The Layering Principle and Mobility Performance

Size: px
Start display at page:

Download "The Layering Principle and Mobility Performance"

Transcription

1 The Layering Principle and Mobility Performance Teemu Rinta-aho Helsinki University of Technology Telecommunications Software and Multimedia Laboratory Abstract Many current networks provide mobility for end-users, and there exists several different protocols and mechanisms to support this on various networking layers. The number of available wireless and wired networks is increasing. These networks are owned and operated by different administrative entities, with different security and other requirements. More and more terminals are now supporting multiple different networking technologies, e.g. both WLAN and UMTS. Together this leads to a situation where all the protocols operating in a layered networking architecture can not fulfill all of today s mobility and security requirements if they don t co-operate. This paper is an introduction to mobility, layered network architectures and their mobility support mechanisms, and to the idea that some level of coordination between layers is required for a layered network architecture to support efficient mobility. Further measurements and simulations are left for further study. KEYWORDS: mobility, layered network architectures 1 Introduction In section 2 we have a look on mobility: what is actually moving, and how. In section 3 we have a look on network architectures and layering. In section 4 some new ideas on how to improve the protocol stack regarding mobility are presented. In section 5 two systems are compared: another one follows strict layering principles, while another one is more relaxed on this principle, allowing better mobility performance. In section 6 some related and future work are introduced, and in section 7 the paper is concluded. 2 Mobility Today, mobile computing in practice is mostly realized as users of laptop computers connecting to the Internet and their home networks via data services of mobile phone networks or some local WLAN hotspots. This is the traditional view of mobile computing, and represents host mobility, in which a communicating host (together with the user and applications) is moving between different access networks. However, mobility support in general, is the process of handling the needs of the mobile objects. These needs usually are reachability and session continuity. 2.1 What is moving To better understand the problems and requirements of mobile computing, it is first necessary to understand what are the mobile objects and what are their requirements on mobility. At the highest level there are five communicating entities, which can be mobile: users, data, applications, hosts, devices, and networks [2]. Mobility of these objects can be characterized as dynamic relationships between all of them. For example, users and applications may change between hosts, physical storage with the data can be attached to different hosts as well. Hosts, in turn, may change attachment to underlying networks, thus changing locators at network interfaces. In addition, hosts may form groups moving networks which are moving between various networks as well [2]. Therefore, mobility support can be thought, on a high level, to be the process of maintaining these dynamic relationships of mobile objects. Basically the mobility has to take care of mapping different identifiers to locators or other identifiers, maintaining the reachability of the mobile objects, and maintaining session continuity through the mobility events [2]. Let s assume the user in Figure 1 is running Application A, which displays Data K. The application may be e.g. a web browser, or a streaming video client, and the data may be a web page or a video file, respectively. The data is refererred to with an URL. The user is using Host X, which has two network interfaces (NW intf 1 and NW intf 2). Data K is handled by Application D on Host Y, which has also two network interfaces. Let s assume Host X is connecting Application A to Interface 1, which is connected to Network 1 (NW1). On the server side, the path is NW2 -> Interface 3 -> Host Y -> Application D. Now, depending on what types of mobility this network architecture supports, we might have: User Mobility (e.g. User moving from Host X to 1

2 Discovering options Making decisions Execution Triggering events are something that trigger or start the mobility process. Triggering events can happen on any networking layer, or outside the networking stack. Some examples of triggering events are: network cable unplugged Host Y) Figure 1: Mobile objects Content Mobility (e.g. Data K moving from Host Y to Host Z) Application Mobility (e.g. App A moving from Host X to Host Y) Host Mobility (e.g. Host X moving from Intf 1 to Intf 2) Interface Mobility (e.g. NW1 to NW2) Intf 1 moving from Network Mobility (e.g. Hosts X, Y, Z form a network which may move in relation to the other networks 1-4) Interface mobility is what e.g. Mobile IP was created for. When an interface connected to a host changes its IP subnet, Mobile IP updates the home address (= Host s identifier) and care-of address (= Host s location) mapping at the Home Agent and in the Correspondent Nodes. Mobile IP is also good for moving the connections from interface to another. But it does not support the simultaneous usage of multiple interfaces. But what if happens so, that the Data K is physically stored on e.g. a USB memory stick, and is moved to a different physical machine, Host Z. First of all, there is the issue to design whether the serving application moves together with the content, or whether there is another application (App E) that can serve the data to the clients. Another issue is to handle the updates in the bindings of mobile objects, and to update the reachability information. These were just two examples of what could be mobile. The next section takes a look on to the mobility process, common to all types of mobile objects. 2.2 The mobility process Mobility can be seen as a continuous process, which consists of the following steps (see Figure 2): Triggering events signal quality went below threshold a new network interface attached a new networking protocol installed These triggering events indicate a change in the system or network status. After receiving such a triggering event, the system needs to discover the options. For example, if the system gets a link-down event from a network interface driver, there is a need to discover what are the other available network interfaces that fulfill the requirements of the running applications and the preferences set by the user. The collection of application, user and the network preferences can be called a set of policies. A user preference could be e.g. how much money he or she is willing to spend on the services, or the required security level for communications. Applications may have minimum requirements for the communication service to be able to do their job, e.g. streaming HDTV application may require a 100Mbit/s network connection. Networks, service providers and operators may have policies on the use of the available networks. This information may be physically stored on e.g. a SIM card, or it may be updated from the network. However the policies are implemented, the system need to be able to prioritize them and resolve possible conflicts. After discovering the current status of the system, and discovering all the options, a decision whether to perform some actions is needed. This decision can be for example making a handover from an access point to another, or making a handover between different types of network interfaces connected to the same mobile node. The last part of the mobility process is the execution. This usually involves signalling between the networking entities. The used signalling protocol depends on the type of mobility. While SIP may be used for session mobility, MIP could be a better choise for host mobility. In current systems the mobility processes are usually restricted to a certain networking layer. This may cause problems if the mobility process is basing the decisions on inadequate amount of information on the whole system. A prime example is Wireless LAN and IP stack. 2

