Cost of deploying new technologies
|
|
- Jonah Fleming
- 5 years ago
- Views:
Transcription
1 Cost of deploying new technologies Erkka Honkavaara Helsinki University of Technology Abstract The current Internet is very different from how it was originally designed. These changes have brought new challenges to its architecture for which different solutions have been devised. In this paper I go through some of these solutions, namely i3, HIP, NUTSS, NSIS and Mobile IP, and changes they require on current systems. I will evaluate their differences and similarities in respect to the cost of deploying them. Currently HIP looks promising due to its many features and legacy support(both IPv4 and IPv6), which lowers the cost of deployment radically. KEYWORDS: i3, HIP, NUTSS, NSIS, Mobile IP, Cost of deployment 1 Introduction The Internet has become very different from what it was in its early years. Advancements in technology have made small and mobile connected devices commonplace. Moreover, mobility is not limited only to single devices, but also to whole networks. However, these advancements present new challenges arising from the limitations of the early types of infrastructure. Different solutions have been proposed, but none have yet emerged as the definitive answer. This paper focuses on the cost of deployment for solutions i3, HIP, NUTSS, NSIS and Mobile IP. These are deployed on different layers, some require changes to applications or operating systems while others require changes to the Internet core routers. First I will go through why changes are needed. After I have established that, I will present some technologies which offer solutions to mobility and other issues. The chapter after that contains cost analysis of these problems. In the final chapter I present my conclusions about the costs and which of the technologies should be deployed. 2 Background Originally, the architecture to support the Internet was designed without any consideration for the need to support mobility. This worked for a while, but the limitations of this early architecture became more obvious as devices shrank in size and, moreover, became increasingly interconnected. That said, the original simple point-to-point architecture was critical to the early development of the Internet, as it contributed to its scalability and efficiency[14]. Because of the smaller size and therefore the improved movability of hosts combined with modern interconnectivity the need for mobility has surfaced. By mobility I mean the ability of hosts to move between networks without losing their current connections. Sometimes staying still or disconnecting isn t an option. An example of where mobility is needed can be a security guards communication device which uses VoIP. First the guard sits in his monitoring room and the device is connected the the WLAN present in his room. When he leaves for his rounds outside the building he leaves the range of the WLAN and his communication device automatically switches to an cellular network. When this switch happens the device must switch smoothly and retain its current connections. This is where mobility support is needed. 3 Solution previews Here I will list short previews of all the proposed solutions, the previews are only meant to scratch the surface of each solution and provide a general picture of the subject. 3.1 Mobile IP: MIP I will only focus on Mobile IPv6 as it is replacing MIPv4 and is meant to be included as a part of IPv6. MIP uses a home agent(ha) with a static address to sustain connections between the mobile node(mn) and the correspondent node(cn) as shown on Fig. 1. The correspondent node does not have to support MIP for the protocol to work, but it helps because it enables rerouting so that all the packets do not have to pass through the home agent[5]. MIP requires a trust relationship between the HA and MN, while no trust is required towards the CN. The trust between the HA and MN is formed with the use of IPSec with ESP when updating the MN information on the HA[5]. The information update is triggered when the MN moves and has to switch address[7]. The mobile host can acquire a new address by the use of IPv6 auto configuration. 3.2 Internet Indirection Infrastructure: i3 i3 aims to ease the development of services such as multicast, anycast and mobility. It offers a rendezvous-based solution which decouples the act of sending from the act of receiving. In an i3 network hosts associate themselves with identifiers, which are stored in the network as triggers. The hosts associated with the trigger receive all the traffic that is sent to the trigger. The i3 overlay network has servers called i3 nodes,
2 solve mobility and other problems by adding new signaling to IP connections[3]. By means of URI it provides a locator identifier split which enables host mobility. The URIs can refer to applications, users and flows in addition to just devices. These URIs are similar to addresses, which in fact are URIs, which makes them more human readable. An example of an URI could be erkka@home.honkavaara.org;type=client;app=skype, that identifies the user, the endpoint type and the application, meaning Erkka s skype client at the domain home.honkavaara.org[11]. These URIs allow more spesific identification of connections. These references and dataflows are setup by the use of SIP and STUNT. SIP is used because of its maturity and already wide deployment[2]. Figure 1: MIP connection which store these triggers and handle all of the traffic[14] forwarding. When a host inserts a trigger to the network, it send it to the hosts gateway i3 node, which then forwards the trigger to the correct i3 node to store the trigger. The triggers are spread throughout the network according to an algorithm, some redundancy is used to make sure a single host failing doesn t bring the whole network down. 3.3 Host Identity Protocol: HIP HIP approaches the mobility problem by adding a new layer, namely the Host Identity Protocol, to the OSI model in between the internetworking and transport layers[8]. The protocol provides an identifier and locator split, which allows hosts to change locations while retaining their identifier(host identity(hi)). The identifier may also have multiple locations assigned to it enabling multihoming[9]. These identifiers have to be stored somewhere and the current approach is to use distributed hash tables(dht) in an secure-i3 overlay network[10], which I presented earlier. This HIP infrastructure is called Hi 3. It makes the handling of HIs more dynamic than using normal DNS based infrastructure at the same time retaining redundancy and security. 3.4 NAT, URI, Tunnel, SIP and STUNT: NUTSS The name NUTSS, a bit different in origin from the other solution names, is derived from the words NAT, URI, tunnel, SIP and STUNT, which are the technologies it relies on. NUTSS challenges the original end-to-end architecture of the Internet and substitutes it with its own end-middle-end version. It is a signaling based IP architecture which tries to 3.5 Next Step In Signaling: NSIS NSIS aims to solve the current problems with the Internet by introducing a suite of protocols for signaling between NEs (NSIS Entities) which are considered peers. These NEs include the end hosts and NSIS enabled nodes along the signaling path. NSIS can configure routes through NSIS enabled firewalls and NATs, negotiate quality of service guarantees and detect congestion along the data path[4]. NSIS capable middleboxes enable NAT- and firewalltraversal by using NAT/FW NSIS Signalling Layer Protocols(NSLPs). The NAT/FW NSLP is used to dynamically install policy rules on supporting middleboxes along the path[13]. Unlike the other solutions NSIS itself does not provide mobility, it just supports it by preparing a route for the connection by manipulating NSIS aware middleboxes on the route. NSIS itself mostly focuses on handling the QoS aspects of the mobile connection[12]. 