Peer-to-Peer Systems and Security IN2194
|
|
|
- Clara Harrison
- 10 years ago
- Views:
Transcription
1 Network Architectures and Services Department of Computer Science TU München Peer-to-Peer Systems and Security IN2194 Dipl.-Inform. Heiko Niedermayer Christian Grothoff, PhD Prof. Dr.-Ing Georg Carle
2 Course organization IN2194 Lecture Monday, 10: , MI A weekly Thursday, 14: , MI A first weekly, then typically bi-weekly Exercises Typically bi-weekly Thursday, 14: , MI A Students are requested to subscribe to lecture and exercises at lehre vorlesungen Informationen des Lehrstuhls vorlesung-peer-to-peer-systeme-und-sicherheit/ list, svn access for subscribers of course Questions and Answers / Office hours Prof. Dr. Georg Carle, [email protected] Upon appointment (typically Monday 16-17) Heiko Niedermayer, [email protected] Christian Grothoff, Ph.D., [email protected] Course Material Slides are available online. Slides may be updated during the course. Network IN2194: Peer-to-Peer Security, WS Systems 2008/09, and Chapter Security, 9 SS
3 Grading Course is 5 ECTS 3 SWS lectures 1 SWS exercises including practical assignment (programming project) Exercises ~5 exercise sheets Prepare for the oral examination Successfully participating at exercises gives a bonus of 0,3 for overall grade Practical assignment will be graded Our concept for grading Final examinations will be oral and give an individual grade. You must pass the oral exam for being successful in the course. For overall grade, grade of practical assignment gives 20% of final grade Network IN2194: Peer-to-Peer Security, WS Systems 2008/09, and Chapter Security, 9 SS
4 Questions Who studies what? Diploma degree? Master in Informatics? Master in Information Systems [Wirtschaftsinformatik]? Other Master courses? Bachelor in Informatics? Which previous relevant courses? Network IN2194: Peer-to-Peer Security, WS Systems 2008/09, and Chapter Security, 9 SS
5 Courses offered by I8 Lectures SS: Introduction to Computer Networking and Distributed Systems (IN0010) Discrete Event Simulation (IN2045) WS: Master Course Computer Networks (IN2097) Network Security (IN2101) Seminars Seminar Network Architectures and Services: Network Hacking (IN0013) Advanced Seminar - Innovative Internet Technologies and Mobile Communications (IN8901) Advanced Seminar Future Internet (IN8901) Advanced Seminar Sensor Networks(IN0014), with Prof. Baumgarten Lab Courses Bachelor Practical Course - Internet Lab (IN0012) Master Practical Course Computer Networks (IN2106) Network IN2194: Peer-to-Peer Security, WS Systems 2008/09, and Chapter Security, 9 SS
6 Peer-to-Peer Systems and Security Motivation The power of P2P Network IN2194: Peer-to-Peer Security, WS Systems 2008/09, and Chapter Security, 9 SS
7 Peer-to-Peer Systems Very popular due to to file-sharing Responsible for for majority of of the traffic of of the Internet! Network of equals (peers) Users can offer new services Users and their computers at the edges of the Internet share their resources (bandwidth, CPU, storage). Inherent scalability with growing Self-organization of the system No traffic management Autonomy from central entities like central servers Robustness Network IN2194: Peer-to-Peer Security, WS Systems 2008/09, and Chapter Security, 9 SS
8 Architecture of a Telecommunication Network (GSM) radio cell MS MS BSS U m radio cell MS MS BSS radio cell RSS U m BTS radio cell MS BTS MS BTS BTS A bis BSC BSC BSC A NSS VLR MSC HLR O VLR MSC GMSC IWF Signaling ISDN, PSTN PDN Involved in Authentication: MS BSS/MSC/VLR OSS EIR AUC OMC HLR/AUC Network IN2194: Peer-to-Peer Security, WS Systems 2008/09, and Chapter Security, 9 SS
9 GSM AUC BSC BSS BTS IMSI HLR LAI MS MSC MSISDN TMSI VLR Some GSM Components Authentication center Base station controller Bas station system Base transceiver station International mobile subscriber identity Home location register Location area identifier Mobile station (e.g. a mobile phone) Mobile switching center Mobile subscriber international ISDN number Temporary mobile subscriber identity Visitor location register Challenge: Availability / Resilience Network IN2194: Peer-to-Peer Security, WS Systems 2008/09, and Chapter Security, 9 SS
10 Related Research Activities at the Chair I8 Goal: Improve the resilience/security of network services using the Peer-to-Peer networking paradigm taking Voice over IP (VoIP) as an example Network IN2194: Peer-to-Peer Security, WS Systems 2008/09, and Chapter Security, 9 SS
11 Cooperative SIP (CoSIP) User registration with CoSIP Session establishment with CoSIP Alice REGISTER Alice (3) CoSIP INVITE (1) SIP INVITE Bob put(h(sip_uri), Contact_URI) (1') get(h(sip_uri)) (2) Contact_URI DHT Network IN2194: Peer-to-Peer Security, WS Systems 2008/09, and Chapter Security, 9 SS
