BMX6 Mesh Routing Protocol
|
|
|
- Kelley Mathews
- 9 years ago
- Views:
Transcription
1 BMX6 Mesh Routing Protocol Reclaim Your Mesh Self-paced Networking in Multilateral Environments Axel Neumann International Summit for Community Wireless Networks (IS4CWN) 2013, Berlin October 3, wirelesssummit.org
2 Outline 1 Introduction (What?) Community Mesh Networks 2 BMX6 Approach (How?) Background and Objectives Protocol Principles 3 Advantages and Outcome (Why BMX6?) Advantages 4 Secure Routing in Open Networks (Whats Next?) Problem: Open versus Secure User-Defined Trust Policies (Routing via Trusted Nodes) BMX6 Mesh Routing Protocol 2/18
3 Community Mesh Networks Structure open, decentralized, neutral heterogeneous cooperative Growing and restructuring Coordinated (consensus) Organically (individually) Scalability challenges Overhead: More nodes, larger IPs (v4 -> v6) HW heterogeneity ([Kb..Gb]) Human diversity: Character (trust) Preference (services, routing: fast vers. reliable) BMX6 Mesh Routing Protocol 3/18
4 Community Mesh Networks Structure open, decentralized, neutral heterogeneous cooperative Growing and restructuring Coordinated (consensus) Organically (individually) Scalability challenges Overhead: More nodes, larger IPs (v4 -> v6) HW heterogeneity ([Kb..Gb]) Human diversity: Character (trust) Preference (services, routing: fast vers. reliable) BMX6 Mesh Routing Protocol 4/18
5 Community Mesh Networks Structure open, decentralized, neutral heterogeneous cooperative Growing and restructuring Coordinated (consensus) Organically (individually) Scalability challenges Overhead: More nodes, larger IPs (v4 -> v6) HW heterogeneity ([Kb..Gb]) Human diversity: Character (trust) Preference (services, routing: fast vers. reliable) BMX6 Mesh Routing Protocol 5/18
6 Background and Objectives B.A.T.M.A.N., started July 2006 BatMan-eXperimental (BMX), gradually diverged to independent project, protocol, code, users,... BMX6, first release during WBMv3, June 2010 Today: Productively used (eg. qmp [1]) BMX6 Design Objectives: IPv6: Exploit capabilities, cope with address size Cope with HW diversity and nodes Scale with increasing diversity of users Failure robustness (misconfiguration, IP collisions, attacks?) Be user centric (power to the people) without disrupting cooperation How: Learn from social networks Scale to millions, despite huge diversity BMX6 Mesh Routing Protocol 6/18
7 Protocol Principles [2,3,4] Seperate node attributes and IDs Traditionally ID given by IPs (Babel) Attributes (static) DESCRIPTION (node profile) Networks, names, services, metrics,... Flooded once & globally Public knowledge Node discovery before path discovery IDs reference node attributes Context-specific ID types Description hashes (160bit RSA): -> globally unambiguous Internal IDs (16bit): -> locally unambiguous, short! Used for routing updates (4 bytes) BMX6 Mesh Routing Protocol 7/18
8 Protocol Principles [2,3,4] Seperate node attributes and IDs Traditionally ID given by IPs (Babel) Attributes (static) DESCRIPTION (node profile) Networks, names, services, metrics,... Flooded once & globally Public knowledge Node discovery before path discovery IDs reference node attributes Context-specific ID types Description hashes (160bit RSA): -> globally unambiguous Internal IDs (16bit): -> locally unambiguous, short! Used for routing updates (4 bytes) BMX6 Mesh Routing Protocol 8/18
9 Advantage I: Overhead Node and neighbor discovery expensive but transient Path discovery/maintenance continuous but cheap [4,5] 4-bytes routing updates (IID + metric value + sequence#) Overhead: approx. 1 byte / node / neighbor / second Master Thesis from Glenn Daneels, Analysis of the BMX6 routing protocol [4]: Overhead (Bps) Overhead (Bps) per second (100 seconds, topology size 100) BMX6 Grid BMX6 Topology OLSR Grid OLSR Topology Time (s) BMX6 Mesh Routing Protocol 9/18
10 Advantage I: Overhead Node and neighbor discovery expensive but transient Path discovery/maintenance continuous but cheap [4,5] 4-bytes routing updates (IID + metric value + sequence#) Overhead: approx. 1 byte / node / neighbor / second Master Thesis from Glenn Daneels, Analysis of the BMX6 routing protocol [4]: Overhead (Bps) Steady state (100 seconds) Steady state BMX6 Grid Steady state OLSR Grid Steady state BMX6 Topology Steady state OLSR Topology Topology size BMX6 Mesh Routing Protocol 10/18
