Cost of deploying new technologies

Size: px
Start display at page:

Download "Cost of deploying new technologies"

Transcription

1 Cost of deploying new technologies Erkka Honkavaara Helsinki University of Technology Abstract The current Internet is very different from how it was originally designed. These changes have brought new challenges to its architecture for which different solutions have been devised. In this paper I go through some of these solutions, namely i3, HIP, NUTSS, NSIS and Mobile IP, and changes they require on current systems. I will evaluate their differences and similarities in respect to the cost of deploying them. Currently HIP looks promising due to its many features and legacy support(both IPv4 and IPv6), which lowers the cost of deployment radically. KEYWORDS: i3, HIP, NUTSS, NSIS, Mobile IP, Cost of deployment 1 Introduction The Internet has become very different from what it was in its early years. Advancements in technology have made small and mobile connected devices commonplace. Moreover, mobility is not limited only to single devices, but also to whole networks. However, these advancements present new challenges arising from the limitations of the early types of infrastructure. Different solutions have been proposed, but none have yet emerged as the definitive answer. This paper focuses on the cost of deployment for solutions i3, HIP, NUTSS, NSIS and Mobile IP. These are deployed on different layers, some require changes to applications or operating systems while others require changes to the Internet core routers. First I will go through why changes are needed. After I have established that, I will present some technologies which offer solutions to mobility and other issues. The chapter after that contains cost analysis of these problems. In the final chapter I present my conclusions about the costs and which of the technologies should be deployed. 2 Background Originally, the architecture to support the Internet was designed without any consideration for the need to support mobility. This worked for a while, but the limitations of this early architecture became more obvious as devices shrank in size and, moreover, became increasingly interconnected. That said, the original simple point-to-point architecture was critical to the early development of the Internet, as it contributed to its scalability and efficiency[14]. Because of the smaller size and therefore the improved movability of hosts combined with modern interconnectivity the need for mobility has surfaced. By mobility I mean the ability of hosts to move between networks without losing their current connections. Sometimes staying still or disconnecting isn t an option. An example of where mobility is needed can be a security guards communication device which uses VoIP. First the guard sits in his monitoring room and the device is connected the the WLAN present in his room. When he leaves for his rounds outside the building he leaves the range of the WLAN and his communication device automatically switches to an cellular network. When this switch happens the device must switch smoothly and retain its current connections. This is where mobility support is needed. 3 Solution previews Here I will list short previews of all the proposed solutions, the previews are only meant to scratch the surface of each solution and provide a general picture of the subject. 3.1 Mobile IP: MIP I will only focus on Mobile IPv6 as it is replacing MIPv4 and is meant to be included as a part of IPv6. MIP uses a home agent(ha) with a static address to sustain connections between the mobile node(mn) and the correspondent node(cn) as shown on Fig. 1. The correspondent node does not have to support MIP for the protocol to work, but it helps because it enables rerouting so that all the packets do not have to pass through the home agent[5]. MIP requires a trust relationship between the HA and MN, while no trust is required towards the CN. The trust between the HA and MN is formed with the use of IPSec with ESP when updating the MN information on the HA[5]. The information update is triggered when the MN moves and has to switch address[7]. The mobile host can acquire a new address by the use of IPv6 auto configuration. 3.2 Internet Indirection Infrastructure: i3 i3 aims to ease the development of services such as multicast, anycast and mobility. It offers a rendezvous-based solution which decouples the act of sending from the act of receiving. In an i3 network hosts associate themselves with identifiers, which are stored in the network as triggers. The hosts associated with the trigger receive all the traffic that is sent to the trigger. The i3 overlay network has servers called i3 nodes,

2 solve mobility and other problems by adding new signaling to IP connections[3]. By means of URI it provides a locator identifier split which enables host mobility. The URIs can refer to applications, users and flows in addition to just devices. These URIs are similar to addresses, which in fact are URIs, which makes them more human readable. An example of an URI could be erkka@home.honkavaara.org;type=client;app=skype, that identifies the user, the endpoint type and the application, meaning Erkka s skype client at the domain home.honkavaara.org[11]. These URIs allow more spesific identification of connections. These references and dataflows are setup by the use of SIP and STUNT. SIP is used because of its maturity and already wide deployment[2]. Figure 1: MIP connection which store these triggers and handle all of the traffic[14] forwarding. When a host inserts a trigger to the network, it send it to the hosts gateway i3 node, which then forwards the trigger to the correct i3 node to store the trigger. The triggers are spread throughout the network according to an algorithm, some redundancy is used to make sure a single host failing doesn t bring the whole network down. 3.3 Host Identity Protocol: HIP HIP approaches the mobility problem by adding a new layer, namely the Host Identity Protocol, to the OSI model in between the internetworking and transport layers[8]. The protocol provides an identifier and locator split, which allows hosts to change locations while retaining their identifier(host identity(hi)). The identifier may also have multiple locations assigned to it enabling multihoming[9]. These identifiers have to be stored somewhere and the current approach is to use distributed hash tables(dht) in an secure-i3 overlay network[10], which I presented earlier. This HIP infrastructure is called Hi 3. It makes the handling of HIs more dynamic than using normal DNS based infrastructure at the same time retaining redundancy and security. 3.4 NAT, URI, Tunnel, SIP and STUNT: NUTSS The name NUTSS, a bit different in origin from the other solution names, is derived from the words NAT, URI, tunnel, SIP and STUNT, which are the technologies it relies on. NUTSS challenges the original end-to-end architecture of the Internet and substitutes it with its own end-middle-end version. It is a signaling based IP architecture which tries to 3.5 Next Step In Signaling: NSIS NSIS aims to solve the current problems with the Internet by introducing a suite of protocols for signaling between NEs (NSIS Entities) which are considered peers. These NEs include the end hosts and NSIS enabled nodes along the signaling path. NSIS can configure routes through NSIS enabled firewalls and NATs, negotiate quality of service guarantees and detect congestion along the data path[4]. NSIS capable middleboxes enable NAT- and firewalltraversal by using NAT/FW NSIS Signalling Layer Protocols(NSLPs). The NAT/FW NSLP is used to dynamically install policy rules on supporting middleboxes along the path[13]. Unlike the other solutions NSIS itself does not provide mobility, it just supports it by preparing a route for the connection by manipulating NSIS aware middleboxes on the route. NSIS itself mostly focuses on handling the QoS aspects of the mobile connection[12]. 4 Costs of solutions In this section I will go through changes which are needed to deploy the different solutions and evaluate the weight of the changes required by them. By cost I refer real costs caused by the need to change the existing systems. These changes include but are not limited to changes to routing infrastructure, operating systems, applications and middleboxes. While I do not dare to make a guess for the numerical size of these costs, they are substantial and have to be taken into account. Changes to operating systems are easily deployed because of the modern automatic updates supported by Windows, Mac and Linux. The real problem is legacy support for applications, the solution may render old applications inoperable until they have been updated. This is a serious problem with unsupported applications. Another cost arises from already deployed application solutions. Companies have configured applications and networks function on the old IPv4. When this changes not only the application has to be updated, but configurations have to be redeployed to with the new architecture. Changes to hardware, routers and middleboxes, take time and effort to implement. Big suppliers, Cisco and others,