12 Application of CoSIP in the fixed network CoSIP adapter/ proxy in DSL routers CoSIP adapters organize themselves into a P2P network Small Office and Home Network (SOHO) Internet/VoIP Provider SIP Infrastructure DSL Router with a CoSIP adapter / CoSIP proxy SOHO Network IN2194: Peer-to-Peer Security, WS Systems 2008/09, and Chapter Security, 9 SS
13 EU FP7 Projekt ResumeNet Resilience and Survivability for future networking: framework, mechanisms, and experimental evaluation A EU Project of the FIRE Research Programme ( Future Internet Research and Experimentation ) Consortium: Strategy: D 2 R 2 DR ETH Zürich Lancaster University Technical University Munich France Telecom NEC Europe Ltd Universität Passau Technical University Delft Uppsala Universitet Université de Liège Switzerland United Kingdom Germany France United Kingdom Germany Netherlands Sweden Belgium Network IN2194: Peer-to-Peer Security, WS Systems 2008/09, and Chapter Security, 9 SS
14 Robust Service Provisioning (Service Resilience) Network IN2194: Peer-to-Peer Security, WS Systems 2008/09, and Chapter Security, 9 SS
15 Robust Service Provisioning (2) Approach: Hybrid p2p overlay network Peers with different roles, verifyable identity, virtualisation Goal: Cooperation of end nodes and infrastructure for high reliability, service quality, scalability Network IN2194: Peer-to-Peer Security, WS Systems 2008/09, and Chapter Security, 9 SS
16 Further selected research at I8 Network Architectures and Services Network IN2194: Peer-to-Peer Security, WS Systems 2008/09, and Chapter Security, 9 SS
17 Projektschwerpunkte Autonomic / Self-Org. Man. Mobile comm. Measurements P2P and Overlays Netzwork Security EU ResumeNet EU AutHoNe DFG LUPUS BMBF ScaleNet NSN SelfMan NSN TC-NAC France-Telecom SASCO BWFIT SpoVNet BWFIT AmbiSense Network IN2194: Peer-to-Peer Security, WS Systems 2008/09, and Chapter Security, 9 SS
18 AutHoNe - Autonomic Home Networking EUREKA-Celtic/BMBF-Project Partner in Germany TU München Fraunhofer FOKUS Siemens Corporate Technology Hirschmann Automation and Control EU/Celtic Partner France Telecom, Frankreich Sony-Ericsson, Schweden Ginkgo Networks, Frankreich Univ. Pierre et Marie Curie, Paris (UPMC-LIP6), Frankreich Universität Lund, Schweden EU AutHoNe Network IN2194: Peer-to-Peer Security, WS Systems 2008/09, and Chapter Security, 9 SS
19 Autonomic Home Networks Full Control Mobile Devices WLAN, Bluetoo th AutHoNe - Home Network Self management Visualization of Network State Autonomic Control Plug and Play PC adaption to users and environment Landlor d Appliances Monitoring Probe Monitoring Probe Home Gateway Visitor Trust determines Access Rights Distributed Sensor/Actuator Network Degree of Autonomicity Self- Management Manual interaction Network IN2194: Peer-to-Peer Security, WS Systems 2008/09, and Chapter Security, 9 SS
20 Basic concepts Knowledge Platform Knowledge Agent KA KA KA Light is on Call from Knowledge Window open My IP is C KA KA KA Autonomous Configuration and Management Network IN2194: Peer-to-Peer Security, WS Systems 2008/09, and Chapter Security, 9 SS
21 Basic concepts User Control User-friendly Modes for normal users and experts Security secure less secure No remote access Only remote access by owner (no administrative control) Remote access by friends Interaction with Environment Sensors Actuators Network IN2194: Peer-to-Peer Security, WS Systems 2008/09, and Chapter Security, 9 SS
22 Home Networks with Cloud and P2P services AutHoNe provides Self-Management Knowledge plane Zero Configuration Cloud Computing Computation and Storage in the network Reliable resources Pay and get more resources Security Anchor Provider and its accounting In combination with Peer-to-Peer Use existing resources at edge Scalability Non-critical tasks and replication Bootstrapping and lookup of services CloudCast to a near-by service cloud for lookup or processing Network IN2194: Peer-to-Peer Security, WS Systems 2008/09, and Chapter Security, 9 SS
23 Detecting Command and Control Traffic Provider-guided attack detection in home networks Security Information Provider Alert!!! Alert!!! Network IN2194: Peer-to-Peer Security, WS Systems 2008/09, and Chapter Security, 9 SS
24 France-Telecom-Project SASCO: Overlay Security Project SASCO Cooperation wit France Télécom and Fraunhofer FOKUS Situated Overlay Geographic & Geodetic Information DMZ Network Provider Resource Access Control HSS Client Situated Overlay Nodes (SON) Network IN2194: Peer-to-Peer Security, WS Systems 2008/09, and Chapter Security, 9 SS
