Chapter 10 Mobile Communication Systems

Size: px
Start display at page:

Download "Chapter 10 Mobile Communication Systems"

Transcription

1 Chapter 10 Mobile Communication Systems Copyright 2011, Dr. Dharma P. Agrawal and Dr. Qing-An Zeng. All rights reserved. 1

2 Outline Cellular System Infrastructure Registration Handoff Parameters and Underlying Support Roaming Support Multicasting Security and Privacy Firewalls and System Security Copyright 2011, Dr. Dharma P. Agrawal and Dr. Qing-An Zeng. All rights reserved. 2

3 Cellular System Infrastructure MS Base Station System BTS BTS BSC VLR HLR AUC BTS: base transceiver system BSC: BS control AUC: authentication center HLR: home location register VLR: visitor location register EIR: equipment identity register MSC: mobile switch center BTS EIR MSC BTS MS BTS BTS BSC MSC Gateway MSC PSTN/ISDN Base Station System Copyright 2011, Dr. Dharma P. Agrawal and Dr. Qing-An Zeng. All rights reserved. 3

4 VLR/HLR/AUC/EIR VLR contains information about all visiting MSs in that particular area of MSC VLR has pointers to the HLR s of visiting MS VLR helps in billing and access permission to the visiting MS AUC provides authentication and encryption parameters EIR contains identity of equipments that prevents service to unauthorized MSs Copyright 2011, Dr. Dharma P. Agrawal and Dr. Qing-An Zeng. All rights reserved. 4

5 Classical Mail Forwarding Technique? Mail from the world Post Office Cincinnati Post Office Washington, DC Cincinnati Copyright 2011, Dr. Dharma P. Agrawal and Dr. Qing-An Zeng. All rights reserved. Washington, DC

6 Automatic Location Update MS HLR 1 2 Home network Home Mobile Switching Center VLR Update location Info. sent to HLR Visiting Mobile Switching Center PSTN Caller MS Visiting area Location update request Using Becon Signals Copyright 2011, Dr. Dharma P. Agrawal and Dr. Qing-An Zeng. All rights reserved. 6

7 Automatic Call Forwarding using HLR-VLR Home MSC checks HLR; gets current location of MS in visiting area MS HLR 2 4 Home Network home Mobile Switching Center VLR Mobile Switching Center Visiting Area Caller 1 Call sent to home location PSTN Copyright 2011, Dr. Dharma P. Agrawal and Dr. Qing-An Zeng. All rights reserved. 7 3 Home MSC forwards call to visiting MSC MSC in visiting area sends call to BS and connects MS

8 Redirection of Call to MS at a Visiting Location Home MSC Another MSC Call routed as per called number to MS Home MSC HLR Visiting MSC VLR Cell where MS is currently located BS MS Through backbone Copyright 2011, Dr. Dharma P. Agrawal and Dr. Qing-An Zeng. All rights reserved. 8

9 Registration Wireless system needs to know whether MS is currently located in its home area or some other area (routing of incoming calls) This is done by periodically exchanging signals between BS and MS known as Beacons BS periodically broadcasts beacon signal (1 signal per second) to determine and test the MSs around Each MS listens to the beacon, if it has not heard it previously then it adds it to the active beacon kernel table This information is used by the MS to locate the nearest BS Information carried by beacon signal: cellular network identifier, timestamp, gateway address ID of the paging area, etc. Copyright 2011, Dr. Dharma P. Agrawal and Dr. Qing-An Zeng. All rights reserved. 9

10 Steps for Registration MS listens to a new beacon, if it s a new one, MS adds it to the active beacon kernel table If MS decides that it has to communicate through a new BS, kernel modulation initiates handoff process. MS locates the nearest BS via user level processing The visiting BS performs user level processing and decides: Who the user (MS) is? What are its access permissions? Keeping track of billing Home site sends appropriate authentication response to the current serving BS The BS approves/disapproves the user access Copyright 2011, Dr. Dharma P. Agrawal and Dr. Qing-An Zeng. All rights reserved. 10

11 Using a Mobile Phone Outside the Subscription Area Through backbone 3 Authentication request 4 Authentication response MS Visiting BS (Visiting MSC) Home BS (Home MSC) Copyright 2011, Dr. Dharma P. Agrawal and Dr. Qing-An Zeng. All rights reserved. 11

12 Applications and Characteristics of Beacon Signals Application Frequency band Information carried Cellular networks Wireless LANs (discussed in Chapter 15) Ad hoc networks (discussed in Chapter 14) GPS (discussed in Chapter 12) MHz (AMPS/CDPD), 1,850-1,910 MHz (GSM) MHz (industrial, scientific, and medical band for analog and mixed signals) GHz (ISM band for digital signals) MHz (ISM band for analog and mixed signals) GHz (ISM band for digital signals) Cellular IP network identifier, Gateway IP address, Paging area ID, Timestamp Traffic indication map Network node identify MHz Timestamped orbital map and astronomical information Search and rescue 406 and MHz Registration country and ID of vessel or aircraft in distress Mobile robotics 100 KHz - 1 MHz Position of pallet or payload Location tracking 300 GHz THz (infrared) Digitally encoded signal to identify user's location Aid to the impaired 176 MHz Digitally coded signal uniquely identifying physical locations Copyright 2011, Dr. Dharma P. Agrawal and Dr. Qing-An Zeng. All rights reserved. 12

13 Handoff Parameters and Underlying Support Change of radio resources from one cell to an adjacent one Handoff depends on cell size, boundary length, signal strength, fading, reflection, etc. Handoff can be initiated by MS or BS and could be due to Radio link Network management Service issues Copyright 2011, Dr. Dharma P. Agrawal and Dr. Qing-An Zeng. All rights reserved. 13

14 Handoff Parameters (Cont d) Radio link handoff is due to mobility of MS It depends on: Number of MSs in the cell Number of MSs that have left the cell Number of calls generated in the cell Number of calls transferred from the neighboring cells Number and duration of calls terminated in the cell Number of calls that were handoff to neighboring cells Cell dwell time Copyright 2011, Dr. Dharma P. Agrawal and Dr. Qing-An Zeng. All rights reserved. 14

15 Handoff Parameters (Cont d) Network management may cause handoff if there is drastic imbalance of traffic in adjacent cells and optimal balance of resources is required Service related handoff is due to the degradation of QoS (quality of service) Copyright 2011, Dr. Dharma P. Agrawal and Dr. Qing-An Zeng. All rights reserved. 15

16 Time for Handoff Factors deciding right time for handoff: Signal strength Signal phase Combination of above two Bit error rate (BER) Distance Need for Handoff is determined by: Signal strength CIR (carrier to interference ratio) Copyright 2011, Dr. Dharma P. Agrawal and Dr. Qing-An Zeng. All rights reserved. 16

17 Handoff Region Signal strength due to BS i Signal strength due to BS j P i (x) P j (x) E P min BS i MS BS X 1 X 3 X 5 X j th X 4 X 2 By looking at the variation of signal strength from either base station it is possible to decide on the optimum area where handoff can take place Copyright 2011, Dr. Dharma P. Agrawal and Dr. Qing-An Zeng. All rights reserved. 17

18 Handoff initiation (Cont d) Region X 3 -X 4 indicates the handoff area, where depending on other factors, the handoff needs to be performed One option is to do handoff at X 5 where the two signal strengths are equal If MS moves back and forth around X 5, it will result in too frequent handoffs (ping-pong effect) Therefore MS is allowed to continue with the existing BS till the signal strength decreases by a threshold value E Different cellular systems follow different handoff procedure Copyright 2011, Dr. Dharma P. Agrawal and Dr. Qing-An Zeng. All rights reserved. 18

