COSC : mobility within same subnet. Lecture 26. H1 remains in same IP subnet: IP address can remain same
|
|
- Arabella Jacobs
- 6 years ago
- Views:
Transcription
1 Lecture : mobility within same subnet H1 remains in same IP subnet: IP address can remain same switch: which AP is associated with H1? self learning (Ch. 5): switch will see frame from H1 and remember which switch port can be used to reach H1 BBS 1 H1 BBS
2 802.11: advanced capabilities Rate adaptation base station, mobile dynamically change transmission rate (physical layer modulation technique) as mobile moves, SNR varies QAM256 (8 Mbps) QAM16 (4 Mbps) BPSK (1 Mbps) operating point BER SNR(dB) 1. SNR decreases, BER increase as node moves away from base station 2. When BER becomes too high, switch to lower transmission rate but with lower BER : advanced capabilities power management node-to-ap: I am going to sleep until next beacon frame AP knows not to transmit frames to this node node wakes up before next beacon frame beacon frame: contains list of mobiles with APto-mobile frames waiting to be sent node will stay awake if AP-to-mobile frames to be sent; otherwise sleep again until next beacon frame 6-4 2
3 802.15: Personal Area Network less than 10 m diameter replacement for cables (mouse, keyboard, headphones) ad hoc: no infrastructure master/slaves: slaves request permission to send (to master) master grants requests : evolved from Bluetooth specification GHz radio band up to 721 kbps S M S P S P M P S P radius of coverage P Master device Slave device Parked device (inactive) 6-5 Chapter 6 outline 6.1 Introduction Wireless 6.2 Wireless links, characteristics CDMA 6.3 IEEE wireless LANs ( Wi Fi ) 6.4 Cellular Internet access architecture standards (e.g., GSM) Mobility 6.5 Principles: addressing and routing to mobile users 6.6 Mobile IP 6.7 Handling mobility in cellular s 6.8 Mobility and higher-layer protocols 6.9 Summary 6-6 3
4 Components of cellular architecture cell covers geographical region base station (BS) analogous to AP mobile users attach to through BS air-interface: physical and link layer protocol between mobile and BS connects cells to wired tel. net. manages call setup (more later!) handles mobility (more later!) Mobile Switching Center Mobile Switching Center Public telephone wired 6-7 Cellular s: the first hop Two techniques for sharing mobile-to-bs radio spectrum combined FDMA/TDMA: divide spectrum in frequency channels, divide each channel into time slots CDMA: code division multiple access frequency bands time slots 6-8 4
5 2G (voice) architecture Base station system (BSS) BTS BSC G Public telephone Gateway Legend Base transceiver station (BTS) Base station controller (BSC) Mobile Switching Center () Mobile subscribers 6-9 3G (voice+data) architecture radio controller G Public telephone Gateway Key insight: new cellular data operates in parallel (except at edge) with existing cellular voice voice unchanged in core data operates in parallel SGSN G GGSN Public Internet Serving GPRS Support Node (SGSN) Gateway GPRS Support Node (GGSN)
6 3G (voice+data) architecture radio controller G Public telephone Gateway SGSN G GGSN Public Internet radio interface (WCDMA, HSPA) radio access Universal Terrestrial Radio Access Network (UTRAN) core General Packet Radio Service (GPRS) Core Network public Internet 6-11 Chapter 6 outline 6.1 Introduction Wireless 6.2 Wireless links, characteristics CDMA 6.3 IEEE wireless LANs ( Wi Fi ) 6.4 Cellular Internet Access architecture standards (e.g., GSM) Mobility 6.5 Principles: addressing and routing to mobile users 6.6 Mobile IP 6.7 Handling mobility in cellular s 6.8 Mobility and higher-layer protocols 6.9 Summary
7 What is mobility? spectrum of mobility, from the perspective: no mobility high mobility mobile wireless user, using same access point mobile user, connecting/ disconnecting from using DHCP. mobile user, passing through multiple access point while maintaining ongoing connections (like cell phone) 6-13 Mobility: vocabulary home : permanent home of mobile (e.g., /24) home agent: entity that will perform mobility functions on behalf of mobile, when mobile is remote permanent address: address in home, can always be used to reach mobile e.g., wide area
8 Mobility: more vocabulary permanent address: remains constant (e.g., ) care-of-address: address in visited. (e.g., 79, ) visited : in which mobile currently resides (e.g., /24) correspondent: wants to communicate with mobile wide area foreign agent: entity in visited that performs mobility functions on behalf of mobile How do you contact a mobile friend: Consider friend frequently changing addresses, how do you find her? search all phone books? call her parents? expect her to let you know where he/she is? I wonder where Alice moved to?
9 Mobility: approaches let routing handle it: routers advertise permanent address of mobile-nodes-in-residence via usual routing table exchange. routing tables indicate where each mobile located no changes to end-systems let end-systems handle it: indirect routing: communication from correspondent to mobile goes through home agent, then forwarded to remote direct routing: correspondent gets foreign address of mobile, sends directly to mobile 6-17 Mobility: approaches let routing handle it: routers advertise permanent address of mobile-nodes-in-residence not via usual scalable routing table exchange. to millions of routing tables indicate mobileswhere each mobile located no changes to end-systems let end-systems handle it: indirect routing: communication from correspondent to mobile goes through home agent, then forwarded to remote direct routing: correspondent gets foreign address of mobile, sends directly to mobile
10 Mobility: registration home visited wide area foreign agent contacts home agent home: this mobile is resident in my 2 1 mobile contacts foreign agent on entering visited end result: foreign agent knows about mobile home agent knows location of mobile 6-19 Mobility via indirect routing home home agent intercepts packets, forwards to foreign agent foreign agent receives packets, forwards to mobile 3 visited correspondent addresses packets using home address of mobile 1 wide area 2 4 mobile replies directly to correspondent
11 Indirect Routing: comments mobile uses two addresses: permanent address: used by correspondent (hence mobile location is transparent to correspondent) care-of-address: used by home agent to forward datagrams to mobile foreign agent functions may be done by mobile itself triangle routing: correspondent-home-mobile inefficient when correspondent, mobile are in same 6-21 Indirect routing: moving between s suppose mobile user moves to another registers with new foreign agent new foreign agent registers with home agent home agent update care-of-address for mobile packets continue to be forwarded to mobile (but with new care-of-address) mobility, changing foreign s transparent: on going connections can be maintained!
