Embedding Identity in Mobile Environments

Size: px
Start display at page:

Download "Embedding Identity in Mobile Environments"

Transcription

1 Mobiarch Kyoto, August 27 th, 2007 Embedding Identity in Mobile Environments Alfredo Matos Susana Sargento Rui L. Aguiar <alfredo.matos@av.it.pt> <ssargento@det.ua.pt> <ruilaa@ua.pt> 2005, it - instituto de telecomunicações. Todos os direitos reservados.

2 Overview Motivation Architecture Identity Referral and Bindings Terminal and Network Support Detailed Operations Bootstrap and Handover Identity Based Mobility Privacy and Multiple Identities Benefits and Drawbacks Conclusion and Future Work 2 Mobiarch 07 - Kyoto

3 Motivation Next Generation Networks Complexity Multiple protocols and services Mobility Security talks of User-Centric Architectures But lack of user oriented approaches Identity has been. a second class citizen (up until now) but taking strong steroids by web 2.0 and thus facing growth problems (passwords, identity theft, etc.) THIS IS NOT ENOUGH 3 Mobiarch 07 - Kyoto

4 NGN Identity-biased Architecture Several Administrative domains Different Access Technologies WiFi, UMTS, DVB Mobility A4C MIPv6, HIP, SIP Bandwith Broker Restricted and controlled environments Bandwidth Brokers Restricted QoS environments Identity Managers Access Wimax Operator power and user driven identity Services File Server A4C Server Core Administrative Domain A Access UMTS Identity Manager Multimedia Server Service Pool VoIP Server IPv6 Networks ( Internet ) Access WiFi SIP Proxy Mobility Anchor Access DVB Location Server Multiple user oriented services: VoIP, Location, Multimedia, File, Mail... Application Server Core Administrative Domain B Access Wimax Access WiFi 4 Mobiarch 07 - Kyoto

5 Identity Referral the Glue Identity Manager Identity Information User oriented policies Identity Namespace Identity Manager and different protocols Bringing Identity to the network level Implicit identity referral Compatibility ID-Pointer 64 bit public Identifier Realm Index Realm the Identity Manager Domain Index information index on the Identity Manager Database Easily resolvable 5 Mobiarch 07 - Kyoto

6 Identity Bindings (I) Implicit Embedded ID-Pointer Explicit Identifier mapping to an ID-Pointer on a database Network Bindings Link Layer MN_ID or PANA ID Network Layer ID-Pointer in the IP Address MIPv6 CoA Transport Layer ID-Pointer in the MIPv6 HoA Application Layer URI mapped to ID-Pointer Network Prefix ID-Pointer 6 Mobiarch 07 - Kyoto

7 ID-Pointer ID-Pointer ID-Pointer ID-Pointer ID-Pointer Identity Bindings (II) Home Address/ID-Pointer URL ID-Pointer URL Home Address Care-of Address MN_ID Mobile Node Point of Access Access Home Agent SIP Proxy Service Network Control Plane A4C Identity Manager Bandwidth Broker 7 Mobiarch 07 - Kyoto

8 Networks: Support Identity Oriented Network Distributed Database Distributed Information Common access methods ID-Pointer Common storage index ID-Pointer Distributed User View Sum of all distributed information bits Reachable with an ID-Pointer and the right permission Strong access control 8 Mobiarch 07 - Kyoto

9 Terminals: Support and features Control Plane New Identity Management Layer Identity is a control plane task Identity aware applications Legacy interfaces Data Plane Preserved Aware Applications Identity Management System Application Layer Transport Layer Legacy Applications Legacy Interface Mobility New paradigm for control Identity Layer Point of decision Intelligence Mobility Protocols Signaling Common Mobility Interface Triggers APIs Identity Layer Common Mobility Interface MIPv6 HIP SIP Mobility Layer Network Layer Link Layer 9 Mobiarch 07 - Kyoto

10 Example: Bootstrap Mobile Node L2 Association Access PANA Authentication (ID-Pointer) PANA Answer (HoA) A4C EAP Authentication (ID-Pointer) EAP Authentication (HoA) Bandwith Broker Verifiy Identity (ID-Pointer) Identity Manager Configure HoA (ID-Pointer) Home Agent HoA Config (ID-Pointer) SLAAC CoA (ID-Pointer) NSIS Flow Setup (Flow) Binding Update QoS Authorization (ID-Pointer, Flow) NSIS Flow Setup (Flow) 10 Mobiarch 07 - Kyoto