4 Costs of solutions In this section I will go through changes which are needed to deploy the different solutions and evaluate the weight of the changes required by them. By cost I refer real costs caused by the need to change the existing systems. These changes include but are not limited to changes to routing infrastructure, operating systems, applications and middleboxes. While I do not dare to make a guess for the numerical size of these costs, they are substantial and have to be taken into account. Changes to operating systems are easily deployed because of the modern automatic updates supported by Windows, Mac and Linux. The real problem is legacy support for applications, the solution may render old applications inoperable until they have been updated. This is a serious problem with unsupported applications. Another cost arises from already deployed application solutions. Companies have configured applications and networks function on the old IPv4. When this changes not only the application has to be updated, but configurations have to be redeployed to with the new architecture. Changes to hardware, routers and middleboxes, take time and effort to implement. Big suppliers, Cisco and others,
3 can release software updates to existing systems, but these changes have to be thoroughly tested and configured by trained professionals which is very costly. 4.1 MIP IPv6 has been coming for the last ten years, although it has only recently started to pick up speed. One of the biggest steps toward deploying IPv6 has been made by China, which has adopted a five year plan to full reach deployment. IPv6 is gaining more and more exposure and I believe that it will be deployed in the next five years. As IPv6 get more and more deployed, MIP will become more and more viable as a solution as it enables mobility with IPv6. The deployment of other solutions discussed in this paper will most probably not slow the IPv6s spread, on the contrary, they may speed it up. This means that the router, application and API changes needed by MIP(IPv6) will be most probably implemented regardless of the use of MIP. Because of this the only need for supporting mobility is the Home Agent, which can be the user s computer at home or at work. 4.2 i3 i3 requires a lot of bandwidth to be fully deployed as a solution because of the need to route all the traffic through the overlay network and its servers. This in addition to the need to add changes to applications and APIs makes it quite costly to deploy[14]. Because of the high cost related to its deployment, it seems more effective to use it only for control data as in the case of HIP. This way only lightweight control data is transferred through the overlay network and the real payload moves along a more traditional route. Without i3 supporting applications a proxy server is needed. The proxy server can be hosted as a remote client or on the user s system. The connection is then handled trough DNS-names, ie. my.homecomputer.i3. There is at least one proxy solution ready, it goes by the name of OCALA[6], Overlay Convergence Architecture for Legacy Applications, and it can be run on Windows, Linux and Mac. i3 can have some security issues such as eavesdropping, trigger hijacking and DoS attacks. Eavesdropping is possible by inserting a trigger to the network with the same id as the victim. This adds the eavesdropper as a recipient of all the messages sent to the victims id. The real threat however is the DoS attacks, these can be caused by attacking either the infrastructure or end-hosts. The attacker can chain triggers in a way that they loop or replicate packets, overwhelming the target. 4.3 HIP Currently, HIP can be used both in user and kernel space. This makes installation easier as changes to the operating system are slower to deploy. However running HIP in user space does create the drawback of reduced performance. This doesn t cause much concern because kernel support can be added later as the usage of HIP grows[1]. Because HIP will be most probably deployed with the Hi 3 infrastructure, it will require servers to host the i3 overlay network. Luckily, as the overlay network will only be used for control data, mainly HITs, the bandwidth and processing requirements of the network are lessened[10]. The deployment of HIP doesn t require much from the average users, as long as they remember to update their operating systems or download the userspace support for HIP. HIP is already implemented in Linux and can most probably be added to new Windows systems with an automatic update. Because of Local Scope Identifiers, LSIs, the users can use their old programs with HIP. An LSI is a localized 32-bit representation for an HI[9], which looks like an IPv4 address. A driving force behind the deployment of HIP could be the fact that it can serve as a bridge between IPv4 and IPv6 as it provides interoperability for them on application level. This would make the transition from IPv4 to IPv6 a lot more streamlined. Also the added security sounds very promising. 4.4 NUTSS While NUTSS benefits greatly from middleboxes supporting it, it can operate in legacy mode to allow NAT-traversal endpoints. This optionality allows NUTSS to be deployed incrementally in three phases. At first it will only offer the traversal and end-to-end access control[2]. In the second phase policy-boxes, called P-boxes, are added to the network allowing some control over the network traffic. The endpoints are configured to use these P-boxes, this can be done through an auto configuration protocol, ie. DHCP[2]. In the final phase, NUTSS-aware middleboxes, called M- boxes, are introduced into the borders of the network. They enforce the P-box defined rules and remove the need of individual endpoint configuration. Also NAT-traversal is made obsolete with the M-boxes[2]. This incremental deployment makes NUTSS more appealing as it offers the highly coveted NAT-traversal in the first phase. The endpoint deployment of NUTSS can be made in userspace and, according to Saikat Guha and Paul Francis, with minimal or no changes to user applications[2]. I m skeptical on this because of the URI-addressing which would need changes to existing applications. NUTSS deployment should be straightforward for an average user, it initially requires only a operating system update or installing a software component. Configuring NUTSS policies in phase 1 requires a bit more insight and may cause not so technically savvy people to use less secure options for added comfort. If NUTSS aware applications are used, automatic configuration should be possible. I believe that one of the problems NUTSS would have is that it most probably will have to deployed mostly on operator side because the average users will not understand P- boxes and may even be confused with the legacy and NUTSS capable NATs. Also there might be problems with implementing the M- and P-boxes because of differences in manufacturers implementations.