19 Types of Handoff Hard Handoff (break before make) Releasing current resources from the prior BS before acquiring resources from the next BS FDMA,TDMA follow this type of handoff Soft Handoff (make before break) In CDMA, since the same channel is used, we can use the same if orthogonal to the codes in the next BS Therefore, it is possible for the MS to communicate simultaneously with the prior BS as well as the new BS Copyright 2011, Dr. Dharma P. Agrawal and Dr. Qing-An Zeng. All rights reserved. 19

20 Hard Handoff BS 1 MS BS 2 BS 1 MS BS 2 (a). Before handoff (c). After handoff BS 1 MS BS 2 (b). During handoff (No connection) Copyright 2011, Dr. Dharma P. Agrawal and Dr. Qing-An Zeng. All rights reserved. 20

21 Soft Handoff (CDMA only) BS 1 MS BS 2 (a). Before handoff BS 1 MS BS 2 (c). After handoff BS 1 MS BS 2 (b). During handoff Copyright 2011, Dr. Dharma P. Agrawal and Dr. Qing-An Zeng. All rights reserved. 21

22 Roaming Support To move from a cell controlled by one MSC area to a cell connected to another MSC Beacon signals and the use of HLR-VLR allow the MS to roam anywhere provided the same service provider using that particular frequency band, is there in that region Copyright 2011, Dr. Dharma P. Agrawal and Dr. Qing-An Zeng. All rights reserved. 22

23 Roaming Support Home MSC Visiting MSC Home MSC Visiting MSC BS 1 MS BS 2 MS moves BS 1 MS BS 2 Copyright 2011, Dr. Dharma P. Agrawal and Dr. Qing-An Zeng. All rights reserved. 23

24 Handoff Scenarios with Different Degree of Mobility PSTN MSC 1 MSC 2 MSC 3 MSC 4 MS a b c d e Paging Area 1 Paging Area 2 Copyright 2011, Dr. Dharma P. Agrawal and Dr. Qing-An Zeng. All rights reserved. 24

25 Possible Handoff Situations Assume MSC 1 to be the home of the MS for registration, billing, authentication, etc. When handoff is from position a to b, the routing can be done by MSC 1 itself When handoff is from position b to c, then bi-directional pointers are set up to link the HLR of MSC 1 to VLR of MSC 2 When handoff occurs at d or e, routing of information using HLR-VLR may not be adequate ( d is in a different paging area) Concept of Backbone network Copyright 2011, Dr. Dharma P. Agrawal and Dr. Qing-An Zeng. All rights reserved. 25

26 Information Transmission Path when MS Hands Off from b to c Information to MS being sent Initial path of information transfer MSC 1 HLR MSC 2 VLR Connection Path after handoff MS a b c Copyright 2011, Dr. Dharma P. Agrawal and Dr. Qing-An Zeng. All rights reserved. 26

27 Illustration of MSC Connections to Backbone Network and Routing/Rerouting R: Routers From rest of the backbone Router R1 (a,b,c,d,e) R12 MSC R3 R2 (a,b,c,d) (d) R4 R6 (a,b) (c) (e) R7 R10 R5 R8 R11 R13 R9 MSC 1 (a,b) MSC 2 (c) Paging area 1 (PA1) MSC 3 (d) MSC 4 (e) Paging area 2 (PA2) Copyright 2011, Dr. Dharma P. Agrawal and Dr. Qing-An Zeng. All rights reserved. 27

28 Backbone Network Routing done according to the topology and connectivity of the backbone network The dotted lines show the possible paths for a call headed for different MS locations One option is to find a router along the original path, from where a new path needs to start to reach the MSC along the shortest path Copyright 2011, Dr. Dharma P. Agrawal and Dr. Qing-An Zeng. All rights reserved. 28

29 Home Agents (HA), Foreign Agents (FA) and Mobile IP Two important software modules are associated with routers, home agent (HA) and foreign agent (FA) MS is registered with a router, mostly a router closest to the home MSC can be used to maintain its HA A router other than closest one could also serve as an HA Once a MS moves from the home network, a software module in the new network FA assists MS by forwarding packets for the MS This functionality is somewhat similar to HLR-VLR Copyright 2011, Dr. Dharma P. Agrawal and Dr. Qing-An Zeng. All rights reserved. 29

30 Home MSC and Home Agent (HA) for the Previous Network Home MSC MSC 1 MSC 2 MSC 3 MSC 4 Selected router for maintaining its home agent R 3 R 4 R 6 R 9 Copyright 2011, Dr. Dharma P. Agrawal and Dr. Qing-An Zeng. All rights reserved. 30

31 Call Establishment using HA-FA Whenever a MS moves to a new network, it still retains its initial HA The MS detects the FA of the new network, by sensing the periodic beacon signals which FA transmits MS can also itself send agent solicitation messages to which FA responds When FA detects a new MS, it allocates a CoA (care of address) to the MS, using dynamic host configuration protocol (DHCP) Once MS receives CoA, it registers its CoA with its HA and the time limit binding for its validity Such registration is initiated either directly by MS to the HA of the home router or indirectly through FA Copyright 2011, Dr. Dharma P. Agrawal and Dr. Qing-An Zeng. All rights reserved. 31

32 Call Establishment (Cont d) HA confirms its binding through a reply to the MS A message sent from an arbitrary source to the MS at the home address is received by the HA Binding is checked, the CoA of the MS is encapsulated in the packet and forwarded to the network If CoA of the FA is used, then packet reaches FA, it decapsulates packet and passes to MS at the link layer In an internet environment, it is called Mobile IP After binding time, if MS still wants to have packets forwarded through HA, it needs to renew its registration When MS returns to its home network, it intimates its HA Copyright 2011, Dr. Dharma P. Agrawal and Dr. Qing-An Zeng. All rights reserved. 32

33 Registration Process Between FA, MS, and HA When the MS Moves to a Paging area HA 4 MS Here is my HA and binding information FA 3 Here is CoA or co-located CoA (C-CoA) for this MS 4 Same as step Beacon Signal (Any one new) I am new here OK, send information 4 Same as step 4 CoA or C-CoA created Acknowledge Registration + binding Copyright 2011, Dr. Dharma P. Agrawal and Dr. Qing-An Zeng. All rights reserved. 33

34 Message Forwarding using HA-FA Pair Incoming message for MS Source To MS Payload Data HA Encapsulation HA CoA/C-CoA Source To MS Payload Data FA Forwarding through intermediate router if CoA used Source To MS Payload Data Forwarding through intermediate router if C-CoA used MS Decapsulation done at MS Copyright 2011, Dr. Dharma P. Agrawal and Dr. Qing-An Zeng. All rights reserved. 34

35 Routing in Backbone Routers How FA finds HA of the MS? One approach is to have a global table at each router of each MSC so that the route from FA to HA for that MS can be determined Disadvantages: Information too large, one network might not like to give out information about all its routers to any external network (only gateways information is provided) Use of Distributed Routing Scheme Copyright 2011, Dr. Dharma P. Agrawal and Dr. Qing-An Zeng. All rights reserved. 35

36 Illustration of Paging Areas (PAs) and Backbone Router Interconnect Network 1 Router W PA 1 PA 2 Router X Router Y MS moves PA 3 PA 4 Router Z PA 5 Network 2 Copyright 2011, Dr. Dharma P. Agrawal and Dr. Qing-An Zeng. All rights reserved. 36

37 Distributed Routing Table and Location PAs Table at router W Route to PA Next hop Table at router X Route to PA Next hop Table at router Table at router Y Z Route to PA Next hop Route to PA Next hop 1 X 1-1 X 1 Y 2 X 2-2 X 2 Y 3 X 3 Y 3 Z 3-4 X 4 Y 4 Z 4-5 X 5 Y 5 Z 5 - Copyright 2011, Dr. Dharma P. Agrawal and Dr. Qing-An Zeng. All rights reserved. 37