3 can release software updates to existing systems, but these changes have to be thoroughly tested and configured by trained professionals which is very costly. 4.1 MIP IPv6 has been coming for the last ten years, although it has only recently started to pick up speed. One of the biggest steps toward deploying IPv6 has been made by China, which has adopted a five year plan to full reach deployment. IPv6 is gaining more and more exposure and I believe that it will be deployed in the next five years. As IPv6 get more and more deployed, MIP will become more and more viable as a solution as it enables mobility with IPv6. The deployment of other solutions discussed in this paper will most probably not slow the IPv6s spread, on the contrary, they may speed it up. This means that the router, application and API changes needed by MIP(IPv6) will be most probably implemented regardless of the use of MIP. Because of this the only need for supporting mobility is the Home Agent, which can be the user s computer at home or at work. 4.2 i3 i3 requires a lot of bandwidth to be fully deployed as a solution because of the need to route all the traffic through the overlay network and its servers. This in addition to the need to add changes to applications and APIs makes it quite costly to deploy[14]. Because of the high cost related to its deployment, it seems more effective to use it only for control data as in the case of HIP. This way only lightweight control data is transferred through the overlay network and the real payload moves along a more traditional route. Without i3 supporting applications a proxy server is needed. The proxy server can be hosted as a remote client or on the user s system. The connection is then handled trough DNS-names, ie. my.homecomputer.i3. There is at least one proxy solution ready, it goes by the name of OCALA[6], Overlay Convergence Architecture for Legacy Applications, and it can be run on Windows, Linux and Mac. i3 can have some security issues such as eavesdropping, trigger hijacking and DoS attacks. Eavesdropping is possible by inserting a trigger to the network with the same id as the victim. This adds the eavesdropper as a recipient of all the messages sent to the victims id. The real threat however is the DoS attacks, these can be caused by attacking either the infrastructure or end-hosts. The attacker can chain triggers in a way that they loop or replicate packets, overwhelming the target. 4.3 HIP Currently, HIP can be used both in user and kernel space. This makes installation easier as changes to the operating system are slower to deploy. However running HIP in user space does create the drawback of reduced performance. This doesn t cause much concern because kernel support can be added later as the usage of HIP grows[1]. Because HIP will be most probably deployed with the Hi 3 infrastructure, it will require servers to host the i3 overlay network. Luckily, as the overlay network will only be used for control data, mainly HITs, the bandwidth and processing requirements of the network are lessened[10]. The deployment of HIP doesn t require much from the average users, as long as they remember to update their operating systems or download the userspace support for HIP. HIP is already implemented in Linux and can most probably be added to new Windows systems with an automatic update. Because of Local Scope Identifiers, LSIs, the users can use their old programs with HIP. An LSI is a localized 32-bit representation for an HI[9], which looks like an IPv4 address. A driving force behind the deployment of HIP could be the fact that it can serve as a bridge between IPv4 and IPv6 as it provides interoperability for them on application level. This would make the transition from IPv4 to IPv6 a lot more streamlined. Also the added security sounds very promising. 4.4 NUTSS While NUTSS benefits greatly from middleboxes supporting it, it can operate in legacy mode to allow NAT-traversal endpoints. This optionality allows NUTSS to be deployed incrementally in three phases. At first it will only offer the traversal and end-to-end access control[2]. In the second phase policy-boxes, called P-boxes, are added to the network allowing some control over the network traffic. The endpoints are configured to use these P-boxes, this can be done through an auto configuration protocol, ie. DHCP[2]. In the final phase, NUTSS-aware middleboxes, called M- boxes, are introduced into the borders of the network. They enforce the P-box defined rules and remove the need of individual endpoint configuration. Also NAT-traversal is made obsolete with the M-boxes[2]. This incremental deployment makes NUTSS more appealing as it offers the highly coveted NAT-traversal in the first phase. The endpoint deployment of NUTSS can be made in userspace and, according to Saikat Guha and Paul Francis, with minimal or no changes to user applications[2]. I m skeptical on this because of the URI-addressing which would need changes to existing applications. NUTSS deployment should be straightforward for an average user, it initially requires only a operating system update or installing a software component. Configuring NUTSS policies in phase 1 requires a bit more insight and may cause not so technically savvy people to use less secure options for added comfort. If NUTSS aware applications are used, automatic configuration should be possible. I believe that one of the problems NUTSS would have is that it most probably will have to deployed mostly on operator side because the average users will not understand P- boxes and may even be confused with the legacy and NUTSS capable NATs. Also there might be problems with implementing the M- and P-boxes because of differences in manufacturers implementations.

4 4.5 NSIS NSIS supports incremental deployment by supporting networks with both NSIS-capable and incapable nodes. Nodes which do not support NSIS are just passed through because common protocols, ie TCP, are used for transport. This way NSIS traffic can move through entire networks without the need of additional support[4]. However if the amount of nodes without NSIS-capabilities is high, the benefits reduce, because of the reduced amount of QoS reservations. NSIS is one of the more costly ones to implement because of the need to make changes to routers. While it may or may not be possible to implement these changes with some software updates the added computing load would force operators to upgrade their routers incurring costs. As operators are mostly after profit, without clear business possibilities NSIS may not seem enough financially justified. On the other hand, the router market is dominated by a few large companies which can push technologies to the core. I believe that if Cisco would implement NSIS support on its core routers, others would follow. This wouldn t be a fast process because the routers would have to be updated and reconfigured. Requires changes to Needs Kernel Apps Routers Solution Phase servers &API i3 In dev YES NO YES* NO HIP Test** YES YES NO NO NUTSS In dev YES NO NO NO NSIS In dev YES YES NO YES Mobile Home IP Ready Agent Done NO NO *Legacy support with proxies **HIP has been deployed in the Linux kernel patched with linux hip.patch but is still being developed. HIP supports old applications and APIs through LSIs which act as bridges between IPv4-based protocols and API. MIPv6 included in IPv6 5 Conclusions Table 2: Solutions 4.6 Summary As we can see from tables 2 and 1 some of the solutions have similar features and requirements, while others take on a totally different approach. i3, HIP and NUTSS approach the mobility problem with a new address space which in the case of i3 and NUTSS requires changes to applications, while HIP can operate with legacy applications. i3 can however function with legacy through the use of a proxy. The cost of these changes is substantial because of the sheer amount of deployed legacy applications. MIP works differently by using the HA for relaying information or data. Because of the way MIP works, it is totally transparent to existing applications and does not require any changes to the network making it a cheap but limited solution. NSIS on the other hand has a totally different approach. It requires the route to be aware of the needs of the connection. This requires changes to the routers, which takes time and effort. Solution DoS protection Id/loc split NAT support i3 YES** YES NO HIP YES* YES YES NUTSS NO YES YES NSIS NO NO YES MIP NO NO NO By NAT support I m referring to NAT traversal *By means of processing challenges **By means of managing triggers Table 1: Some solution features Currently, Mobile IP and HIP are the most mature of and closest to being fully deployed. HIP has been added to the Linux kernel and is being tested with currently. But MIP has the advantage because it is bundled with IPv6 which is currently supported in all major operating systems. Although it has not yet reached IPv4 s popularity, it has been gaining ground and public acceptance. While MIP does solve mobility issues, the other solutions have other benefits that should be taken into account. These benefits include NAT-traversal, DoS-protection, etc... as shown in table 1. Although all of the solutions have important features, in my opinion the best benefit-cost ratio is with HIP. It implements scalable security, mobility and multihoming with minimal changes to existing infrastructure. Although solutions like NUTSS and HIP offer support for legacy applications I fear that there will be some programs that stop working. This is a major problem because some of these applications may be mission critical components for firms. If these applications are not being supported anymore, they cannot be easily fixed to work with the new solutions. Because of this completely legacy hosts may be left on the network. It will be interesting to follow the development of the current situation and see which technologies take flight, and which crash and burn. As time has shown, it is very hard to predict which technologies will make it, good design and features do not always help. I believe that the most critical time for these solutions will be when IPv6 starts being deployed on the large scale, because the most logical time to deploy them is at the same with IPv6 or a bit before. After IPv6 I don t believe there will as much interest in doing more work to deploy the latecomers.