25 SASCO: Situated Autonomic Service Control Negotiation of Service Parameters Dynamic Access Control Network IN2194: Peer-to-Peer Security, WS Systems 2008/09, and Chapter Security, 9 SS
26 BWFIT SpoVNet: Cross-Layer-Information for Overlays Prof. Dr. Paul Kühn Universität Stuttgart Prof. Dr. Martina Zitterbart Universität Karlsruhe Prof. Dr. Georg Carle TU München Prof. Dr. Kurt Rothermel Universität Stuttgart Prof. Dr. Wolfgang Effelsberg Universität Mannheim SpoVNet: Spontanous Virtual Networks Flexible, adaptive and spontaneous service provisioning Approach: overlays Applications: Video Streaming, Gaming Let-1000-networks-bloom instea of One-size-fits-all Tailored architekture for applications and networks Cross-Layer-Information supports QoS decisions and optimisation No dedicated infrastructure needed Network IN2194: Peer-to-Peer Security, WS Systems 2008/09, and Chapter Security, 9 SS
27 SpoVNet - Spontaneous Virtual Networks Partners: KIT (Zitterbart), Uni Stuttgart (Kühn, Rothermel), Uni Mannheim (Effelsberg) Future Internet Approach Locator/Identifier-Split On demand overlay creation Service overlays UNISONO (@TUM) Cross-layer Information Service SpoVNet-Overlay IP-based Internet Application Service Abstraction Service Overlays ALM Others Underlay Abstraction Ariba SRM Underlay RTT: 15ms Loss: 0 availbw: 75M Capacity: 100M MTU: 1500 L2: Ethernet IPMC: 1 MTU: 1500 Load: 0.1 FreeRAM: 734M availbw: 75M Capacity: 100M Network IN2194: Peer-to-Peer Security, WS Systems 2008/09, and Chapter Security, 9 SS
28 Peer-to-Peer Systems and Security The lecture Network IN2194: Peer-to-Peer Security, WS Systems 2008/09, and Chapter Security, 9 SS
29 Course Overview Peer-to-Peer Chapter 1: Peer-to-Peer systems and overlay networks Chapter 2: Security in distributed systems Chapter 3: Anonymity and Privacy Client/Server Classic networking Security Network IN2194: Peer-to-Peer Security, WS Systems 2008/09, and Chapter Security, 9 SS
30 Peer-to-Peer Systems Network of equals No distinction between client and server Users and their computers at the edges of the Internet share their resources (bandwidth, CPU, storage). Self-organization of the system Autonomy from central entities like central servers Peers come and go continuously changing environment Very popular due to file-sharing and content distribution networks that today are responsible for majority of the traffic of the Internet Network IN2194: Peer-to-Peer Security, WS Systems 2008/09, and Chapter Security, 9 SS
31 Security but Highly decentralized systems are not very secure. What about peers that do not cooperate? What about attacks or misuse? still. Peer-to-Peer systems are useful for censor-resistance, DoS resilience, etc. Security is an important issue especially for serious applications. Decentralized systems have their drawbacks, but also a high potential for improvements! Network IN2194: Peer-to-Peer Security, WS Systems 2008/09, and Chapter Security, 9 SS
32 Anonymity & Privacy In our daily life we are often an anonymous entity among a mass of other entities. Pseudonymity: An entity hides behind a pseudonym, so that anyone (but an authority) only knows the pseudonym, but not the true identity. The pseudonym can be tracked. Anonymity: Hide the identity, the usage/traffic patterns, and relationships from other entities or observers. No tracking. Traffic Analysis can reveal information that is leaked even if encryption is used. Technologies like Onion Routing can make these attacks harder. Network IN2194: Peer-to-Peer Security, WS Systems 2008/09, and Chapter Security, 9 SS
33 Where are we? on the network stack... Peer Peer Layer Layer 77 Layer Layer 4 4 Application Layer (e.g. HTTP) Transport Layer (e.g. TCP, UDP) Layer Layer 77 Layer Layer 4 4 Layer Layer 33 Network Layer (e.g. IP) Layer Layer 33 Layer Layer 33 Network Layer (e.g. IP) Layer Layer 33 Layer Layer 2 2 Data Link Layer Layer Layer 2 2 Layer Layer 2 2 Data Link Layer Layer Layer 2 2 Layer Layer 11 Physical Layer Layer Layer 11 Layer Layer 11 Physical Layer Layer Layer 11 on application layer with some exceptions. Network IN2194: Peer-to-Peer Security, WS Systems 2008/09, and Chapter Security, 9 SS
34 Where are we? II Who is contributing / doing the work? End system (Peer) End system (Peer) End system (Peer) End system (Peer) Network End system (Peer) End system (Peer) End system (Peer) Network IN2194: Peer-to-Peer Security, WS Systems 2008/09, and Chapter Security, 9 SS
Theory and Practice. IT-Security: GSM Location System Syslog XP 3.7. Mobile Communication. December 18, 2001. GSM Location System Syslog XP 3.