11 Advantage I: Overhead Node and neighbor discovery expensive but transient Path discovery/maintenance continuous but cheap [4,5] 4-bytes routing updates (IID + metric value + sequence#) Overhead: approx. 1 byte / node / neighbor / second Real-life overhead trace from Wireless Community Weekend 2013, Berlin [6] One node moving around, approx 20-nodes temporary mesh deployment BMX6 Mesh Routing Protocol 11/18
12 Advantages II: User-controlled routing (choose how) Description contains routing-metric algo: Defaults: 0.5s-link probes, 5s-routing update, ETX-like metric Performance analysis from Wireless Battle Mesh WBMv6, 2013 [7], (work in progress) 25 ping tests between stationary nodes: ECDF groups=5,6,7,8,9,10,13,15,17,18,19,23,24,25,26,27,28,30,32,34,35,36,37,38,39 ECDF babel succ used expect rcvd batadv babel bmx6 batadv bmx olsr olsr proportion [%] <= RTT babel batadv bmx olsr netperf TCP throughput tests between stationary nodes in [Kbits/second]: Protocol test1 test2 test3 avg babel batadv bmx olsr Note correlation between ECDF for 10ms RTT and avg TP round tip time (RTT) [ms] BMX6 Mesh Routing Protocol 12/18
13 Advantage III: Overlay Networking (choose what) Description publishes tunnel endpoints to networks Traffic routed via user-controlled overlay network Using Linux-Kernel tunnel: Fast!!! Flexible tunnel offering and routes redistribution tunin=myself /n= /28 /b=10m redisttable=homenets /table=123 /b=100m /kernel=1 redistribute=nbcloud /n= /16 /b=10m /olsr=1 Flexible tunnel selection policies Destination specific GWs (private, cloud) tunout=peter /n= /24 /hostname=peter tunout=mycloud /n= /16 /minprefixlen=26 Zebra/Quagga support (export other community clouds) tunout=community /n= /8 /maxprefixlen=16 /bgp=1 No undesired internet-gw switching tunout=inet /n= /0 /maxprefixlen=0 /hysteresis=50 Preference driven GW selection (encounter IP hijacking) tunout=inet /n= /0 /maxprefixlen=0 /name=ffgw /bonus=100 BMX6 Mesh Routing Protocol 13/18
14 Advantages IV: Self-configuration & Failure Recovery Configuration: Minimal configuration requires only interface Auto-configured primary address (ULA-IPv6 based, similar to EUI64) immediate reachability Unambiguous end-to-end routing (NOT anycast/anywhere) Also description hash re-usable as primary IP (routing) Failure Recovery: Allocation conflicts solved context specific Eg: DAD solved by dropping conflicting routing updates NOT affecting overall network, just conflicting nodes!!! Misbehaving nodes are isolated locally Illegal node descriptions are dropped BMX6 Mesh Routing Protocol 14/18
15 Problem: Open versus Secure Existing end2end sec (ssl, vpn) rely on functioning routing Routing security by exclusion (shared key) is NO solution! Contradicts openness Public secret soon, hard to control or update Controversy between key-holders remains Clear rules are nice. But global compliance questionable! Think of hitchhikers dilemma: Society consensus: Do not threaten others? Young lady worries sweating older man (despite well dressed) Others afraid of punks offering a lift Security driven by trust, not by law (rules of consensus) Society approach: Don t exclude (criminalize) anybody But allow individuals to discard offers Lets try the same for routing... BMX6 Mesh Routing Protocol 15/18
16 User-Controlled Routing via Trusted Nodes: Goal Anarchist and Hippie distrust Spy Data to-be routed around Bourgeois appealed by NSA-sponsored high-speed links Data to-be routed straight Helps Anarchist despite distrust BMX6 Mesh Routing Protocol 16/18
17 User-Controlled Routing via Trusted Nodes: Approach Extend BMX6 description to publish each node s PubKey Trust set (other node s pubkeys) Signature: ensure authenticity) Remember: Descriptions propagated globally New rules: pubkeys+signature to setup symmetric link encryption: Authenticate routing updates from NB s Only process routing updates from X via NB if NB trusted by X! -> Forwarding path (next hops) to X only via trusted nodes BMX6 Mesh Routing Protocol 17/18