5 6 Future work I believe that a numerical analysis on this subject would be interesting and rewarding. The amount of legacy applications and hosts is huge, the volume of the changes needed to implement these changes brings along a cost. Also the possible need for upgrading core routers for possible future technologies such as NSIS would have to be looked into as well. 7 Acknowledgements I would like to thank Timo Kiravuo for providing direction and guidance for this paper and Roger Munn for help with the correct use of the English language. I would also like to extend my gratitude to my opponent Lu Yang for comments and improvement suggestions on this paper. References [10] P. Nikander, J. Arkko, and B. Ohlman. Host identity indirection infrastructure (hi3). Internet Draft, june Internet Draft, Expired in December 26, [11] P. F. Saikat Guha. Towards a secure internet architecture through signaling. Technical report, July cul.cis/tr [12] T. Sanda, X. Fu, S. Jeong, J. Manner, and H. Tschofenig. Applicability statement of nsis protocols in mobile environments. Internet Draft, february Internet Draft, Expires in August 25, [13] N. Steinleitner, H. Peters, and X. Fu. Implementation and performance study of a new nat/firewall signaling protocol. In ICDCSW 06: Proceedings of the 26th IEEE International ConferenceWorkshops on Distributed Computing Systems, page 8, Washington, DC, USA, IEEE Computer Society. [14] I. Stoica, D. Adkins, S. Zhuang, S. Shenker, and S. Surana. Internet indirection infrastructure, [1] J. Ahrenholz. OpenHip webpage - Overview, October Visited [2] S. Guha and P. Francis. An end-middle-end approach to connection establishment. In SIGCOMM 07: Proceedings of the 2007 conference on Applications, technologies, architectures, and protocols for computer communications, pages , New York, NY, USA, ACM. [3] S. Guha, Y. Takeda, and P. Francis. Nutss: a sipbased approach to udp and tcp network connectivity. In FDNA 04: Proceedings of the ACM SIGCOMM workshop on Future directions in network architecture, pages 43 48, New York, NY, USA, ACM. [4] R. Hancock, G. Karagiannis, J. Loughney, and S. V. den Bosch. Next Steps in Signaling (NSIS): Framework. RFC 4080 (Informational), June [5] D. Johnson, C. Perkins, and J. Arkko. Mobility Support in IPv6. RFC 3775 (Proposed Standard), June [6] D. A. Joseph. Ocala: Overlay convergence architecture for legacy applications. Web page, november url( ): [7] M. Merger. Mobility management with mobile ip version 6. Master s thesis, [8] R. Moskowitz and P. Nikander. Host Identity Protocol (HIP) Architecture. RFC 4423 (Informational), May [9] P. Nikander. Applying host identity protocol to the internet addressing architecture. Applications and the Internet, Proceedings International Symposium on, pages 5, 2004.

HIP Host Identity Protocol. October 2007 Patrik Salmela Ericsson

HIP Host Identity Protocol. October 2007 Patrik Salmela Ericsson HIP Host Identity Protocol October 2007 Patrik Salmela Ericsson Agenda What is the Host Identity Protocol (HIP) What does HIP try to solve HIP basics Architecture The HIP base exchange HIP basic features

More information

Mobile SCTP for IP Mobility Support in All-IP Networks

Mobile SCTP for IP Mobility Support in All-IP Networks Mobile SCTP for IP Mobility Support in All-IP Networks Seok Joo Koh sjkoh@cs.knu.ac.kr Abstract The Stream Control Transmission Protocol (SCTP) is a new transport protocol that is featured multi-streaming

More information

On the Applicability of knowledge based NAT-Traversal for Home Networks

On the Applicability of knowledge based NAT-Traversal for Home Networks On the Applicability of knowledge based NAT-Traversal for Home Networks Andreas Müller, Andreas Klenk, and Georg Carle University of Tübingen, Computer Networks and Internet, Sand 13, 72076 Tübingen, Germany

More information

On Host Identity Protocol

On Host Identity Protocol On Host Identity Protocol Miika Komu Data Communications Software Group Dep. of Computer Science and Engineering School of Science Aalto University 17.10.2011 Table of Contents Introduction

More information

On the Applicability of Knowledge Based NAT-Traversal for Home Networks

On the Applicability of Knowledge Based NAT-Traversal for Home Networks On the Applicability of Knowledge Based NAT-Traversal for Home Networks Andreas Müller, Andreas Klenk, and Georg Carle University of Tübingen, Computer Networks and Internet, Sand 13, 72076 Tübingen, Germany

More information

ABI Working Title: Messaging NSLP

ABI Working Title: Messaging NSLP ABI Working Title: Messaging NSLP University of Helsinki Helsinki University of Technology VTT Technical Research Centre of Finland September 19, 2006 i Contents 1 Introduction 1 2 NSIS Framework 2 2.1

More information

Why do we really want an ID/locator split anyway?