12 Mobility via direct routing home correspondent forwards to foreign agent foreign agent receives packets, forwards to mobile visited correspondent requests, receives foreign address of mobile mobile replies directly to correspondent 6-23 Mobility via direct routing: comments overcome triangle routing problem non-transparent to correspondent: correspondent must get care-of-address from home agent what if mobile changes visited?
13 Accommodating mobility with direct routing anchor foreign agent: FA in first visited data always routed first to anchor FA when mobile moves: new FA arranges to have data forwarded from old FA (chaining) correspondent wide area 1 correspondent agent anchor foreign agent new foreign agent foreign net visited at session start 2 new foreign 6-25 Chapter 6 outline 6.1 Introduction Wireless 6.2 Wireless links, characteristics CDMA 6.3 IEEE wireless LANs ( Wi Fi ) 6.4 Cellular Internet Access architecture standards (e.g., GSM) Mobility 6.5 Principles: addressing and routing to mobile users 6.6 Mobile IP 6.7 Handling mobility in cellular s 6.8 Mobility and higher-layer protocols 6.9 Summary
14 Mobile IP RFC 3344 has many features we ve seen: home agents, foreign agents, foreign agent registration, care of addresses, encapsulation (packet within a packet) three components to standard: indirect routing of datagrams agent discovery registration with home agent 6-27 Mobile IP: indirect routing foreign-agent-to-mobile packet packet sent by home agent to foreign agent: a packet within a packet dest: dest: dest: Permanent address: dest: packet sent by correspondent Care-of address:
15 Mobile IP: agent discovery agent advertisement: foreign/home agents advertise service by broadcasting ICMP messages (typefield = 9) type = 9 code = 0 checksum H,F bits: home and/or foreign agent router address standard ICMP fields R bit: registration required type = 16 length sequence # RBHFMGV registration lifetime reserved bits 0 or more care-ofaddresses mobility agent advertisement extension 6-29 Mobile IP: registration example home agent HA: registration req. COA: HA: MA: Lifetime: 9999 identification: 714 encapsulation format. registration reply HA: MA: Lifetime: 4999 Identification: 714 encapsulation format. time visited : /24 foreign agent COA: ICMP agent adv. COA: registration req. COA: HA: MA: Lifetime: 9999 identification:714. registration reply HA: MA: Lifetime: 4999 Identification: 714. mobile agent MA:
16 Components of cellular architecture recall: wired public telephone correspondent different cellular s, operated by different providers 6-31 Handling mobility in cellular s home : of cellular provider you subscribe to (e.g., Sprint PCS, Verizon) home location register (HLR): database in home containing permanent cell phone #, profile information (services, preferences, billing), information about current location (could be in another ) visited : in which mobile currently resides visitor location register (VLR): database with entry for each user currently in could be home
17 GSM: indirect routing to mobile home consults HLR, gets roaming number of mobile in visited mobile user HLR 2 home home Mobile Switching Center VLR Mobile Switching Center 4 visited 3 correspondent 1 call routed to home Public switched telephone home sets up 2 nd leg of call to in visited in visited completes call through base station to mobile 6-33 GSM: handoff with common old BSS VLR Mobile Switching Center old routing new routing new BSS handoff goal: route call via new base station (without interruption) reasons for handoff: stronger signal to/from new BSS (continuing connectivity, less battery drain) load balance: free up channel in current BSS GSM doesnt mandate why to perform handoff (policy), only how (mechanism) handoff initiated by old BSS
18 GSM: handoff with common old BSS VLR Mobile Switching Center new BSS 1. old BSS informs of impending handoff, provides list of 1 + new BSSs 2. sets up path (allocates resources) to new BSS 3. new BSS allocates radio channel for use by mobile 4. new BSS signals, old BSS: ready 5. old BSS tells mobile: perform handoff to new BSS 6. mobile, new BSS signal to activate new channel 7. mobile signals via new BSS to : handoff complete. reroutes call 8 -old-bss resources released 6-35 GSM: handoff between s home Home anchor correspondent PSTN (a) before handoff anchor : first visited during call call remains routed through anchor new s add on to end of chain as mobile moves to new optional path minimization step to shorten multi- chain
19 GSM: handoff between s home Home anchor correspondent PSTN (b) after handoff anchor : first visited during call call remains routed through anchor new s add on to end of chain as mobile moves to new optional path minimization step to shorten multi- chain 6-37 Mobility: GSM versus Mobile IP GSM element Comment on GSM element Mobile IP element Home system Gateway Mobile Switching Center, or home. Home Location Register (HLR) Visited System Visited Mobile services Switching Center. Visitor Location Record (VLR) Mobile Station Roaming Number (MSRN), or roaming number Network to which mobile user s permanent phone number belongs Home : point of contact to obtain routable address of mobile user. HLR: database in home system containing permanent phone number, profile information, current location of mobile user, subscription information Network other than home system where mobile user is currently residing Visited : responsible for setting up calls to/from mobile nodes in cells associated with. VLR: temporary database entry in visited system, containing subscription information for each visiting mobile user Routable address for telephone call segment between home and visited, visible to neither the mobile nor the correspondent. Home Home agent Visited Foreign agent Care-ofaddress
20 Wireless, mobility: impact on higher layer protocols logically, impact should be minimal best effort service model remains unchanged TCP and UDP can (and do) run over wireless, mobile but performance wise: packet loss/delay due to bit errors (discarded packets, delays for link layer retransmissions), and handoff TCP interprets loss as congestion, will decrease congestion window un necessarily delay impairments for real time traffic limited bandwidth of wireless links 6-39 Chapter 6 summary Wireless wireless links: capacity, distance channel impairments CDMA IEEE ( Wi Fi ) CSMA/CA reflects wireless channel characteristics cellular access architecture standards (e.g., GSM, 3G, 4G LTE) Mobility principles: addressing, routing to mobile users home, visited s direct, indirect routing care-of-addresses case studies mobile IP mobility in GSM impact on higher-layer protocols