18 References: 1 L. Cerdà-Alabern, A. Neumann, and P. Escrich, Experimental Evaluation of a Wireless Community Mesh Network, acceppted for 16th ACM/IEEE International Conference on Modeling, Analysis and Simulation of Wireless and Mobile Systems (MSWiM 2013), Barcelona/Spain 2 A. Neumann, E. López, and L. Navarro, An evaluation of BMX6 for community wireless networks, 1st International Workshop on Community Networks and Bottom-up-Broadband (IEEE CNBuB 2012), Barcelona/Spain 3 A. Neumann, L. Navarro, P. Escrich, and R. Baig, Receiver-driven routing for community mesh networks, 5th International Workshop on Hot Topics in Mesh Networking (IEEE HotMesh 2013), Madrid/Spain 4 Glenn Daneels, Analysis of the BMX6 routing protocol, Master thesis at University of Antwerp, Department Mathematics-Computer Science, Roger Baig Viñas, Evaluation of Dynamic Routing Protocols on Realistic Wireless Topologies, Master Thesis at Universitat Autònoma de Barcelona, Department de Telecomunicació i D Enginyeria De Sistemes, June Wireless Community Weekend, 2013, Berlin, 7 Wireless Battle Mesh version 6 ( Mailing list Subject: [Battlemesh] Battlemesh v6 conclusions, Online: Thanks! Questions...? Checkout BMX6 Mesh Routing Protocol 18/18
Testing Network Security Using OPNET
Testing Network Security Using OPNET Agustin Zaballos, Guiomar Corral, Isard Serra, Jaume Abella Enginyeria i Arquitectura La Salle, Universitat Ramon Llull, Spain Paseo Bonanova, 8, 08022 Barcelona Tlf:
Definition. A Historical Example
Overlay Networks This lecture contains slides created by Ion Stoica (UC Berkeley). Slides used with permission from author. All rights remain with author. Definition Network defines addressing, routing,
SBSCET, Firozpur (Punjab), India
Volume 3, Issue 9, September 2013 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Layer Based
CROSS LAYER BASED MULTIPATH ROUTING FOR LOAD BALANCING
CHAPTER 6 CROSS LAYER BASED MULTIPATH ROUTING FOR LOAD BALANCING 6.1 INTRODUCTION The technical challenges in WMNs are load balancing, optimal routing, fairness, network auto-configuration and mobility
LIST OF FIGURES. Figure No. Caption Page No.
LIST OF FIGURES Figure No. Caption Page No. Figure 1.1 A Cellular Network.. 2 Figure 1.2 A Mobile Ad hoc Network... 2 Figure 1.3 Classifications of Threats. 10 Figure 1.4 Classification of Different QoS
Bit Chat: A Peer-to-Peer Instant Messenger
Bit Chat: A Peer-to-Peer Instant Messenger Shreyas Zare [email protected] https://technitium.com December 20, 2015 Abstract. Bit Chat is a peer-to-peer instant messaging concept, allowing one-to-one
EXTENDING NETWORK KNOWLEDGE: MAKING OLSR A QUALITY OF SERVICE CONDUCIVE PROTOCOL
EXTENDING NETWORK KNOWLEDGE: MAKING OLSR A QUALITY OF SERVICE CONDUCIVE PROTOCOL by Pedro Eduardo Villanueva-Pena, Thomas Kunz Carleton University January, 2006 This report examines mechanisms to gradually
MPLS over IP-Tunnels. Mark Townsley Distinguished Engineer. 21 February 2005
MPLS over IP-Tunnels Mark Townsley Distinguished Engineer 21 February 2005 1 MPLS over IP The Basic Idea MPLS Tunnel Label Exp S TTL MPLS VPN Label Exp S TTL MPLS Payload (L3VPN, PWE3, etc) MPLS Tunnel
Internetworking. Problem: There is more than one network (heterogeneity & scale)
Internetworking Problem: There is more than one network (heterogeneity & scale) Hongwei Zhang http://www.cs.wayne.edu/~hzhang Internetworking: Internet Protocol (IP) Routing and scalability Group Communication
Internet Firewall CSIS 4222. Packet Filtering. Internet Firewall. Examples. Spring 2011 CSIS 4222. net15 1. Routers can implement packet filtering
Internet Firewall CSIS 4222 A combination of hardware and software that isolates an organization s internal network from the Internet at large Ch 27: Internet Routing Ch 30: Packet filtering & firewalls
Multihoming and Multi-path Routing. CS 7260 Nick Feamster January 29. 2007
Multihoming and Multi-path Routing CS 7260 Nick Feamster January 29. 2007 Today s Topic IP-Based Multihoming What is it? What problem is it solving? (Why multihome?) How is it implemented today (in IP)?