Participant: Hack contacting... IT-Security: Theory and Practice Mobile Communication December 18, 2001 Uwe Jendricke [email protected] Lecture Homepage: http://www.informatik.uni-freiburg.de/~softech/teaching/ws01/itsec/
Lecture overview. History of cellular systems (1G) GSM introduction. Basic architecture of GSM system. Basic radio transmission parameters of GSM
Lecture overview History of cellular systems (1G) GSM introduction Basic architecture of GSM system Basic radio transmission parameters of GSM Analogue cellular systems 70 s In the early 70 s radio frequencies
Mobile Communications
October 21, 2009 Agenda Topic 2: Case Study: The GSM Network 1 GSM System General Architecture 2 GSM Access network. 3 Traffic Models for the Air interface 4 Models for the BSS design. 5 UMTS and the path
2 System introduction
2 System introduction Objectives After this chapter the student will: be able to describe the different nodes in a GSM network. be able to describe geographical subdivision of a GSM network. be able to
Global System for Mobile Communication Technology
Global System for Mobile Communication Technology Mobile Device Investigations Program Technical Operations Division DHS - FLETC GSM Technology Global System for Mobile Communication or Groupe Special
Ariba: A Framework for Developing Decentralized Services
Ariba: A Framework for Developing Decentralized Services Christian Hübsch, Christoph P. Mayer, and Oliver P. Waldhorst NGN Service Delivery Platforms and Service Overlays, 13. November 2009, Berlin Institute
Mobile Communications Chapter 4: Wireless Telecommunication Systems slides by Jochen Schiller with modifications by Emmanuel Agu
Mobile Communications Chapter 4: Wireless Telecommunication Systems slides by Jochen Schiller with modifications by Emmanuel Agu Market GSM Overview Services Sub-systems Components Prof. Dr.-Ing. Jochen
Tutorial Proposal for MONAMI 2012 Operating Heterogeneous Wireless Networks with SON (Self-Organizing Networks)
Tutorial Proposal for MONAMI 2012 Operating Heterogeneous Wireless Networks with SON (Self-Organizing Networks) Objectives Dr. Henning Sanneck, Lars Christoph Schmelz Providing a comprehensive introduction
1 Introduction. 2 Assumptions. Implementing roaming for OpenBTS
Implementing roaming for OpenBTS 1 Introduction One of the main advantages of OpenBTS TM system architecture is absence of a legacy GSM core network. SIP is used for registering, call control and messaging.
Mobility Management 嚴 力 行 高 雄 大 學 資 工 系
Mobility Management 嚴 力 行 高 雄 大 學 資 工 系 Mobility Management in Cellular Systems Cellular System HLR PSTN MSC MSC VLR BSC BSC BSC cell BTS BTS BTS BTS MT BTS BTS BTS BTS HLR and VLR HLR (Home Location Register)
The GSM and GPRS network T-110.300/301
The GSM and GPRS network T-110.300/301 History The successful analog 1:st generation mobile telephone systems proved that there is a market for mobile telephones ARP (AutoRadioPuhelin) in Finland NMT (Nordic
Locating Mobile Phones using Signalling System #7. Tobias Engel <[email protected]> twitter: @2b_as
Locating Mobile Phones using Signalling System #7 Tobias Engel twitter: @2b_as What is Signalling System #7? protocol suite used by most telecommunications operators throughout the world
Mobile Wireless Overview
Mobile Wireless Overview A fast-paced technological transition is occurring today in the world of internetworking. This transition is marked by the convergence of the telecommunications infrastructure
How To Understand The Gsm And Mts Mobile Network Evolution
Mobile Network Evolution Part 1 GSM and UMTS GSM Cell layout Architecture Call setup Mobility management Security GPRS Architecture Protocols QoS EDGE UMTS Architecture Integrated Communication Systems
Wireless and Mobile Network Architecture
Wireless and Mobile Network Architecture Chapter 13: VoIP Service for Mobile Networks Prof. Yuh-Shyan Chen Department of Computer Science and Information Engineering National Taipei University Dec. 2006
SS7 & LTE Stack Attack
SS7 & LTE Stack Attack Ankit Gupta Black Hat USA 2013 [email protected] Introduction With the evolution of IP network, Telecom Industries are using it as their core mode of communication for their network
Overview of Network Architecture Alternatives for 3GPP2 Femto Cells Jen M. Chen, et al. QUALCOMM Incorporated
3GPP2 Workshop, Boston, MA Title: Source: Contact: Overview of Network Architecture Alternatives for 3GPP2 Femto Cells Jen M. Chen, et al. QUALCOMM Incorporated Jen M. Chen QUALCOMM Incorporated 858-658-2543
Worldwide attacks on SS7 network
Worldwide attacks on SS7 network P1 Security Hackito Ergo Sum 26 th April 2014 Pierre-Olivier Vauboin ([email protected]) Alexandre De Oliveira ([email protected]) Agenda Overall telecom architecture Architecture
Chapter 10 VoIP for the Non-All-IP Mobile Networks
Chapter 10 VoIP for the Non-All-IP Mobile Networks Prof. Yuh-Shyan Chen Department of Computer Science and Information Engineering National Taipei University Outline 10.1 GSM-IP: VoIP Service for GSM 256
GSM System Architecture
Intersystem Operation and Mobility Management David Tipper Associate Professor Graduate Program in Telecommunications and Networking University it of Pittsburgh Telcom 2700 Slides 6 http://www.tele.pitt.edu/tipper.html
Handoff in GSM/GPRS Cellular Systems. Avi Freedman Hexagon System Engineering
Handoff in GSM/GPRS Cellular Systems Avi Freedman Hexagon System Engineering Outline GSM and GSM referemce model GPRS basics Handoffs GSM GPRS Location and Mobility Management Re-selection and routing
What is telecommunication? electronic communications? What is telephony?