4 4.5 NSIS NSIS supports incremental deployment by supporting networks with both NSIS-capable and incapable nodes. Nodes which do not support NSIS are just passed through because common protocols, ie TCP, are used for transport. This way NSIS traffic can move through entire networks without the need of additional support[4]. However if the amount of nodes without NSIS-capabilities is high, the benefits reduce, because of the reduced amount of QoS reservations. NSIS is one of the more costly ones to implement because of the need to make changes to routers. While it may or may not be possible to implement these changes with some software updates the added computing load would force operators to upgrade their routers incurring costs. As operators are mostly after profit, without clear business possibilities NSIS may not seem enough financially justified. On the other hand, the router market is dominated by a few large companies which can push technologies to the core. I believe that if Cisco would implement NSIS support on its core routers, others would follow. This wouldn t be a fast process because the routers would have to be updated and reconfigured. Requires changes to Needs Kernel Apps Routers Solution Phase servers &API i3 In dev YES NO YES* NO HIP Test** YES YES NO NO NUTSS In dev YES NO NO NO NSIS In dev YES YES NO YES Mobile Home IP Ready Agent Done NO NO *Legacy support with proxies **HIP has been deployed in the Linux kernel patched with linux hip.patch but is still being developed. HIP supports old applications and APIs through LSIs which act as bridges between IPv4-based protocols and API. MIPv6 included in IPv6 5 Conclusions Table 2: Solutions 4.6 Summary As we can see from tables 2 and 1 some of the solutions have similar features and requirements, while others take on a totally different approach. i3, HIP and NUTSS approach the mobility problem with a new address space which in the case of i3 and NUTSS requires changes to applications, while HIP can operate with legacy applications. i3 can however function with legacy through the use of a proxy. The cost of these changes is substantial because of the sheer amount of deployed legacy applications. MIP works differently by using the HA for relaying information or data. Because of the way MIP works, it is totally transparent to existing applications and does not require any changes to the network making it a cheap but limited solution. NSIS on the other hand has a totally different approach. It requires the route to be aware of the needs of the connection. This requires changes to the routers, which takes time and effort. Solution DoS protection Id/loc split NAT support i3 YES** YES NO HIP YES* YES YES NUTSS NO YES YES NSIS NO NO YES MIP NO NO NO By NAT support I m referring to NAT traversal *By means of processing challenges **By means of managing triggers Table 1: Some solution features Currently, Mobile IP and HIP are the most mature of and closest to being fully deployed. HIP has been added to the Linux kernel and is being tested with currently. But MIP has the advantage because it is bundled with IPv6 which is currently supported in all major operating systems. Although it has not yet reached IPv4 s popularity, it has been gaining ground and public acceptance. While MIP does solve mobility issues, the other solutions have other benefits that should be taken into account. These benefits include NAT-traversal, DoS-protection, etc... as shown in table 1. Although all of the solutions have important features, in my opinion the best benefit-cost ratio is with HIP. It implements scalable security, mobility and multihoming with minimal changes to existing infrastructure. Although solutions like NUTSS and HIP offer support for legacy applications I fear that there will be some programs that stop working. This is a major problem because some of these applications may be mission critical components for firms. If these applications are not being supported anymore, they cannot be easily fixed to work with the new solutions. Because of this completely legacy hosts may be left on the network. It will be interesting to follow the development of the current situation and see which technologies take flight, and which crash and burn. As time has shown, it is very hard to predict which technologies will make it, good design and features do not always help. I believe that the most critical time for these solutions will be when IPv6 starts being deployed on the large scale, because the most logical time to deploy them is at the same with IPv6 or a bit before. After IPv6 I don t believe there will as much interest in doing more work to deploy the latecomers.
5 6 Future work I believe that a numerical analysis on this subject would be interesting and rewarding. The amount of legacy applications and hosts is huge, the volume of the changes needed to implement these changes brings along a cost. Also the possible need for upgrading core routers for possible future technologies such as NSIS would have to be looked into as well. 7 Acknowledgements I would like to thank Timo Kiravuo for providing direction and guidance for this paper and Roger Munn for help with the correct use of the English language. I would also like to extend my gratitude to my opponent Lu Yang for comments and improvement suggestions on this paper. References [10] P. Nikander, J. Arkko, and B. Ohlman. Host identity indirection infrastructure (hi3). Internet Draft, june Internet Draft, Expired in December 26, [11] P. F. Saikat Guha. Towards a secure internet architecture through signaling. Technical report, July cul.cis/tr [12] T. Sanda, X. Fu, S. Jeong, J. Manner, and H. Tschofenig. Applicability statement of nsis protocols in mobile environments. Internet Draft, february Internet Draft, Expires in August 25, [13] N. Steinleitner, H. Peters, and X. Fu. Implementation and performance study of a new nat/firewall signaling protocol. In ICDCSW 06: Proceedings of the 26th IEEE International ConferenceWorkshops on Distributed Computing Systems, page 8, Washington, DC, USA, IEEE Computer Society. [14] I. Stoica, D. Adkins, S. Zhuang, S. Shenker, and S. Surana. Internet indirection infrastructure, [1] J. Ahrenholz. OpenHip webpage - Overview, October Visited [2] S. Guha and P. Francis. An end-middle-end approach to connection establishment. In SIGCOMM 07: Proceedings of the 2007 conference on Applications, technologies, architectures, and protocols for computer communications, pages , New York, NY, USA, ACM. [3] S. Guha, Y. Takeda, and P. Francis. Nutss: a sipbased approach to udp and tcp network connectivity. In FDNA 04: Proceedings of the ACM SIGCOMM workshop on Future directions in network architecture, pages 43 48, New York, NY, USA, ACM. [4] R. Hancock, G. Karagiannis, J. Loughney, and S. V. den Bosch. Next Steps in Signaling (NSIS): Framework. RFC 4080 (Informational), June [5] D. Johnson, C. Perkins, and J. Arkko. Mobility Support in IPv6. RFC 3775 (Proposed Standard), June [6] D. A. Joseph. Ocala: Overlay convergence architecture for legacy applications. Web page, november url( ): [7] M. Merger. Mobility management with mobile ip version 6. Master s thesis, [8] R. Moskowitz and P. Nikander. Host Identity Protocol (HIP) Architecture. RFC 4423 (Informational), May [9] P. Nikander. Applying host identity protocol to the internet addressing architecture. Applications and the Internet, Proceedings International Symposium on, pages 5, 2004.