21 Chapter 8: Network Security Chapter goals: understand principles of security: cryptography and its many uses beyond confidentiality authentication message integrity security in practice: firewalls and intrusion detection systems security in application, transport,, link layers Chapter 8 roadmap 8.1 What is security? 8.2 Principles of cryptography 8.3 Message integrity, authentication 8.4 Securing e mail 8.5 Securing TCP connections: SSL 8.6 Network layer security: IPsec 8.7 Securing wireless LANs 8.8 Operational security: firewalls and IDS 21
22 What is security? confidentiality: only sender, intended receiver should understand message contents sender encrypts message receiver decrypts message authentication: sender, receiver want to confirm identity of each other message integrity: sender, receiver want to ensure message not altered (in transit, or afterwards) without detection access and availability: services must be accessible and available to users Friends and enemies: Alice, Bob, Trudy well known in security world Bob, Alice (lovers!) want to communicate securely Trudy (intruder) may intercept, delete, add messages Alice channel data, control messages Bob data secure sender Secure receiver data Trudy 22
23 Who might Bob, Alice be? well, real life Bobs and Alices! Web browser/server for electronic transactions (e.g., on line purchases) on line banking client/server DNS servers routers exchanging routing table updates other examples? There are bad guys (and girls) out there! Q: What can a bad guy do? A: A lot! See section 1.6 eavesdrop: intercept messages actively insert messages into connection impersonation: can fake (spoof) source address in packet (or any field in packet) hijacking: take over ongoing connection by removing sender or receiver, inserting himself in place denial of service: prevent service from being used by others (e.g., by overloading resources) 23
24 Chapter 8 roadmap 8.1 What is security? 8.2 Principles of cryptography 8.3 Message integrity, authentication 8.4 Securing e mail 8.5 Securing TCP connections: SSL 8.6 Network layer security: IPsec 8.7 Securing wireless LANs 8.8 Operational security: firewalls and IDS The language of cryptography K A Alice s encryption key Bob s decryption K Bkey plaintext encryption algorithm ciphertext decryption algorithm plaintext m plaintext message K A (m) ciphertext, encrypted with key K A m = K B (K A (m)) 24
25 Simple encryption scheme substitution cipher: substituting one thing for another monoalphabetic cipher: substitute one letter for another plaintext: abcdefghijklmnopqrstuvwxyz ciphertext: mnbvcxzasdfghjklpoiuytrewq e.g.: Plaintext: bob. i love you. alice ciphertext: nkn. s gktc wky. mgsbc Encryption key: mapping from set of 26 letters to set of 26 letters A more sophisticated encryption approach n substitution ciphers, M 1,M 2,,M n cycling pattern: e.g., n=4: M 1,M 3,M 4,M 3,M 2 ; M 1,M 3,M 4,M 3,M 2 ;.. for each new plaintext symbol, use subsequent subsitution pattern in cyclic pattern dog: d from M 1, o from M 3, g from M 4 Encryption key: n substitution ciphers, and cyclic pattern key need not be just n bit pattern 25
26 Breaking an encryption scheme cipher text only attack: Trudy has ciphertext she can analyze two approaches: brute force: search through all keys statistical analysis known plaintext attack: Trudy has plaintext corresponding to ciphertext e.g., in monoalphabetic cipher, Trudy determines pairings for a,l,i,c,e,b,o, chosen plaintext attack: Trudy can get ciphertext for chosen plaintext Types of Cryptography Crypto often uses keys: Algorithm is known to everyone Only keys are secret Public key cryptography Involves the use of two keys Symmetric key cryptography Involves the use one key Hash functions Involves the use of no keys Nothing secret: How can this be useful? 26
27 Symmetric key cryptography K S K S plaintext message, m encryption algorithm ciphertext K S (m) decryption algorithm plaintext m = K S (K S (m)) symmetric key crypto: Bob and Alice share same (symmetric) key: K S e.g., key is knowing substitution pattern in mono alphabetic substitution cipher Q: how do Bob and Alice agree on key value? Public Key Cryptography symmetric key crypto requires sender, receiver know shared secret key Q: how to agree on key in first place (particularly if never met )? public key crypto radically different approach [Diffie- Hellman76, RSA78] sender, receiver do not share secret key public encryption key known to all private decryption key known only to receiver 27
28 Public key cryptography K B + K B - Bob s public key Bob s private key plaintext message, m encryption algorithm ciphertext + K (m) B decryption algorithm plaintext message - + m = K (K (m)) B B Public key encryption algorithms requirements: B B - + K (K (m)) = m B B need K ( ) and K ( ) such that + given public key K B, it should be impossible to compute private - key K B RSA: Rivest, Shamir, Adelson algorithm 28
29 Prerequisite: modular arithmetic x mod n = remainder of x when divide by n facts: [(a mod n) + (b mod n)] mod n = (a+b) mod n [(a mod n) (b mod n)] mod n = (a b) mod n [(a mod n) * (b mod n)] mod n = (a*b) mod n thus (a mod n) d mod n = a d mod n example: x=14, n=10, d=2: (x mod n) d mod n = 4 2 mod 10 = 6 x d = 14 2 = 196 x d mod 10 = 6 RSA: getting ready message: just a bit pattern bit pattern can be uniquely represented by an integer number thus, encrypting a message is equivalent to encrypting a number. example: m= This message is uniquely represented by the decimal number 145. to encrypt m, we encrypt the corresponding number, which gives a new number (the ciphertext). 29
30 RSA: Creating public/private key pair 1. choose two large prime numbers p, q. (e.g., 1024 bits each) 2. compute n = pq, z = (p-1)(q-1) 3. choose e (with e<n) that has no common factors with z (e, z are relatively prime ). 4. choose d such that ed-1 is exactly divisible by z. (in other words: ed mod z = 1 ). 5. public key is (n,e). private key is (n,d). K B + K B - RSA: encryption, decryption 0. given (n,e) and (n,d) as computed above 1. to encrypt message m (<n), compute c = m e mod n 2. to decrypt received bit pattern, c, compute m = c d mod n magic happens! m = (m e mod n) c d mod n 30