What is telecommunication? Telecommunication: Any transmission, emission or reception of signs, signals, writing, images and sounds or intelligence of any nature by wire, radio, optical or other electromagnetic
Lawful Interception in P2Pbased
Lawful Interception in P2Pbased VoIP Systems Jan Seedorf (jan.seedorf_at_nw.neclab.eu) NEC Laboratories Europe Heidelberg, Germany July Page 2008 1-1 IPTCOMM 2008 Heidelberg, Germany Outline 1.
!!! "# $ % & & # ' (! ) * +, -!!. / " 0! 1 (!!! ' &! & & & ' ( 2 3 0-4 ' 3 ' Giuseppe Bianchi
!!! "# $ % & & # ' (! ) * +, -!!. / " 0! 1 (!!! ' &! & & & ' ( 2 3 0-4 ' 3 ' "#$!!% "&'! #&'!%! () *+,, 3 & 5 &,! #-!*! ' & '.! #%!* //!! & (0)/!&/, 6 5 /, "! First system: NMT-450 (Nordic Mobile Telephone)
What is telecommunication? electronic communications. service?
What is telecommunication? Telecommunication: Any transmission, emission or reception of signs, signals, writing, images and sounds or intelligence of any nature by wire, radio, optical or other electromagnetic
P2P and IMS Cooperation / Integration
P2P and IMS Cooperation / Integration Jens Fiedler Fraunhofer FOKUS Group for Next Generation Network Infrastructures 1 P2P vs. IMS Isn t P2P and IMS like Fire and Water? No, more like Fish and Chips.
GSM - Global System for Mobile Communications
GSM - Global System for Mobile Communications VLR BTS BSC GMSC PSTN MS HLR 1) Overview of GSM architecture 2) GSM channel structure 05-1 GSM - Global System for Mobile Communications VLR BTS BSC GMSC PSTN
Cellular Network Organization
Cellular Networks Cellular Network Organization Use multiple low-power transmitters (100 W or less) Areas divided into cells o Each served by its own antenna o Served by base station consisting of transmitter,
Master Course Computer Networks IN2097
Chair for Network Architectures and Services Prof. Carle Department for Computer Science TU München Master Course Computer Networks IN2097 Prof. Dr.-Ing. Georg Carle Christian Grothoff, Ph.D. Chair for
2G/3G Mobile Communication Systems
2G/3G Mobile Communication Systems Winter 2012/13 Integrated Communication Systems Group Ilmenau University of Technology Outline 2G Review: GSM Services Architecture Protocols Call setup Mobility management
Advanced Networking (MSCSP) + Wireless Internet (II, IN)
Advanced Networking (MSCSP) + Wireless Internet (II, IN) Summer Semester 2012 Integrated Communication Systems Group Ilmenau University of Technology Outline Motivation Objectives Organizational Stuff
Network Resilience & DDoS attacks
Network Resilience & DDoS attacks Paul Smith School of Computing and Communications Lancaster University [email protected] The ResiliNets Group @ Lancaster http://www.comp.lancs.ac.uk/resilience
EAP-SIM Authentication using Interlink Networks RAD-Series RADIUS Server
Application Note EAP-SIM Authentication using Interlink Networks RAD-Series RADIUS Server Introduction The demand for wireless LAN (WLAN) access to the public IP network is growing rapidly. It is only
Network Security. Chapter 1 Introduction. Network Security IN2101. Georg Carle. Course organization
Chair for Network Architectures and Services Institute for Informatics TU München Prof. Carle Network Security IN101 Prof. Dr.-Ing. Georg Carle Dipl.-Inform. Ali Fessi Institut für Informatik Technische
Introduction: Why do we need computer networks?
Introduction: Why do we need computer networks? Karin A. Hummel - Adapted slides of Prof. B. Plattner, [email protected] - Add-on material included of Peterson, Davie: Computer Networks February
GSM Architecture Training Document
Training Document TC Finland Nokia Networks Oy 1 (20) The information in this document is subject to change without notice and describes only the product defined in the introduction of this documentation.