HIP Host Identity Protocol. October 2007 Patrik Salmela Ericsson
HIP Host Identity Protocol October 2007 Patrik Salmela Ericsson Agenda What is the Host Identity Protocol (HIP) What does HIP try to solve HIP basics Architecture The HIP base exchange HIP basic features
More informationMobile SCTP for IP Mobility Support in All-IP Networks
Mobile SCTP for IP Mobility Support in All-IP Networks Seok Joo Koh sjkoh@cs.knu.ac.kr Abstract The Stream Control Transmission Protocol (SCTP) is a new transport protocol that is featured multi-streaming
More informationOn the Applicability of knowledge based NAT-Traversal for Home Networks
On the Applicability of knowledge based NAT-Traversal for Home Networks Andreas Müller, Andreas Klenk, and Georg Carle University of Tübingen, Computer Networks and Internet, Sand 13, 72076 Tübingen, Germany
More informationOn Host Identity Protocol
On Host Identity Protocol Miika Komu Data Communications Software Group Dep. of Computer Science and Engineering School of Science Aalto University 17.10.2011 Table of Contents Introduction
More informationOn the Applicability of Knowledge Based NAT-Traversal for Home Networks
On the Applicability of Knowledge Based NAT-Traversal for Home Networks Andreas Müller, Andreas Klenk, and Georg Carle University of Tübingen, Computer Networks and Internet, Sand 13, 72076 Tübingen, Germany
More informationABI Working Title: Messaging NSLP
ABI Working Title: Messaging NSLP University of Helsinki Helsinki University of Technology VTT Technical Research Centre of Finland September 19, 2006 i Contents 1 Introduction 1 2 NSIS Framework 2 2.1
More informationWhy do we really want an ID/locator split anyway?
Why do we really want an ID/locator split anyway? Dave Thaler dthaler@microsoft.com MobiArch 2008 1 Starting from basics Users deal with names, not addresses (esp. in IPv6) Humans need friendly identifiers
More informationIP Mobility vs. Session Mobility
IP Mobility vs. Session Mobility Securing wireless communication is a formidable task, something that many companies are rapidly learning the hard way. IP level solutions become extremely cumbersome when
More informationInternet Indirection Infrastructure (i3) Ion Stoica, Daniel Adkins, Shelley Zhuang, Scott Shenker, Sonesh Surana. UC Berkeley SIGCOMM 2002
Internet Indirection Infrastructure (i3) Ion Stoica, Daniel Adkins, Shelley Zhuang, Scott Shenker, Sonesh Surana UC Berkeley SIGCOMM 2002 Motivations Today s Internet is built around a unicast pointto-point
More informationHost Identity Protocol. Miika Komu Helsinki Institute for Information Technology
Host Identity Protocol Miika Komu Helsinki Institute for Information Technology 16.11.2009 Table of Contents Introduction Naming and Layering Control Plane Data Plane Introduction Motivation
More informationHost Identity Indirection Infrastructure Hi 3. Jari Arkko, Pekka Nikander and Börje Ohlman Ericsson Research
Host Identity Indirection Infrastructure Hi 3 Jari Arkko, Pekka Nikander and Börje Ohlman Ericsson Research Presentation outline Motivation Background Secure i 3 Hi 3 Summary 2 Hi 3 motivation Question:
More informationMOBILITY AGENTS: AVOIDING THE SIGNALING OF ROUTE OPTIMIZATION ON LARGE SERVERS
MOBILITY AGENTS: AVOIDING THE SIGNALING OF ROUTE OPTIMIZATION ON LARGE SERVERS Albert Cabellos-Aparicio and Jordi Domingo-Pascual * Technical University of Catalonia, Department of Computer Architecture
More informationIPV6 SIMPLE SECURITY CAPABILITIES.
IPV6 SIMPLE SECURITY CAPABILITIES. 50 issues from RFC 6092 edited by J. Woodyatt, Apple Presentation by Olle E. Johansson, Edvina AB. ABSTRACT The RFC which this presentation is based upon is focused on
More informationHost Identity Protocol (HIP): Connectivity, Mobility, Multi-Homing, Security, and Privacy over IPv4 and IPv6
Host Identity Protocol (HIP): Connectivity, Mobility, Multi-Homing, Security, and Privacy over IPv4 and IPv6 by Pekka Nikander, Andrei Gurtov, and Thomas R. Henderson Johannes Bachhuber Jacobs University
More informationHost Identity Protocol
Host Identity Protocol V.Gowri 1, M.Nirmala Kumari 2, R.Devendra Reddy 3 Associate Professor, Dept of CSE, Sri Venkatesa Perumal College of Engineering, Andhra Pradesh, India Assistant Professor, Dept
More informationT Computer Networks II. Mobility Issues Contents. Mobility. Mobility. Classifying Mobility Protocols. Routing vs.
T-0.50 Computer Networks II Mobility Issues 6.0.008 Overview Mobile IP NEMO Transport layer solutions i SIP mobility Contents Prof. Sasu Tarkoma Mobility What happens when network endpoints start to move?