Building scalable IPSec infrastructure with MikroTik. IPSec, L2TP/IPSec, OSPF
Building scalable IPSec infrastructure with MikroTik IPSec, L2TP/IPSec, OSPF Presenter information Tomas Kirnak Network design Security, wireless Servers Virtualization MikroTik Certified Trainer Atris,
Configuring a Site-to-Site VPN Tunnel Between Cisco RV320 Gigabit Dual WAN VPN Router and Cisco (1900/2900/3900) Series Integrated Services Router
print email Article ID: 4938 Configuring a Site-to-Site VPN Tunnel Between Cisco RV320 Gigabit Dual WAN VPN Router and Cisco (1900/2900/3900) Series Integrated Services Router Objective Virtual Private
Disaster-Resilient Backbone and Access Networks
The Workshop on Establishing Resilient Life-Space in the Cyber-Physical Integrated Society, March. 17, 2015, Sendai, Japan Disaster-Resilient Backbone and Access Networks Shigeki Yamada ([email protected])
Tor Anonymity Network & Traffic Analysis. Presented by Peter Likarish
Tor Anonymity Network & Traffic Analysis Presented by Peter Likarish This is NOT the presenter s original work. This talk reviews: Tor: The Second Generation Onion Router Dingledine, Mathewson, Syverson
Hyacinth An IEEE 802.11-based Multi-channel Wireless Mesh Network
Hyacinth An IEEE 802.11-based Multi-channel Wireless Mesh Network 1 Gliederung Einführung Vergleich und Problemstellung Algorithmen Evaluation 2 Aspects Backbone Last mile access stationary commodity equipment
Keywords- manet, routing protocols, aodv, olsr, grp,data drop parameter.
Volume 5, Issue 3, March 2015 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Evaluation of
Figure 1. The Example of ZigBee AODV Algorithm
TELKOMNIKA Indonesian Journal of Electrical Engineering Vol.12, No.2, February 2014, pp. 1528 ~ 1535 DOI: http://dx.doi.org/10.11591/telkomnika.v12i2.3576 1528 Improving ZigBee AODV Mesh Routing Algorithm
Mobile Security Wireless Mesh Network Security. Sascha Alexander Jopen
Mobile Security Wireless Mesh Network Security Sascha Alexander Jopen Overview Introduction Wireless Ad-hoc Networks Wireless Mesh Networks Security in Wireless Networks Attacks on Wireless Mesh Networks
Overview. Lecture 16: IP variations: IPv6, multicast, anycast. I think we have a problem. IPv6. IPv6 Key Features
Overview Lecture 16: IP variations: IPv6, multicast, anycast Next generation IP: IPv6 6lowpan and the Internet of Things IP multicast IP anycast Practical considerations throughout I think we have a problem
Enabling Multiple Wireless Networks on RV320 VPN Router, WAP321 Wireless-N Access Point, and Sx300 Series Switches
print email Article ID: 4941 Enabling Multiple Wireless Networks on RV320 VPN Router, WAP321 Wireless-N Access Point, and Sx300 Series Switches Objective In an ever-changing business environment, your
12/3/08. Security in Wireless LANs and Mobile Networks. Wireless Magnifies Exposure Vulnerability. Mobility Makes it Difficult to Establish Trust
Security in Wireless LANs and Mobile Networks Wireless Magnifies Exposure Vulnerability Information going across the wireless link is exposed to anyone within radio range RF may extend beyond a room or
Requirements for Simulation and Modeling Tools. Sally Floyd NSF Workshop August 2005
Requirements for Simulation and Modeling Tools Sally Floyd NSF Workshop August 2005 Outline for talk: Requested topic: the requirements for simulation and modeling tools that allow one to study, design,
S-38.3192 ITGuru Exercise (3: Building the MPLS BGP VPN) Spring 2006
S-38.3192 ITGuru Exercise (3: Building the MPLS BGP VPN) Spring 2006 Original version: Johanna Nieminen and Timo Viipuri (2005) Modified: Timo-Pekka Heikkinen, Juha Järvinen and Yavor Ivanov (2006) Task
CHAPTER 6. VOICE COMMUNICATION OVER HYBRID MANETs
CHAPTER 6 VOICE COMMUNICATION OVER HYBRID MANETs Multimedia real-time session services such as voice and videoconferencing with Quality of Service support is challenging task on Mobile Ad hoc Network (MANETs).