38 Multicasting Process of transmitting messages from a source to multiple recipients by using a group address for all hosts that wish to be the members of the group Reduces number of messages to be transmitted as compared to multiple unicasting Useful in video/audio conferencing, multi party games Copyright 2011, Dr. Dharma P. Agrawal and Dr. Qing-An Zeng. All rights reserved. 38

39 Multicasting Multicasting can be performed either by building a source based tree or core based tree In source based tree, for each source of the group a shortest path is maintained, encompassing all the members of the group, with the source being the root of the tree In core based tree, a particular router is chosen as a core and a tree is maintained with the core being the root -- Every source forwards the packet to a core router, which then forwards it on the tree to reach all members of the multicast group Copyright 2011, Dr. Dharma P. Agrawal and Dr. Qing-An Zeng. All rights reserved. 39

40 Multicasting Bi-directional Tunneling (BT) and Remote Subscription approaches have been proposed by IETF for providing multicast over Mobile IP In BT approach, whenever a MS moves to a foreign network, HA is responsible for forwarding the multicast packets to the MS via FA In Remote Subscription protocol, whenever a MS moves to a foreign network, the FA (if not already a member of multicast group) sends a tree join request Copyright 2011, Dr. Dharma P. Agrawal and Dr. Qing-An Zeng. All rights reserved. 40

41 Multicasting Remote Subscription based approach is simple and prevents packet duplication and non optimal path delivery It can cause data interruption till the FA is connected to the tree It results in a number of tree join and tree leave requests when MS are in continuous motion In contrast, in the BT approach, the HA creates a bi-directional tunnel to FA and encapsulates the packets for MS FA then forwards the packets to the MS Copyright 2011, Dr. Dharma P. Agrawal and Dr. Qing-An Zeng. All rights reserved. 41

42 Multicasting BT approach prevents data disruption due to the movement of MS But causes packet duplication if several MSs of the same HA, that have subscribed to the same multicast group move to same FA Also causes Tunnel Convergence Problem, where one FA may have several MSs subscribed to the same group, belonging to different HAs and each HA may forward a packet for its MSs to the same FA Copyright 2011, Dr. Dharma P. Agrawal and Dr. Qing-An Zeng. All rights reserved. 42

43 Packet Duplication in BT Tunnel Approach Multicast packets from the multicast tree MS1 MS 1 HA MS2 FA MS 2 MS3 MS 3 Copyright 2011, Dr. Dharma P. Agrawal and Dr. Qing-An Zeng. All rights reserved. 43

44 Tunnel Convergence Problem Multicast packets from the multicast tree HA 1 CoA (MS1) MS 1 FA HA 2 CoA (MS2) MS 2 HA 3 CoA (MS3) CoA (MS4) MS 3 MS 4 Copyright 2011, Dr. Dharma P. Agrawal and Dr. Qing-An Zeng. All rights reserved. 44

45 Multicasting To overcome Tunnel Convergence Problem, MoM protocol is proposed wherein the FA selects one of the HAs, called the Designated Multicast Service Provider (DMSP), from the HA List for a particular group The remaining HAs do not forward packets to FA Copyright 2011, Dr. Dharma P. Agrawal and Dr. Qing-An Zeng. All rights reserved. 45

46 Illustration of MoM Protocol Multicast packets from the multicast tree HA 1 Stop CoA (MS1) MS 1 Forward MS 2 HA 2 CoA (MS2) FA DMSP Selection MS 3 HA 3 Stop CoA (MS3) CoA (MS4) MS 4 Copyright 2011, Dr. Dharma P. Agrawal and Dr. Qing-An Zeng. All rights reserved. 46

47 Security and Privacy Transfer through an open air medium makes messages vulnerable to various attacks One such problem is Jamming by a very powerful transmitting antenna Can be overcome by using frequency hopping. Many encryption techniques used so that unauthorized users cannot interpret the signals Copyright 2011, Dr. Dharma P. Agrawal and Dr. Qing-An Zeng. All rights reserved. 47

48 Encryption Techniques Permuting the bits in a pre specified manner before transmitting them Such permuted information can be reconstructed by using reverse operation This is called Data Encryption Standard (DES) on input bits Copyright 2011, Dr. Dharma P. Agrawal and Dr. Qing-An Zeng. All rights reserved. 48

49 Copyright 2011, Dr. Dharma P. Agrawal and Dr. Qing-An Zeng. All rights reserved. 49 Input Output Simple Permutation Function W I R E L E S S W L I E R S E S

50 Initial Bit Patterns and effect of before Transmission and after Reception using DES (a) Information sequence to be transmitted (b) Permutation of information sequence before transmission (c) Permutation to be performed on received information sequence Copyright 2011, Dr. Dharma P. Agrawal and Dr. Qing-An Zeng. All rights reserved. 50

51 Encryption Techniques A complex encryption scheme involves transforming input blocks to some coded form Encoded information is uniquely mapped back to useful information Simplest transformation involves logical or arithmetic or both operations Copyright 2011, Dr. Dharma P. Agrawal and Dr. Qing-An Zeng. All rights reserved. 51

52 A Generic Process of Encoding and Decoding Information block Encoding at transmitter Encoded signal Transmitted signal Received signal Encoded signal Decoding at receiver Information block (Original) Copyright 2011, Dr. Dharma P. Agrawal and Dr. Qing-An Zeng. All rights reserved. 52

53 A Generic Process of Encoding and Decoding Encoding Information at block transmitter Encoded signal Received signal Transmitted signal Encoded signal Decoding at receiver Information block (Original) Initial pattern EX-OR bits Bits after EX-OR Transmitted Shuffle bits Received Inverse bits Shuffle Bits after shuffle EX-OR bits Air Operations done at the transmitting MS Operations done at the receiving MS Copyright 2011, Dr. Dharma P. Agrawal and Dr. Qing-An Zeng. All rights reserved. Bits after EX-OR

54 Permutation and Coding of Information Input (64 bits) Initial Permutation (IP) 32 bits 32 bits Left half: L1 + f Right half: R1 Key K1 Left half: L1 = R1 R1 = L1 f(r1, K1) + + f R16 = L16 f(r15, K16) + Left half: L16 = R15 Inverse initial permutation (IP 1) Coded Output Copyright 2011, Dr. Dharma P. Agrawal and Dr. Qing-An Zeng. All rights reserved. 54

55 Authentication Making sure user is genuine Using a Hash Function from an associated unique identification of the user (not full proof) Another approach is to use two different interrelated keys One known only to system generating the key (private key), other used for sending to outside world (public key) RSA algorithm (best known public key system) Copyright 2011, Dr. Dharma P. Agrawal and Dr. Qing-An Zeng. All rights reserved. 55

56 Public/Private Key Authentication Steps System (1) Compute Public Key for User i from its private key (2) Send Public Key User i Save Public Key usually done off line System (4) Verify using private key of User i (3) ID, Signature User i Use public key to generate signature. on-line test System (5) Authentication Result User i Copyright 2011, Dr. Dharma P. Agrawal and Dr. Qing-An Zeng. All rights reserved. 56

57 Authentication (RSA Algorithm) Let us take p=3 and q=11, giving n=pq=33 Assume e=7, gives (n,e) as public key of (33,7) For message m=4, c= m e mod n = 4 7 mod 33 = 16 d is computed such that ed mod (p-1)(q-1) = ed mod 20 = 1, thus, d=3, giving private key of (33,3) After receiving c=16, compute c d mod 30 = 16 3 mod 33 =4 Copyright 2011, Dr. Dharma P. Agrawal and Dr. Qing-An Zeng. All rights reserved. 57