Delivery of Voice and Text Messages over LTE
Delivery of Voice and Text Messages over LTE 1. The Market for Voice and SMS! 2. Third Party Voice over IP! 3. The IP Multimedia Subsystem! 4. Circuit Switched Fallback! 5. VoLGA LTE was designed as a
Resilience in Networks: Elements and Approach for a Trustworthy Infrastructure. Andreas Fischer and Hermann de Meer
Resilience in Networks: Elements and Approach for a Trustworthy Infrastructure Andreas Fischer and Hermann de Meer The ResumeNet project Resilience & Survivability for future networking framework, mechanisms
FT networks, services and IS evolution perspectives towards convergence Patrice COLLET France Télécom Network, Carrier and IT Division
FT networks, services and IS evolution perspectives towards convergence Patrice COLLET France Télécom Network, Carrier and IT Division Networks, Carriers and IT France Télécom T vision Networks, Carriers
Introduction Chapter 1. Uses of Computer Networks
Introduction Chapter 1 Uses of Computer Networks Network Hardware Network Software Reference Models Example Networks Network Standardization Metric Units Revised: August 2011 Uses of Computer Networks
1.1. Abstract. 1.2. VPN Overview
1.1. Abstract Traditionally organizations have designed their VPN networks using layer 2 WANs that provide emulated leased lines. In the last years a great variety of VPN technologies has appeared, making
802.11: Mobility Within Same Subnet
What is Mobility? Spectrum of mobility, from the perspective: no mobility high mobility mobile wireless user, using same AP mobile user, (dis) connecting from using DHCP mobile user, passing through multiple
2G Mobile Communication Systems
2G Mobile Communication Systems 2G Review: GSM Services Architecture Protocols Call setup Mobility management Security HSCSD GPRS EDGE References Jochen Schiller: Mobile Communications (German and English),
Cellular Technology Sections 6.4 & 6.7
Overview Cellular Technology Sections 6. & 6.7 CSC 9 December, 0 Cellular architecture evolution Cellular telephony and internet terminology Mobility for cellular mobiles 6- Components of cellular architecture
Troubleshooting Voice Over IP with WireShark
Hands-On Course Description Voice over IP is being widely implemented both within companies and across the Internet. The key problems with IP voice services are maintaining the quality of the voice service
White paper. Reliable and Scalable TETRA networks
Abstract The evolution of TETRA networks towards an all- IP architecture is now a reality and has been accepted by even the most demanding users of TETRA technology. Although circuit switch based TETRA
1.264 Lecture 37. Telecom: Enterprise networks, VPN
1.264 Lecture 37 Telecom: Enterprise networks, VPN 1 Enterprise networks Connections within enterprise External connections Remote offices Employees Customers Business partners, supply chain partners Patients
Master Kurs Rechnernetze Computer Networks IN2097
Chair for Network Architectures and Services Institute for Informatics TU München Prof. Carle, Dr. Fuhrmann Master Kurs Rechnernetze Computer Networks IN2097 Prof. Dr.-Ing. Georg Carle Dr. Thomas Fuhrmann
Wireless Internet/Advanced Networking
Wireless Internet/Advanced Networking Master Ingenieurinformatik, Remote Engineering Track, 4 LP/credits Master Ingenieurinformatik, MIKS Track, 2 LP/credits Master Communications and Signal Processing,
SIP and VoIP 1 / 44. SIP and VoIP
What is SIP? What s a Control Channel? History of Signaling Channels Signaling and VoIP Complexity Basic SIP Architecture Simple SIP Calling Alice Calls Bob Firewalls and NATs SIP URIs Multiple Proxies
192620010 Mobile & Wireless Networking. Lecture 5: Cellular Systems (UMTS / LTE) (1/2) [Schiller, Section 4.4]
192620010 Mobile & Wireless Networking Lecture 5: Cellular Systems (UMTS / LTE) (1/2) [Schiller, Section 4.4] Geert Heijenk Outline of Lecture 5 Cellular Systems (UMTS / LTE) (1/2) q Evolution of cellular
A Comparative Study of Signalling Protocols Used In VoIP
A Comparative Study of Signalling Protocols Used In VoIP Suman Lasrado *1, Noel Gonsalves *2 Asst. Prof, Dept. of MCA, AIMIT, St. Aloysius College (Autonomous), Mangalore, Karnataka, India Student, Dept.
Research on P2P-SIP based VoIP system enhanced by UPnP technology
December 2010, 17(Suppl. 2): 36 40 www.sciencedirect.com/science/journal/10058885 The Journal of China Universities of Posts and Telecommunications http://www.jcupt.com Research on P2P-SIP based VoIP system
Trends in Mobile Network Architectures 3GPP LTE Mobile WiMAX Next Generation Mobile Networks Dr.-Ing. Michael Schopp, Siemens Networks
Trends in Mobile Network Architectures 3GPP LTE Mobile WiMAX Next Generation Mobile Networks Dr.-Ing. Michael Schopp, Siemens Networks Outline 1 Next Generation Mobile Networks 2 New Radio Access Network
Need for Signaling and Call Control
Need for Signaling and Call Control VoIP Signaling In a traditional voice network, call establishment, progress, and termination are managed by interpreting and propagating signals. Transporting voice
Mobile SCTP Transport Layer Mobility Management for the Internet
Mobile SCTP Transport Layer Mobility Management for the Maximilian Riegel Siemens AG, Munich, Germany E-mail: [email protected] Dr. Michael Tüxen Siemens AG, Munich, Germany E-mail: [email protected]
Huawei One Net Campus Network Solution
Huawei One Net Campus Network Solution 2 引 言 3 园 区 网 面 临 的 挑 战 4 华 为 园 区 网 解 决 方 案 介 绍 6 华 为 园 区 网 解 决 方 案 对 应 产 品 组 合 6 结 束 语 Introduction campus network is an internal network of an enterprise or organization,
Internet, Part 2. 1) Session Initiating Protocol (SIP) 2) Quality of Service (QoS) support. 3) Mobility aspects (terminal vs. personal mobility)
Internet, Part 2 1) Session Initiating Protocol (SIP) 2) Quality of Service (QoS) support 3) Mobility aspects (terminal vs. personal mobility) 4) Mobile IP Session Initiation Protocol (SIP) SIP is a protocol
Dialogic BorderNet Session Border Controller Solutions
Dialogic BorderNet Session Border Controller Solutions Dialogic BorderNet Session Border Controllers Transform, Connect and Secure Today s Networks and Services Dialogic BorderNet Session Border Controller
GSM Architecture and Interfaces
GSM.05 Page 71 Monday, November 30, 1998 2:07 PM C H A P T E R 5 GSM Architecture and Interfaces 5.1 INTRODUCTION In this chapter we present an overview of the GSM as described in ETSI s recommendations.