Threats and Security Analysis for Enhanced Secure Neighbor Discovery Protocol (SEND) of IPv6 NDP Security
Threats and Security Analysis for Enhanced Secure Neighbor Discovery Protocol (SEND) of IPv6 NDP Security Yvette E. Gelogo 1, Ronnie D. Caytiles 1 and Byungjoo Park 1 * 1Multimedia Engineering Department,
Network Security. Mobin Javed. October 5, 2011
Network Security Mobin Javed October 5, 2011 In this class, we mainly had discussion on threat models w.r.t the class reading, BGP security and defenses against TCP connection hijacking attacks. 1 Takeaways
Performance Evaluation of AODV, OLSR Routing Protocol in VOIP Over Ad Hoc
(International Journal of Computer Science & Management Studies) Vol. 17, Issue 01 Performance Evaluation of AODV, OLSR Routing Protocol in VOIP Over Ad Hoc Dr. Khalid Hamid Bilal Khartoum, Sudan [email protected]
Behavior Analysis of TCP Traffic in Mobile Ad Hoc Network using Reactive Routing Protocols
Behavior Analysis of TCP Traffic in Mobile Ad Hoc Network using Reactive Routing Protocols Purvi N. Ramanuj Department of Computer Engineering L.D. College of Engineering Ahmedabad Hiteishi M. Diwanji
ProCurve Networking IPv6 The Next Generation of Networking
ProCurve Networking The Next Generation of Networking Introduction... 2 Benefits from... 2 The Protocol... 3 Technology Features and Benefits... 4 Larger number of addresses... 4 End-to-end connectivity...
Configuring a WatchGuard SOHO to SOHO IPSec Tunnel
Configuring a WatchGuard to IPSec Tunnel This document describes the procedures required to configure an IPSec tunnel between two WatchGuard Firebox s (version 2.3.x). The following WatchGuard products
Autoconfiguration and maintenance of the IP address in ad-hoc mobile networks
1 Autoconfiguration and maintenance of the IP address in ad-hoc mobile networks M. Fazio, M. Villari, A. Puliafito Università di Messina, Dipartimento di Matematica Contrada Papardo, Salita Sperone, 98166
INTERNATIONAL JOURNAL OF PURE AND APPLIED RESEARCH IN ENGINEERING AND TECHNOLOGY
INTERNATIONAL JOURNAL OF PURE AND APPLIED RESEARCH IN ENGINEERING AND TECHNOLOGY A PATH FOR HORIZING YOUR INNOVATIVE WORK AN OVERVIEW OF MOBILE ADHOC NETWORK: INTRUSION DETECTION, TYPES OF ATTACKS AND
Inter-domain Routing Basics. Border Gateway Protocol. Inter-domain Routing Basics. Inter-domain Routing Basics. Exterior routing protocols created to:
Border Gateway Protocol Exterior routing protocols created to: control the expansion of routing tables provide a structured view of the Internet by segregating routing domains into separate administrations
Final for ECE374 05/06/13 Solution!!
1 Final for ECE374 05/06/13 Solution!! Instructions: Put your name and student number on each sheet of paper! The exam is closed book. You have 90 minutes to complete the exam. Be a smart exam taker -
Intelligent Agents for Routing on Mobile Ad-Hoc Networks
Intelligent Agents for Routing on Mobile Ad-Hoc Networks Y. Zhou Dalhousie University [email protected] A. N. Zincir-Heywood Dalhousie University [email protected] Abstract This paper introduces a new agent-based
Report to WIPO SCIT Plenary Trilateral Secure Virtual Private Network Primer. February 3, 1999
Report to WIPO SCIT Plenary Trilateral Secure Virtual Private Network Primer February 3, 1999 Frame Relay Frame Relay is an international standard for high-speed access to public wide area data networks
IPv6 Advantages. www.compaq.com. Yanick Pouffary. [email protected]
IPv6 Advantages Yanick Pouffary [email protected] IPv6 FORUM A world-wide consortium of leading Internet vendors and Research and Education Networks The IPv6 FORUM mission To promote IPv6 in order
CCNA Security 1.1 Instructional Resource
CCNA Security 1.1 Instructional Resource Chapter 8 Implementing Virtual Private Networks 2012 Cisco and/or its affiliates. All rights reserved. 1 Describe the purpose and types of VPNs and define where
Configuration Example
Configuration Example BOVPN Virtual Interface Load Balancing with OSPF Example configuration files created with WSM v11.10 Revised 5/22/2015 Use Case In this configuration example, an organization has
MPLS over Various IP Tunnels. W. Mark Townsley
MPLS over Various IP Tunnels W. Mark Townsley Generic MPLS over IP Manual, Point to Point Tunnel IP/MPLS Network P Manually Configured Tunnel IP Network P IP/MPLS Network Typically a GRE tunnel, but may
Protocol Rollback and Network Security
CSE 484 / CSE M 584 (Spring 2012) Protocol Rollback and Network Security Tadayoshi Kohno Thanks to Dan Boneh, Dieter Gollmann, Dan Halperin, John Manferdelli, John Mitchell, Vitaly Shmatikov, Bennet Yee,