Why do we really want an ID/locator split anyway? Why do we really want an ID/locator split anyway? Dave Thaler dthaler@microsoft.com MobiArch 2008 1 Starting from basics Users deal with names, not addresses (esp. in IPv6) Humans need friendly identifiers

More information

IP Mobility vs. Session Mobility

IP Mobility vs. Session Mobility IP Mobility vs. Session Mobility Securing wireless communication is a formidable task, something that many companies are rapidly learning the hard way. IP level solutions become extremely cumbersome when

More information

Internet Indirection Infrastructure (i3) Ion Stoica, Daniel Adkins, Shelley Zhuang, Scott Shenker, Sonesh Surana. UC Berkeley SIGCOMM 2002

Internet Indirection Infrastructure (i3) Ion Stoica, Daniel Adkins, Shelley Zhuang, Scott Shenker, Sonesh Surana. UC Berkeley SIGCOMM 2002 Internet Indirection Infrastructure (i3) Ion Stoica, Daniel Adkins, Shelley Zhuang, Scott Shenker, Sonesh Surana UC Berkeley SIGCOMM 2002 Motivations Today s Internet is built around a unicast pointto-point

More information

Host Identity Protocol. Miika Komu Helsinki Institute for Information Technology

Host Identity Protocol. Miika Komu Helsinki Institute for Information Technology Host Identity Protocol Miika Komu Helsinki Institute for Information Technology 16.11.2009 Table of Contents Introduction Naming and Layering Control Plane Data Plane Introduction Motivation

More information

Host Identity Indirection Infrastructure Hi 3. Jari Arkko, Pekka Nikander and Börje Ohlman Ericsson Research

Host Identity Indirection Infrastructure Hi 3. Jari Arkko, Pekka Nikander and Börje Ohlman Ericsson Research Host Identity Indirection Infrastructure Hi 3 Jari Arkko, Pekka Nikander and Börje Ohlman Ericsson Research Presentation outline Motivation Background Secure i 3 Hi 3 Summary 2 Hi 3 motivation Question:

More information

MOBILITY AGENTS: AVOIDING THE SIGNALING OF ROUTE OPTIMIZATION ON LARGE SERVERS

MOBILITY AGENTS: AVOIDING THE SIGNALING OF ROUTE OPTIMIZATION ON LARGE SERVERS MOBILITY AGENTS: AVOIDING THE SIGNALING OF ROUTE OPTIMIZATION ON LARGE SERVERS Albert Cabellos-Aparicio and Jordi Domingo-Pascual * Technical University of Catalonia, Department of Computer Architecture

More information

IPV6 SIMPLE SECURITY CAPABILITIES.

IPV6 SIMPLE SECURITY CAPABILITIES. IPV6 SIMPLE SECURITY CAPABILITIES. 50 issues from RFC 6092 edited by J. Woodyatt, Apple Presentation by Olle E. Johansson, Edvina AB. ABSTRACT The RFC which this presentation is based upon is focused on

More information

Host Identity Protocol (HIP): Connectivity, Mobility, Multi-Homing, Security, and Privacy over IPv4 and IPv6

Host Identity Protocol (HIP): Connectivity, Mobility, Multi-Homing, Security, and Privacy over IPv4 and IPv6 Host Identity Protocol (HIP): Connectivity, Mobility, Multi-Homing, Security, and Privacy over IPv4 and IPv6 by Pekka Nikander, Andrei Gurtov, and Thomas R. Henderson Johannes Bachhuber Jacobs University

More information

Host Identity Protocol

Host Identity Protocol Host Identity Protocol V.Gowri 1, M.Nirmala Kumari 2, R.Devendra Reddy 3 Associate Professor, Dept of CSE, Sri Venkatesa Perumal College of Engineering, Andhra Pradesh, India Assistant Professor, Dept

More information

T Computer Networks II. Mobility Issues Contents. Mobility. Mobility. Classifying Mobility Protocols. Routing vs.

T Computer Networks II. Mobility Issues Contents. Mobility. Mobility. Classifying Mobility Protocols. Routing vs. T-0.50 Computer Networks II Mobility Issues 6.0.008 Overview Mobile IP NEMO Transport layer solutions i SIP mobility Contents Prof. Sasu Tarkoma Mobility What happens when network endpoints start to move?

More information

Towards an Evolvable Internet Architecture

Towards an Evolvable Internet Architecture lthomas@student.ethz.ch December 19, 2007 Topics: Goals: How to evolve from IPv(N-1) to IPvN How to use overlay networks in legacy applications Show some nice ideas for evolvability Describe needed technologies

More information

Table of Contents. Cisco How NAT Works

Table of Contents. Cisco How NAT Works Table of Contents How NAT Works...1 This document contains Flash animation...1 Introduction...1 Behind the Mask...2 Dynamic NAT and Overloading Examples...5 Security and Administration...7 Multi Homing...9

More information

MILSA: A Mobility and Multihoming Supporting Identifier Locator Split Architecture for Naming in the Next Generation Internet

MILSA: A Mobility and Multihoming Supporting Identifier Locator Split Architecture for Naming in the Next Generation Internet MILSA: A Mobility and Multihoming Supporting Identifier Locator Split Architecture for Naming in the Next Generation Internet Jianli Pan, Subharthi Paul, Raj Jain Department of Computer Science and Engineering

More information

Host Identity Protocol (HIP):

Host Identity Protocol (HIP): Host Identity Protocol (HIP): Towards the Secure Mobile Internet Andrei Gurtov Helsinki Institute for Information Technology (HUT), Finland A John Wiley & Sons, Ltd, Publication Contents About the Author

More information

Location Privacy Extensions for the Host Identity Protocol

Location Privacy Extensions for the Host Identity Protocol 978 REVISTA DO DETUA, VOL. 4,N 8, JUNHO 2007 Location Privacy Extensions for the Host Identity Protocol Alfredo Matos, Justino Santos, João Girão, Marco Liebsch, Rui Aguiar NEC Europe Ltd, Network Laboratories

More information

Research Article A Novel Solution based on NAT Traversal for High-speed Accessing the Campus Network from the Public Network

Research Article A Novel Solution based on NAT Traversal for High-speed Accessing the Campus Network from the Public Network Research Journal of Applied Sciences, Engineering and Technology 7(2): 221-226, 2014 DOI:10.19026/rjaset.7.244 ISSN: 2040-7459; e-issn: 2040-7467 2014 Maxwell Scientific Publication Corp. Submitted: March

More information

Migration to IPv6 from IPv4. Is it necessary?