3 Figure 2: Mobility process In e.g. IEEE networks it is not possible to detect the network layer services that are available via an access point, and no way for the higher layers to control the handovers between of IEEE mobile stations between access points. While the IEEE network interface is looking at the network ID (i.e. a text string) and signal quality, IP layer is interested in end-to-end reachability and applications in QoS. Most mobility protocols like Mobile IP actually only patch a network architecture that was not designed for mobility in the first place. This kind of solutions are easier to accept and deploy, than solutions that solve the problem by changing the architecture, like the Host Identity Protocol [9]. In the following chapter we ll have a closer look on the network architectures and some mobility solutions. 3 Network Architectures and Mobility The chosen network architecture has a great impact on the mobility support the network can offer. Typically current network architectures are based on a layered network model, although some other proposals have been proposed [4], but not yet deployed. 3.1 Layered network model Current packet-based network architectures assume that the communication functions are organized into levels of abstraction called protocol layers, and the metadata that controls the protocols on different layers is organized into protocol headers. In Figure 3 the seven layers of the OSI network model are presented. The idea in the model is that each layer only offers services to the layer just above it, and only uses services of the layer just below it. For example, the network layer offers end-to-end packet delivery to the transport layer, and it is using the data link layer to actually send and receive the frames that carry Figure 3: Seven layers of the OSI model the network packets. The layered protocols in a system form a network stack. Current TCP/IP stacks only realize layers from transport to network, while the ethernet drivers and hardware take care of the lowest two layers. Applications connect to the stack through a sockets API. This kind of layered networking architecture has its pros and cons. One of the biggest arguments for this kind of an architecture is the independence of the layers from each other. A developer may change the protocol residing on a certain layer without affecting the protocols on other layers as long as the interfaces don t change. One drawback of the layered networking architecture is the lack of useful information available from other layers, if strict layering is followed. A simple example: both transport (e.g. TCP) and network layer (e.g. IPv6) protocols could use information from the data link layer (e.g. IEEE ) to enhance their performance. Information could be about the link quality or whether the wireless network adapter has decided to change to another access point. TCP congestion control algorithms could take into account whether the packet loss is on the first hop from the node or somewhere deeper in the network, while IPv6 could check the validity of the IP address immediately after a handover and not wait until a signal is received from its own timers. It is probably possible to have a layered protocol stack and good mobility performance, but the mobility decisions should be done in the right place. Whether the place in the system where the decisions are taken is static (e.g. in IP or in WLAN or outside the protocol stack) or dynamically changing, there is a minimum amount of information that is needed. So, the information may flow inside the stack from layer to another 3

4 Figure 4: Common coordinating function through the service interfaces, or it might be collected to a control plane which is controlling the layers (see Figure 4) as proposed in Ambient Networks [1]. 3.2 Network layer mobility To support mobility in the networking layer, IETF has standardized Mobile IP for both IPv4 [10] and IPv6 [7]. These are extensions to the existing IP architecture and protocols at the network layer that hide mobility from the higher layer protocols and applications. The problem with the existing IP architecture regarding mobility is that the role of the IP address is overloaded it serves both as the identifier and the locator of the end host. Mobile IP solves the problem by having one IP address the home address for identifying the node, and another IP address the care-of address for locating the node. Mobile IP also introduces a special node in the home network (the network where the home address topologically belongs to) a home agent that stores the care-of address to home address binding, and redirects traffic to the mobile node while it s not connected to the home network. If the correspondent node does not support Mobile IP binding updates from the mobile node, then the problem of triangular routing occurs. Mobile IP would make traffic stealing attacks possible, but that, among other security issues has been dealt by adding security features into the protocol. 3.3 Adding the host layer Host Identity architecture [8] is another extension to the IP architecture that provides, among other things, multihoming support. The Host Identity Protocol (HIP) provides a protocol for authentication and setting up security associations between two end-hosts [9]. It uses a new Host Identity (HI) name space, based on public keys. The public keys are typically, but not necessarily, self generated. The cryptographic construct of the public-private key pairs provides strong mechanisms to authenticate remote identities, therefore HIP solves the IP address ownership problem that comes when using Mobile IP. In HIP, the public keys, not IP addresses, are used to identify a host. IP addresses are only used for routing IP packets. This implicitly leads to the situation that when a node receives a packet, it does not matter what is the source IP address, only the HIT (Host Identity Tag) is needed to identify the source of the packet. HIP adds a new layer host layer into the protocol stack between the transport and the network layers. In host layer, the binding between the HIT and a set of locators is managed. The HIP base exchange [XXX ref] is a 4-way handshake protocol that sets up a security association between two end-hosts. After this it is possible to run e.g. IPsec ESP protocol between the end-hosts. An extension to the HIP base exchange is the support for mobility and multi-homing [5]. HIP MM provides host mobility between IP addresses of same or different address families contrary to the Mobile IP, host layer provides mobility between IPv4 and IPv6 for a dual stack mobile node. 4 Enhancing the protocol stack 4.1 Collecting information Decision is based on available information at a time. The more information one has, and the more accurate it is, the better the decision is likely to be. A big part of the mobility process is the decision about handovers (i.e. decision to update mobility states). An isolated layer can t make good decisions as it lacks the knowledge of the needs of protocols running on other layers, application needs, user preferences, operator policies etc. One way to solve the problem is to move the decision making aside the protocol stack. This decision maker obviously needs information from the protocol stack but as well from the user, applications and the network. This information collection is called Trigger Collection in Ambient Networks [11]. Trigger Collection is a part of Trigger Management, which also contains e.g. Trigger Classification and a Trigger Repository. Triggers are caused by Triggering Events, which are events that may lead to an action in the mobility management system. 4.2 Access selection Currently in IEEE (WLAN) networks the mobile station selects the access point based on radio link parameters and the network id broadcasted in special 4

5 Figure 5: The access discovery and selection problem management frames called beacons. This information is, however, inadequate to base the access selection on. The user of the mobile station may have other preferences, such as price, while the applications need to know the available QoS etc. WLAN access points broadcast beacons on a regular basis, normally every 100 milliseconds. Extending the beacons with extra information makes them larger and thus wastes the available bandwidth on the channel. Inserting all desired information into the beacons would therefore not be desirable. One solution is that the beacon is extended only with a special flag which indicates that the access point is capable of delivering extra information before the standard WLAN attachment frames. If the mobile station supports using this extra information, it may send a special information request frame to the access point. The access point can then send the requested extra information in one or more special information reply frames. These information reply frames may contain any information that can help the mobile station to select the access point. The actual attachment process with the access point follows the normal WLAN procedure or as in the Quick NAP proposal (see the next section). This extra information may contain e.g. cryptographic identities list of available services with prices information on roaming partnerships supported security & AAA mechanisms It should be noted, that while this information is transmitted as part of the WLAN access point scanning, it is not useful in the existing WLAN access point selection algorithms, that are only designed with the link layer in mind. By passing this information to a software module which is aware of the whole stack will most likely result in better decisions. We could e.g. have a laptop which has an IPv4 stack and a WLAN interface. The WLAN interface will happily connect to an access point which is connected to an IPv6-only network, if there is just a strong signal to it. To prevent this kind of situations, the access points need to inform the mobile stations which services they offer. Network layer connectivity with IPv4 is one service, IPv6 another. There are two options, either the mobile station is aware of the services the other layers need or prefer, or there is a central process which makes the decisions and controls e.g. selection of the access point. 4.3 Network attachment Attaching to a WLAN access point requires several actions and roundtrips on several protocol layers before the applications at the mobile station can send and receive IP packets. These actions include e.g. authentication and association at link layer, IP address allocation and assignment, router discovery and network layer mobility updates. Performing these actions independently of each other results in suboptimal total system performance with sequential protocol runs and unnecessary timers on various layers. A new architecture, Quick NAP [3] takes the approach of looking at the whole network attachment process as a whole, and not concentrating on a single layer or a single process. Quick NAP provides a new protocol that combines link layer and network layer control functions within the same messages. In short, after the mobile station 5