Mobility: vocabulary
What is mobility? spectrum of mobility, from the perspective: no mobility high mobility mobile wireless user, using same access point mobile user, connecting/ disconnecting from using DHCP. mobile user,
More informationCSC 401 Data and Computer Communications Networks
CSC 401 Data and Computer Communications Networks Wireless Networks Cellular & Mobility Sec 7.4 7.8 Lina Battestilli 7.1 Introduction Wireless Chapter 7 Outline Wireless and Mobile Networks 7.2 Wireless
More informationCSC 4900 Computer Networks: Mobility
CSC 4900 Computer Networks: Mobility Professor Henry Carter Fall 2017 Last Time What is the hidden terminal problem? How do CDMA networks use spectrum differently than TDMA systems? What is a chipping
More informationChapter 7. Wireless and Mobile Networks. Computer Networking: A Top Down Approach
Chapter 7 Wireless and Mobile Networks Computer Networking: A Top Down Approach 7 th edition Jim Kurose, Keith Ross Pearson/Addison Wesley April 2016 7-1 Background: # wireless (mobile) phone subscribers
More informationChapter 8 Security. Computer Networking: A Top Down Approach. 6 th edition Jim Kurose, Keith Ross Addison-Wesley March 2012
Chapter 8 Security A note on the use of these ppt slides: We re making these slides freely available to all (faculty, students, readers). They re in PowerPoint form so you see the animations; and can add,
More informationChapter 6 Wireless and Mobile Networks (Wireless and Mobility)
CSF645 Mobile Computing 行動計算 Chapter 6 Wireless and Mobile Networks (Wireless and Mobility) Computer Networking: A Top Down Approach 6 th edition, Jim Kurose, Keith Ross 吳俊興國立高雄大學資訊工程學系 outline 6.1 Introduction
More informationCPSC 826 Internetworking. Wireless and Mobile Networks. Wireless Networks Wireless Hosts
1 CPSC 826 Intering Wireless and Mobile Networks Michele Weigle Department of Computer Science Clemson University mweigle@cs.clemson.edu November 29, 200 Wireless and Mobile Networks Background Number
More informationCS 332 Computer Networks Security
CS 332 Computer Networks Security Professor Szajda Last Time We talked about mobility as a matter of context: How is mobility handled as you move around a room? Between rooms in the same building? As your
More informationChapter 6 Wireless and Mobile Networks
Chapter 6 Wireless and Mobile Networks A note on the use of these ppt slides: We re making these slides freely available to all (faculty, students, readers). They re in PowerPoint form so you see the animations;
More informationNo lecture on Thurs. Last homework will be out this week (not due, covers wireless) Extra office hours for next week and the week after.
Administrivia No lecture on Thurs. Last homework will be out this week (not due, covers wireless) Extra office hours for next week and the week after. 1 CSMA/CA: Recap Sensing in wireless medium is limited
More informationChapter 6 Wireless and Mobile Networks
Chapter 6 Wireless and Mobile Networks A note on the use of these ppt slides: We re making these slides freely available to all (faculty, students, readers). They re in PowerPoint form so you see the animations;
More informationInput ports, switching fabric, output ports Switching via memory, bus, crossbar Queueing, head-of-line blocking
Last time Router internals Input ports, switching fabric, output ports Switching via memory, bus, crossbar Queueing, head-of-line blocking Mobility Home, visited s Home, foreign agents Permanent, care-of
More informationLast time. BGP policy. Broadcast / multicast routing. Link virtualization. Spanning trees. Reverse path forwarding, pruning Tunneling
Last time BGP policy Broadcast / multicast routing Spanning trees Source-based, group-shared, center-based Reverse path forwarding, pruning Tunneling Link virtualization Whole networks can act as an Internet
More informationReti degli elaboratori
Reti degli elaboratori Dealing with Mobility; Bluetooth Basics Chiara Petrioli petrioli@di.uniroma1.it What is mobility? v spectrum of mobility, from the network perspective: no mobility high mobility
More informationChapter 6. Wireless and Mobile Networks. IEEE : personal area network : WiMAX: downlink, uplink scheduling
Chapter 6 Wireless and Networks Part II IEEE 802.15: personal area less than 10 m diameter replacement for cables (mouse, keyboard, headphones) ad hoc: no infrastructure master/slaves: slaves request permission
More informationCSC 8560 Computer Networks: Wireless and Mobility
CSC 8560 Computer Networks: Wireless and Mobility Professor Henry Carter Fall 2017 Chapter 7: Wireless and Mobile Networks Background: # wireless (mobile) phone subscribers now exceeds # wired phone subscribers!
More informationChapter 7. Wireless and Mobile Networks. Computer Networking: A Top Down Approach. Andrei Gurtov
Chapter 7 Wireless and Mobile Networks Andrei Gurtov All material copyright 1996-2016 J.F Kurose and K.W. Ross, All Rights Reserved Computer Networking: A Top Down Approach 7 th edition Jim Kurose, Keith
More informationWireless and Mobile Networks
Wireless and Mobile Networks Background: # wireless (mobile) phone subscribers now exceeds # wired phone subscribers (5-to-1)! # wireless Internet-connected devices equals # wireline Internet-connected
More informationWireless Security Background
Wireless Security Background Wireless Networks The need for mobile computing Laptops, PDAs, Bluetooth devices Smart phones Enabling technology Wireless communication Two important characteristics Wireless
More informationChapter 6 Wireless and Mobile Networks
Chapter 6 Wireless and Mobile Networks A note on the use of these ppt slides: We re making these slides freely available to all (faculty, students, readers). They re in PowerPoint form so you can add,
More informationLecture 15 Wireless and Mobility
Lecture 15 Wireless and Mobility From Kurose & Ross Book slightly modified by Romaric Duvignau duvignau@chalmers.se Thanks and enjoy! JFK/KWR All material copyright 1996-2016 J.F Kurose and K.W. Ross,
More informationChapter 7. Wireless and Mobile Networks. Computer Networking: A Top Down Approach
Chapter 7 Wireless and Mobile Networks A note on the use of these Powerpoint slides: We re making these slides freely available to all (faculty, students, readers). They re in PowerPoint form so you see
More informationAlready finished all layers in the stack, why a separate chapter for wireless and mobile networks?