Lecture Objectives. Lecture 8 Mobile Networks: Security in Wireless LANs and Mobile Networks. Agenda. References
Lecture Objectives Wireless Networks and Mobile Systems Lecture 8 Mobile Networks: Security in Wireless LANs and Mobile Networks Introduce security vulnerabilities and defenses Describe security functions
CS 43: Computer Networks IP. Kevin Webb Swarthmore College November 5, 2013
CS 43: Computer Networks IP Kevin Webb Swarthmore College November 5, 2013 Reading Quiz IP datagram format IP protocol version number header length (bytes) type of data max number remaining hops (decremented
Router and Routing Basics
Router and Routing Basics Malin Bornhager Halmstad University Session Number 2002, Svenska-CNAP Halmstad University 1 Routing Protocols and Concepts CCNA2 Routing and packet forwarding Static routing Dynamic
An evaluation of BMX6 for Community Wireless Networks
An evaluation of BMX6 for Community Wireless Networks Axel Neumann Pangea.org NGO Barcelona, Spain [email protected] Ester López Computer Architecture Department Universitat Politècnica de Catalunya Barcelona,
Virtual Private Network VPN IPSec Testing: Functionality Interoperability and Performance
Virtual Private Network VPN IPSec Testing: Functionality Interoperability and Performance Johnnie Chen Project Manager of Network Security Group Network Benchmarking Lab Network Benchmarking Laboratory
CCT vs. CCENT Skill Set Comparison
Operation of IP Data Networks Recognize the purpose and functions of various network devices such as Routers, Switches, Bridges and Hubs Select the components required to meet a given network specification
White Paper. Cisco MPLS based VPNs: Equivalent to the security of Frame Relay and ATM. March 30, 2001
The leading edge in networking information White Paper Cisco MPLS based VPNs: Equivalent to the security of Frame Relay and ATM March 30, 2001 Abstract: The purpose of this white paper is to present discussion
VPN. Date: 4/15/2004 By: Heena Patel Email:[email protected]
VPN Date: 4/15/2004 By: Heena Patel Email:[email protected] What is VPN? A VPN (virtual private network) is a private data network that uses public telecommunicating infrastructure (Internet), maintaining
COMPARATIVE ANALYSIS OF ON -DEMAND MOBILE AD-HOC NETWORK
www.ijecs.in International Journal Of Engineering And Computer Science ISSN:2319-7242 Volume 2 Issue 5 May, 2013 Page No. 1680-1684 COMPARATIVE ANALYSIS OF ON -DEMAND MOBILE AD-HOC NETWORK ABSTRACT: Mr.Upendra
Policy Based Forwarding
Policy Based Forwarding Tech Note PAN-OS 4.1 Revision A 2012, Palo Alto Networks, Inc. www.paloaltonetworks.com Contents Overview... 3 Security... 3 Performance... 3 Symmetric Routing... 3 Service Versus
F5 Silverline DDoS Protection Onboarding: Technical Note
F5 Silverline DDoS Protection Onboarding: Technical Note F5 Silverline DDoS Protection onboarding F5 Networks is the first leading application services company to offer a single-vendor hybrid solution
19531 - Telematics. 9th Tutorial - IP Model, IPv6, Routing
19531 - Telematics 9th Tutorial - IP Model, IPv6, Routing Bastian Blywis Department of Mathematics and Computer Science Institute of Computer Science 06. January, 2011 Institute of Computer Science Telematics
Lecture Objectives. Lecture 07 Mobile Networks: TCP in Wireless Networks. Agenda. TCP Flow Control. Flow Control Can Limit Throughput (1)
Lecture Objectives Wireless and Mobile Systems Design Lecture 07 Mobile Networks: TCP in Wireless Networks Describe TCP s flow control mechanism Describe operation of TCP Reno and TCP Vegas, including
Building MPLS VPNs with QoS Routing Capability i
Building MPLS VPNs with QoS Routing Capability i Peng Zhang, Raimo Kantola Laboratory of Telecommunication Technology, Helsinki University of Technology Otakaari 5A, Espoo, FIN-02015, Finland Tel: +358
Border Gateway Protocol (BGP)
Border Gateway Protocol (BGP) Petr Grygárek rek 1 Role of Autonomous Systems on the Internet 2 Autonomous systems Not possible to maintain complete Internet topology information on all routers big database,
Efficient End-to-End Mobility Support in IPv6
Efficient End-to-End Mobility Support in IPv6, Mark Doll, [email protected], Communicating Anywhere, Anytime 1 Mobile IPv6 Basics mobile node @ home address Internet visited network home network correspondent
Formal Measure of the Effect of MANET size over the Performance of Various Routing Protocols
Formal Measure of the Effect of MANET size over the Performance of Various Routing Protocols Er. Pooja Kamboj Research Scholar, CSE Department Guru Nanak Dev Engineering College, Ludhiana (Punjab) Er.