6 Figure 6: Unoptimized messaging sequence for network attachment has made the decision to connect to the access point, the client initiates an attachment procedure. The first step is to run a Diffie-Hellman exchange to protect all subsequent communications and to authenticate opportunistically. In parallel with the Diffie-Hellman exchange, also third party authentication and authorization exchanges can be initiated (e.g. EAP, web-logins). After the authentication and authorization steps, the client can explicitly request services, e.g. IP network connectivity, IP address allocation or delegations of mobility updates. In the Quick NAP paper is proposed that the WLAN beacon would carry the hash of the access point s identity and also some other information. However, in the WLAN networks the beacon is broadcasted every certain time invertal, and enlarging it takes the bandwidth away from other (e.g. data) frames. Therefore it might be the best to compromise by keeping the beacon small, but using one extra round trip to query the information as described in the previous section. 5 Performance comparison To see the effects of the layering, we take two mobile nodes, both of which run HIP and IPv6. The first node strictly obeys isolated layering and sequential protocol runs, while another one uses cross-layer information like L2 triggers, parallel setup of many layers while attaching to an access network etc. We will compare the relative performance of these systems. Both mobile nodes (MN) have one g WLAN interface to connect to IPv6 access networks. Both nodes are having end-to-end connections to correspondent nodes (CN). Both nodes are using a home network based authentication server (AAA), and updating their location to the HIP Rendezvous Server (RVS). The difference between the two mobile nodes is that the first one is using the state-of the art protocols on each layer, which are not co-operating or sharing information, while the another mobile node uses different sources of information for access selection and a new network attachment protocol that sets up protocols on several layers in parallel. Another difference is that the first mobile node does not support the information extensions of the , while the second mobile does use this information to make better attachment decisions. After the first mobile node has received an beacon, its wireless lan driver checks whether the network id and the AAA settings match and makes the decision on whether to connect. At this stage, the mobile node does not know whether there is network layer connectivity through the access point. The IPv6 router discovery will later notice whether there are any usable IPv6 routers on the link. If there are none, there is no connectivity for the applications until the mobile node attaches to another access point which has IPv6 routers. IPv6 can t tell this to the WLAN driver, as it is on a different layer. The second node instead, can pick a suitable access point, if one is available, by re- 6

7 Figure 7: Optimized messaging sequence for network attachment ceiving extra information from the access points that were qualified by the information in their beacons (see section 4.2). The first node: After doing the attachment to the access point, 802.1X and EAP are used for authentication and authorization, followed by i protocol run to set up link layer encryption. After the link layer has been set up, setting up network layer follows. However, if there is no interaction between the layers, then there will be a delay before the next IPv6 Router Advertisement is received by the mobile node. After the Router Advertisement is received, the mobile node configures itself an IPv6 address and runs IPv6 Duplicate Address Detection with the mandatory one second delay. After the IPv6 address has been verified, HIP notices that the IPv6 address on the interface has been changed, and that triggers HIP to send location update messages to the location server (RVS) and correspondent nodes (CN), and applications can resume their communication (unless the TCP have timed out...). The second node: The second node supports Quick NAP, which integrates network attachment to the WLAN, IPv6 address allocation and mobility updates into just a few messages between the mobile node and the access point. The access point may communicate on behalf of the mobile node with the Access Network (AN) to allocate an IPv6 address from e.g. a DHCPv6 server. It may also forward the AAA signalling to the mobile node s home network, together with the HIP location update messages to the rendez-vous server (RVS). 6 Related and future work IETF has a working group on detecting network attachment (DNA). The purpose of this working group is to create mechanisms for an IPv6 node to detect that its link layer has or may have undergone a change, and whether its IP layer addressing and routing configurations are still valid or have changed [12]. Some of the proposed mechanisms are e.g. link layer triggers where the L2 protocol informs L3 protocols of changes in the link status. IEEE has a working group (Media Independent Handover Services) [6]. The purpose of the working group is to produce a standard way to do handovers between different IEEE 802 protocol family networks and some cellular networks. Work items include trigger collection, access selection, etc. Role-based architectures offer an alternative to the layered architectures [4]. This is a revolutionary shift in thinking and implementing, so it is yet to see if it progresses from the paper level. It is to be analyzed how this kind of architecture would help in supporting different mobility scenarios. Ambient Networks project presents an Ambient Control Space which aims to glue together the existing and new protocols and networks and offers transparent and seamless mobility between different types of networks, different address spaces and different operators. Future work is to implement the proposed enhancements into access selection and network attachment and to measure the effect of those in real systems. 7 Conclusions In section 2 we had a look into mobility, what it is and what could be the objects that are mobile. The conclusion is that the view on what is mobility should be broad when designing the network architecture, to avoid a later need to patch the mobility support in. Mobility can also be seen as a continuous process, where different events trigger different decisions, causing mobility events to happen. Section 3 introduced layered network architectures, and listed some mobility issues. Also two different solutions to add mobility into the IP architectures was presented, namely Mobile IP and HIP. In section 4 some new approaches on enhancing the 7

8 protocol stacks. One of the most important things is how to collect information, and who is using that information. Another enhancement is the extension of IEEE signalling to help selecting the correct access point. Third work that was introduced, was the Quick NAP, which brings more parallelism and therefore speed into the network attachment step. Section 5 presented how strict layering and even decent mobility performance is difficult to combine without some level of co-operation or information exchange between layers. Two example systems with HIP, IPv6 and WLAN were compared. It is clear that with strict layering the mobility performance would be far from the expectations of the end users. Section 6 presented some related and future work. The intention of the author of this paper is to work further on integrating the ideas presented in this paper. The work could include e.g. implementing a prototype and comparing it to existing solutions. [9] R. Moskowitz, P. Nikander, P. Jokela, and T. Henderson. Host Identity Protocol. draft-ietf-hipbase-04.txt, work in progress, October [10] C. Perkins. IP Mobility Support for IPv4, revised. draft-ietf-mip4-rfc3344bis-02.txt, work in progress, October [11] V. Typpö, O. Gonsa, T. Rinta-aho, B. Tharon, and S. Bonjour. Triggering Multi-dimensional Mobility in Ambient Networks. In 14th IST Mobile & Wireless Communications Summit (IST 05), March [12] A. Yegin. Link-layer Event Notifications for Detecting Network Attachments. draft-ietf-dnalink-information-03.txt, work in progress, October Acknowledgements Yuri Ismailov, Jari Arkko, Jukka Ylitalo, Tero Kauppinen, members of the Ambient Networks project. References [1] Ambient Networks Project. D1.5 AN Framework Architecture (IST AN/WP1- D05). Technical report, December [2] Ambient Networks Project. D4.2 Mobility Architecture & Concepts (IST AN/WP4/D4.2). April [3] J. Arkko, P. Eronen, S. Heikkinen, and A. Prasand. Quick NAP - Secure and Efficient Network Access Protocol [4] R. Braden, T. Faber, and M. Handley. From protocol stack to protocol heap: role-based architecture. SIGCOMM Comput. Commun. Rev., 33(1):17 22, [5] T. Henderson. End-Host Mobility and Multihoming with the Host Identity Protocol. draft-ietf-hipmm-02.txt, work in progress, July [6] IEEE Draft IEEE Standard for Local and Metropolitan Area Networks: Media Independent Handover Services (IEEE P802.21/D00.01), July [7] D. Johnson, C. Perkins, and J. Arkko. Mobility Support in IPv6. RFC 3775, June [8] R. Moskowitz and P. Nikander. Host Identity Protocol Architecture. draft-ietf-hip-arch-03.txt, work in progress, August

The Layering Principle and Mobility Performance

The Layering Principle and Mobility Performance The Layering Principle and Mobility Performance Teemu Rinta-aho 30.11.2005 T-110.7190 Research Seminar on Datacommunications Software Contents Introduction Mobility Network Architectures