58 Authentication (RSA Algorithm) In RSA method 2 large prime numbers (p,q) are selected. n = p*q, A number e is selected to use (n,e) as the public key and is transmitted to the user, User stores this, whenever a message m< n needs to be transmitted, user computes c = m e mod n and sends to the system. After receiving c, the system computes c d mod n where d is computed using the private key (n,e) c d mod n = (m e mod n ) d mod n = (m e ) d mod n = m ed mod n To make this equal to m, ed should be equal to 1. This means e and d need to be multiplicative inverse using mod n (or mod p*q) This can be satisfied if e is prime with respect to (p-1)*(q-1) Using this restriction original message is reconstructed. Copyright 2011, Dr. Dharma P. Agrawal and Dr. Qing-An Zeng. All rights reserved. 58

59 Message Authentication using Public/Private Keys Base Station Select p and q as two prime numbers n = p*q 1 < e < n Public Key (n,e) Mobile Station Save public key (n, e) Base Station Compute d from e (n,d) private key Receive c c Mobile Station Message m < n Sent as c = m e mod n Base Station Compute c d mod n = m de mod n = m If de = 1 Authentication Mobile station OK Copyright 2011, Dr. Dharma P. Agrawal and Dr. Qing-An Zeng. All rights reserved. 59

60 Authentication of a MS by the BS (ID) e mod n Base Station Authentication Mobile Station Base Station (a) Authentication based on ID (ID) e mod n R: Random Number as a Challenge Send R e mod n Authentication (b) Authentication using a challenge Mobile Station Copyright 2011, Dr. Dharma P. Agrawal and Dr. Qing-An Zeng. All rights reserved. 60

61 Wireless System Security Basic services of security: Confidentiality Non-repudiation: sender and receiver cannot deny the transmission Authentication: sender of the information is correctly identified Integrity: content of the message can only be modified by authorized user Availability: resources available only to authorized users Copyright 2011, Dr. Dharma P. Agrawal and Dr. Qing-An Zeng. All rights reserved. 61

62 Wireless System Security Security Mechanisms: Security Prevention: Enforces security during the operation of the system Security Detection: Detects attempts to violate security Recovery: Restore the system to presecurity violation state Copyright 2011, Dr. Dharma P. Agrawal and Dr. Qing-An Zeng. All rights reserved. 62

63 Cost Function of a Secured Wireless System Cost Expected total cost Expected total cost with violations Optimal Level Cost for Security enhancing mechanisms 100% Security Level Copyright 2011, Dr. Dharma P. Agrawal and Dr. Qing-An Zeng. All rights reserved. 63

64 Security Threat Categories S Source I Intruder D Destination Message S I D Interruption S Message Message I Interception D S Message I D Message S I Message Modification Fabrication Copyright 2011, Dr. Dharma P. Agrawal and Dr. Qing-An Zeng. All rights reserved. 64 D

65 Wireless Security Active Attacks: When data modification or false data transmission takes place Masquerade: one entity pretends to be a different entity Replay: information captured and retransmitted to produce unauthorized effect Modification of message Denial of service (DoS) Passive Attacks: Goal of intruder is to obtain information (monitoring, eavesdropping on transmission) Copyright 2011, Dr. Dharma P. Agrawal and Dr. Qing-An Zeng. All rights reserved. 65

66 Firewalls and System Security Firewall carries out traffic filtering, web authentication, and other security mechanisms Filtering can be configured by fixing: Source IP Destination IP Source TCP/UDP port Destination TCP/UDP port Arrival interface Destination interface IP protocol Firewall resides at wireless access point to carry out authentication Copyright 2011, Dr. Dharma P. Agrawal and Dr. Qing-An Zeng. All rights reserved. 66

The GSM and GPRS network T-110.300/301

The GSM and GPRS network T-110.300/301 The GSM and GPRS network T-110.300/301 History The successful analog 1:st generation mobile telephone systems proved that there is a market for mobile telephones ARP (AutoRadioPuhelin) in Finland NMT (Nordic

More information

Mobility Management 嚴 力 行 高 雄 大 學 資 工 系

Mobility Management 嚴 力 行 高 雄 大 學 資 工 系 Mobility Management 嚴 力 行 高 雄 大 學 資 工 系 Mobility Management in Cellular Systems Cellular System HLR PSTN MSC MSC VLR BSC BSC BSC cell BTS BTS BTS BTS MT BTS BTS BTS BTS HLR and VLR HLR (Home Location Register)

More information

Cellular Network Organization. Cellular Wireless Networks. Approaches to Cope with Increasing Capacity. Frequency Reuse

Cellular Network Organization. Cellular Wireless Networks. Approaches to Cope with Increasing Capacity. Frequency Reuse Cellular Network Organization Cellular Wireless Networks Use multiple low-power transmitters (100 W or less) Areas divided into cells Each served by its own antenna Served by base station consisting of

More information

Administrivia. CSMA/CA: Recap. Mobility Management. Mobility Management. Channel Partitioning, Random Access and Scheduling

Administrivia. CSMA/CA: Recap. Mobility Management. Mobility Management. Channel Partitioning, Random Access and Scheduling Administrivia No lecture on Thurs. Last work will be out this week (not due, covers wireless) Extra office hours for next week and the week after. Channel Partitioning, Random Access and Scheduling Channel

More information

Module 5. Broadcast Communication Networks. Version 2 CSE IIT, Kharagpur

Module 5. Broadcast Communication Networks. Version 2 CSE IIT, Kharagpur Module 5 Broadcast Communication Networks Lesson 9 Cellular Telephone Networks Specific Instructional Objectives At the end of this lesson, the student will be able to: Explain the operation of Cellular

More information

Mobile Communications

Mobile Communications October 21, 2009 Agenda Topic 2: Case Study: The GSM Network 1 GSM System General Architecture 2 GSM Access network. 3 Traffic Models for the Air interface 4 Models for the BSS design. 5 UMTS and the path

More information

Computer Networks. Wireless and Mobile Networks. László Böszörményi Computer Networks Mobile - 1

Computer Networks. Wireless and Mobile Networks. László Böszörményi Computer Networks Mobile - 1 Computer Networks Wireless and Mobile Networks László Böszörményi Computer Networks Mobile - 1 Background Number of wireless (mobile) phone subscribers now exceeds number of wired phone subscribers! Computer

More information

CS 294-7: Cellular Digital Packet Data (CDPD) Prof. Randy H. Katz CS Division University of California, Berkeley Berkeley, CA 94720-1776 1996

CS 294-7: Cellular Digital Packet Data (CDPD) Prof. Randy H. Katz CS Division University of California, Berkeley Berkeley, CA 94720-1776 1996 CS 294-7: Cellular Digital Packet Data (CDPD) Prof. Randy H. Katz CS Division University of California, Berkeley Berkeley, CA 94720-1776 1996 1 Cellular Digital Packet Data IBM, McCaw Cellular Data network

More information

Mobile Wireless Overview

Mobile Wireless Overview Mobile Wireless Overview A fast-paced technological transition is occurring today in the world of internetworking. This transition is marked by the convergence of the telecommunications infrastructure

More information

Wireless Cellular Networks: 1G and 2G

Wireless Cellular Networks: 1G and 2G Wireless Cellular Networks: 1G and 2G Raj Jain Professor of Computer Science and Engineering Washington University in Saint Louis Saint Louis, MO 63130 Audio/Video recordings of this lecture are available

More information

Tomás P. de Miguel DIT-UPM. dit UPM

Tomás P. de Miguel DIT-UPM. dit UPM Tomás P. de Miguel DIT- 15 12 Internet Mobile Market Phone.com 15 12 in Millions 9 6 3 9 6 3 0 1996 1997 1998 1999 2000 2001 0 Wireless Internet E-mail subscribers 2 (January 2001) Mobility The ability