Migration to IPv6 from IPv4. Is it necessary? Introduction Today Internet plays a big role in every aspect of our lives and IP acted as an important pillar of Internet. Since its inception the Internet has reached almost all corners of globe and it

More information

Techological Advantages of Mobile IPv6

Techological Advantages of Mobile IPv6 Techological Advantages of Mobile IPv6 Nokia Research Center Mountain View, CA USA Charles E. Perkins http://people.nokia.net/charliep charliep@iprg.nokia.com 1 NOKIA NERD2000.PPT/ 11/20/00 / HFl Outline

More information

Interoperability and Security of TraSH: A Transport Layer Seamless Handover

Interoperability and Security of TraSH: A Transport Layer Seamless Handover Interoperability and Security of TraSH: A Transport Layer Seamless Handover Panel Session at 23 rd IEEE International Performance, Computing, and Communications Conference April 16, 2004 Dr. Mohammed Atiquzzaman

More information

2013 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other uses, in any current or future media,

2013 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other uses, in any current or future media, 2013 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other uses, in any current or future media, including reprinting/republishing this material for advertising

More information

Routing. Architecture for the Next. Generation. Internet (RANGI) Xiaohu Xu, Dayong Guo, Raj Jain, Jianli Pan, Subharthi Paul

Routing. Architecture for the Next. Generation. Internet (RANGI) Xiaohu Xu, Dayong Guo, Raj Jain, Jianli Pan, Subharthi Paul Routing Architecture for the Next Generation Internet (RANGI) Xiaohu Xu, Dayong Guo, Raj Jain, Jianli Pan, Subharthi Paul Presented to Routing Research Group (RRG), Internet Research Task Force Meeting

More information

Introduction Mobility Support Handover Management Conclutions. Mobility in IPv6. Thomas Liske. Dresden University of Technology

Introduction Mobility Support Handover Management Conclutions. Mobility in IPv6. Thomas Liske. Dresden University of Technology 2005 / High Speed Networks II Outline Introduction Mobility Support Overview of IPv6 Mobility Support Handover Management Mobility Support What means Mobility Support? allow transparent routing of IPv6

More information

On the Internet, nobody knows you re a dog.

On the Internet, nobody knows you re a dog. On the Internet, nobody knows you re a dog. THREATS TO DISTRIBUTED APPLICATIONS 1 Jane Q. Public Big Bank client s How do I know I am connecting to my bank? server s Maybe an attacker...... sends you phishing

More information

MIPv6: New Capabilities for Seamless Roaming Among Wired, Wireless, and Cellular Networks

MIPv6: New Capabilities for Seamless Roaming Among Wired, Wireless, and Cellular Networks Page 1 M: New Capabilities for Seamless Roaming Among Wired, Wireless, and Cellular Networks Paul Schmitz Technical Marketing Engineer Geoff Weaver Business Development Manager Copyright 2002. *Third-party

More information

Request for Comments: University of Twente/Ericsson J. Loughney Nokia S. Van den Bosch Alcatel June 2005

Request for Comments: University of Twente/Ericsson J. Loughney Nokia S. Van den Bosch Alcatel June 2005 Network Working Group Request for Comments: 4080 Category: Informational R. Hancock Siemens/RMR G. Karagiannis University of Twente/Ericsson J. Loughney Nokia S. Van den Bosch Alcatel June 2005 Status

More information

Q-Balancer Range FAQ The Q-Balance LB Series General Sales FAQ

Q-Balancer Range FAQ The Q-Balance LB Series General Sales FAQ Q-Balancer Range FAQ The Q-Balance LB Series The Q-Balance Balance Series is designed for Small and medium enterprises (SMEs) to provide cost-effective solutions for link resilience and load balancing

More information

IEEE Assisted Network Layer Mobility Support

IEEE Assisted Network Layer Mobility Support IEEE802.21 Assisted Network Layer Mobility Support Qazi Bouland Mussabbir *, Wenbing Yao ** and John Cosmas *** *School Of Engineering and Design, Brunel University Uxbridge, London, UB83PH, UK, qazi.mussabbir@brunel.ac.uk

More information

Ossification of the Internet

Ossification of the Internet Ossification of the Internet The Internet evolved as an experimental packet-switched network Today, many aspects appear to be set in stone - Witness difficulty in getting IP multicast deployed - Major

More information

IPv6: Are we really ready to turn off IPv4? Geoff Huston APNIC

IPv6: Are we really ready to turn off IPv4? Geoff Huston APNIC IPv6: Are we really ready to turn off IPv4? Geoff Huston APNIC The IPv6 Timeline 1990 2000 2010 2020 The IPv6 Timeline Yes, we ve been working on this for close to 30 years! 1990 2000 2010 2020 In-situ

More information

Planning for Information Network

Planning for Information Network Planning for Information Network Lecture 7: Introduction to IPv6 Assistant Teacher Samraa Adnan Al-Asadi 1 IPv6 Features The ability to scale networks for future demands requires a limitless supply of

More information

Slide 1. Slide 2. Slide 3. Technological Advantages of Mobile IPv6. Outline of Presentation. Earth with 2 Billion Mobile devices

Slide 1. Slide 2. Slide 3. Technological Advantages of Mobile IPv6. Outline of Presentation. Earth with 2 Billion Mobile devices Slide 1 Technological Advantages of Mobile IPv6 Nokia Research Center Mountain View, CA USA Charles E. Perkins http://people.nokia.net/charliep charliep@iprg.nokia.com 1 NOKIA NERD2000.PPT/ 11/20/00 /

More information

IPv6: Are we really ready to turn off IPv4?

IPv6: Are we really ready to turn off IPv4? IPv6: Are we really ready to turn off IPv4? In-situ transition In-situ transition Phase 1 Early Deployment IPv4 Internet Edge Dual-Stack Networks IPv6 networks interconnect by IPv6-over-IPv4 tunnels In-situ

More information

Architectural Approaches to Multi-Homing for IPv6

Architectural Approaches to Multi-Homing for IPv6 Architectural Approaches to Multi-Homing for IPv6 A Walk-Through of draft-huston-multi6-architectures-00 Geoff Huston June 2004 Recap Multi-Homing in IPv4 Either: Or: Obtain a local AS Obtain PI space

More information

Internet 3.0: The Next Generation Internet

Internet 3.0: The Next Generation Internet Internet 3.0: The Next Generation Internet Raj Jain Washington University in Saint Louis Saint Louis, MO 63130 Jain@wustl.edu Boeing Brown Bag Seminar, January 22, 2009 These slides and Audio/Video recordings

More information

Next Generation IPv6 Cyber Security Protection Through Assure6i TM Product Line

Next Generation IPv6 Cyber Security Protection Through Assure6i TM Product Line Next Generation IPv6 Cyber Security Protection Through Assure6i TM Product Line Designed to Prevent, Detect, and Block Malicious Attacks on Both IPv4 and IPv6 Networks TM Introduction With the exponential

More information

TBGP: A more scalable and functional BGP. Paul Francis Jan. 2004

TBGP: A more scalable and functional BGP. Paul Francis Jan. 2004 TBGP: A more scalable and functional BGP Paul Francis Jan. 2004 BGP: Border Gateway Protocol BGP is the top-level routing protocol in the Internet It holds the Internet together BGP allows routers to tell

More information

Mobile IP and IPSec in Enterprise use

Mobile IP and IPSec in Enterprise use Mobile IP and IPSec in Enterprise use Markku Rantala Helsinki University of Technology Department of Electrical and Communications Engineering Markku.Rantala@spiritco.com Abstract A modern enterprise IT

More information

Virtual ID: A Technique for Mobility, Multi- Homing, and Location Privacy in Next Generation Wireless Networks