Wireless and Mobile Networks Yanmin Zhu Department of Computer Science and Engineering Mobile lobal ISP Home Regional ISP Institutional Already finished all layers in the stack, why a separate chapter
More informationCSCI-1680 Wireless Chen Avin
CSCI-1680 Wireless Chen Avin Based on slides from Computer Networking: A Top Down Approach - 6th edition Administrivia TCP is due on Friday Final Project is out (fun, two weeks) Wireless and Mobile Networks
More informationChapter 3: Wireless and Mobile Networks
Computer Network Architectures and Multimedia Guy Leduc Chapter 3 Wireless and Mobile Networks Chapter 7 of Computer Networking: A Top Down Approach, 7 th edition. Jim Kurose, Keith Ross Addison-Wesley,
More informationChapter 7. Wireless and Mobile Networks. Computer Networking: A Top Down Approach
Chapter 7 Wireless and Mobile Networks A note on the use of these Powerpoint slides: We re making these slides freely available to all (faculty, students, readers). They re in PowerPoint form so you see
More informationChapter 6 Wireless and Mobile Networks
Chapter 6 Wireless and Mobile Networks A note on the use of these ppt slides: We re making these slides freely available to all (faculty, students, readers). They re in PowerPoint form so you can add,
More informationModule 6: Wireless Mobile Networks
Module 6: Wireless Mobile Networks SMD123 Computer Communications Kaustubh Phanse Department of Computer Science and Electrical Engineering Luleå University of Technology Lecture Objectives Wireless links
More informationTopic 2b Wireless MAC. Chapter 7. Wireless and Mobile Networks. Computer Networking: A Top Down Approach
Topic 2b Wireless MAC Chapter 7 Wireless and Mobile Networks Computer Networking: A Top Down Approach 7 th edition Jim Kurose, Keith Ross Pearson/Addison Wesley April 2016 7-1 Ch. 7: Background: # wireless
More informationChapter 7. Wireless and Mobile Networks 7-1
Chapter 7 Wireless and Mobile Networks A note on the use of these Powerpoint slides: We re making these slides freely available to all (faculty, students, readers). They re in PowerPoint form so you see
More informationChapter 5 Wireless and Mobile Networks
Chapter 5 Wireless and Mobile Networks Reference: Computer Networking: A Top Down Approach 4 th edition. Jim Kurose, Keith Ross Addison-Wesley, July 2007. Wireless and Mobile Networks Chapter 5: Wireless
More informationMohammad Hossein Manshaei 1393
Mohammad Hossein Manshaei manshaei@gmail.com 1393 Mobile IP 2 Mobile Network Layer: Problems and Concerns Entities and Terminology in Mobile IP Mobile Indirect Routing Mobile IP Agent Advertisement Registration
More informationComputer Networks 1 (Mạng Máy Tính 1) Lectured by: Dr. Phạm Trần Vũ
Computer Networks 1 (Mạng Máy Tính 1) Lectured by: Dr. Phạm Trần Vũ Chapter 6 Wireless and Mobile Networks Computer Networking: A Top Down Approach, 5 th edition. Jim Kurose, Keith Ross Addison-Wesley,
More informationComputer Communication Networks Network Security
Computer Communication Networks Network Security ICEN/ICSI 416 Fall 2016 Prof. Dola Saha 1 Network Security Goals: understand principles of network security: cryptography and its many uses beyond confidentiality
More informationChapter 6 Wireless and Mobile Networks. Chapter 6 outline. Chapter 6: Wireless and Mobile Networks. Elements of a wireless network
Chapter 6 Wireless and Mobile Networks A note on the use of these ppt slides: We re making these slides freely available to all (faculty, students, readers). They re in PowerPoint form so you can add,
More informationChapter 6 Wireless and Mobile Networks
Chapter 6 Wireless and Mobile Networks A note on the use of these ppt slides: We re making these slides freely available to all (faculty, students, readers). They re in PowerPoint form so you can add,
More informationData Communication & Networks G Session 5 - Main Theme Wireless Networks. Dr. Jean-Claude Franchitti
Data Communication & Networks G22.2262-001 Session 5 - Main Theme Wireless Networks Dr. Jean-Claude Franchitti New York University Computer Science Department Courant Institute of Mathematical Sciences
More informationChapter 6 Wireless and Mobile Networks
Chapter 6 Wireless and Mobile Networks A note on the use of these ppt slides: We re making these slides freely available to all (faculty, students, readers). They re in PowerPoint form so you can add,
More informationComputer Networks, Andrew Tannenbaum, Chapter 5.6. Computer Networking: A Top Down Approach Featuring the
Mobile IP (IPv4 and IPv6) Dr. John Keeney 3BA33 Elements of a wireless Wired infrastructure wireless hosts laptop, PDA, IP phone run applications may be stationary (nonmobile) or mobile wireless does not
More informationWireless and Mobile Networks
Chapter 6 Wireless and Mobile Networks A note on the use of these ppt slides: We re making these slides freely available to all (faculty, students, readers). They re in PowerPoint form so you can add,
More informationCSC 8560 Computer Networks: Network Security
CSC 8560 Computer Networks: Network Security Professor Henry Carter Fall 2017 Last Time We talked about mobility as a matter of context: How is mobility handled as you move around a room? Between rooms
More informationChapter 6 Wireless and Mobile Networks
Chapter 6 Wireless and Mobile Networks A note on the use of these ppt slides: We re making these slides freely available to all (faculty, students, readers). They re in PowerPoint form so you can add,
More informationMobile and Sensor Systems
Mobile and Sensor Systems Lecture 2: Mobile Medium Access Control Protocols and Wireless Systems Dr Cecilia Mascolo In this lecture We will describe medium access control protocols and wireless systems
More informationWelcome to CS 395/495 Internet Security: A Measurement-based Approach
Welcome to CS 395/495 Internet Security: A Measurement-based Approach Why Internet Security Internet attacks are increasing in frequency, severity and sophistication Denial of service (DoS) attacks Cost
More information14. Internet Security (J. Kurose)
14. Internet Security (J. Kurose) 1 Network security Foundations: what is security? cryptography authentication message integrity key distribution and certification Security in practice: application layer:
More information3/20/2012. Data Communications & Networks. Session 5 Main Theme. 2 Wireless and Mobile Networks. Dr. Jean-Claude Franchitti
Data Communications & Networks Session 5 Main Theme Wireless and Mobile Networks Dr. Jean-Claude Franchitti New York University Computer Science Department Courant Institute of Mathematical Sciences Adapted
More informationRef:
Cryptography & digital signature Dec. 2013 Ref: http://cis.poly.edu/~ross/ 2 Cryptography Overview Symmetric Key Cryptography Public Key Cryptography Message integrity and digital signatures References:
More informationChapter 6 Wireless and Mobile Networks
Chapter 6 Wireless and Mobile Networks A note on the use of these ppt slides: The notes used in this course are substantially based on powerpoint slides developed and copyrighted by J.F. Kurose and K.W.