More information

Mobile IP. Bheemarjuna Reddy Tamma IIT Hyderabad. Source: Slides of Charlie Perkins and Geert Heijenk on Mobile IP

Mobile IP. Bheemarjuna Reddy Tamma IIT Hyderabad. Source: Slides of Charlie Perkins and Geert Heijenk on Mobile IP Mobile IP Bheemarjuna Reddy Tamma IIT Hyderabad Source: Slides of Charlie Perkins and Geert Heijenk on Mobile IP IP Refresher Mobile IP Basics 3 parts of Mobile IP: Outline Advertising Care-of Addresses

More information

CS6956: Wireless and Mobile Networks Lecture Notes: 2/11/2015. IEEE 802.11 Wireless Local Area Networks (WLANs)

CS6956: Wireless and Mobile Networks Lecture Notes: 2/11/2015. IEEE 802.11 Wireless Local Area Networks (WLANs) CS6956: Wireless and Mobile Networks Lecture Notes: //05 IEEE 80. Wireless Local Area Networks (WLANs) CSMA/CD Carrier Sense Multi Access/Collision Detection detects collision and retransmits, no acknowledgement,

More information

Chapter 6 Wireless and Mobile Networks

Chapter 6 Wireless and Mobile Networks Chapter 6 Wireless and Mobile Networks A note on the use of these ppt slides: We re making these slides freely available to all (faculty, students, readers). They re in PowerPoint form so you see the animations;

More information

communication over wireless link handling mobile user who changes point of attachment to network

communication over wireless link handling mobile user who changes point of attachment to network Wireless Networks Background: # wireless (mobile) phone subscribers now exceeds # wired phone subscribers! computer nets: laptops, palmtops, PDAs, Internet-enabled phone promise anytime untethered Internet

More information

GSM System Architecture

GSM System Architecture Intersystem Operation and Mobility Management David Tipper Associate Professor Graduate Program in Telecommunications and Networking University it of Pittsburgh Telcom 2700 Slides 6 http://www.tele.pitt.edu/tipper.html

More information

Location management Need Frequency Location updating

Location management Need Frequency Location updating Lecture-16 Mobility Management Location management Need Frequency Location updating Fig 3.10 Location management in cellular network Mobility Management Paging messages Different paging schemes Transmission

More information

Global System for Mobile Communication Technology

Global System for Mobile Communication Technology Global System for Mobile Communication Technology Mobile Device Investigations Program Technical Operations Division DHS - FLETC GSM Technology Global System for Mobile Communication or Groupe Special

More information

HANDBOOK 8 NETWORK SECURITY Version 1.0

HANDBOOK 8 NETWORK SECURITY Version 1.0 Australian Communications-Electronic Security Instruction 33 (ACSI 33) Point of Contact: Customer Services Team Phone: 02 6265 0197 Email: assist@dsd.gov.au HANDBOOK 8 NETWORK SECURITY Version 1.0 Objectives

More information

Mobile Office Security Requirements for the Mobile Office

Mobile Office Security Requirements for the Mobile Office Mobile Office Security Requirements for the Mobile Office S.Rupp@alcatel.de Alcatel SEL AG 20./21.06.2001 Overview Security Concepts in Mobile Networks Applications in Mobile Networks Mobile Terminal used

More information

2G/3G Mobile Communication Systems

2G/3G Mobile Communication Systems 2G/3G Mobile Communication Systems Winter 2012/13 Integrated Communication Systems Group Ilmenau University of Technology Outline 2G Review: GSM Services Architecture Protocols Call setup Mobility management

More information

Module 8. Network Security. Version 2 CSE IIT, Kharagpur

Module 8. Network Security. Version 2 CSE IIT, Kharagpur Module 8 Network Security Lesson 2 Secured Communication Specific Instructional Objectives On completion of this lesson, the student will be able to: State various services needed for secured communication

More information

IP and Mobility. Requirements to a Mobile IP. Terminology in Mobile IP

IP and Mobility. Requirements to a Mobile IP. Terminology in Mobile IP IP and Mobility Chapter 2 Technical Basics: Layer Methods for Medium Access: Layer 2 Chapter Wireless Networks: Bluetooth, WLAN, WirelessMAN, WirelessWAN Mobile Telecommunication Networks: GSM, GPRS, UMTS

More information

Lecture overview. History of cellular systems (1G) GSM introduction. Basic architecture of GSM system. Basic radio transmission parameters of GSM

Lecture overview. History of cellular systems (1G) GSM introduction. Basic architecture of GSM system. Basic radio transmission parameters of GSM Lecture overview History of cellular systems (1G) GSM introduction Basic architecture of GSM system Basic radio transmission parameters of GSM Analogue cellular systems 70 s In the early 70 s radio frequencies

More information

10. Wireless Networks

10. Wireless Networks Computernetzwerke und Sicherheit (CS221) 10. Wireless Networks 1. April 2011 omas Meyer Departement Mathematik und Informatik, Universität Basel Chapter 6 Wireless and Mobile Networks (with changes CS221

More information

Ch 2.3.3 GSM PENN. Magda El Zarki - Tcom 510 - Spring 98

Ch 2.3.3 GSM PENN. Magda El Zarki - Tcom 510 - Spring 98 Ch 2.3.3 GSM In the early 80 s the European community decided to work together to define a cellular system that would permit full roaming in all countries and give the network providers freedom to provide

More information

Mobile Networking Concepts and Protocols CNT 5517

Mobile Networking Concepts and Protocols CNT 5517 Mobile Networking Concepts and Protocols CNT 5517 Some slides are adapted from Dr. Dave Johnson Notes Dr. Sumi Helal, Ph.D. Professor Computer & Information Science & Engineering Department University

More information

Handoff in GSM/GPRS Cellular Systems. Avi Freedman Hexagon System Engineering

Handoff in GSM/GPRS Cellular Systems. Avi Freedman Hexagon System Engineering Handoff in GSM/GPRS Cellular Systems Avi Freedman Hexagon System Engineering Outline GSM and GSM referemce model GPRS basics Handoffs GSM GPRS Location and Mobility Management Re-selection and routing

More information

An Overview of ZigBee Networks

An Overview of ZigBee Networks An Overview of ZigBee Networks A guide for implementers and security testers Matt Hillman Contents 1. What is ZigBee?... 3 1.1 ZigBee Versions... 3 2. How Does ZigBee Operate?... 3 2.1 The ZigBee Stack...

More information

Mobile Routing. When a host moves, its point of attachment in the network changes. This is called a handoff.

Mobile Routing. When a host moves, its point of attachment in the network changes. This is called a handoff. Mobile Routing Basic Notions of Mobility When a host moves, its point of attachment in the changes. This is called a handoff. The point of attachment is a base station (BS) for cellular, or an access point

More information

Mobile IP Network Layer Lesson 01 OSI (open systems interconnection) Seven Layer Model and Internet Protocol Layers

Mobile IP Network Layer Lesson 01 OSI (open systems interconnection) Seven Layer Model and Internet Protocol Layers Mobile IP Network Layer Lesson 01 OSI (open systems interconnection) Seven Layer Model and Internet Protocol Layers Oxford University Press 2007. All rights reserved. 1 OSI (open systems interconnection)

More information

How To Understand The Gsm And Mts Mobile Network Evolution

How To Understand The Gsm And Mts Mobile Network Evolution Mobile Network Evolution Part 1 GSM and UMTS GSM Cell layout Architecture Call setup Mobility management Security GPRS Architecture Protocols QoS EDGE UMTS Architecture Integrated Communication Systems

More information

Hello viewers, welcome to today s lecture on cellular telephone systems.