More information

Dynamic Selection of Optimal Wireless Access Service

Dynamic Selection of Optimal Wireless Access Service Dynamic Selection of Optimal Wireless Access Service Teemu inta-aho teemu.rinta-aho@tkk.fi Abstract The number of different wireless access technologies is increasing, as well as the number of players

More information

Introduction to Mobile IPv6

Introduction to Mobile IPv6 1 Introduction to Mobile IPv6 III IPv6 Global Summit Moscow Dr. Dimitrios Kalogeras dkalo@grnet.gr GRNET Outline Introduction Relevant Features of IPv6 Major Differences between MIPv4 and MIPv6 Mobile

More information

Threats and Security Analysis for Enhanced Secure Neighbor Discovery Protocol (SEND) of IPv6 NDP Security

Threats and Security Analysis for Enhanced Secure Neighbor Discovery Protocol (SEND) of IPv6 NDP Security Threats and Security Analysis for Enhanced Secure Neighbor Discovery Protocol (SEND) of IPv6 NDP Security Yvette E. Gelogo 1, Ronnie D. Caytiles 1 and Byungjoo Park 1 * 1Multimedia Engineering Department,

More information

MPLS VPN in Cellular Mobile IPv6 Architectures(04##017)

MPLS VPN in Cellular Mobile IPv6 Architectures(04##017) MPLS VPN in Cellular Mobile IPv6 Architectures(04##017) Yao-Chung Chang, Han-Chieh Chao, K.M. Liu and T. G. Tsuei* Department of Electrical Engineering, National Dong Hwa University Hualien, Taiwan, Republic

More information

An Active Network Based Hierarchical Mobile Internet Protocol Version 6 Framework

An Active Network Based Hierarchical Mobile Internet Protocol Version 6 Framework An Active Network Based Hierarchical Mobile Internet Protocol Version 6 Framework Zutao Zhu Zhenjun Li YunYong Duan Department of Business Support Department of Computer Science Department of Business

More information

Seamless Handover of Streamed Video over UDP between Wireless LANs

Seamless Handover of Streamed Video over UDP between Wireless LANs Seamless Handover of Streamed Video over UDP between Wireless LANs Ger Cunningham, Seán Murphy, Liam Murphy Department of Computer Science University College Dublin Dublin, Ireland {ger.munningham,liam.murphy@ucd.ie,

More information

Mobility Management Advanced

Mobility Management Advanced Mobility Management Advanced Summer Semester 2011 Integrated Communication Systems Group Ilmenau University of Technology Outline Motivation Mobility Management Approaches in the TCP/IP Reference Model

More information

VPN. Date: 4/15/2004 By: Heena Patel Email:hpatel4@stevens-tech.edu

VPN. Date: 4/15/2004 By: Heena Patel Email:hpatel4@stevens-tech.edu VPN Date: 4/15/2004 By: Heena Patel Email:hpatel4@stevens-tech.edu What is VPN? A VPN (virtual private network) is a private data network that uses public telecommunicating infrastructure (Internet), maintaining

More information

Ethernet. Ethernet. Network Devices

Ethernet. Ethernet. Network Devices Ethernet Babak Kia Adjunct Professor Boston University College of Engineering ENG SC757 - Advanced Microprocessor Design Ethernet Ethernet is a term used to refer to a diverse set of frame based networking

More information

SERVICE DISCOVERY AND MOBILITY MANAGEMENT

SERVICE DISCOVERY AND MOBILITY MANAGEMENT Objectives: 1) Understanding some popular service discovery protocols 2) Understanding mobility management in WLAN and cellular networks Readings: 1. Fundamentals of Mobile and Pervasive Computing (chapt7)

More information

Tomás P. de Miguel DIT-UPM. dit UPM

Tomás P. de Miguel DIT-UPM. dit UPM Tomás P. de Miguel DIT- 15 12 Internet Mobile Market Phone.com 15 12 in Millions 9 6 3 9 6 3 0 1996 1997 1998 1999 2000 2001 0 Wireless Internet E-mail subscribers 2 (January 2001) Mobility The ability

More information

Procedure: You can find the problem sheet on Drive D: of the lab PCs. 1. IP address for this host computer 2. Subnet mask 3. Default gateway address

Procedure: You can find the problem sheet on Drive D: of the lab PCs. 1. IP address for this host computer 2. Subnet mask 3. Default gateway address Objectives University of Jordan Faculty of Engineering & Technology Computer Engineering Department Computer Networks Laboratory 907528 Lab.4 Basic Network Operation and Troubleshooting 1. To become familiar

More information

CCNA R&S: Introduction to Networks. Chapter 5: Ethernet

CCNA R&S: Introduction to Networks. Chapter 5: Ethernet CCNA R&S: Introduction to Networks Chapter 5: Ethernet 5.0.1.1 Introduction The OSI physical layer provides the means to transport the bits that make up a data link layer frame across the network media.

More information

21.4 Network Address Translation (NAT) 21.4.1 NAT concept

21.4 Network Address Translation (NAT) 21.4.1 NAT concept 21.4 Network Address Translation (NAT) This section explains Network Address Translation (NAT). NAT is also known as IP masquerading. It provides a mapping between internal IP addresses and officially

More information

Final for ECE374 05/06/13 Solution!!

Final for ECE374 05/06/13 Solution!! 1 Final for ECE374 05/06/13 Solution!! Instructions: Put your name and student number on each sheet of paper! The exam is closed book. You have 90 minutes to complete the exam. Be a smart exam taker -

More information

Course Overview: Learn the essential skills needed to set up, configure, support, and troubleshoot your TCP/IP-based network.

Course Overview: Learn the essential skills needed to set up, configure, support, and troubleshoot your TCP/IP-based network. Course Name: TCP/IP Networking Course Overview: Learn the essential skills needed to set up, configure, support, and troubleshoot your TCP/IP-based network. TCP/IP is the globally accepted group of protocols

More information

Overview of Routing between Virtual LANs

Overview of Routing between Virtual LANs Overview of Routing between Virtual LANs This chapter provides an overview of virtual LANs (VLANs). It describes the encapsulation protocols used for routing between VLANs and provides some basic information

More information

Telecommunication Services Engineering (TSE) Lab. Chapter III 4G Long Term Evolution (LTE) and Evolved Packet Core (EPC)

Telecommunication Services Engineering (TSE) Lab. Chapter III 4G Long Term Evolution (LTE) and Evolved Packet Core (EPC) Chapter III 4G Long Term Evolution (LTE) and Evolved Packet Core (EPC) http://users.encs.concordia.ca/~glitho/ Outline 1. LTE 2. EPC architectures (Basic and advanced) 3. Mobility management in EPC 4.

More information

Object Identification for Ubiquitous Networking

Object Identification for Ubiquitous Networking Object Identification for Ubiquitous Networking Gyu Myoung Lee 1, Jun Kyun Choi 2, Noel Crespi 1 1 Institut TELECOM SudParis 9 rue Charles Fourier, 91011, Evry France {gm.lee, noel.crespi}@it-sudparis.eu

More information

Quick NAP - Secure and Efficient Network Access Protocol

Quick NAP - Secure and Efficient Network Access Protocol Quick NAP - Secure and Efficient Network Access Protocol Jari Arkko, Pasi Eronen, Hannes Tschofenig, Seppo Heikkinen and Anand Prasad Ericsson Research NomadicLab, E-Mail: Jari.Arkko@ericsson.com Nokia

More information

Final Exam. Route Computation: One reason why link state routing is preferable to distance vector style routing.