Virtual ID: A Technique for Mobility, Multi- Homing, and Location Privacy in Next Generation Wireless Networks Virtual ID: A Technique for Mobility, Multi- Homing, and Location Privacy in Next Generation Wireless Networks Chakchai So-In, Student Member, IEEE, and Raj Jain, Fellow, IEEE Subharthi Paul and Jianli

More information

Embedding Identity in Mobile Environments

Embedding Identity in Mobile Environments Mobiarch 2007 - Kyoto, August 27 th, 2007 Embedding Identity in Mobile Environments Alfredo Matos Susana Sargento Rui L. Aguiar 2005, it -

More information

A Multihoming based IPv4/IPv6 Transition Approach

A Multihoming based IPv4/IPv6 Transition Approach A Multihoming based IPv4/IPv6 Transition Approach Lizhong Xie, Jun Bi, and Jianping Wu Network Research Center, Tsinghua University, China Education and Research Network (CERNET) Beijing 100084, China

More information

ROUTE OPTIMIZATION EXTENSION FOR THE MOBILE INTERNET PROTOCOL IN LINUX

ROUTE OPTIMIZATION EXTENSION FOR THE MOBILE INTERNET PROTOCOL IN LINUX ROUTE OPTIMIZATION EXTENSION FOR THE MOBILE INTERNET PROTOCOL IN LINUX M. L. Jiang and Y. C. Tay ABSTRACT The base Mobile Internet Protocol (Mobile IP)[1] provides a means for portable computers to roam

More information

Host Identity Payload in Home Networks

Host Identity Payload in Home Networks Host Identity Payload in Home Networks Miika Komu Helsinki University of Technology Department of Computer Science and Engineering 47521c Miika.Komu@hut.fi Abstract Host Identity Payload (HIP) is a new

More information

IPv4 Care-of Address Registration for IPv4 Support on the NEMO Basic Support Protocol

IPv4 Care-of Address Registration for IPv4 Support on the NEMO Basic Support Protocol IPv4 Care-of Address Registration for IPv4 Support on the NEMO Basic Support Protocol Ryuji Wakikawa Carl Williams Keisuke Uehara Jun Murai Keio University. Graduate School of Media and Governance KDDI

More information

Networked Multimedia and Internet Video. Colin Perkins

Networked Multimedia and Internet Video. Colin Perkins Networked Multimedia and Internet Video Colin Perkins IP video will represent 80% of all traffic by 2019, up from 67% in 2014 Source: Cisco Visual Networking Index, 2015 2 History MPEG TS YouTube MPEG

More information

Mobile IP. Mobile Computing. Mobility versus Portability

Mobile IP. Mobile Computing. Mobility versus Portability Mobile IP Mobile Computing Introduction Amount of mobile/nomadic computing expected to increase dramatically in near future. By looking at the great acceptance of mobile telephony, one can foresee a similar

More information

Postellation: an Enhanced Delay-Tolerant Network (DTN) Implementation with Video Streaming and Automated Network Attachment

Postellation: an Enhanced Delay-Tolerant Network (DTN) Implementation with Video Streaming and Automated Network Attachment Postellation: an Enhanced Delay-Tolerant Network (DTN) Implementation with Video Streaming and Automated Network Attachment Marc Blanchet, Simon Perreault and Jean-Philippe Dionne Viagénie, Québec, Québec,

More information

Comcast IPv6 Trials NANOG50 John Jason Brzozowski

Comcast IPv6 Trials NANOG50 John Jason Brzozowski Comcast IPv6 Trials NANOG50 John Jason Brzozowski October 2010 Overview Background Goals and Objectives Trials Observations 2 Background Comcast IPv6 program started over 5 years ago Incrementally planned

More information

Cisco 5921 Embedded Services Router

Cisco 5921 Embedded Services Router Data Sheet Cisco 5921 Embedded Services Router The Cisco 5921 Embedded Services Router (ESR) is a Cisco IOS software router application. It is designed to operate on small, low-power, Linux-based platforms

More information

QOS Quality Of Service

QOS Quality Of Service QOS Quality Of Service Michael Schär Seminar in Distributed Computing Outline Definition QOS Attempts and problems in the past (2 Papers) A possible solution for the future: Overlay networks (2 Papers)

More information

Technical Overview of DirectAccess in Windows 7 and Windows Server 2008 R2. Microsoft Windows Family of Operating Systems

Technical Overview of DirectAccess in Windows 7 and Windows Server 2008 R2. Microsoft Windows Family of Operating Systems Technical Overview of in Windows 7 and Windows Server 2008 R2 Microsoft Windows Family of Operating Systems Published: January 2009 This document supports a preliminary release of a software product that

More information

Considerations and Actions of Content Providers in Adopting IPv6

Considerations and Actions of Content Providers in Adopting IPv6 Considerations and Actions of Content Providers in Adopting IPv6 Sheng Jiang / Huawei Brian Carpenter / University of Auckland www.huawei.com IPv6 Trends Global IPv4 registry (IANA) ran out of spare blocks

More information

Technical White Paper for NAT Traversal

Technical White Paper for NAT Traversal V300R002 Technical White Paper for NAT Traversal Issue 01 Date 2016-01-15 HUAWEI TECHNOLOGIES CO., LTD. 2016. All rights reserved. No part of this document may be reproduced or transmitted in any form

More information

Fundamental Questions to Answer About Computer Networking, Jan 2009 Prof. Ying-Dar Lin,

Fundamental Questions to Answer About Computer Networking, Jan 2009 Prof. Ying-Dar Lin, Fundamental Questions to Answer About Computer Networking, Jan 2009 Prof. Ying-Dar Lin, ydlin@cs.nctu.edu.tw Chapter 1: Introduction 1. How does Internet scale to billions of hosts? (Describe what structure

More information

Host Identity Protocol

Host Identity Protocol Presentation outline Host Identity Protocol Slides by: Pekka Nikander Ericsson Research Nomadiclab and Helsinki Institute for Information Technology http://www.hip4inter.net 2 What is HIP? Motivation HIP

More information

Multicast Technology White Paper

Multicast Technology White Paper Multicast Technology White Paper Keywords: Multicast, IGMP, IGMP Snooping, PIM, MBGP, MSDP, and SSM Mapping Abstract: The multicast technology implements high-efficiency point-to-multipoint data transmission

More information

USING HIP TO SOLVE MULTI-HOMING IN IPV6 NETWORKS

USING HIP TO SOLVE MULTI-HOMING IN IPV6 NETWORKS USING HIP TO SOLVE MULTI-HOMING IN IPV6 NETWORKS Zhangyi Yuan 1, Xiaohong Huang 1, Junyi Zhang 2, Fred Baker 3 1 Research Institute of Networking Technology, Beijing University of Posts and Telecommunications,

More information

Network Working Group. Intended status: Informational. H. Deng. China Mobile. July 4, 2014