APPENDIX 1 USER LEVEL IMPLEMENTATION OF PPATPAN IN LINUX SYSTEM
152 APPENDIX 1 USER LEVEL IMPLEMENTATION OF PPATPAN IN LINUX SYSTEM A1.1 INTRODUCTION PPATPAN is implemented in a test bed with five Linux system arranged in a multihop topology. The system is implemented
IPv6 First Hop Security Protecting Your IPv6 Access Network
IPv6 First Hop Security Protecting Your IPv6 Access Network What You Will Learn This paper provides a brief introduction to common security threats on IPv6 campus access networks and will explain the value
Deploying IPSec VPN in the Enterprise
VPN5 6/9/03 6:14 PM Page 137 Chapter 5 Deploying IPSec VPN in the Enterprise 5.1 Chapter Overview In Chapters 3 and 4, the focus was on implementing a single site-to-site IPSec VPN and the different IKE
DEPLOYMENT GUIDE Version 1.1. Configuring BIG-IP WOM with Oracle Database Data Guard, GoldenGate, Streams, and Recovery Manager
DEPLOYMENT GUIDE Version 1.1 Configuring BIG-IP WOM with Oracle Database Data Guard, GoldenGate, Streams, and Recovery Manager Table of Contents Table of Contents Configuring BIG-IP WOM with Oracle Database
Lecture 8 Performance Measurements and Metrics. Performance Metrics. Outline. Performance Metrics. Performance Metrics Performance Measurements
Outline Lecture 8 Performance Measurements and Metrics Performance Metrics Performance Measurements Kurose-Ross: 1.2-1.4 (Hassan-Jain: Chapter 3 Performance Measurement of TCP/IP Networks ) 2010-02-17
PART III. OPS-based wide area networks
PART III OPS-based wide area networks Chapter 7 Introduction to the OPS-based wide area network 7.1 State-of-the-art In this thesis, we consider the general switch architecture with full connectivity
PRASAD ATHUKURI Sreekavitha engineering info technology,kammam
Multiprotocol Label Switching Layer 3 Virtual Private Networks with Open ShortestPath First protocol PRASAD ATHUKURI Sreekavitha engineering info technology,kammam Abstract This paper aims at implementing
Receiver-driven routing for community mesh networks
Receiver-driven routing for community mesh networks Axel Neumann, Leandro Navarro Department of Computer Architecture Universitat Politècnica de Catalunya Barcelona, Spain [email protected], [email protected]
APNIC elearning: BGP Attributes
APNIC elearning: BGP Attributes Contact: [email protected] erou04_v1.0 Overview BGP Attributes Well-known and Optional Attributes AS Path AS Loop Detection ibgp and ebgp Next Hop Next Hop Best Practice
Steelcape Product Overview and Functional Description
Steelcape Product Overview and Functional Description TABLE OF CONTENTS 1. General Overview 2. Applications/Uses 3. Key Features 4. Steelcape Components 5. Operations Overview: Typical Communications Session
Tomás P. de Miguel DIT-UPM. dit UPM
Tomás P. de Miguel DIT- 15 12 Internet Mobile Market Phone.com 15 12 in Millions 9 6 3 9 6 3 0 1996 1997 1998 1999 2000 2001 0 Wireless Internet E-mail subscribers 2 (January 2001) Mobility The ability
Rohde & Schwarz R&S SITLine ETH VLAN Encryption Device Functionality & Performance Tests
Rohde & Schwarz R&S Encryption Device Functionality & Performance Tests Introduction Following to our test of the Rohde & Schwarz ETH encryption device in April 28 the European Advanced Networking Test
Using Peer to Peer Dynamic Querying in Grid Information Services
Using Peer to Peer Dynamic Querying in Grid Information Services Domenico Talia and Paolo Trunfio DEIS University of Calabria HPC 2008 July 2, 2008 Cetraro, Italy Using P2P for Large scale Grid Information
Study of Different Types of Attacks on Multicast in Mobile Ad Hoc Networks
Study of Different Types of Attacks on Multicast in Mobile Ad Hoc Networks Hoang Lan Nguyen and Uyen Trang Nguyen Department of Computer Science and Engineering, York University 47 Keele Street, Toronto,
Introduction to Metropolitan Area Networks and Wide Area Networks
Introduction to Metropolitan Area Networks and Wide Area Networks Chapter 9 Learning Objectives After reading this chapter, you should be able to: Distinguish local area networks, metropolitan area networks,
Cisco Integrated Services Routers Performance Overview
Integrated Services Routers Performance Overview What You Will Learn The Integrated Services Routers Generation 2 (ISR G2) provide a robust platform for delivering WAN services, unified communications,
CCNA R&S: Introduction to Networks. Chapter 5: Ethernet
CCNA R&S: Introduction to Networks Chapter 5: Ethernet 5.0.1.1 Introduction The OSI physical layer provides the means to transport the bits that make up a data link layer frame across the network media.