Final Exam. Route Computation: One reason why link state routing is preferable to distance vector style routing. UCSD CSE CS 123 Final Exam Computer Networks Directions: Write your name on the exam. Write something for every question. You will get some points if you attempt a solution but nothing for a blank sheet

More information

Introduction Chapter 1. Uses of Computer Networks

Introduction Chapter 1. Uses of Computer Networks Introduction Chapter 1 Uses of Computer Networks Network Hardware Network Software Reference Models Example Networks Network Standardization Metric Units Revised: August 2011 Uses of Computer Networks

More information

Boosting mobility performance with Multi-Path TCP

Boosting mobility performance with Multi-Path TCP Boosting mobility performance with Multi-Path TCP Name SURNAME 1, Name SURNAME 2 1 Organisation, Address, City, Postcode, Country Tel: +countrycode localcode number, Fax: + countrycode localcode number,

More information

RARP: Reverse Address Resolution Protocol

RARP: Reverse Address Resolution Protocol SFWR 4C03: Computer Networks and Computer Security January 19-22 2004 Lecturer: Kartik Krishnan Lectures 7-9 RARP: Reverse Address Resolution Protocol When a system with a local disk is bootstrapped it

More information

IP-based Mobility Management for a Distributed Radio Access Network Architecture. helmut.becker@siemens.com

IP-based Mobility Management for a Distributed Radio Access Network Architecture. helmut.becker@siemens.com IP-based Mobility Management for a Distributed Radio Access Network Architecture helmut.becker@siemens.com Outline - Definition IP-based Mobility Management for a Distributed RAN Architecture Page 2 Siemens

More information

RESOURCE DISCOVERY IN AD HOC NETWORKS

RESOURCE DISCOVERY IN AD HOC NETWORKS RESOURCE DISCOVERY IN AD HOC NETWORKS Diane Tang Chih-Yuan Chang Kei Tanaka Mary Baker Technical Report No.: CSL-TR-98-769 August 1998 This project is in part supported by FX Palo Alto Laboratories and

More information

CCT vs. CCENT Skill Set Comparison

CCT vs. CCENT Skill Set Comparison Operation of IP Data Networks Recognize the purpose and functions of various network devices such as Routers, Switches, Bridges and Hubs Select the components required to meet a given network specification

More information

Wireless Local Area Networks (WLANs)

Wireless Local Area Networks (WLANs) 4 Wireless Local Area Networks (WLANs) Contents Overview...................................................... 4-3 Configuration Options: Normal Versus Advanced Mode.............. 4-4 Normal Mode Configuration..................................

More information

Exposing Link-Change Events to Applications

Exposing Link-Change Events to Applications Exposing Link-Change Events to Applications Problem Description As a Mobile Node (MN) handoffs from one Point Of Attachment (POA) to another, the state of its network interface (in the MN) changes: From

More information

Mobile Internet Protocol v6 MIPv6

Mobile Internet Protocol v6 MIPv6 Mobile Internet Protocol v6 MIPv6 A brief introduction Holger.Zuleger@hznet.de 13-dec-2005 Holger Zuleger 1/15 > c Defined by MIPv6 RFC3775: Mobility Support in IPv6 (June 2004) RFC3776: Using IPsec to

More information

Mobility Management for IP-based Mobile Networks

Mobility Management for IP-based Mobile Networks Mobility Management for IP-based Mobile Networks H. Becker, N. Gerlich, M. Schopp Siemens Information & Communication Mobile Munich, Germany 1 Overview Introduction to IP-based Radio Access Networks Definition

More information

Chapter 9. IP Secure

Chapter 9. IP Secure Chapter 9 IP Secure 1 Network architecture is usually explained as a stack of different layers. Figure 1 explains the OSI (Open System Interconnect) model stack and IP (Internet Protocol) model stack.

More information

SFWR 4C03: Computer Networks & Computer Security Jan 3-7, 2005. Lecturer: Kartik Krishnan Lecture 1-3

SFWR 4C03: Computer Networks & Computer Security Jan 3-7, 2005. Lecturer: Kartik Krishnan Lecture 1-3 SFWR 4C03: Computer Networks & Computer Security Jan 3-7, 2005 Lecturer: Kartik Krishnan Lecture 1-3 Communications and Computer Networks The fundamental purpose of a communication network is the exchange

More information

Wireless Mesh Networks under FreeBSD

Wireless Mesh Networks under FreeBSD Wireless Networks under FreeBSD Rui Paulo rpaulo@freebsd.org The FreeBSD Project AsiaBSDCon 2010 - Tokyo, Japan Abstract With the advent of low cost wireless chipsets, wireless mesh networks became much

More information

IP Flow Mobility: Smart Traffic Offload for Future Wireless Networks

IP Flow Mobility: Smart Traffic Offload for Future Wireless Networks 1 IP Flow Mobility: Smart Traffic Offload for Future Wireless Networks Antonio de la Oliva, Carlos J. Bernardos, Maria Calderon, Telemaco Melia and Juan Carlos Zuniga Universidad Carlos III de Madrid,

More information

VLANs. Application Note

VLANs. Application Note VLANs Application Note Table of Contents Background... 3 Benefits... 3 Theory of Operation... 4 IEEE 802.1Q Packet... 4 Frame Size... 5 Supported VLAN Modes... 5 Bridged Mode... 5 Static SSID to Static

More information

MIP6 Route Optimization Enhancements

MIP6 Route Optimization Enhancements MIP6 Route Optimization Enhancements draft-arkko-mip6-ro-enhancements-00 Jari Arkko, jari.arkko@ericsson.com Christian Vogt, chvogt@tm.uka.de IETF 61, Washington D.C. Mobopts Meeting, November 10, 2004

More information

Mobility (and philosophical questions about names and identity) David Andersen CMU CS 15-744. The problem

Mobility (and philosophical questions about names and identity) David Andersen CMU CS 15-744. The problem Mobility (and philosophical questions about names and identity) David Andersen CMU CS 15-744 The problem How to support mobile users What do we mean by support? Make it easy and convenient to effectively

More information

Data Networking and Architecture. Delegates should have some basic knowledge of Internet Protocol and Data Networking principles.