More informationThe Network Security Model. What can an adversary do? Who might Bob and Alice be? Computer Networks 12/2/2009. CSC 257/457 - Fall
The Network Security Model Bob and lice want to communicate securely. Trudy (the adversary) has access to the channel. Kai Shen lice data channel secure sender data, control s secure receiver Bob data
More informationSECURITY IN NETWORKS
SECURITY IN NETWORKS GOALS Understand principles of network security: Cryptography and its many uses beyond con dentiality Authentication Message integrity WHAT IS NETWORK SECURITY? Con dentiality: only
More informationComputer Networks. Wireless and Mobile Networks. László Böszörményi Computer Networks Mobile - 1
Computer Networks Wireless and Mobile Networks László Böszörményi Computer Networks Mobile - 1 Background Number of wireless (mobile) phone subscribers now exceeds number of wired phone subscribers! Computer
More informationEncryption. INST 346, Section 0201 April 3, 2018
Encryption INST 346, Section 0201 April 3, 2018 Goals for Today Symmetric Key Encryption Public Key Encryption Certificate Authorities Secure Sockets Layer Simple encryption scheme substitution cipher:
More informationECS-087: Mobile Computing
ECS-087: Mobile Computing Mobile IP Most of the slides borrowed from Prof. Sridhar Iyer Diwakar Yagyasen.1 Effect of Mobility on Protocol Stack Application: new applications and adaptations Transport:
More informationSECURITY IN NETWORKS 1
SECURITY IN NETWORKS 1 GOALS Understand principles of network security: Cryptography and its many uses beyond con dentiality Authentication Message integrity 2. 1 WHAT IS NETWORK SECURITY? Con dentiality:
More informationCellular Networks and Mobility
Cellular Networks and Mobility Daniel Zappala CS 460 Computer Networking Brigham Young University Cellular Networks GSM 2G/3G Architecture 3/20 2G Standard 4/20 GSM: combined FDM/TDM divide into 200 khz
More informationCSC 4900 Computer Networks: Wireless Networks
CSC 4900 Computer Networks: Wireless Networks Professor Henry Carter Fall 2017 Last Time Mobile applications are taking off! What about current platforms is fueling this? How are an application s permission
More informationKurose & Ross, Chapters (5 th ed.)
Kurose & Ross, Chapters 8.2-8.3 (5 th ed.) Slides adapted from: J. Kurose & K. Ross \ Computer Networking: A Top Down Approach (5 th ed.) Addison-Wesley, April 2009. Copyright 1996-2010, J.F Kurose and
More informationComputer Networks 1 (Mạng Máy Tính 1) Lectured by: Dr. Phạm Trần Vũ
Computer Networks 1 (Mạng Máy Tính 1) Lectured by: Dr. Phạm Trần Vũ Chapter 8 Network Security Computer Networking: A Top Down Approach, 5 th edition. Jim Kurose, Keith Ross Addison-Wesley, April 2009.
More informationCommunication Networks: Wireless and Mobile Communication Networks. Prof. Amir Herzberg BIU, Dept. of CS
89-850 Communication Networks: Wireless and Mobile Communication Networks Prof. Amir Herzberg BIU, Dept. of CS From ch.6 of Kurose and Ross, 3 rd edition; and [KMK], ch. 8. All material copyright 1996-2004
More informationח'/סיון/תשע "א. RSA: getting ready. Public Key Cryptography. Public key cryptography. Public key encryption algorithms
Public Key Cryptography Kurose & Ross, Chapters 8.28.3 (5 th ed.) Slides adapted from: J. Kurose & K. Ross \ Computer Networking: A Top Down Approach (5 th ed.) AddisonWesley, April 2009. Copyright 19962010,
More informationWireless and Mobile Networks 7-2
Wireless and Mobile Networks EECS3214 2018-03-26 7-1 Ch. 6: Wireless and Mobile Networks Background: # wireless (mobile) phone subscribers now exceeds # wired phone subscribers (5-to-1)! # wireless Internet-connected
More informationNetwork Security. Computer Networking: A Top Down Approach Featuring the Internet, 2 nd edition. Jim Kurose, Keith Ross Addison-Wesley, July 2002.