EE627 Lecture 22. Multihoming Route Control Devices
EE627 Lecture 22 Multihoming Route Control Devices 1 Multihoming Connect to multiple ISPs Provide reliability from access link/isp failures Potential for load balancing Intelligent Route Control Devices
21.4 Network Address Translation (NAT) 21.4.1 NAT concept
21.4 Network Address Translation (NAT) This section explains Network Address Translation (NAT). NAT is also known as IP masquerading. It provides a mapping between internal IP addresses and officially
Network Infrastructure Under Siege
Network Infrastructure Under Siege Char Sample Security Engineer, CERT Information Security Decisions TechTarget Disclaimer Standard Disclaimer - This talk represents the opinions and research of the presenter
Mobile Internet Protocol v6 MIPv6
Mobile Internet Protocol v6 MIPv6 A brief introduction [email protected] 13-dec-2005 Holger Zuleger 1/15 > c Defined by MIPv6 RFC3775: Mobility Support in IPv6 (June 2004) RFC3776: Using IPsec to
batman-adv scalability
batman-adv scalability Layer 2 Mesh Networks - Myths and Risks Linus Lüssing Freifunk Hamburg Geekend02, Sep. 2013 Outline Introduction 1 Introduction Layer 2 Mesh Networks 2 Experiences From Lübeck 3
Implementing MPLS VPN in Provider's IP Backbone Luyuan Fang [email protected] AT&T
Implementing MPLS VPN in Provider's IP Backbone Luyuan Fang [email protected] AT&T 1 Outline! BGP/MPLS VPN (RFC 2547bis)! Setting up LSP for VPN - Design Alternative Studies! Interworking of LDP / RSVP
SANE: A Protection Architecture For Enterprise Networks
Fakultät IV Elektrotechnik und Informatik Intelligent Networks and Management of Distributed Systems Research Group Prof. Anja Feldmann, Ph.D. SANE: A Protection Architecture For Enterprise Networks WS
CS 457 Lecture 19 Global Internet - BGP. Fall 2011
CS 457 Lecture 19 Global Internet - BGP Fall 2011 Decision Process Calculate degree of preference for each route in Adj-RIB-In as follows (apply following steps until one route is left): select route with
Integrated Services Router with the "AIM-VPN/SSL" Module
Virtual Private Network (VPN) Advanced Integration Module (AIM) for the 1841 Integrated Services Router and 2800 and 3800 Series Integrated Services Routers The VPN Advanced Integration Module (AIM) for
Experimental Comparison of Routing and Middleware Solutions for Mobile Ad Hoc Networks: Legacy vs Cross-Layer Approach
Experimental Comparison of Routing and Middleware Solutions for Mobile Ad Hoc Networks: Legacy vs Cross-Layer Approach E. Borgia, M. Conti, F.Delmastro, and E. Gregori Pervasive Computing & Networking
Configuring Static and Dynamic NAT Simultaneously
Configuring Static and Dynamic NAT Simultaneously Document ID: 13778 Contents Introduction Prerequisites Requirements Components Used Conventions Configuring NAT Related Information Introduction In some
Cisco 3745. Cisco 3845 X X X X X X X X X X X X X X X X X X
Data Sheet Virtual Private Network (VPN) Advanced Integration Module (AIM) for the 1841 Integrated Services Router and 2800 and 3800 Series Integrated Services Routers The VPN Advanced Integration Module
Disaster Recovery White Paper
Introduction Remote access plays a critical role in successfully executing a business recovery plan both in terms of providing access for existing remote users and accommodating the potential increase
Adapting Distributed Hash Tables for Mobile Ad Hoc Networks
University of Tübingen Chair for Computer Networks and Internet Adapting Distributed Hash Tables for Mobile Ad Hoc Networks Tobias Heer, Stefan Götz, Simon Rieche, Klaus Wehrle Protocol Engineering and
IT 3202 Internet Working (New)
[All Rights Reserved] SLIATE SRI LANKA INSTITUTE OF ADVANCED TECHNOLOGICAL EDUCATION (Established in the Ministry of Higher Education, vide in Act No. 29 of 1995) Instructions for Candidates: Answer any