TS-3GB-S.R0103-0v1.0 Network Firewall Configuration and Control (NFCC) - Stage 1 Requirements
TS-3GB-S.R0103-0v1.0 Network Firewall Configuration and Control (NFCC) - Stage 1 Requirements Mar 3,2005 THE TELECOMMUNICATION TECHNOLOGY COMMITTEE TS-3GB-S.R0103-0v1.0 Network Firewall Configuration and
LTE transport network security Jason S. Boswell Head of Security Sales, NAM Nokia Siemens Networks
LTE transport network security Jason S. Boswell Head of Security Sales, NAM Nokia Siemens Networks 1 Nokia Siemens Networks New evolved Networks - new security needs Walled Garden Transport & Protocols
Dimensioning and Deployment of GSM Networks
Case Study: Dimensioning and Deployment of GSM Networks Acknowledgement: some of these slides are based on originals and information kindly provided by Ian O Shea of Altobridge Ltd. 2011 1 GSM System Architecture
Voice over IP Probe! for Network Operators and! Internet Service Providers
Voice over IP Probe! for Network Operators and! Internet Service Providers Product Presentation September 2011 2011 ADVENAGE GmbH Agenda Voice over IP Probe Key Facts VoIP Probe in a Nutshell Use Cases
29.09.2015. Digital Communications Exploring SS7 signaling fraud that threatens mobile network security and subscriber privacy
29.09.2015 Digital Communications Exploring SS7 signaling fraud that threatens mobile Mobile communications is a prime target for hackers who desire to penetrate critical infrastructures and businesses
1. The Web: HTTP; file transfer: FTP; remote login: Telnet; Network News: NNTP; e-mail: SMTP.
Chapter 2 Review Questions 1. The Web: HTTP; file transfer: FTP; remote login: Telnet; Network News: NNTP; e-mail: SMTP. 2. Network architecture refers to the organization of the communication process
GSM Research. Chair in Communication Systems Department of Applied Sciences University of Freiburg 2010
Chair in Communication Systems Department of Applied Sciences University of Freiburg 2010 Dennis Wehrle, Konrad Meier, Dirk von Suchodoletz, Klaus Rechert, Gerhard Schneider Overview 1. GSM Infrastructure
Mobile Communications Chapter 4: Wireless Telecommunication Systems
Mobile Communications Chapter 4: Wireless Telecommunication Systems Market GSM Overview Services Sub-systems Components GPRS DECT Not a part if this course! TETRA Not a part if this course! w-cdma (rel
Integrate VoIP with your existing network
Integrate VoIP with your existing network As organisations increasingly recognise and require the benefits voice over Internet Protocol (VoIP) offers, they stop asking "Why?" and start asking "How?". A
Bölüm 8. GSM. 6 Milyar mobil telefon kullanıcısı (2011 sonu)* Dünya nüfusu 7 Milyar!
Bölüm 8. GSM http://ceng.gazi.edu.tr/~ozdemir Durum 6 Milyar mobil telefon kullanıcısı (2011 sonu)* Dünya nüfusu 7 Milyar! * http://www.itu.int/dms_pub/itu-d/opb/ind/d-ind-ictoi-2012-sum-pdf-e.pdf 1 Global
Service Announcements for Hot-Spots: Enabling Automated Access and Provider Selection for (WLAN-based) Voice. 2005-05-11 Upperside WiFi Voice 2005
Service Announcements for Hot-Spots: Enabling Automated Access and Provider Selection for (WLAN-based) Voice 2005-05-11 Upperside WiFi Voice 2005 Jörg Ott Dirk Kutscher [email protected] [email protected] 2005
ScaleNet Converged Network of the Future
ScaleNet Converged Network of the Future ComNets Workshop 2008, Dr. Bangnan Xu, T-Systems Nov.21.2008 1 What is the deciding factors for the success of networking technologies? Simple Telecom 2.0 WLAN
Mobile Computing. Basic Call Calling terminal Network Called terminal 10/25/14. Public Switched Telephone Network - PSTN. CSE 40814/60814 Fall 2014
Mobile Computing CSE 40814/60814 Fall 2014 Public Switched Telephone Network - PSTN Transit switch Transit switch Long distance network Transit switch Local switch Outgoing call Incoming call Local switch
Chapter 2 PSTN and VoIP Services Context
Chapter 2 PSTN and VoIP Services Context 2.1 SS7 and PSTN Services Context 2.1.1 PSTN Architecture During the 1990s, the telecommunication industries provided various PSTN services to the subscribers using
TECHNICAL CHALLENGES OF VoIP BYPASS
TECHNICAL CHALLENGES OF VoIP BYPASS Presented by Monica Cultrera VP Software Development Bitek International Inc 23 rd TELELCOMMUNICATION CONFERENCE Agenda 1. Defining VoIP What is VoIP? How to establish
SIP: Ringing Timer Support for INVITE Client Transaction
SIP: Ringing Timer Support for INVITE Client Transaction Poojan Tanna ([email protected]) Motorola India Private Limited Outer Ring Road, Bangalore, India 560 037 Abstract-The time for which the Phone