More informationTowards an Evolvable Internet Architecture
lthomas@student.ethz.ch December 19, 2007 Topics: Goals: How to evolve from IPv(N-1) to IPvN How to use overlay networks in legacy applications Show some nice ideas for evolvability Describe needed technologies
More informationTable of Contents. Cisco How NAT Works
Table of Contents How NAT Works...1 This document contains Flash animation...1 Introduction...1 Behind the Mask...2 Dynamic NAT and Overloading Examples...5 Security and Administration...7 Multi Homing...9
More informationMILSA: A Mobility and Multihoming Supporting Identifier Locator Split Architecture for Naming in the Next Generation Internet
MILSA: A Mobility and Multihoming Supporting Identifier Locator Split Architecture for Naming in the Next Generation Internet Jianli Pan, Subharthi Paul, Raj Jain Department of Computer Science and Engineering
More informationHost Identity Protocol (HIP):
Host Identity Protocol (HIP): Towards the Secure Mobile Internet Andrei Gurtov Helsinki Institute for Information Technology (HUT), Finland A John Wiley & Sons, Ltd, Publication Contents About the Author
More informationLocation Privacy Extensions for the Host Identity Protocol
978 REVISTA DO DETUA, VOL. 4,N 8, JUNHO 2007 Location Privacy Extensions for the Host Identity Protocol Alfredo Matos, Justino Santos, João Girão, Marco Liebsch, Rui Aguiar NEC Europe Ltd, Network Laboratories
More informationResearch Article A Novel Solution based on NAT Traversal for High-speed Accessing the Campus Network from the Public Network
Research Journal of Applied Sciences, Engineering and Technology 7(2): 221-226, 2014 DOI:10.19026/rjaset.7.244 ISSN: 2040-7459; e-issn: 2040-7467 2014 Maxwell Scientific Publication Corp. Submitted: March
More informationMigration to IPv6 from IPv4. Is it necessary?
Introduction Today Internet plays a big role in every aspect of our lives and IP acted as an important pillar of Internet. Since its inception the Internet has reached almost all corners of globe and it
More informationTechological Advantages of Mobile IPv6
Techological Advantages of Mobile IPv6 Nokia Research Center Mountain View, CA USA Charles E. Perkins http://people.nokia.net/charliep charliep@iprg.nokia.com 1 NOKIA NERD2000.PPT/ 11/20/00 / HFl Outline
More informationInteroperability and Security of TraSH: A Transport Layer Seamless Handover
Interoperability and Security of TraSH: A Transport Layer Seamless Handover Panel Session at 23 rd IEEE International Performance, Computing, and Communications Conference April 16, 2004 Dr. Mohammed Atiquzzaman
More information2013 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other uses, in any current or future media,
2013 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other uses, in any current or future media, including reprinting/republishing this material for advertising
More informationRouting. Architecture for the Next. Generation. Internet (RANGI) Xiaohu Xu, Dayong Guo, Raj Jain, Jianli Pan, Subharthi Paul
Routing Architecture for the Next Generation Internet (RANGI) Xiaohu Xu, Dayong Guo, Raj Jain, Jianli Pan, Subharthi Paul Presented to Routing Research Group (RRG), Internet Research Task Force Meeting
More informationIntroduction Mobility Support Handover Management Conclutions. Mobility in IPv6. Thomas Liske. Dresden University of Technology
2005 / High Speed Networks II Outline Introduction Mobility Support Overview of IPv6 Mobility Support Handover Management Mobility Support What means Mobility Support? allow transparent routing of IPv6
More informationOn the Internet, nobody knows you re a dog.
On the Internet, nobody knows you re a dog. THREATS TO DISTRIBUTED APPLICATIONS 1 Jane Q. Public Big Bank client s How do I know I am connecting to my bank? server s Maybe an attacker...... sends you phishing
More informationMIPv6: New Capabilities for Seamless Roaming Among Wired, Wireless, and Cellular Networks
Page 1 M: New Capabilities for Seamless Roaming Among Wired, Wireless, and Cellular Networks Paul Schmitz Technical Marketing Engineer Geoff Weaver Business Development Manager Copyright 2002. *Third-party
More informationRequest for Comments: University of Twente/Ericsson J. Loughney Nokia S. Van den Bosch Alcatel June 2005
Network Working Group Request for Comments: 4080 Category: Informational R. Hancock Siemens/RMR G. Karagiannis University of Twente/Ericsson J. Loughney Nokia S. Van den Bosch Alcatel June 2005 Status
More informationQ-Balancer Range FAQ The Q-Balance LB Series General Sales FAQ
Q-Balancer Range FAQ The Q-Balance LB Series The Q-Balance Balance Series is designed for Small and medium enterprises (SMEs) to provide cost-effective solutions for link resilience and load balancing
More informationIEEE Assisted Network Layer Mobility Support
IEEE802.21 Assisted Network Layer Mobility Support Qazi Bouland Mussabbir *, Wenbing Yao ** and John Cosmas *** *School Of Engineering and Design, Brunel University Uxbridge, London, UB83PH, UK, qazi.mussabbir@brunel.ac.uk
More informationOssification of the Internet
Ossification of the Internet The Internet evolved as an experimental packet-switched network Today, many aspects appear to be set in stone - Witness difficulty in getting IP multicast deployed - Major
More informationIPv6: Are we really ready to turn off IPv4? Geoff Huston APNIC
IPv6: Are we really ready to turn off IPv4? Geoff Huston APNIC The IPv6 Timeline 1990 2000 2010 2020 The IPv6 Timeline Yes, we ve been working on this for close to 30 years! 1990 2000 2010 2020 In-situ
More informationPlanning for Information Network
Planning for Information Network Lecture 7: Introduction to IPv6 Assistant Teacher Samraa Adnan Al-Asadi 1 IPv6 Features The ability to scale networks for future demands requires a limitless supply of
More informationSlide 1. Slide 2. Slide 3. Technological Advantages of Mobile IPv6. Outline of Presentation. Earth with 2 Billion Mobile devices
Slide 1 Technological Advantages of Mobile IPv6 Nokia Research Center Mountain View, CA USA Charles E. Perkins http://people.nokia.net/charliep charliep@iprg.nokia.com 1 NOKIA NERD2000.PPT/ 11/20/00 /
More informationIPv6: Are we really ready to turn off IPv4?