Hello viewers, welcome to today s lecture on cellular telephone systems. Data Communications Prof. A. Pal Department of Computer Science & Engineering Indian Institute of Technology, Kharagpur Lecture minus 31 Cellular Telephone Systems Hello viewers, welcome to today s lecture

More information

Basic Network Design

Basic Network Design Frequency Reuse and Planning Cellular Technology enables mobile communication because they use of a complex two-way radio system between the mobile unit and the wireless network. It uses radio frequencies

More information

CS263: Wireless Communications and Sensor Networks

CS263: Wireless Communications and Sensor Networks CS263: Wireless Communications and Sensor Networks Matt Welsh Lecture 4: Medium Access Control October 5, 2004 2004 Matt Welsh Harvard University 1 Today's Lecture Medium Access Control Schemes: FDMA TDMA

More information

MPLS VPN in Cellular Mobile IPv6 Architectures(04##017)

MPLS VPN in Cellular Mobile IPv6 Architectures(04##017) MPLS VPN in Cellular Mobile IPv6 Architectures(04##017) Yao-Chung Chang, Han-Chieh Chao, K.M. Liu and T. G. Tsuei* Department of Electrical Engineering, National Dong Hwa University Hualien, Taiwan, Republic

More information

Final exam review, Fall 2005 FSU (CIS-5357) Network Security

Final exam review, Fall 2005 FSU (CIS-5357) Network Security Final exam review, Fall 2005 FSU (CIS-5357) Network Security Instructor: Breno de Medeiros 1. What is an insertion attack against a NIDS? Answer: An insertion attack against a network intrusion detection

More information

Mobile Computing/ Mobile Networks

Mobile Computing/ Mobile Networks Mobile Computing/ Mobile Networks TCP in Mobile Networks Prof. Chansu Yu Contents Physical layer issues Communication frequency Signal propagation Modulation and Demodulation Channel access issues Multiple

More information

Network Security 網 路 安 全. Lecture 1 February 20, 2012 洪 國 寶

Network Security 網 路 安 全. Lecture 1 February 20, 2012 洪 國 寶 Network Security 網 路 安 全 Lecture 1 February 20, 2012 洪 國 寶 1 Outline Course information Motivation Introduction to security Basic network concepts Network security models Outline of the course 2 Course

More information

Wireless Mobile Telephony

Wireless Mobile Telephony Wireless Mobile Telephony The Ohio State University Columbus, OH 43210 Durresi@cis.ohio-state.edu http://www.cis.ohio-state.edu/~durresi/ 1 Overview Why wireless mobile telephony? First Generation, Analog

More information

Computer Network. Interconnected collection of autonomous computers that are able to exchange information

Computer Network. Interconnected collection of autonomous computers that are able to exchange information Introduction Computer Network. Interconnected collection of autonomous computers that are able to exchange information No master/slave relationship between the computers in the network Data Communications.

More information

Attenuation (amplitude of the wave loses strength thereby the signal power) Refraction Reflection Shadowing Scattering Diffraction

Attenuation (amplitude of the wave loses strength thereby the signal power) Refraction Reflection Shadowing Scattering Diffraction Wireless Physical Layer Q1. Is it possible to transmit a digital signal, e.g., coded as square wave as used inside a computer, using radio transmission without any loss? Why? It is not possible to transmit

More information

Protocols and Architecture. Protocol Architecture.

Protocols and Architecture. Protocol Architecture. Protocols and Architecture Protocol Architecture. Layered structure of hardware and software to support exchange of data between systems/distributed applications Set of rules for transmission of data between

More information

This chapter covers the following topics: Characteristics of roaming Layer 2 roaming Layer 3 roaming and an introduction to Mobile IP

This chapter covers the following topics: Characteristics of roaming Layer 2 roaming Layer 3 roaming and an introduction to Mobile IP This chapter covers the following topics: Characteristics of roaming Layer 2 roaming Layer 3 roaming and an introduction to Mobile IP C H A P T E R 5 Mobility This book covers the major components of 802.11

More information

Computer Networks - CS132/EECS148 - Spring 2013 --------------------------------------------------------------------------

Computer Networks - CS132/EECS148 - Spring 2013 -------------------------------------------------------------------------- Computer Networks - CS132/EECS148 - Spring 2013 Instructor: Karim El Defrawy Assignment 5 Deadline : May 30th 9:30pm (hard and soft copies required) --------------------------------------------------------------------------

More information

802.11: Mobility Within Same Subnet

802.11: Mobility Within Same Subnet What is Mobility? Spectrum of mobility, from the perspective: no mobility high mobility mobile wireless user, using same AP mobile user, (dis) connecting from using DHCP mobile user, passing through multiple

More information

Chap. 1: Introduction

Chap. 1: Introduction Chap. 1: Introduction Introduction Services, Mechanisms, and Attacks The OSI Security Architecture Cryptography 1 1 Introduction Computer Security the generic name for the collection of tools designed

More information

ssumathy@vit.ac.in upendra_mcs2@yahoo.com

ssumathy@vit.ac.in upendra_mcs2@yahoo.com S. Sumathy 1 and B.Upendra Kumar 2 1 School of Computing Sciences, VIT University, Vellore-632 014, Tamilnadu, India ssumathy@vit.ac.in 2 School of Computing Sciences, VIT University, Vellore-632 014,

More information

GSM Architecture Training Document

GSM Architecture Training Document Training Document TC Finland Nokia Networks Oy 1 (20) The information in this document is subject to change without notice and describes only the product defined in the introduction of this documentation.

More information

Mobile SCTP Transport Layer Mobility Management for the Internet

Mobile SCTP Transport Layer Mobility Management for the Internet Mobile SCTP Transport Layer Mobility Management for the Maximilian Riegel Siemens AG, Munich, Germany E-mail: maximilian.riegel@icn.siemens.de Dr. Michael Tüxen Siemens AG, Munich, Germany E-mail: michael.tuexen@icn.siemens.de

More information

CSE331: Introduction to Networks and Security. Lecture 6 Fall 2006

CSE331: Introduction to Networks and Security. Lecture 6 Fall 2006 CSE331: Introduction to Networks and Security Lecture 6 Fall 2006 Open Systems Interconnection (OSI) End Host Application Reference model not actual implementation. Transmits messages (e.g. FTP or HTTP)

More information

GSM - Global System for Mobile Communications

GSM - Global System for Mobile Communications GSM - Global System for Mobile Communications VLR BTS BSC GMSC PSTN MS HLR 1) Overview of GSM architecture 2) GSM channel structure 05-1 GSM - Global System for Mobile Communications VLR BTS BSC GMSC PSTN

More information

Chapter 6: Wireless and Mobile Networks

Chapter 6: Wireless and Mobile Networks Chapter 6: Wireless and Mobile Networks Background: # wireless (mobile) phone subscribers now exceeds # wired phone subscribers! computer nets: laptops, palmtops, PDAs, Internet-enabled phone promise anytime

More information

Introduction to IP v6

Introduction to IP v6 IP v 1-3: defined and replaced Introduction to IP v6 IP v4 - current version; 20 years old IP v5 - streams protocol IP v6 - replacement for IP v4 During developments it was called IPng - Next Generation

More information

T.38 fax transmission over Internet Security FAQ

T.38 fax transmission over Internet Security FAQ August 17, 2011 T.38 fax transmission over Internet Security FAQ Give me a rundown on the basics of T.38 Fax over IP security. Real time faxing using T.38 SIP trunks is just as secure as sending faxes

More information

Measuring the Optimal Transmission Power of GSM Cellular Network: A Case Study

Measuring the Optimal Transmission Power of GSM Cellular Network: A Case Study 216 Measuring the Optimal Transmission Power of GSM Cellular Network: A Case Study Measuring the Optimal Transmission Power of GSM Cellular Network: A Case Study Dr Basil M Kasasbeh, Applied Science University,