Data Networking and Architecture. Delegates should have some basic knowledge of Internet Protocol and Data Networking principles. Data Networking and Architecture The course focuses on theoretical principles and practical implementation of selected Data Networking protocols and standards. Physical network architecture is described

More information

Charter Text Network Design and Configuration

Charter Text Network Design and Configuration MIF Charter update proposal MIF WG Charter update proposal summary http://www.ietf.org/mail-archive/web/mif/current/msg02125.html Specific deliverables listed MPVD architecture document Requirement for

More information

Authentication, Authorization and Accounting (AAA) Protocols

Authentication, Authorization and Accounting (AAA) Protocols Authentication, Authorization and Accounting (AAA) Protocols Agententechnologien in der Telekommunikation Sommersemester 2009 Babak Shafieian babak.shafieian@dai-labor.de 10.06.2009 Agententechnologien

More information

Dynamic Network Interface Selection in Multihomed Mobile Hosts

Dynamic Network Interface Selection in Multihomed Mobile Hosts Dynamic Network Interface Selection in Multihomed Mobile Hosts Jukka Ylitalo, Tony Jokikyyny, Tero Kauppinen, Antti J. Tuominen, Jaakko Laine Abstract Current mobile devices are often equipped with several

More information

IP and Mobility. Requirements to a Mobile IP. Terminology in Mobile IP

IP and Mobility. Requirements to a Mobile IP. Terminology in Mobile IP IP and Mobility Chapter 2 Technical Basics: Layer Methods for Medium Access: Layer 2 Chapter Wireless Networks: Bluetooth, WLAN, WirelessMAN, WirelessWAN Mobile Telecommunication Networks: GSM, GPRS, UMTS

More information

A Proxy Mobile IP based Layer-3 Handover Scheme for Mobile WiMAX based Wireless Mesh Networks

A Proxy Mobile IP based Layer-3 Handover Scheme for Mobile WiMAX based Wireless Mesh Networks A Proxy Mobile IP based Layer-3 Handover Scheme for Mobile WiMAX based Wireless Mesh Networks Min-Kim, Jong-min Kim, Hwa-sung Kim Dept. of Electronics and Communications Engineering Kwangwoon University

More information

Objectives of Lecture. Network Architecture. Protocols. Contents

Objectives of Lecture. Network Architecture. Protocols. Contents Objectives of Lecture Network Architecture Show how network architecture can be understood using a layered approach. Introduce the OSI seven layer reference model. Introduce the concepts of internetworking

More information

A O T. Heterogeneous Networks and Mobility User Perspective. Agententechnologien in der Telekommunikation Sommersemester 2009. Lecture 4 20.05.

A O T. Heterogeneous Networks and Mobility User Perspective. Agententechnologien in der Telekommunikation Sommersemester 2009. Lecture 4 20.05. Heterogeneous Networks and Mobility User Perspective Agententechnologien in der Telekommunikation Sommersemester 2009 Thomas Geithner thomas.geithner@dai-labor.de Lecture 4 20.05.2009 Agententechnologien

More information

IPv4 and IPv6 Integration. Formation IPv6 Workshop Location, Date

IPv4 and IPv6 Integration. Formation IPv6 Workshop Location, Date IPv4 and IPv6 Integration Formation IPv6 Workshop Location, Date Agenda Introduction Approaches to deploying IPv6 Standalone (IPv6-only) or alongside IPv4 Phased deployment plans Considerations for IPv4

More information

Mobile IP. Bheemarjuna Reddy Tamma IIT Hyderabad. Source: Slides of Charlie Perkins and Geert Heijenk on Mobile IP

Mobile IP. Bheemarjuna Reddy Tamma IIT Hyderabad. Source: Slides of Charlie Perkins and Geert Heijenk on Mobile IP Mobile IP Bheemarjuna Reddy Tamma IIT Hyderabad Source: Slides of Charlie Perkins and Geert Heijenk on Mobile IP IP Refresher Mobile IP Basics 3 parts of Mobile IP: Outline Advertising Care-of Addresses

More information

Mobile IPv6: Configuration and Trials

Mobile IPv6: Configuration and Trials Mobile IPv6: Configuration and Trials Tudor Blaga Technical University of Cluj-Napoca Tudor.Blaga@ com.utcluj.ro Virgil Dobrota Technical University of Cluj-Napoca Virgil.Dobrota@ com.utcluj.ro Daniel

More information

Network Access Security. Lesson 10

Network Access Security. Lesson 10 Network Access Security Lesson 10 Objectives Exam Objective Matrix Technology Skill Covered Exam Objective Exam Objective Number Firewalls Given a scenario, install and configure routers and switches.

More information

Internet, Part 2. 1) Session Initiating Protocol (SIP) 2) Quality of Service (QoS) support. 3) Mobility aspects (terminal vs. personal mobility)

Internet, Part 2. 1) Session Initiating Protocol (SIP) 2) Quality of Service (QoS) support. 3) Mobility aspects (terminal vs. personal mobility) Internet, Part 2 1) Session Initiating Protocol (SIP) 2) Quality of Service (QoS) support 3) Mobility aspects (terminal vs. personal mobility) 4) Mobile IP Session Initiation Protocol (SIP) SIP is a protocol

More information

Network Layer: Network Layer and IP Protocol

Network Layer: Network Layer and IP Protocol 1 Network Layer: Network Layer and IP Protocol Required reading: Garcia 7.3.3, 8.1, 8.2.1 CSE 3213, Winter 2010 Instructor: N. Vlajic 2 1. Introduction 2. Router Architecture 3. Network Layer Protocols

More information

Behavior Analysis of TCP Traffic in Mobile Ad Hoc Network using Reactive Routing Protocols

Behavior Analysis of TCP Traffic in Mobile Ad Hoc Network using Reactive Routing Protocols Behavior Analysis of TCP Traffic in Mobile Ad Hoc Network using Reactive Routing Protocols Purvi N. Ramanuj Department of Computer Engineering L.D. College of Engineering Ahmedabad Hiteishi M. Diwanji

More information

Internet Control Protocols Reading: Chapter 3

Internet Control Protocols Reading: Chapter 3 Internet Control Protocols Reading: Chapter 3 ARP - RFC 826, STD 37 DHCP - RFC 2131 ICMP - RFC 0792, STD 05 1 Goals of Today s Lecture Bootstrapping an end host Learning its own configuration parameters

More information

Transport Layer Protocols

Transport Layer Protocols Transport Layer Protocols Version. Transport layer performs two main tasks for the application layer by using the network layer. It provides end to end communication between two applications, and implements

More information

Mobile IP Part I: IPv4

Mobile IP Part I: IPv4 Mobile IP Part I: IPv4 Raj Jain Washington University in Saint Louis Saint Louis, MO 63130 Jain@cse.wustl.edu These slides are available on-line at: http://www.cse.wustl.edu/~jain/cse574-06/ 12-1 q Mobile

More information

Introduction to IPv6 and Benefits of IPv6

Introduction to IPv6 and Benefits of IPv6 Introduction to IPv6 and Benefits of IPv6 Ammar Yasir Korkusuz 2012 Bogazici University, Electrical-Electronics Engineering Department MSc. Student EE 545 TERM PROJECT Abstract: IPv6 is a new internet

More information

Network Design Best Practices for Deploying WLAN Switches

Network Design Best Practices for Deploying WLAN Switches Network Design Best Practices for Deploying WLAN Switches A New Debate As wireless LAN products designed for the enterprise came to market, a debate rapidly developed pitting the advantages of standalone

More information

IPv6 SECURITY. May 2011. The Government of the Hong Kong Special Administrative Region

IPv6 SECURITY. May 2011. The Government of the Hong Kong Special Administrative Region IPv6 SECURITY May 2011 The Government of the Hong Kong Special Administrative Region The contents of this document remain the property of, and may not be reproduced in whole or in part without the express

More information

Introducing Reliability and Load Balancing in Mobile IPv6 based Networks

Introducing Reliability and Load Balancing in Mobile IPv6 based Networks Introducing Reliability and Load Balancing in Mobile IPv6 based Networks Jahanzeb Faizan Southern Methodist University Dallas, TX, USA jfaizan@engr.smu.edu Hesham El-Rewini Southern Methodist University