Network Working Group. Intended status: Informational. H. Deng. China Mobile. July 4, 2014 Network Working Group Internet-Draft Intended status: Informational Expires: January 5, 2015 D. Liu China Mobile H. Chan Huawei Technologies H. Deng China Mobile July 4, 2014 Distributed mobility management

More information

Mobile Routing : Computer Networking. Overview. How to Handle Mobile Nodes? Mobile IP Ad-hoc network routing Assigned reading

Mobile Routing : Computer Networking. Overview. How to Handle Mobile Nodes? Mobile IP Ad-hoc network routing Assigned reading Mobile Routing 15-744: Computer Networking L-10 Ad Hoc Networks Mobile IP Ad-hoc network routing Assigned reading Performance Comparison of Multi-Hop Wireless Ad Hoc Routing Protocols A High Throughput

More information

Independent Local Locator Substrate Indirection Transport ILLSIT

Independent Local Locator Substrate Indirection Transport ILLSIT Independent Local Locator Substrate Indirection Transport ILLSIT Supervisor Mats Björkman Mälardhalens University MAIL Javier Ubillos SICS MAIL Student Pablo Santibanez Jara Mikael Svensson Abstract Interoperation

More information

Charles Perkins Nokia Research Center 2 July Mobility Support in IPv6 <draft-ietf-mobileip-ipv6-14.txt> Status of This Memo

Charles Perkins Nokia Research Center 2 July Mobility Support in IPv6 <draft-ietf-mobileip-ipv6-14.txt> Status of This Memo IETF Mobile IP Working Group INTERNET-DRAFT David B. Johnson Rice University Charles Perkins Nokia Research Center 2 July 2000 Mobility Support in IPv6 Status of This

More information

Issues in Mobile Node Controlled Handovers

Issues in Mobile Node Controlled Handovers Issues in 802.21 Mobile Node Controlled Handovers Rehan Qureshi, Arek Dadej and Qiang Fu Institute for Telecommunications Research University of South Australia Mawson Lakes, SA 5095, Australia Email:

More information

ANTS - A Framework for Knowledge based NAT Traversal

ANTS - A Framework for Knowledge based NAT Traversal - A Framework for Knowledge based NAT Traversal Andreas Müller, Andreas Klenk and Georg Carle Chair for Network Architectures and Services Technische Universität München {mueller, klenk, carle}@net.in.tum.de

More information

Raj Jain

Raj Jain ID/Locator Separation Technology and Its Implications for Future Network Design Raj Jain Washington University in Saint Louis Saint Louis, MO 63130 Jain@wustl.edu A talk given at Huawei Technologies Co.,

More information

An Efficient NAT Traversal for SIP and Its Associated Media sessions

An Efficient NAT Traversal for SIP and Its Associated Media sessions An Efficient NAT Traversal for SIP and Its Associated Media sessions Yun-Shuai Yu, Ce-Kuen Shieh, *Wen-Shyang Hwang, **Chien-Chan Hsu, **Che-Shiun Ho, **Ji-Feng Chiu Department of Electrical Engineering,

More information

CONCEPTION ON TRANSITION METHODS: DEPLOYING NETWORKS FROM IPV4 TO IPV6

CONCEPTION ON TRANSITION METHODS: DEPLOYING NETWORKS FROM IPV4 TO IPV6 CONCEPTION ON TRANSITION METHODS: DEPLOYING NETWORKS FROM IPV4 TO IPV6 1 MS. CHAITA JANI, 2 PROF.MEGHA MEHTA 1 M.E.[C.E] Student, Department Of Computer Engineering, Noble Group Of Institutions, Junagadh,Gujarat

More information

Unit 5 - IPv4/ IPv6 Transition Mechanism(8hr) BCT IV/ II Elective - Networking with IPv6

Unit 5 - IPv4/ IPv6 Transition Mechanism(8hr) BCT IV/ II Elective - Networking with IPv6 5.1 Tunneling 5.1.1 Automatic Tunneling 5.1.2 Configured Tunneling 5.2 Dual Stack 5.3 Translation 5.4 Migration Strategies for Telcos and ISPs Introduction - Transition - the process or a period of changing

More information

VXLAN Overview: Cisco Nexus 9000 Series Switches

VXLAN Overview: Cisco Nexus 9000 Series Switches White Paper VXLAN Overview: Cisco Nexus 9000 Series Switches What You Will Learn Traditional network segmentation has been provided by VLANs that are standardized under the IEEE 802.1Q group. VLANs provide

More information

Application Note 3Com VCX Connect with SIP Trunking - Configuration Guide

Application Note 3Com VCX Connect with SIP Trunking - Configuration Guide Application Note 3Com VCX Connect with SIP Trunking - Configuration Guide 28 May 2009 3Com VCX Connect Solution SIP Trunking Table of Contents 1 3COM VCX CONNECT AND INGATE... 1 1.1 SIP TRUNKING SUPPORT...

More information

The Design Space of Network Mobility

The Design Space of Network Mobility The Design Space of Network Mobility Key ideas Network Mobility Seamless Mobility Overview of implementations and challenges Geomorphic model New abstraction for the network stack Helps us discuss, understand

More information

Service Graph Design with Cisco Application Centric Infrastructure

Service Graph Design with Cisco Application Centric Infrastructure White Paper Service Graph Design with Cisco Application Centric Infrastructure 2017 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 1 of 101 Contents Introduction...

More information

The Y-Comm Framework. A new way

The Y-Comm Framework. A new way The Y-Comm Framework A new way Mobility within Domains Mobile IP is good for moving between large defined domains But we also have to consider mobility issues within a domain which may have a number of

More information

Application Note Asterisk BE with Remote Phones - Configuration Guide

Application Note Asterisk BE with Remote Phones - Configuration Guide Application Note Asterisk BE with Remote Phones - Configuration Guide 15 January 2009 Asterisk BE - Remote SIP Phones Table of Contents 1 ASTERISK BUSINESS EDITION AND INGATE... 1 1.1 REMOTE SIP PHONE

More information

Advantage TLS Why IpTL TLS versus IPSec Technology Reference Guide

Advantage TLS Why IpTL TLS versus IPSec Technology Reference Guide IpTL s Expert Edition Networking Simplified Advantage TLS Why IpTL TLS versus IPSec Technology Reference Guide The World s Longest Ethernet Cable Take control and get the network you want with the network

More information

The NSIS QOS Model for Inter-domain Signaling to Enable End-to-End QoS Provisioning Over Heterogeneous Domains

The NSIS QOS Model for Inter-domain Signaling to Enable End-to-End QoS Provisioning Over Heterogeneous Domains The NSIS QOS Model for Inter-domain Signaling to Enable End-to-End QoS Provisioning Over Heterogeneous Domains Jian Zhang and Edmundo Monteiro Laboratory of Communications and Telematics (LCT), University

More information

Hillstone IPSec VPN Solution

Hillstone IPSec VPN Solution 1. Introduction With the explosion of Internet, more and more companies move their network infrastructure from private lease line to internet. Internet provides a significant cost advantage over private