11 Example: Handover Mobile Node Old Access New Access A4C Bandwidth Broker Identity Manager Home Agent Handover Negotiation Handover Decision (ID-Pointer) Reserve Resources (ID-Pointer) Context (ID-Pointer) L2 Association PANA Authentication (ID-Pointer) EAP Authentication (ID-Pointer) Verifiy Identity (ID-Pointer) EAP Authentication (HoA) PANA Authentication (HoA) SLAAC CoA (ID-Pointer) Handover Complete (ID-Pointer) Release Resources (ID-Pointer) Binding Update 11 Mobiarch 07 - Kyoto

12 Results in: Identity Based Mobility Consistent Approach across the network Addresses change ID-Pointer does not change Update ONLY mobility tables not everything else: triggers and referrals are consistent. Modularized mobility Control is in the identity layer Identifiers are embedded in the protocols and remain constant Pick your own protocol New paradigms Addresses don t move, Entities do. Can be decoupled from the terminal Mobility between terminals Multiple identities or users in the same terminal 12 Mobiarch 07 - Kyoto

13 IdBM Privacy and Multiple Identities Identifiers raise privacy issues Identity related information in addressing structures Resolvable pointers Passive listeners can reach identity information Strong security is required Authentication for requesters Non-public user information only allowed after the authentication Multi-tier access control Cross Layer Identifiers raise linkability issues More actions under the same identifiers Higher probability of correlation More security required Per layer encryption hides upper layer identifiers 13 Mobiarch 07 - Kyoto

14 Benefits Cross-layer and cross-protocol integration Distributed database model with consistent indexes Not bound by specific protocol Identifiers Distributed meta-system Different addresses, same Identity Simplification of network processes Simpler user profiles Identity is not the profile Different information exists in different places under the same identity Abstraction Layer enables access Larger information set Same access means User-centric paradigms Better APIs Abstraction layer User-centric software Legacy support 14 Mobiarch 07 - Kyoto

15 Drawbacks Mandatory Identity Resolution Resolution of the ID-Pointer at each network element ID-Pointer to ID-Manager Reverse DNS, Distributed Hash Tables Minimized by caching Optimized through deduction (e.g. if the A4C receives a preconfigured HoA it can safely infer the Realm by looking at the address). Longer setup phases are unavoidable But mobility can be as fast as before Strong Security is a requirement not an option If you believe in free networks, you have here a challenge Per requester Access Control Multi-tier access control 15 Mobiarch 07 - Kyoto

16 Conclusions Identity in the communication stack Both as a 6th (presentation) layer AND a vertical control layer Greatly simplified network processes Technology and protocol independent mobility Re-focus around the identity of the customer in all its actions Open path to a decoupling of mobility management (user, device, session) from underlying technologies, smoothing network evolution and driving optimization aspects at all levels of the OSI stack. Necessary infrastructure enabling a distributed linkable database (somewhat implicit already in management systems) Modifications to resolution systems (to transverse these databases) and on the protocol stack on the equipments 16 Mobiarch 07 - Kyoto

17 Future (hum, hum on-going) Work Mapping of this architecture in specific protocol instances Including evolution path from current 3G networks Performance and scalability analysis Further study on mobility control common layer Technology independence Easier migration paths from current technologies and protocols Implementation Mobility-aware and Identity-aware services. Cross-protocol identifiers and privacy 17 Mobiarch 07 - Kyoto

18 Thank You. Questions? 18 Mobiarch 07 - Kyoto

Heterogeneous Signaling Framework for End-to-end QoS support in Next Generation networks

Heterogeneous Signaling Framework for End-to-end QoS support in Next Generation networks Heterogeneous Signaling Framework for End-to-end QoS support in Next Generation networks Rui Prior 1, Susana Sargento 2, Diogo Gomes 2, Rui L. Aguiar 2 1 DCC & LIAAC, Faculdade de Ciências da Universidade

More information

IP Mobility Support for QoS over Heterogeneous Networks

IP Mobility Support for QoS over Heterogeneous Networks IP Mobility Support for QoS over Heterogeneous Networks Eun Kyoung PAIK Feb. 7-9, 2007 Future Technology Lab. KT Contents Introduction Network Topology Perspective Multihoming Network Layer Perspective

More information

Mobility in IPv6 (MIPv6)

Mobility in IPv6 (MIPv6) Irish IPv6 Task Force Mobility in IPv6 (MIPv6) Irish IPv6 Task Force IPv6 Training Slide-sets 1. The Bigger Picture: Why is IPv6 so Important? 2. IPv6 Deployment & Strategy (technical) 3. Introduction