More information

Introduction to IP v6

Introduction to IP v6 IP v 1-3: defined and replaced Introduction to IP v6 IP v4 - current version; 20 years old IP v5 - streams protocol IP v6 - replacement for IP v4 During developments it was called IPng - Next Generation

More information

Bit Chat: A Peer-to-Peer Instant Messenger

Bit Chat: A Peer-to-Peer Instant Messenger Bit Chat: A Peer-to-Peer Instant Messenger Shreyas Zare shreyas@technitium.com https://technitium.com December 20, 2015 Abstract. Bit Chat is a peer-to-peer instant messaging concept, allowing one-to-one

More information

Network Mobility Support Scheme on PMIPv6 Networks

Network Mobility Support Scheme on PMIPv6 Networks Network Mobility Support Scheme on PMIPv6 Networks Hyo-Beom Lee 1, Youn-Hee Han 2 and Sung-Gi Min 1 1 Dept. of Computer Science and Engineering, Korea University, Seoul, South Korea. sgmin@korea.ac.kr

More information

CSIS 3230. CSIS 3230 Spring 2012. Networking, its all about the apps! Apps on the Edge. Application Architectures. Pure P2P Architecture

CSIS 3230. CSIS 3230 Spring 2012. Networking, its all about the apps! Apps on the Edge. Application Architectures. Pure P2P Architecture Networking, its all about the apps! CSIS 3230 Chapter 2: Layer Concepts Chapter 5.4: Link Layer Addressing Networks exist to support apps Web Social ing Multimedia Communications Email File transfer Remote

More information

Life of a Packet CS 640, 2015-01-22

Life of a Packet CS 640, 2015-01-22 Life of a Packet CS 640, 2015-01-22 Outline Recap: building blocks Application to application communication Process to process communication Host to host communication Announcements Syllabus Should have

More information

Mobility Management 嚴 力 行 高 雄 大 學 資 工 系

Mobility Management 嚴 力 行 高 雄 大 學 資 工 系 Mobility Management 嚴 力 行 高 雄 大 學 資 工 系 Mobility Management in Cellular Systems Cellular System HLR PSTN MSC MSC VLR BSC BSC BSC cell BTS BTS BTS BTS MT BTS BTS BTS BTS HLR and VLR HLR (Home Location Register)

More information

HP and IPv6 Deployment. Bill Medlin HP-UX IPv6 Project Manager

HP and IPv6 Deployment. Bill Medlin HP-UX IPv6 Project Manager HP and IPv6 Deployment Bill Medlin HP-UX IPv6 Project Manager OUTLINE Why IPv6? Current HP-UX IPv6 Features IPv6 Customer Experience HP-UX and IPv6 Deployment HP Strategy for IPv6 page 2 Why IPv6? Immediate

More information

Packet Level Authentication Overview

Packet Level Authentication Overview Packet Level Authentication Overview Dmitrij Lagutin, Dmitrij.Lagutin@hiit.fi Helsinki Institute for Information Technology HIIT Aalto University School of Science and Technology Contents Introduction

More information

Improved Digital Media Delivery with Telestream HyperLaunch

Improved Digital Media Delivery with Telestream HyperLaunch WHITE PAPER Improved Digital Media Delivery with Telestream THE CHALLENGE Increasingly, Internet Protocol (IP) based networks are being used to deliver digital media. Applications include delivery of news

More information

6 Mobility Management

6 Mobility Management Politecnico di Milano Facoltà di Ingegneria dell Informazione 6 Mobility Management Reti Mobili Distribuite Prof. Antonio Capone Introduction Mobility management allows a terminal to change its point of

More information

Computer Network. Interconnected collection of autonomous computers that are able to exchange information

Computer Network. Interconnected collection of autonomous computers that are able to exchange information Introduction Computer Network. Interconnected collection of autonomous computers that are able to exchange information No master/slave relationship between the computers in the network Data Communications.

More information

IT 3202 Internet Working (New)

IT 3202 Internet Working (New) [All Rights Reserved] SLIATE SRI LANKA INSTITUTE OF ADVANCED TECHNOLOGICAL EDUCATION (Established in the Ministry of Higher Education, vide in Act No. 29 of 1995) Instructions for Candidates: Answer any

More information

OPNET - Network Simulator

OPNET - Network Simulator Simulations and Tools for Telecommunications 521365S: OPNET - Network Simulator Jarmo Prokkola Project Manager, M. Sc. (Tech.) VTT Technical Research Centre of Finland Kaitoväylä 1, Oulu P.O. Box 1100,

More information

Connecting IPv6 capable Bluetooth Low Energy sensors with the Internet of Things

Connecting IPv6 capable Bluetooth Low Energy sensors with the Internet of Things Connecting IPv6 capable Bluetooth Low Energy sensors with the Internet of Things Johanna Nieminen (Nokia), Future Internet SHOK preconference 30.05.2012 IoT Taxonomy ZigBee 802.5.4 Bluetooth Video RFID

More information

Enabling Multiple Wireless Networks on RV320 VPN Router, WAP321 Wireless-N Access Point, and Sx300 Series Switches

Enabling Multiple Wireless Networks on RV320 VPN Router, WAP321 Wireless-N Access Point, and Sx300 Series Switches print email Article ID: 4941 Enabling Multiple Wireless Networks on RV320 VPN Router, WAP321 Wireless-N Access Point, and Sx300 Series Switches Objective In an ever-changing business environment, your

More information

Internet Architecture for Robust Mobility. Sangheon Pack (백상헌) Korea University shpack@korea.ac.kr

Internet Architecture for Robust Mobility. Sangheon Pack (백상헌) Korea University shpack@korea.ac.kr Internet Architecture for Robust Mobility Sangheon Pack (백상헌) Korea University shpack@korea.ac.kr Contents Introduction IETF Activity Home Agent Reliability Protocol P2P-based Approaches ROAM and SAMP

More information

A Multi-level Security Mechanism for Secure Data Transmission in SCTP

A Multi-level Security Mechanism for Secure Data Transmission in SCTP Research Journal of Applied Sciences, Engineering and Technology 7(10): 2123-2128, 2014 ISSN: 2040-7459; e-issn: 2040-7467 Maxwell Scientific Organization, 2014 Submitted: July 6, 2013 Accepted: September

More information

STRESS TESTING OF HOST IDENTITY PROTOCOL (HIP) IMPLEMENTATIONS

STRESS TESTING OF HOST IDENTITY PROTOCOL (HIP) IMPLEMENTATIONS STRESS TESTING OF HOST IDENTITY PROTOCOL (HIP) IMPLEMENTATIONS Oleg Ponomarev Andrei Gurtov Helsinki Institute for Information Technology HIIT, Finland Helsinki University of Technology TKK oleg.ponomarev@hiit.fi,

More information

8/27/2014. What is a computer network? Introduction. Business Applications (1) Uses of Computer Networks. Business Applications (2)

8/27/2014. What is a computer network? Introduction. Business Applications (1) Uses of Computer Networks. Business Applications (2) What is a computer network? Introduction Chapter 1 A number of separate but interconnected computers A collection of autonomous computers interconnected by a single technology COURSE FOCUS: design and