Network Security Computer Networking: A Top Down Approach Featuring the Internet, 1. What is network security 2. Principles of cryptography 3. Authentication 4. Integrity 5. Key Distribution and certification
More informationCOMP 3331/9331: Computer Networks and Applications
COMP 3331/9331: Computer Networks and Applications Week 10 Reading Guide: Chapter 6: 6.1 6.4 1 Ch. 6: Wireless and Mobile Networks Background: v # wireless (mobile) phone subscribers now exceeds # wired
More informationWhat is mobility? Mobile IP. Mobility Impact on Protocol Stack (cont.) Advanced Topics in Computer Networks
Advanced Topics in Computer Networks What is mobility? spectrum of mobility, from the perspective: Mobile IP no mobility high mobility Chalermek Intanagonwiwat Slides courtesy of James F. Kurose, Keith
More informationWireless Networks. CSE 3461: Introduction to Computer Networking Reading: , Kurose and Ross
Wireless Networks CSE 3461: Introduction to Computer Networking Reading: 6.1 6.3, Kurose and Ross 1 Wireless Networks Background: Number of wireless (mobile) phone subscribers now exceeds number of wired
More informationComputer Networking. What is network security? Chapter 7: Network security. Symmetric key cryptography. The language of cryptography
Chapter 7: Network security 15-441 Computer Networking Network Security: Cryptography, Authentication, Integrity Foundations: what is security? cryptography authentication message integrity key distribution
More informationLast time?! Block 3: Lecture 1! Wireless networks! Ingredients 2: Antennas! Ingredients 1: Mobile Phones, PDAs & Co.! 20/05/14. Part 3: lecture 3!
20/05/14 Last time? WiFi Block 3: Lecture 1 Part 3: lecture 3 Wireless s Speed and ranges and channels Specifications DCF mechanisms WiMax Mobile s Ingredients 1: Mobile Phones, PDAs & Co. Ingredients
More informationAnnouncements: Assignment 4 due now Lab 4 due next Tuesday Assignment 5 posted, due next Thursday
ECE/CS 372 introduction to computer networks Lecture 15 Announcements: Assignment 4 due now Lab 4 due next Tuesday Assignment 5 posted, due next Thursday Credit for lecture slides to Professor Bechir Hamdaoui
More informationInternet Services & Protocols. Mobile and Wireless Networks
Department of Computer Science Institute for System Architecture, Chair for Computer Networks Internet Services & Protocols Mobile and Wireless Networks Dr.-Ing. Stephan Groß Room: INF 3099 E-Mail: stephan.gross@tu-dresden.de
More informationCS 332 Computer Networks Wireless Networks
CS 332 Computer Networks Wireless Networks Professor Szajda Chapter 6: Wireless and Mobile Networks Background: # wireless (mobile) phone subscribers now exceeds # wired phone subscribers! computer nets:
More informationInternet and Intranet Protocols and Applications
Internet and Intranet Protocols and Applications Lecture 10: Internet and Network Security April 9, 2003 Arthur Goldberg Computer Science Department New York University artg@cs.nyu.edu What is network
More informationMohammad Hossein Manshaei 1393
Mohammad Hossein Manshaei manshaei@gmail.com 1393 Wireless Links, WiFi, Cellular Internet Access, and Mobility Slides derived from those available on the Web site of the book Computer Networking, by Kurose
More informationChapter 8 Security. Computer Networking: A Top Down Approach. 6 th edition Jim Kurose, Keith Ross Addison-Wesley March 2012
Chapter 8 Security A note on the use of these ppt slides: We re making these slides freely available to all (faculty, students, readers). They re in PowerPoint form so you see the animations; and can add,
More informationWireless and Mobile Networks Reading: Sections 2.8 and 4.2.5
Wireless and Mobile Networks Reading: Sections 2.8 and 4.2.5 Acknowledgments: Lecture slides are from Computer networks course thought by Jennifer Rexford at Princeton University. When slides are obtained
More informationExtending or Interconnecting LANS. Physical LAN segment. Virtual LAN. Forwarding Algorithm 11/9/15. segments. VLAN2, Port3. VLAN1, Port1.
Physical LAN segment q Hosts connected on the same physical LAN segment q Same subnet; L2 forwarding q ARP (IPè MAC) L2 frame (S, D), send q Scale? Extending or Interconnecting LANS q q q Why not just
More informationChapter 4 roadmap. CS555, Spring /14/2005. WMU-CS, Dr. Gupta 1. Multicast Routing: Problem Statement. Approaches for building mcast trees
Chapter 4 roadmap 4. Introduction and Network Service Models 4.2 VC and Datagram Networks 4.3 What s Inside a Router 4.4 The Internet (IP) Protocol 4.5 Routing Algorithms 4.6 Routing in the Internet 4.7
More information6.9 Summary. 11/20/2013 Wireless and Mobile Networks (SSL) 6-1. Characteristics of selected wireless link standards a, g point-to-point
Chapter 6 outline 6.1 Introduction Wireless 6.2 Wireless links, characteristics CDMA 6.3 IEEE 802.11 wireless LANs ( wi-fi ) 6.4 Cellular Internet Access architecture standards (e.g., GSM) Mobility 6.5
More informationChapter 8. Computer Networking: A Top Down Approach Featuring the Internet, 3 rd edition. Jim Kurose, Keith Ross Addison-Wesley, July 2004.
Chapter 8 Network Security A note on the use of these ppt slides: We re making these slides freely available to all (faculty, students, readers). They re in PowerPoint form so you can add, modify, and
More informationLecture 30. Cryptography. Symmetric Key Cryptography. Key Exchange. Advanced Encryption Standard (AES) DES. Security April 11, 2005
Lecture 30 Security April 11, 2005 Cryptography K A ciphertext Figure 7.3 goes here K B symmetric-key crypto: sender, receiver keys identical public-key crypto: encrypt key public, decrypt key secret Symmetric
More informationFixed Internetworking Protocols and Networks. IP mobility. Rune Hylsberg Jacobsen Aarhus School of Engineering
Fixed Internetworking Protocols and Networks IP mobility Rune Hylsberg Jacobsen Aarhus School of Engineering rhj@iha.dk 1 2011 ITIFN Mobile computing Vision Seamless, ubiquitous network access for mobile
More informationMedium Access Control
Medium Access Control All material copyright 1996-2009 J.F Kurose and K.W. Ross, All Rights Reserved 5: DataLink Layer 5-1 Link Layer Introduction and services Multiple access protocols Ethernet Wireless
More information2001, Cisco Systems, Inc. All rights reserved. Copyright 2001, Cisco Systems, Inc. All rights reserved. Printed in USA. Presentation_ID.