IPv6: Are we really ready to turn off IPv4? In-situ transition In-situ transition Phase 1 Early Deployment IPv4 Internet Edge Dual-Stack Networks IPv6 networks interconnect by IPv6-over-IPv4 tunnels In-situ
More informationArchitectural Approaches to Multi-Homing for IPv6
Architectural Approaches to Multi-Homing for IPv6 A Walk-Through of draft-huston-multi6-architectures-00 Geoff Huston June 2004 Recap Multi-Homing in IPv4 Either: Or: Obtain a local AS Obtain PI space
More informationInternet 3.0: The Next Generation Internet
Internet 3.0: The Next Generation Internet Raj Jain Washington University in Saint Louis Saint Louis, MO 63130 Jain@wustl.edu Boeing Brown Bag Seminar, January 22, 2009 These slides and Audio/Video recordings
More informationNext Generation IPv6 Cyber Security Protection Through Assure6i TM Product Line
Next Generation IPv6 Cyber Security Protection Through Assure6i TM Product Line Designed to Prevent, Detect, and Block Malicious Attacks on Both IPv4 and IPv6 Networks TM Introduction With the exponential
More informationTBGP: A more scalable and functional BGP. Paul Francis Jan. 2004
TBGP: A more scalable and functional BGP Paul Francis Jan. 2004 BGP: Border Gateway Protocol BGP is the top-level routing protocol in the Internet It holds the Internet together BGP allows routers to tell
More informationMobile IP and IPSec in Enterprise use
Mobile IP and IPSec in Enterprise use Markku Rantala Helsinki University of Technology Department of Electrical and Communications Engineering Markku.Rantala@spiritco.com Abstract A modern enterprise IT
More informationVirtual ID: A Technique for Mobility, Multi- Homing, and Location Privacy in Next Generation Wireless Networks
Virtual ID: A Technique for Mobility, Multi- Homing, and Location Privacy in Next Generation Wireless Networks Chakchai So-In, Student Member, IEEE, and Raj Jain, Fellow, IEEE Subharthi Paul and Jianli
More informationEmbedding Identity in Mobile Environments
Mobiarch 2007 - Kyoto, August 27 th, 2007 Embedding Identity in Mobile Environments Alfredo Matos Susana Sargento Rui L. Aguiar 2005, it -
More informationA Multihoming based IPv4/IPv6 Transition Approach
A Multihoming based IPv4/IPv6 Transition Approach Lizhong Xie, Jun Bi, and Jianping Wu Network Research Center, Tsinghua University, China Education and Research Network (CERNET) Beijing 100084, China
More informationROUTE OPTIMIZATION EXTENSION FOR THE MOBILE INTERNET PROTOCOL IN LINUX
ROUTE OPTIMIZATION EXTENSION FOR THE MOBILE INTERNET PROTOCOL IN LINUX M. L. Jiang and Y. C. Tay ABSTRACT The base Mobile Internet Protocol (Mobile IP)[1] provides a means for portable computers to roam
More informationHost Identity Payload in Home Networks
Host Identity Payload in Home Networks Miika Komu Helsinki University of Technology Department of Computer Science and Engineering 47521c Miika.Komu@hut.fi Abstract Host Identity Payload (HIP) is a new
More informationIPv4 Care-of Address Registration for IPv4 Support on the NEMO Basic Support Protocol
IPv4 Care-of Address Registration for IPv4 Support on the NEMO Basic Support Protocol Ryuji Wakikawa Carl Williams Keisuke Uehara Jun Murai Keio University. Graduate School of Media and Governance KDDI
More informationNetworked Multimedia and Internet Video. Colin Perkins
Networked Multimedia and Internet Video Colin Perkins IP video will represent 80% of all traffic by 2019, up from 67% in 2014 Source: Cisco Visual Networking Index, 2015 2 History MPEG TS YouTube MPEG
More informationMobile IP. Mobile Computing. Mobility versus Portability
Mobile IP Mobile Computing Introduction Amount of mobile/nomadic computing expected to increase dramatically in near future. By looking at the great acceptance of mobile telephony, one can foresee a similar
More informationPostellation: an Enhanced Delay-Tolerant Network (DTN) Implementation with Video Streaming and Automated Network Attachment
Postellation: an Enhanced Delay-Tolerant Network (DTN) Implementation with Video Streaming and Automated Network Attachment Marc Blanchet, Simon Perreault and Jean-Philippe Dionne Viagénie, Québec, Québec,
More informationComcast IPv6 Trials NANOG50 John Jason Brzozowski
Comcast IPv6 Trials NANOG50 John Jason Brzozowski October 2010 Overview Background Goals and Objectives Trials Observations 2 Background Comcast IPv6 program started over 5 years ago Incrementally planned
More informationCisco 5921 Embedded Services Router
Data Sheet Cisco 5921 Embedded Services Router The Cisco 5921 Embedded Services Router (ESR) is a Cisco IOS software router application. It is designed to operate on small, low-power, Linux-based platforms
More informationQOS Quality Of Service
QOS Quality Of Service Michael Schär Seminar in Distributed Computing Outline Definition QOS Attempts and problems in the past (2 Papers) A possible solution for the future: Overlay networks (2 Papers)
More informationTechnical Overview of DirectAccess in Windows 7 and Windows Server 2008 R2. Microsoft Windows Family of Operating Systems
Technical Overview of in Windows 7 and Windows Server 2008 R2 Microsoft Windows Family of Operating Systems Published: January 2009 This document supports a preliminary release of a software product that
More informationConsiderations and Actions of Content Providers in Adopting IPv6
Considerations and Actions of Content Providers in Adopting IPv6 Sheng Jiang / Huawei Brian Carpenter / University of Auckland www.huawei.com IPv6 Trends Global IPv4 registry (IANA) ran out of spare blocks