More information

Abstract. 2 Overview of mobility in WLAN. 1 Introduction

Abstract. 2 Overview of mobility in WLAN. 1 Introduction A study of mobility in WLAN Fengping Li Helsinki University of Technology Telecommunication Software and Multimedia Laboratory fli@cc.hut.fi Abstract This paper studies mobility in wireless LAN (WLAN,

More information

REDUCING PACKET OVERHEAD IN MOBILE IPV6

REDUCING PACKET OVERHEAD IN MOBILE IPV6 REDUCING PACKET OVERHEAD IN MOBILE IPV6 ABSTRACT Hooshiar Zolfagharnasab 1 1 Department of Computer Engineering, University of Isfahan, Isfahan, Iran hoppico@eng.ui.ac.ir hozo19@gmail.com Common Mobile

More information

Best Practices for SIP Security

Best Practices for SIP Security Best Practices for SIP Security IMTC SIP Parity Group Version 21 November 9, 2011 Table of Contents 1. Overview... 33 2. Security Profile... 33 3. Authentication & Identity Protection... 33 4. Protecting

More information

Birdstep Intelligent Mobile IP Client v2.0, Universal Edition. Seamless secure mobility across all networks. Copyright 2002 Birdstep Technology ASA

Birdstep Intelligent Mobile IP Client v2.0, Universal Edition. Seamless secure mobility across all networks. Copyright 2002 Birdstep Technology ASA White Paper Birdstep Intelligent Mobile IP Client v2.0, Universal Edition Seamless secure mobility across all networks Copyright 2002 Birdstep Technology ASA Haakon VII's gate 5B, N-0161 Oslo, Norway Tel:

More information

CME: A Middleware Architecture for Network-Aware Adaptive Applications

CME: A Middleware Architecture for Network-Aware Adaptive Applications CME: A Middleware Architecture for Network-Aware Adaptive Applications Jun-Zhao Sun, Jari Tenhunen, and Jaakko Sauvola MediaTeam, Machine Vision and Media Processing Unit, Infotech Oulu P.O.Box 4500 4SOINFO,

More information

Chapter 17. Transport-Level Security

Chapter 17. Transport-Level Security Chapter 17 Transport-Level Security Web Security Considerations The World Wide Web is fundamentally a client/server application running over the Internet and TCP/IP intranets The following characteristics

More information

Security. Contents. S-72.3240 Wireless Personal, Local, Metropolitan, and Wide Area Networks 1

Security. Contents. S-72.3240 Wireless Personal, Local, Metropolitan, and Wide Area Networks 1 Contents Security requirements Public key cryptography Key agreement/transport schemes Man-in-the-middle attack vulnerability Encryption. digital signature, hash, certification Complete security solutions

More information

BASIC ANALYSIS OF TCP/IP NETWORKS

BASIC ANALYSIS OF TCP/IP NETWORKS BASIC ANALYSIS OF TCP/IP NETWORKS INTRODUCTION Communication analysis provides powerful tool for maintenance, performance monitoring, attack detection, and problems fixing in computer networks. Today networks

More information

The Elements of GigE Vision

The Elements of GigE Vision What Is? The standard was defined by a committee of the Automated Imaging Association (AIA). The committee included Basler AG and companies from all major product segments in the vision industry. The goal

More information

VXLAN: Scaling Data Center Capacity. White Paper

VXLAN: Scaling Data Center Capacity. White Paper VXLAN: Scaling Data Center Capacity White Paper Virtual Extensible LAN (VXLAN) Overview This document provides an overview of how VXLAN works. It also provides criteria to help determine when and where

More information

An Experimental Study of Cross-Layer Security Protocols in Public Access Wireless Networks

An Experimental Study of Cross-Layer Security Protocols in Public Access Wireless Networks An Experimental Study of Cross-Layer Security Protocols in Public Access Wireless Networks Avesh K. Agarwal Wenye Wang Department of Electrical and Computer Engineering North Carolina State University,

More information

Review: Lecture 1 - Internet History

Review: Lecture 1 - Internet History Review: Lecture 1 - Internet History late 60's ARPANET, NCP 1977 first internet 1980's The Internet collection of networks communicating using the TCP/IP protocols 1 Review: Lecture 1 - Administration

More information

Configuring a Site-to-Site VPN Tunnel Between Cisco RV320 Gigabit Dual WAN VPN Router and Cisco (1900/2900/3900) Series Integrated Services Router

Configuring a Site-to-Site VPN Tunnel Between Cisco RV320 Gigabit Dual WAN VPN Router and Cisco (1900/2900/3900) Series Integrated Services Router print email Article ID: 4938 Configuring a Site-to-Site VPN Tunnel Between Cisco RV320 Gigabit Dual WAN VPN Router and Cisco (1900/2900/3900) Series Integrated Services Router Objective Virtual Private

More information

5.0 Network Architecture. 5.1 Internet vs. Intranet 5.2 NAT 5.3 Mobile Network

5.0 Network Architecture. 5.1 Internet vs. Intranet 5.2 NAT 5.3 Mobile Network 5.0 Network Architecture 5.1 Internet vs. Intranet 5.2 NAT 5.3 Mobile Network 1 5.1The Internet Worldwide connectivity ISPs connect private and business users Private: mostly dial-up connections Business:

More information

13 Virtual Private Networks 13.1 Point-to-Point Protocol (PPP) 13.2 Layer 2/3/4 VPNs 13.3 Multi-Protocol Label Switching 13.4 IPsec Transport Mode

13 Virtual Private Networks 13.1 Point-to-Point Protocol (PPP) 13.2 Layer 2/3/4 VPNs 13.3 Multi-Protocol Label Switching 13.4 IPsec Transport Mode 13 Virtual Private Networks 13.1 Point-to-Point Protocol (PPP) PPP-based remote access using dial-in PPP encryption control protocol (ECP) PPP extensible authentication protocol (EAP) 13.2 Layer 2/3/4

More information

Linux Network Security

Linux Network Security Linux Network Security Course ID SEC220 Course Description This extremely popular class focuses on network security, and makes an excellent companion class to the GL550: Host Security course. Protocols

More information

Developing Network Security Strategies

Developing Network Security Strategies NETE-4635 Computer Network Analysis and Design Developing Network Security Strategies NETE4635 - Computer Network Analysis and Design Slide 1 Network Security Design The 12 Step Program 1. Identify network

More information

Mobility on IPv6 Networks

Mobility on IPv6 Networks Mobility on IPv6 Networks Pedro M. Ruiz Project Manager Agora Systems S.A. Global IPv6 Summit Madrid 13-15 March 2002 Pedro M. Ruiz (c) Agora Systems S.A, 2002 1 Outline Motivation MIPv6 architecture MIPv6

More information

Integrating Security, Mobility, and Multi-Homing in a HIP way

Integrating Security, Mobility, and Multi-Homing in a HIP way Integrating Security, Mobility, and Multi-Homing in a way Pekka Nikander Ericsson Research Nomadiclab & Helsinki Institute for Information Technology Outline The problem: TCP/IP is getting old Locators

More information

Secure SCTP against DoS Attacks in Wireless Internet

Secure SCTP against DoS Attacks in Wireless Internet Secure SCTP against DoS Attacks in Wireless Internet Inwhee Joe College of Information and Communications Hanyang University Seoul, Korea iwjoe@hanyang.ac.kr Abstract. The Stream Control Transport Protocol

More information