More information

A New Inter-networking Architecture for Mobile Oriented Internet Environment

A New Inter-networking Architecture for Mobile Oriented Internet Environment Future Network & MobileSummit 2012 Conference Proceedings Paul Cunningham and Miriam Cunningham (Eds) IIMC International Information Management Corporation, 2012 ISBN: 978-1-905824-29-8 A New Inter-networking

More information

QoS Support for Mobile Users Using NSIS

QoS Support for Mobile Users Using NSIS QoS Support for Mobile Users Using NSIS Roland Bless and Martin Röhricht Institute of Telematics Universität Karlsruhe (TH) Zirkel 2, D 76128 Karlsruhe, Germany {bless,roehricht}@tm.uka.de Abstract. Resource

More information

P2P Based Architecture for Global Home Agent Dynamic Discovery in IP Mobility

P2P Based Architecture for Global Home Agent Dynamic Discovery in IP Mobility P2P Based Architecture for Global Home Agent Dynamic Discovery in IP Mobility Rubén Cuevas, Carmen Guerrero, Ángel Cuevas, María Calderón, Carlos J. Bernardos Departamento de Ingeniería Telemática, Universidad

More information

Fixed Internetworking Protocols and Networks. IP mobility. Rune Hylsberg Jacobsen Aarhus School of Engineering

Fixed Internetworking Protocols and Networks. IP mobility. Rune Hylsberg Jacobsen Aarhus School of Engineering Fixed Internetworking Protocols and Networks IP mobility Rune Hylsberg Jacobsen Aarhus School of Engineering rhj@iha.dk 1 2011 ITIFN Mobile computing Vision Seamless, ubiquitous network access for mobile

More information

Cisco RV180 VPN Router

Cisco RV180 VPN Router Cisco RV180 VPN Router Secure, high-performance connectivity at a price you can afford. Figure 1. Cisco RV180 VPN Router (Front Panel) Highlights Affordable, high-performance Gigabit Ethernet ports allow

More information

Protocol for Tetherless Computing

Protocol for Tetherless Computing Protocol for Tetherless Computing S. Keshav P. Darragh A. Seth S. Fung School of Computer Science University of Waterloo Waterloo, Canada, N2L 3G1 1. Introduction Tetherless computing involves asynchronous

More information

1. Ultimate Powerful VPN Connectivity

1. Ultimate Powerful VPN Connectivity 1.1. Firewall, Proxy and NAT Transparency One of the key features of SoftEther VPN is the transparency for firewalls, proxy servers and NATs (Network Address Translators). NATs are sometimes implemented

More information

SD-WAN Deployment Guide (CVD)

SD-WAN Deployment Guide (CVD) SD-WAN Deployment Guide (CVD) All Cisco Meraki security appliances are equipped with SD-WAN capabilities that enable administrators to maximize network resiliency and bandwidth efficiency. This guide introduces

More information

IPv6 deployment at Google

IPv6 deployment at Google IPv6 deployment at Google Lorenzo Colitti, Angus Lees {lorenzo,alees}@google.com Why? Why IPv6? When the day comes that users only have IPv6, Google needs to be there If we can serve our users better over

More information

Network Working Group Request for Comments: Nokia Research Center F. Dupont GET/ENST Bretagne June 2004

Network Working Group Request for Comments: Nokia Research Center F. Dupont GET/ENST Bretagne June 2004 Network Working Group Request for Comments: 3776 Category: Standards Track J. Arkko Ericsson V. Devarapalli Nokia Research Center F. Dupont GET/ENST Bretagne June 2004 Using IPsec to Protect Mobile IPv6

More information

Mobile IPv6 Security while traversing a NAT

Mobile IPv6 Security while traversing a NAT Mobile Pv6 Security while traversing a NAT Geon-Woo Kim, Jong-Wook Han, Dong-1 Seo Electronics and Telecommunications Research nstitute 161 Gajeong-Dong Yuseong-Gu Daejeon, KOREA Abstract- The mobile Wv6

More information

A Scheme of Primary Path Switching for Mobile Terminals using SCTP Handover

A Scheme of Primary Path Switching for Mobile Terminals using SCTP Handover Proceedings of the 2007 WSEAS International Conference on Computer Engineering and Applications, Gold Coast, Australia, January 17-19, 2007 218 A Scheme of Primary Path Switching for Mobile Terminals using

More information

NIST SP : Guidelines for the Secure Deployment of IPv6

NIST SP : Guidelines for the Secure Deployment of IPv6 NIST SP 800-119: Guidelines for the Secure Deployment of IPv6 Sheila Frankel Computer Security Division NIST sheila.frankel@nist.gov US Government IPv6 Directives: Office of Management and Budget (OMB)

More information

Lecture 13 Page 1. Lecture 13 Page 3

Lecture 13 Page 1. Lecture 13 Page 3 IPsec Network Security: IPsec CS 239 Computer Software March 2, 2005 Until recently, the IP protocol had no standards for how to apply security Encryption and authentication layered on top Or provided

More information

MySip.ch. SIP Network Address Translation (NAT) SIP Architecture with NAT Version 1.0 SIEMENS SCHWEIZ AKTIENGESELLSCHAFT

MySip.ch. SIP Network Address Translation (NAT) SIP Architecture with NAT Version 1.0 SIEMENS SCHWEIZ AKTIENGESELLSCHAFT s MySip.ch SIP Network Address Translation () SIP Architecture with Version 1.0 Issued by DS MS, Software house Albisriederstr. 245, CH-8047 Zurich Copyright Siemens Schweiz AG 2004 All Rights Reserved.

More information

Unified Communication:

Unified Communication: Unified Communication: It should work as easily as a telephone call! Authors Thomas Reisinger, MSc (Royal Holloway, 2016) Peter Komisarczuk, ISG, Royal Holloway Abstract This article explains various aspects

More information

Shim6: Reference Implementation and Optimization

Shim6: Reference Implementation and Optimization Shim6: Reference Implementation and Optimization Jun Bi, Ping Hu, and Lizhong Xie Network Research Center, Tsinghua University, Beijing, 100084, China junbi@tsinghua.edu.cn Abstract. Shim6 is an important

More information

Mobility vs Multihoming

Mobility vs Multihoming Mobility vs Multihoming Naveen Gundu Helsinki University of Technology Telecommunications Software and Multimedia Laboratory naveen@cc.hut.fi Abstract In current scenario, use of mobile and Internet has

More information

Communications Software. CSE 123b. CSE 123b. Spring Lecture 10: Mobile Networking. Stefan Savage

Communications Software. CSE 123b. CSE 123b. Spring Lecture 10: Mobile Networking. Stefan Savage CSE 123b CSE 123b Communications Software Spring 2003 Lecture 10: Mobile Networking Stefan Savage Quick announcement My office hours tomorrow are moved to 12pm May 6, 2003 CSE 123b -- Lecture 10 Mobile

More information