More information

How To Write A Transport Layer Protocol For Wireless Networks

How To Write A Transport Layer Protocol For Wireless Networks Chapter 9: Transport Layer and Security Protocols for Ad Hoc Wireless Networks Introduction Issues Design Goals Classifications TCP Over Ad Hoc Wireless Networks Other Transport Layer Protocols Security

More information

7 Network Security. 7.1 Introduction 7.2 Improving the Security 7.3 Internet Security Framework. 7.5 Absolute Security?

7 Network Security. 7.1 Introduction 7.2 Improving the Security 7.3 Internet Security Framework. 7.5 Absolute Security? 7 Network Security 7.1 Introduction 7.2 Improving the Security 7.3 Internet Security Framework 7.4 Firewalls 7.5 Absolute Security? 7.1 Introduction Security of Communications data transport e.g. risk

More information

GSM System. Global System for Mobile Communications

GSM System. Global System for Mobile Communications GSM System Global System for Mobile Communications Introduced in 1991. Settings of standards under ETSI (European Telecommunication Standards Institute) Services - Telephone services - Data services -

More information

Forced Low latency Handoff in Mobile Cellular Data Networks

Forced Low latency Handoff in Mobile Cellular Data Networks Forced Low latency Handoff in Mobile Cellular Data Networks N. Moayedian, Faramarz Hendessi Department of Electrical and Computer Engineering Isfahan University of Technology, Isfahan, IRAN Hendessi@cc.iut.ac.ir

More information

A Brief Overview of VoIP Security. By John McCarron. Voice of Internet Protocol is the next generation telecommunications method.

A Brief Overview of VoIP Security. By John McCarron. Voice of Internet Protocol is the next generation telecommunications method. A Brief Overview of VoIP Security By John McCarron Voice of Internet Protocol is the next generation telecommunications method. It allows to phone calls to be route over a data network thus saving money

More information

ECE/CS 372 introduction to computer networks. Lecture 13

ECE/CS 372 introduction to computer networks. Lecture 13 ECE/CS 372 introduction to computer networks Lecture 13 Announcements: HW #4 hard copy due today Lab #5 posted is due Tuesday June 4 th HW #5 posted is due Thursday June 6 th Pickup midterms Acknowledgement:

More information

Security in Ad Hoc Network

Security in Ad Hoc Network Security in Ad Hoc Network Bingwen He Joakim Hägglund Qing Gu Abstract Security in wireless network is becoming more and more important while the using of mobile equipments such as cellular phones or laptops

More information

GSM Network and Services

GSM Network and Services GSM Network and Services GPRS - sharing of resources 1 What is the problem? Many data applications are very bursty in its traffic pattern: http, smtp, pop, telnet,... Why reserve physical resources at

More information

Enterprise VoIP Services over Mobile Ad-Hoc Technologies

Enterprise VoIP Services over Mobile Ad-Hoc Technologies Enterprise VoIP Services over Mobile Ad-Hoc Technologies 1 System Architecture Figure 1 illustrates the system architecture. We can divide it into 2 parts. One is the Mobile VoIP Box (MVB) node and the

More information

How To Understand The Performance Of A Cell Phone Network

How To Understand The Performance Of A Cell Phone Network Survivability Analysis for Mobile Cellular Networks David W. Tipper *, Chalermpol Charnsripinyo *, Hyundoo Shin * Teresa A. Dahlberg ** * Department of Information Science and Telecommunications, University

More information

Report to WIPO SCIT Plenary Trilateral Secure Virtual Private Network Primer. February 3, 1999

Report to WIPO SCIT Plenary Trilateral Secure Virtual Private Network Primer. February 3, 1999 Report to WIPO SCIT Plenary Trilateral Secure Virtual Private Network Primer February 3, 1999 Frame Relay Frame Relay is an international standard for high-speed access to public wide area data networks

More information

WAN Data Link Protocols

WAN Data Link Protocols WAN Data Link Protocols In addition to Physical layer devices, WANs require Data Link layer protocols to establish the link across the communication line from the sending to the receiving device. 1 Data

More information

Lecture 17: 802.11 Wireless Networking"

Lecture 17: 802.11 Wireless Networking Lecture 17: 802.11 Wireless Networking" CSE 222A: Computer Communication Networks Alex C. Snoeren Thanks: Lili Qiu, Nitin Vaidya Lecture 17 Overview" Project discussion Intro to 802.11 WiFi Jigsaw discussion

More information

Chapter 9. IP Secure

Chapter 9. IP Secure Chapter 9 IP Secure 1 Network architecture is usually explained as a stack of different layers. Figure 1 explains the OSI (Open System Interconnect) model stack and IP (Internet Protocol) model stack.

More information

Introduction to Ad hoc Networks

Introduction to Ad hoc Networks Introduction to Ad hoc Networks CS-647: Advanced Topics in Wireless Networks Drs. Baruch Awerbuch & Amitabh Mishra Department of Computer Science Johns Hopkins University Amitabh Mishra & Baruch Awerbuch

More information

Wireless Networks: Network Protocols/Mobile IP

Wireless Networks: Network Protocols/Mobile IP Wireless Networks: Network Protocols/Mobile IP Mo$va$on Data transfer Encapsula$on Security IPv6 Problems DHCP Adapted from J. Schiller, Mobile Communications 1 Mo$va$on for Mobile IP Rou$ng based on IP

More information

The Wireless Network Road Trip

The Wireless Network Road Trip The Wireless Network Road Trip The Association Process To begin, you need a network. This lecture uses the common logical topology seen in Figure 9-1. As you can see, multiple wireless clients are in

More information

Module 5. Broadcast Communication Networks. Version 2 CSE IIT, Kharagpur

Module 5. Broadcast Communication Networks. Version 2 CSE IIT, Kharagpur Module 5 Broadcast Communication Networks Lesson 1 Network Topology Specific Instructional Objectives At the end of this lesson, the students will be able to: Specify what is meant by network topology

More information

Authentication and Security in IP based Multi Hop Networks

Authentication and Security in IP based Multi Hop Networks 7TH WWRF MEETING IN EINDHOVEN, THE NETHERLANDS 3RD - 4TH DECEMBER 2002 1 Authentication and Security in IP based Multi Hop Networks Frank Fitzek, Andreas Köpsel, Patrick Seeling Abstract Network security

More information

Cellular Technology Sections 6.4 & 6.7

Cellular Technology Sections 6.4 & 6.7 Overview Cellular Technology Sections 6. & 6.7 CSC 9 December, 0 Cellular architecture evolution Cellular telephony and internet terminology Mobility for cellular mobiles 6- Components of cellular architecture

More information

Tema 5.- Seguridad. Problemas Soluciones

Tema 5.- Seguridad. Problemas Soluciones Tema 5.- Seguridad Problemas Soluciones Wireless medium is easy to snoop on Routing security vulnerabilities Due to ad hoc connectivity and mobility, it is hard to guarantee access to any particular node

More information

EPL 657 Wireless Networks

EPL 657 Wireless Networks EPL 657 Wireless Networks Some fundamentals: Multiplexing / Multiple Access / Duplex Infrastructure vs Infrastructureless Panayiotis Kolios Recall: The big picture... Modulations: some basics 2 Multiplexing

More information

Chapters 1-21 Introduction to Wireless Communication Systems

Chapters 1-21 Introduction to Wireless Communication Systems Chapters 1-21 Introduction to Wireless Communication Systems Yimin Zhang, Ph.D. Department of Electrical & Computer Engineering Villanova University http://yiminzhang.com/ece8708 Yimin Zhang, Villanova

More information

Global System for Mobile Communication (GSM)

Global System for Mobile Communication (GSM) Global System for Mobile Communication (GSM) Definition Global system for mobile communication (GSM) is a globally accepted standard for digital cellular communication. GSM is the name of a standardization