More informationTechnical White Paper for NAT Traversal
V300R002 Technical White Paper for NAT Traversal Issue 01 Date 2016-01-15 HUAWEI TECHNOLOGIES CO., LTD. 2016. All rights reserved. No part of this document may be reproduced or transmitted in any form
More informationFundamental Questions to Answer About Computer Networking, Jan 2009 Prof. Ying-Dar Lin,
Fundamental Questions to Answer About Computer Networking, Jan 2009 Prof. Ying-Dar Lin, ydlin@cs.nctu.edu.tw Chapter 1: Introduction 1. How does Internet scale to billions of hosts? (Describe what structure
More informationHost Identity Protocol
Presentation outline Host Identity Protocol Slides by: Pekka Nikander Ericsson Research Nomadiclab and Helsinki Institute for Information Technology http://www.hip4inter.net 2 What is HIP? Motivation HIP
More informationMulticast Technology White Paper
Multicast Technology White Paper Keywords: Multicast, IGMP, IGMP Snooping, PIM, MBGP, MSDP, and SSM Mapping Abstract: The multicast technology implements high-efficiency point-to-multipoint data transmission
More informationUSING HIP TO SOLVE MULTI-HOMING IN IPV6 NETWORKS
USING HIP TO SOLVE MULTI-HOMING IN IPV6 NETWORKS Zhangyi Yuan 1, Xiaohong Huang 1, Junyi Zhang 2, Fred Baker 3 1 Research Institute of Networking Technology, Beijing University of Posts and Telecommunications,
More informationNetwork Working Group. Intended status: Informational. H. Deng. China Mobile. July 4, 2014
Network Working Group Internet-Draft Intended status: Informational Expires: January 5, 2015 D. Liu China Mobile H. Chan Huawei Technologies H. Deng China Mobile July 4, 2014 Distributed mobility management
More informationMobile Routing : Computer Networking. Overview. How to Handle Mobile Nodes? Mobile IP Ad-hoc network routing Assigned reading
Mobile Routing 15-744: Computer Networking L-10 Ad Hoc Networks Mobile IP Ad-hoc network routing Assigned reading Performance Comparison of Multi-Hop Wireless Ad Hoc Routing Protocols A High Throughput
More informationIndependent Local Locator Substrate Indirection Transport ILLSIT
Independent Local Locator Substrate Indirection Transport ILLSIT Supervisor Mats Björkman Mälardhalens University MAIL Javier Ubillos SICS MAIL Student Pablo Santibanez Jara Mikael Svensson Abstract Interoperation
More informationCharles Perkins Nokia Research Center 2 July Mobility Support in IPv6 <draft-ietf-mobileip-ipv6-14.txt> Status of This Memo
IETF Mobile IP Working Group INTERNET-DRAFT David B. Johnson Rice University Charles Perkins Nokia Research Center 2 July 2000 Mobility Support in IPv6 Status of This
More informationIssues in Mobile Node Controlled Handovers
Issues in 802.21 Mobile Node Controlled Handovers Rehan Qureshi, Arek Dadej and Qiang Fu Institute for Telecommunications Research University of South Australia Mawson Lakes, SA 5095, Australia Email:
More informationANTS - A Framework for Knowledge based NAT Traversal
- A Framework for Knowledge based NAT Traversal Andreas Müller, Andreas Klenk and Georg Carle Chair for Network Architectures and Services Technische Universität München {mueller, klenk, carle}@net.in.tum.de
More informationRaj Jain
ID/Locator Separation Technology and Its Implications for Future Network Design Raj Jain Washington University in Saint Louis Saint Louis, MO 63130 Jain@wustl.edu A talk given at Huawei Technologies Co.,
More informationAn Efficient NAT Traversal for SIP and Its Associated Media sessions
An Efficient NAT Traversal for SIP and Its Associated Media sessions Yun-Shuai Yu, Ce-Kuen Shieh, *Wen-Shyang Hwang, **Chien-Chan Hsu, **Che-Shiun Ho, **Ji-Feng Chiu Department of Electrical Engineering,
More informationCONCEPTION ON TRANSITION METHODS: DEPLOYING NETWORKS FROM IPV4 TO IPV6
CONCEPTION ON TRANSITION METHODS: DEPLOYING NETWORKS FROM IPV4 TO IPV6 1 MS. CHAITA JANI, 2 PROF.MEGHA MEHTA 1 M.E.[C.E] Student, Department Of Computer Engineering, Noble Group Of Institutions, Junagadh,Gujarat
More informationUnit 5 - IPv4/ IPv6 Transition Mechanism(8hr) BCT IV/ II Elective - Networking with IPv6
5.1 Tunneling 5.1.1 Automatic Tunneling 5.1.2 Configured Tunneling 5.2 Dual Stack 5.3 Translation 5.4 Migration Strategies for Telcos and ISPs Introduction - Transition - the process or a period of changing
More informationVXLAN Overview: Cisco Nexus 9000 Series Switches
White Paper VXLAN Overview: Cisco Nexus 9000 Series Switches What You Will Learn Traditional network segmentation has been provided by VLANs that are standardized under the IEEE 802.1Q group. VLANs provide
More informationApplication Note 3Com VCX Connect with SIP Trunking - Configuration Guide
Application Note 3Com VCX Connect with SIP Trunking - Configuration Guide 28 May 2009 3Com VCX Connect Solution SIP Trunking Table of Contents 1 3COM VCX CONNECT AND INGATE... 1 1.1 SIP TRUNKING SUPPORT...
More informationThe Design Space of Network Mobility
The Design Space of Network Mobility Key ideas Network Mobility Seamless Mobility Overview of implementations and challenges Geomorphic model New abstraction for the network stack Helps us discuss, understand
More informationService Graph Design with Cisco Application Centric Infrastructure
White Paper Service Graph Design with Cisco Application Centric Infrastructure 2017 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 1 of 101 Contents Introduction...