More information

The Y-Comm Framework. A new way

The Y-Comm Framework. A new way The Y-Comm Framework A new way Mobility within Domains Mobile IP is good for moving between large defined domains But we also have to consider mobility issues within a domain which may have a number of

More information

Mobile Communications

Mobile Communications DSMIPv6, 802.21 1 Mobile Communications IEEE and 3GPP Approaches to Macro-Mobility Manuel P. Ricardo Faculdade de Engenharia da Universidade do Porto How does the Dual Stack MIPv6 work? DSMIPv6, 802.21

More information

Why do we really want an ID/locator split anyway?

Why do we really want an ID/locator split anyway? Why do we really want an ID/locator split anyway? Dave Thaler dthaler@microsoft.com MobiArch 2008 1 Starting from basics Users deal with names, not addresses (esp. in IPv6) Humans need friendly identifiers

More information

Internet Engineering Task Force (IETF) Request for Comments: 6572 Category: Standards Track

Internet Engineering Task Force (IETF) Request for Comments: 6572 Category: Standards Track Internet Engineering Task Force (IETF) Request for Comments: 6572 Category: Standards Track ISSN: 2070-1721 F. Xia B. Sarikaya Huawei USA J. Korhonen, Ed. Nokia Siemens Networks S. Gundavelli Cisco D.

More information

VoIP Core Technologies. Aarti Iyengar Apricot 2004

VoIP Core Technologies. Aarti Iyengar Apricot 2004 VoIP Core Technologies Aarti Iyengar Apricot 2004 Copyright 2004 Table Of Contents What is Internet Telephony or Voice over IP? VoIP Network Paradigms Key VoIP Protocols Call Control and Signaling protocols

More information

Advanced Computer Networks. IP Mobility

Advanced Computer Networks. IP Mobility Advanced Computer Networks 263 3501 00 IP Mobility Patrick Stuedi Spring Semester 2014 1 Oriana Riva, Department of Computer Science ETH Zürich Tuesday 1 April 2014 Outline Last week: Today: Cellular Networks

More information

Applicability of IETF Mobility Solutions to the 3GPP All IP Network

Applicability of IETF Mobility Solutions to the 3GPP All IP Network Applicability of IETF Mobility Solutions to the 3GPP All IP Patrick Stupar, Krishna Pandit, and Wolfgang Granzow Qualcomm CDMA Technologies GmbH Outline Motivation All-IP paradigm in 3GPP LTE network Survey

More information

T Computer Networks II. Mobility Issues Contents. Mobility. Mobility. Classifying Mobility Protocols. Routing vs.

T Computer Networks II. Mobility Issues Contents. Mobility. Mobility. Classifying Mobility Protocols. Routing vs. T-0.50 Computer Networks II Mobility Issues 6.0.008 Overview Mobile IP NEMO Transport layer solutions i SIP mobility Contents Prof. Sasu Tarkoma Mobility What happens when network endpoints start to move?

More information

Fast Handover in Mobile IPv4 and IPv6

Fast Handover in Mobile IPv4 and IPv6 Fast Handover in Mobile IPv4 and IPv6 Raoul Schmidiger & Gregor Zographos April 28, 2005 Seminar: Mobile Systems Talk No.4 Content IPv4 (Gregor) IPv6 (Raoul) Problems in IP mobility (Gregor) Standards

More information

On Host Identity Protocol

On Host Identity Protocol On Host Identity Protocol Miika Komu Data Communications Software Group Dep. of Computer Science and Engineering School of Science Aalto University 17.10.2011 Table of Contents Introduction

More information

Mobile SCTP for IP Mobility Support in All-IP Networks

Mobile SCTP for IP Mobility Support in All-IP Networks Mobile SCTP for IP Mobility Support in All-IP Networks Seok Joo Koh sjkoh@cs.knu.ac.kr Abstract The Stream Control Transmission Protocol (SCTP) is a new transport protocol that is featured multi-streaming

More information

Mobile IP QoS Using Flow in BcN. Contents

Mobile IP QoS Using Flow in BcN. Contents Mobile IP Using Flow in BcN 2007. 2. 8 MC CTO 최준환 Cjw8724@mobilecvg.com Contents 1 Mobile IP Requirements 2 xgmip 3 Mobile solution 2 Conclusion 1/ 전체페이지번호 1 Mobile IP Requirements 2 xgmip 3 Mobile solution