3001_05_2001_c1 2001, Cisco Systems, Inc. All rights reserved. 1 Introduction to IP Mobility Session 3001_05_2001_c1 2001, Cisco Systems, Inc. All rights reserved. 3 Agenda IP Mobility Overview Terminology
More informationMobile IP Overview. Based on IP so any media that can support IP can also support Mobile IP
Introduction: Mobile IP Overview An Internet Protocol address (IP address) is a numerical label assigned to each device (e.g., computer, printer) participating in a computer network that uses the Internet
More informationChapter 8 Security. Computer Networking: A Top Down Approach. Andrei Gurtov. 7 th edition Jim Kurose, Keith Ross Pearson/Addison Wesley April 2016
Chapter 8 Andrei Gurtov All material copyright 1996-2016 J.F Kurose and K.W. Ross, All Rights Reserved Computer Networking: A Top Down Approach 7 th edition Jim Kurose, Keith Ross Pearson/Addison Wesley
More informationWireless Networks. CSE 3461: Introduction to Computer Networking Reading: , Kurose and Ross ( 6th ed.); , Kurose and Ross (7th ed.
Wireless Networks CSE 3461: Introduction to Computer Networking Reading: 6.1 6.3, Kurose and Ross ( 6th ed.); 7.1 7.3, Kurose and Ross (7th ed.) 1 Questions How do you use wireless network technology in
More informationCOMP 3331/9331: Computer Networks and Applications
COMP 3331/9331: Computer Networks and Applications Week 10 Wireless Networks Reading Guide: Chapter 6: 6.1 6.3 Wireless Networks + Security 1 Wireless and Mobile Networks Background: # wireless (mobile)
More informationChapter 6 Wireless and Mobile Networks
Chapter 6 Wireless and Mobile Networks Computer Networking: A Top Down Approach Featuring the Internet, 3 rd edition. Jim Kurose, Keith Ross Addison-Wesley, July 2004. 6: Wireless and Mobile Networks 6
More informationSecurity issues: Encryption algorithms. Threats Methods of attack. Secret-key Public-key Hybrid protocols. CS550: Distributed OS.
Security issues: Threats Methods of attack Encryption algorithms Secret-key Public-key Hybrid protocols Lecture 15 Page 2 1965-75 1975-89 1990-99 Current Platforms Multi-user timesharing computers Distributed
More informationLECTURE 8. Mobile IP
1 LECTURE 8 Mobile IP What is Mobile IP? The Internet protocol as it exists does not support mobility Mobile IP tries to address this issue by creating an anchor for a mobile host that takes care of packet
More informationWireless and WiFi. Daniel Zappala. CS 460 Computer Networking Brigham Young University
Wireless and WiFi Daniel Zappala CS 460 Computer Networking Brigham Young University Wireless Networks 2/28 mobile phone subscribers now outnumber wired phone subscribers similar trend likely with Internet
More informationSecurity in Distributed Systems. Network Security
Security in Distributed Systems Introduction Cryptography Authentication Key exchange Readings: Tannenbaum, chapter 8 Ross/Kurose, Ch 7 (available online) Computer Science Lecture 22, page 1 Network Security
More informationGPRS and UMTS T
GPRS and UMTS T-110.2100 Global Packet Radio Service GPRS uses the time slots not used for circuit switched services Data rate depends on the availability of free time slots GPRS uses the multislot technique,
More informationCS118 Discussion 1A, Week 9. Zengwen Yuan Dodd Hall 78, Friday 10:00 11:50 a.m.
CS118 Discussion 1A, Week 9 Zengwen Yuan Dodd Hall 78, Friday 10:00 11:50 a.m. 1 Outline Wireless: 802.11 Mobile IP Cellular Networks: LTE Sample final 2 Wireless and Mobile Network Wireless access: WIFI
More informationSJTU 2018 Fall Computer Networking. Wireless Communication
SJTU 2018 Fall Computer Networking 1 Wireless Communication Internet Protocol Stack 2 Application: supporting network applications - FTP, SMTP, HTTP Transport: data transfer between processes - TCP, UDP
More informationFirst Semester Examinations 2013/14 (Model Solution) INTERNET PRINCIPLES
PAPER CODE NO. EXAMINER : Martin Gairing COMP211 DEPARTMENT : Computer Science Tel. No. 0151 795 4264 First Semester Examinations 2013/14 (Model Solution) INTERNET PRINCIPLES TIME ALLOWED : Two Hours INSTRUCTIONS
More informationWireless Network and Mobility
Wireless Network and Mobility Dept. of Computer Science, University of Rochester 2008-11-17 CSC 257/457 - Fall 2008 1 Wireless Networks and Mobility Wireless networking in the data link layer Short range:
More informationCSC 4900 Computer Networks: Security Protocols (2)
CSC 4900 Computer Networks: Security Protocols (2) Professor Henry Carter Fall 2017 Chapter 8 roadmap 8.1 What is network security? 8.2 Principles of cryptography 8.3 Message Integrity 8.4 End point Authentication
More informationPublic Key Algorithms
Public Key Algorithms 1 Public Key Algorithms It is necessary to know some number theory to really understand how and why public key algorithms work Most of the public key algorithms are based on modular
More informationEEC-682/782 Computer Networks I
EEC-682/782 Computer Networks I Lecture 24 Wenbing Zhao wenbingz@gmail.com http://academic.csuohio.edu/zhao_w/teaching/eec682.htm (Lecture nodes are based on materials supplied by Dr. Louise Moser at UCSB
More informationManaging and Securing Computer Networks. Guy Leduc. Chapter 7: Securing LANs. Chapter goals: security in practice: Security in the data link layer
Managing and Securing Computer Networks Guy Leduc Chapter 7: Securing LANs Computer Networking: A Top Down Approach, 7 th edition. Jim Kurose, Keith Ross Addison-Wesley, April 2016. (section 8.8) Also
More information