More informationThe Y-Comm Framework. A new way
The Y-Comm Framework A new way Mobility within Domains Mobile IP is good for moving between large defined domains But we also have to consider mobility issues within a domain which may have a number of
More informationApplication Note Asterisk BE with Remote Phones - Configuration Guide
Application Note Asterisk BE with Remote Phones - Configuration Guide 15 January 2009 Asterisk BE - Remote SIP Phones Table of Contents 1 ASTERISK BUSINESS EDITION AND INGATE... 1 1.1 REMOTE SIP PHONE
More informationAdvantage TLS Why IpTL TLS versus IPSec Technology Reference Guide
IpTL s Expert Edition Networking Simplified Advantage TLS Why IpTL TLS versus IPSec Technology Reference Guide The World s Longest Ethernet Cable Take control and get the network you want with the network
More informationThe NSIS QOS Model for Inter-domain Signaling to Enable End-to-End QoS Provisioning Over Heterogeneous Domains
The NSIS QOS Model for Inter-domain Signaling to Enable End-to-End QoS Provisioning Over Heterogeneous Domains Jian Zhang and Edmundo Monteiro Laboratory of Communications and Telematics (LCT), University
More informationHillstone IPSec VPN Solution
1. Introduction With the explosion of Internet, more and more companies move their network infrastructure from private lease line to internet. Internet provides a significant cost advantage over private
More informationA New Inter-networking Architecture for Mobile Oriented Internet Environment
Future Network & MobileSummit 2012 Conference Proceedings Paul Cunningham and Miriam Cunningham (Eds) IIMC International Information Management Corporation, 2012 ISBN: 978-1-905824-29-8 A New Inter-networking
More informationQoS Support for Mobile Users Using NSIS
QoS Support for Mobile Users Using NSIS Roland Bless and Martin Röhricht Institute of Telematics Universität Karlsruhe (TH) Zirkel 2, D 76128 Karlsruhe, Germany {bless,roehricht}@tm.uka.de Abstract. Resource
More informationP2P Based Architecture for Global Home Agent Dynamic Discovery in IP Mobility
P2P Based Architecture for Global Home Agent Dynamic Discovery in IP Mobility Rubén Cuevas, Carmen Guerrero, Ángel Cuevas, María Calderón, Carlos J. Bernardos Departamento de Ingeniería Telemática, Universidad
More informationFixed Internetworking Protocols and Networks. IP mobility. Rune Hylsberg Jacobsen Aarhus School of Engineering
Fixed Internetworking Protocols and Networks IP mobility Rune Hylsberg Jacobsen Aarhus School of Engineering rhj@iha.dk 1 2011 ITIFN Mobile computing Vision Seamless, ubiquitous network access for mobile
More informationCisco RV180 VPN Router
Cisco RV180 VPN Router Secure, high-performance connectivity at a price you can afford. Figure 1. Cisco RV180 VPN Router (Front Panel) Highlights Affordable, high-performance Gigabit Ethernet ports allow
More informationProtocol for Tetherless Computing
Protocol for Tetherless Computing S. Keshav P. Darragh A. Seth S. Fung School of Computer Science University of Waterloo Waterloo, Canada, N2L 3G1 1. Introduction Tetherless computing involves asynchronous
More information1. Ultimate Powerful VPN Connectivity
1.1. Firewall, Proxy and NAT Transparency One of the key features of SoftEther VPN is the transparency for firewalls, proxy servers and NATs (Network Address Translators). NATs are sometimes implemented
More informationSD-WAN Deployment Guide (CVD)
SD-WAN Deployment Guide (CVD) All Cisco Meraki security appliances are equipped with SD-WAN capabilities that enable administrators to maximize network resiliency and bandwidth efficiency. This guide introduces
More informationIPv6 deployment at Google
IPv6 deployment at Google Lorenzo Colitti, Angus Lees {lorenzo,alees}@google.com Why? Why IPv6? When the day comes that users only have IPv6, Google needs to be there If we can serve our users better over
More informationNetwork Working Group Request for Comments: Nokia Research Center F. Dupont GET/ENST Bretagne June 2004
Network Working Group Request for Comments: 3776 Category: Standards Track J. Arkko Ericsson V. Devarapalli Nokia Research Center F. Dupont GET/ENST Bretagne June 2004 Using IPsec to Protect Mobile IPv6
More informationMobile IPv6 Security while traversing a NAT
Mobile Pv6 Security while traversing a NAT Geon-Woo Kim, Jong-Wook Han, Dong-1 Seo Electronics and Telecommunications Research nstitute 161 Gajeong-Dong Yuseong-Gu Daejeon, KOREA Abstract- The mobile Wv6
More informationA Scheme of Primary Path Switching for Mobile Terminals using SCTP Handover
Proceedings of the 2007 WSEAS International Conference on Computer Engineering and Applications, Gold Coast, Australia, January 17-19, 2007 218 A Scheme of Primary Path Switching for Mobile Terminals using
More informationNIST SP : Guidelines for the Secure Deployment of IPv6
NIST SP 800-119: Guidelines for the Secure Deployment of IPv6 Sheila Frankel Computer Security Division NIST sheila.frankel@nist.gov US Government IPv6 Directives: Office of Management and Budget (OMB)
More informationLecture 13 Page 1. Lecture 13 Page 3
IPsec Network Security: IPsec CS 239 Computer Software March 2, 2005 Until recently, the IP protocol had no standards for how to apply security Encryption and authentication layered on top Or provided
More informationMySip.ch. SIP Network Address Translation (NAT) SIP Architecture with NAT Version 1.0 SIEMENS SCHWEIZ AKTIENGESELLSCHAFT
s MySip.ch SIP Network Address Translation () SIP Architecture with Version 1.0 Issued by DS MS, Software house Albisriederstr. 245, CH-8047 Zurich Copyright Siemens Schweiz AG 2004 All Rights Reserved.
More informationUnified Communication:
Unified Communication: It should work as easily as a telephone call! Authors Thomas Reisinger, MSc (Royal Holloway, 2016) Peter Komisarczuk, ISG, Royal Holloway Abstract This article explains various aspects
More informationShim6: Reference Implementation and Optimization
Shim6: Reference Implementation and Optimization Jun Bi, Ping Hu, and Lizhong Xie Network Research Center, Tsinghua University, Beijing, 100084, China junbi@tsinghua.edu.cn Abstract. Shim6 is an important
More informationMobility vs Multihoming
Mobility vs Multihoming Naveen Gundu Helsinki University of Technology Telecommunications Software and Multimedia Laboratory naveen@cc.hut.fi Abstract In current scenario, use of mobile and Internet has
More informationCommunications Software. CSE 123b. CSE 123b. Spring Lecture 10: Mobile Networking. Stefan Savage
CSE 123b CSE 123b Communications Software Spring 2003 Lecture 10: Mobile Networking Stefan Savage Quick announcement My office hours tomorrow are moved to 12pm May 6, 2003 CSE 123b -- Lecture 10 Mobile
More information