More information

TS-3GB-S.R0103-0v1.0 Network Firewall Configuration and Control (NFCC) - Stage 1 Requirements

TS-3GB-S.R0103-0v1.0 Network Firewall Configuration and Control (NFCC) - Stage 1 Requirements TS-3GB-S.R0103-0v1.0 Network Firewall Configuration and Control (NFCC) - Stage 1 Requirements Mar 3,2005 THE TELECOMMUNICATION TECHNOLOGY COMMITTEE TS-3GB-S.R0103-0v1.0 Network Firewall Configuration and

More information

!!! "# $ % & & # ' (! ) * +, -!!. / " 0! 1 (!!! ' &! & & & ' ( 2 3 0-4 ' 3 ' Giuseppe Bianchi

!!! # $ % & & # ' (! ) * +, -!!. /  0! 1 (!!! ' &! & & & ' ( 2 3 0-4 ' 3 ' Giuseppe Bianchi !!! "# $ % & & # ' (! ) * +, -!!. / " 0! 1 (!!! ' &! & & & ' ( 2 3 0-4 ' 3 ' "#$!!% "&'! #&'!%! () *+,, 3 & 5 &,! #-!*! ' & '.! #%!* //!! & (0)/!&/, 6 5 /, "! First system: NMT-450 (Nordic Mobile Telephone)

More information

All vulnerabilities that exist in conventional wired networks apply and likely easier Theft, tampering of devices

All vulnerabilities that exist in conventional wired networks apply and likely easier Theft, tampering of devices Wireless Security All vulnerabilities that exist in conventional wired networks apply and likely easier Theft, tampering of devices Portability Tamper-proof devices? Intrusion and interception of poorly

More information

ESSENTIALS. Understanding Ethernet Switches and Routers. April 2011 VOLUME 3 ISSUE 1 A TECHNICAL SUPPLEMENT TO CONTROL NETWORK

ESSENTIALS. Understanding Ethernet Switches and Routers. April 2011 VOLUME 3 ISSUE 1 A TECHNICAL SUPPLEMENT TO CONTROL NETWORK VOLUME 3 ISSUE 1 A TECHNICAL SUPPLEMENT TO CONTROL NETWORK Contemporary Control Systems, Inc. Understanding Ethernet Switches and Routers This extended article was based on a two-part article that was

More information

Cellular Networks: Background and Classical Vulnerabilities

Cellular Networks: Background and Classical Vulnerabilities Cellular Networks: Background and Classical Vulnerabilities Patrick Traynor CSE 545 1 Cellular Networks Provide communications infrastructure for an estimated 2.6 billion users daily. The Internet connects

More information

Networked AV Systems Pretest

Networked AV Systems Pretest Networked AV Systems Pretest Instructions Choose the best answer for each question. Score your pretest using the key on the last page. If you miss three or more out of questions 1 11, consider taking Essentials

More information

Mobile IP Part I: IPv4

Mobile IP Part I: IPv4 Mobile IP Part I: IPv4 Raj Jain Washington University in Saint Louis Saint Louis, MO 63130 Jain@cse.wustl.edu These slides are available on-line at: http://www.cse.wustl.edu/~jain/cse574-06/ 12-1 q Mobile

More information

Applications that Benefit from IPv6

Applications that Benefit from IPv6 Applications that Benefit from IPv6 Lawrence E. Hughes Chairman and CTO InfoWeapons, Inc. Relevant Characteristics of IPv6 Larger address space, flat address space restored Integrated support for Multicast,

More information

GSM and Similar Architectures Lesson 07 GSM Radio Interface, Data bursts and Interleaving

GSM and Similar Architectures Lesson 07 GSM Radio Interface, Data bursts and Interleaving GSM and Similar Architectures Lesson 07 GSM Radio Interface, Data bursts and Interleaving 1 Space Division Multiple Access of the signals from the MSs A BTS with n directed antennae covers mobile stations

More information

Top-Down Network Design

Top-Down Network Design Top-Down Network Design Chapter Five Designing a Network Topology Copyright 2010 Cisco Press & Priscilla Oppenheimer Topology A map of an internetwork that indicates network segments, interconnection points,

More information

SECURE DATA TRANSMISSION USING INDISCRIMINATE DATA PATHS FOR STAGNANT DESTINATION IN MANET

SECURE DATA TRANSMISSION USING INDISCRIMINATE DATA PATHS FOR STAGNANT DESTINATION IN MANET SECURE DATA TRANSMISSION USING INDISCRIMINATE DATA PATHS FOR STAGNANT DESTINATION IN MANET MR. ARVIND P. PANDE 1, PROF. UTTAM A. PATIL 2, PROF. B.S PATIL 3 Dept. Of Electronics Textile and Engineering

More information

Security Requirements for Wireless Networks and their Satisfaction in IEEE 802.11b and Bluetooth

Security Requirements for Wireless Networks and their Satisfaction in IEEE 802.11b and Bluetooth Security Requirements for Wireless Networks and their Satisfaction in IEEE 802.11b and Bluetooth Henrich C. Poehls Master s Thesis M.Sc. in Information Security Information Security Group Royal Holloway,

More information

6 Mobility Management

6 Mobility Management Politecnico di Milano Facoltà di Ingegneria dell Informazione 6 Mobility Management Reti Mobili Distribuite Prof. Antonio Capone Introduction Mobility management allows a terminal to change its point of

More information

OSPF Version 2 (RFC 2328) Describes Autonomous Systems (AS) topology. Propagated by flooding: Link State Advertisements (LSAs).

OSPF Version 2 (RFC 2328) Describes Autonomous Systems (AS) topology. Propagated by flooding: Link State Advertisements (LSAs). OSPF Version 2 (RFC 2328) Interior gateway protocol (IGP). Routers maintain link-state database. Describes Autonomous Systems (AS) topology. Propagated by flooding: Link State Advertisements (LSAs). Router

More information

Integrating Heterogeneous Wireless Technologies: A Cellular Aided Mobile Ad hoc Network (CAMA)

Integrating Heterogeneous Wireless Technologies: A Cellular Aided Mobile Ad hoc Network (CAMA) ACM MOBILE NETWORK AND APPLICATIONS Integrating Heterogeneous Wireless Technologies: A Cellular Aided Mobile Ad hoc Network (CAMA) Bharat Bhargava, Xiaoxin Wu, Yi Lu, and Weichao Wang Abstract A mobile

More information

CS 8803 - Cellular and Mobile Network Security: Cellular Networking

CS 8803 - Cellular and Mobile Network Security: Cellular Networking CS 8803 - Cellular and Mobile Network Security: Cellular Networking Professor Patrick Traynor 9/13/2012 The Big Picture Details create the big picture. -Sanford I. Weill 2 Overview Evolution Architecture

More information

How To Make A Multi-User Communication Efficient

How To Make A Multi-User Communication Efficient Multiple Access Techniques PROF. MICHAEL TSAI 2011/12/8 Multiple Access Scheme Allow many users to share simultaneously a finite amount of radio spectrum Need to be done without severe degradation of the

More information

SECURITY ASPECTS IN MOBILE AD HOC NETWORK (MANETS)

SECURITY ASPECTS IN MOBILE AD HOC NETWORK (MANETS) SECURITY ASPECTS IN MOBILE AD HOC NETWORK (MANETS) Neha Maurya, ASM S IBMR ABSTRACT: Mobile Ad hoc networks (MANETs) are a new paradigm of wireless network, offering unrestricted mobility without any underlying

More information

Security issues with Mobile IP

Security issues with Mobile IP Technical report, IDE1107, February 2011 Security issues with Mobile IP Master s Thesis in Computer Network Engineering Abdel Rahman Alkhawaja & Hatem Sheibani School of Information Science, Computer and

More information