack (백상헌) Korea University shpack@korea.ac.kr
Internet Architecture for Robust Mobility Sangheon Pack (백상헌) Korea University shpack@korea.ac.kr Contents Introduction IETF Activity Home Agent Reliability Protocol P2P-based Approaches ROAM and SAMP
More informationA Multi-level Security Mechanism for Secure Data Transmission in SCTP
Research Journal of Applied Sciences, Engineering and Technology 7(10): 2123-2128, 2014 ISSN: 2040-7459; e-issn: 2040-7467 Maxwell Scientific Organization, 2014 Submitted: July 6, 2013 Accepted: September
More informationSTRESS TESTING OF HOST IDENTITY PROTOCOL (HIP) IMPLEMENTATIONS
STRESS TESTING OF HOST IDENTITY PROTOCOL (HIP) IMPLEMENTATIONS Oleg Ponomarev Andrei Gurtov Helsinki Institute for Information Technology HIIT, Finland Helsinki University of Technology TKK oleg.ponomarev@hiit.fi,
More information8/27/2014. What is a computer network? Introduction. Business Applications (1) Uses of Computer Networks. Business Applications (2)
What is a computer network? Introduction Chapter 1 A number of separate but interconnected computers A collection of autonomous computers interconnected by a single technology COURSE FOCUS: design and
More informationAbstract. 2 Overview of mobility in WLAN. 1 Introduction
A study of mobility in WLAN Fengping Li Helsinki University of Technology Telecommunication Software and Multimedia Laboratory fli@cc.hut.fi Abstract This paper studies mobility in wireless LAN (WLAN,
More informationREDUCING PACKET OVERHEAD IN MOBILE IPV6
REDUCING PACKET OVERHEAD IN MOBILE IPV6 ABSTRACT Hooshiar Zolfagharnasab 1 1 Department of Computer Engineering, University of Isfahan, Isfahan, Iran hoppico@eng.ui.ac.ir hozo19@gmail.com Common Mobile
More informationBest Practices for SIP Security
Best Practices for SIP Security IMTC SIP Parity Group Version 21 November 9, 2011 Table of Contents 1. Overview... 33 2. Security Profile... 33 3. Authentication & Identity Protection... 33 4. Protecting
More informationBirdstep Intelligent Mobile IP Client v2.0, Universal Edition. Seamless secure mobility across all networks. Copyright 2002 Birdstep Technology ASA
White Paper Birdstep Intelligent Mobile IP Client v2.0, Universal Edition Seamless secure mobility across all networks Copyright 2002 Birdstep Technology ASA Haakon VII's gate 5B, N-0161 Oslo, Norway Tel:
More informationCME: A Middleware Architecture for Network-Aware Adaptive Applications
CME: A Middleware Architecture for Network-Aware Adaptive Applications Jun-Zhao Sun, Jari Tenhunen, and Jaakko Sauvola MediaTeam, Machine Vision and Media Processing Unit, Infotech Oulu P.O.Box 4500 4SOINFO,
More informationChapter 17. Transport-Level Security
Chapter 17 Transport-Level Security Web Security Considerations The World Wide Web is fundamentally a client/server application running over the Internet and TCP/IP intranets The following characteristics
More informationSecurity. Contents. S-72.3240 Wireless Personal, Local, Metropolitan, and Wide Area Networks 1
Contents Security requirements Public key cryptography Key agreement/transport schemes Man-in-the-middle attack vulnerability Encryption. digital signature, hash, certification Complete security solutions
More informationBASIC ANALYSIS OF TCP/IP NETWORKS
BASIC ANALYSIS OF TCP/IP NETWORKS INTRODUCTION Communication analysis provides powerful tool for maintenance, performance monitoring, attack detection, and problems fixing in computer networks. Today networks
More informationThe Elements of GigE Vision
What Is? The standard was defined by a committee of the Automated Imaging Association (AIA). The committee included Basler AG and companies from all major product segments in the vision industry. The goal
More informationVXLAN: Scaling Data Center Capacity. White Paper
VXLAN: Scaling Data Center Capacity White Paper Virtual Extensible LAN (VXLAN) Overview This document provides an overview of how VXLAN works. It also provides criteria to help determine when and where
More informationAn Experimental Study of Cross-Layer Security Protocols in Public Access Wireless Networks
An Experimental Study of Cross-Layer Security Protocols in Public Access Wireless Networks Avesh K. Agarwal Wenye Wang Department of Electrical and Computer Engineering North Carolina State University,
More informationReview: Lecture 1 - Internet History
Review: Lecture 1 - Internet History late 60's ARPANET, NCP 1977 first internet 1980's The Internet collection of networks communicating using the TCP/IP protocols 1 Review: Lecture 1 - Administration
More informationConfiguring a Site-to-Site VPN Tunnel Between Cisco RV320 Gigabit Dual WAN VPN Router and Cisco (1900/2900/3900) Series Integrated Services Router
print email Article ID: 4938 Configuring a Site-to-Site VPN Tunnel Between Cisco RV320 Gigabit Dual WAN VPN Router and Cisco (1900/2900/3900) Series Integrated Services Router Objective Virtual Private
More information5.0 Network Architecture. 5.1 Internet vs. Intranet 5.2 NAT 5.3 Mobile Network
5.0 Network Architecture 5.1 Internet vs. Intranet 5.2 NAT 5.3 Mobile Network 1 5.1The Internet Worldwide connectivity ISPs connect private and business users Private: mostly dial-up connections Business:
More information13 Virtual Private Networks 13.1 Point-to-Point Protocol (PPP) 13.2 Layer 2/3/4 VPNs 13.3 Multi-Protocol Label Switching 13.4 IPsec Transport Mode
13 Virtual Private Networks 13.1 Point-to-Point Protocol (PPP) PPP-based remote access using dial-in PPP encryption control protocol (ECP) PPP extensible authentication protocol (EAP) 13.2 Layer 2/3/4
More informationLinux Network Security
Linux Network Security Course ID SEC220 Course Description This extremely popular class focuses on network security, and makes an excellent companion class to the GL550: Host Security course. Protocols
More informationDeveloping Network Security Strategies
NETE-4635 Computer Network Analysis and Design Developing Network Security Strategies NETE4635 - Computer Network Analysis and Design Slide 1 Network Security Design The 12 Step Program 1. Identify network
More informationMobility on IPv6 Networks
Mobility on IPv6 Networks Pedro M. Ruiz Project Manager Agora Systems S.A. Global IPv6 Summit Madrid 13-15 March 2002 Pedro M. Ruiz (c) Agora Systems S.A, 2002 1 Outline Motivation MIPv6 architecture MIPv6
More informationIntegrating Security, Mobility, and Multi-Homing in a HIP way
Integrating Security, Mobility, and Multi-Homing in a way Pekka Nikander Ericsson Research Nomadiclab & Helsinki Institute for Information Technology Outline The problem: TCP/IP is getting old Locators
More informationSecure SCTP against DoS Attacks in Wireless Internet
Secure SCTP against DoS Attacks in Wireless Internet Inwhee Joe College of Information and Communications Hanyang University Seoul, Korea iwjoe@hanyang.ac.kr Abstract. The Stream Control Transport Protocol
More information