Advanced SIP Series: SIP and 3GPP
Advanced SIP Series: SIP and 3GPP, Award Solutions, Inc Abstract The Session Initiation Protocol has been selected as the main signaling protocol of the Third Generation Partnership Projects IP Multimedia
1. Introduction: The Evolution of Mobile Telephone Systems
IEC: The Global System for Mobile Communication Tutorial: Index Page 1 of 14 Global System for Mobile Communication (GSM) Tutorial Definition Global System for Mobile Communication (GSM) is a globally
How To Connect Gsm To Ip On A Gsm Network On A Pnet On A Microsoft Cell Phone On A Pc Or Ip On An Ip Onc (Gsm) On A Network On An Iph (Gms) On An
THE STUDY OF THE INTERCONNECTION OF GSM MOBILE COMMUNCATION SYSTEM OVER IP BASED NETWORK+ Le-Pond Chin. Jyh-Hong Wen2, and Ting-Way Liu Department of Information Management Shih-Chien University, Taipei,
Wireless Mobile Telephony
Wireless Mobile Telephony The Ohio State University Columbus, OH 43210 [email protected] http://www.cis.ohio-state.edu/~durresi/ 1 Overview Why wireless mobile telephony? First Generation, Analog
VoIP Survivor s s Guide
VoIP Survivor s s Guide Can you really save $, improve operations, AND achieve greater security and availability? Presented by Peggy Gritt, Founder and CEO of the VoIP A non-biased organization for the
Overlay Networks. Slides adopted from Prof. Böszörményi, Distributed Systems, Summer 2004.
Overlay Networks An overlay is a logical network on top of the physical network Routing Overlays The simplest kind of overlay Virtual Private Networks (VPN), supported by the routers If no router support
Vehicle Scrutinizing using GPS & GSM Technologies Implemented with Ardunio controller
Vehicle Scrutinizing using GPS & GSM Technologies Implemented with Ardunio controller A.Kalaiarasi 1, Raviram.P 2, Prabakaran. P M 3, ShanthoshKumar.K 4, Dheeraj B P 5 Assistant Professor, Dept. of EEE,
Wireless and Mobile Network Architecture
Wireless and Mobile Network Architecture Chapter 7: GSM Network Signaling Prof. Yuh-Shyan Chen Department of Computer Science and Information Engineering National Taipei University Nov. 2006 1 Outline
Global System for Mobile Communication (GSM)
Global System for Mobile Communication (GSM) Definition Global system for mobile communication (GSM) is a globally accepted standard for digital cellular communication. GSM is the name of a standardization
Computer System Management: Hosting Servers, Miscellaneous
Computer System Management: Hosting Servers, Miscellaneous Amarjeet Singh October 22, 2012 Partly adopted from Computer System Management Slides by Navpreet Singh Logistics Any doubts on project/hypo explanation
Analysis of Effect of Handoff on Audio Streaming in VOIP Networks
Beyond Limits... Volume: 2 Issue: 1 International Journal Of Advance Innovations, Thoughts & Ideas Analysis of Effect of Handoff on Audio Streaming in VOIP Networks Shivani Koul* [email protected]
Configuration of Applied VoIP Sip Trunks with the Toshiba CIX40, 100, 200 and 670
Configuration of Applied VoIP Sip Trunks with the Toshiba CIX40, 100, 200 and 670 Businesses Save Money with Toshiba s New SIP Trunking Feature Unlike gateway based solutions, Toshiba s MIPU/ GIPU8 card
GSM Network and Services
GSM Network and Services GPRS - sharing of resources 1 What is the problem? Many data applications are very bursty in its traffic pattern: http, smtp, pop, telnet,... Why reserve physical resources at
10 Signaling Protocols for Multimedia Communication
Outline (Preliminary) 1. Introduction and Motivation 2. Digital Rights Management 3. Cryptographic Techniques 4. Electronic Payment Systems 5. Multimedia Content Description Part I: Content-Oriented Base
SIP Security Controllers. Product Overview
SIP Security Controllers Product Overview Document Version: V1.1 Date: October 2008 1. Introduction UM Labs have developed a range of perimeter security gateways for VoIP and other applications running
Secured Voice over VPN Tunnel and QoS. Feature Paper
Secured Voice over VPN Tunnel and QoS Feature Paper Table of Contents Introduction...3 Preface...3 Chapter 1: The Introduction of Virtual Private Network (VPN) 3 1.1 The Functions and Types of VPN...3
An Oracle White Paper December 2013. The Value of Diameter Signaling in Security and Interworking Between 3G and LTE Networks
An Oracle White Paper December 2013 The Value of Diameter Signaling in Security and Interworking Between 3G and LTE Networks Introduction Today s mobile networks are no longer limited to voice calls. With