More information

An Open Grid Services Architecture for Mobile Network Operators

An Open Grid Services Architecture for Mobile Network Operators ICT 2006 Funchal, 12 May 2006 An Open Grid Services Architecture for Mobile Network Operators Antonios Litke, Rui L. Aguiar, Sotirios Chatzis, Nuno Inacio, Dimitrios Halkos, Kleopatra Konstanteli and Theodora

More information

Distributed Mobility Management: Current Practices and Gap Analysis

Distributed Mobility Management: Current Practices and Gap Analysis Distributed Mobility Management: Current Practices and Gap Analysis draft-ietf-dmm-best-practices-gap-analysis-02 Juan Carlos Zuniga (Editor) Presenting Dapeng Liu (Editor) CJ. Bernardos Pierrick Seite

More information

CS 268: Computer Networking

CS 268: Computer Networking CS 268: Computer Networking L-18 Naming Overview i3 Layered naming DOA SFR 2 Multicast S 1 S 2 R RP R R R R RP: Rendezvous Point C 1 C 2 3 Mobility Sender HA FA Home Network Network 5 5.0.0.1 12.0.0.4

More information

Current Challenges on SDN Research

Current Challenges on SDN Research Software Defined Networks ISCTE, April 04 2018 Current Challenges on SDN Research Rui L. Aguiar ruilaa@ua.pt Universidade de Aveiro Instituto de Telecomunicações 2005, it - instituto de telecomunicações.

More information

3GPP TS V8.4.0 ( )

3GPP TS V8.4.0 ( ) TS 23.327 V8.4.0 (2009-09) Technical Specification 3rd Generation Partnership Project; Technical Specification Group Services and System Aspects; Mobility between -Wireless Local Area Network (WLAN) interworking

More information

IEEE Assisted Network Layer Mobility Support

IEEE Assisted Network Layer Mobility Support IEEE802.21 Assisted Network Layer Mobility Support Qazi Bouland Mussabbir *, Wenbing Yao ** and John Cosmas *** *School Of Engineering and Design, Brunel University Uxbridge, London, UB83PH, UK, qazi.mussabbir@brunel.ac.uk

More information

WiMAX Overview. Parviz Yegani Cisco Systems IETF-64 Nov. 7-11, 2005 Vancouver, Canada. Session Number Presentation_ID

WiMAX Overview. Parviz Yegani Cisco Systems IETF-64 Nov. 7-11, 2005 Vancouver, Canada. Session Number Presentation_ID WiMAX Overview Parviz Yegani Cisco Systems pyegani@cisco.com IETF-64 Nov. 7-11, 2005 Vancouver, Canada Session Number 1 Outline WiMAX NWG Goals Network Reference Model Reference Points and Interfaces NWG

More information

General requirements for ID/locator separation in NGN

General requirements for ID/locator separation in NGN Draft Recommendation ITU-T Y.2015 (Y.ipsplit) General requirements for ID/locator separation in NGN Summary This Recommendation begins with showing the limitations of the conventional IP architecture,

More information

IEEE C /26. IEEE Working Group on Mobile Broadband Wireless Access <http://grouper.ieee.org/groups/802/20/>

IEEE C /26. IEEE Working Group on Mobile Broadband Wireless Access <http://grouper.ieee.org/groups/802/20/> 2003-03-09 IEEE C802.20-03/26 Project Title Date Submitted IEEE 802.20 Working Group on Mobile Broadband Wireless Access Architectural Attributes of an IP-based

More information

SJTU 2018 Fall Computer Networking. Wireless Communication

SJTU 2018 Fall Computer Networking. Wireless Communication SJTU 2018 Fall Computer Networking 1 Wireless Communication Internet Protocol Stack 2 Application: supporting network applications - FTP, SMTP, HTTP Transport: data transfer between processes - TCP, UDP

More information

OPTIMIZING MOBILITY MANAGEMENT IN FUTURE IPv6 MOBILE NETWORKS

OPTIMIZING MOBILITY MANAGEMENT IN FUTURE IPv6 MOBILE NETWORKS OPTIMIZING MOBILITY MANAGEMENT IN FUTURE IPv6 MOBILE NETWORKS Sandro Grech Nokia Networks (Networks Systems Research) Supervisor: Prof. Raimo Kantola 1 SANDRO GRECH - OPTIMIZING MOBILITY MANAGEMENT IN

More information

Mobile IPv6. Washington University in St. Louis

Mobile IPv6. Washington University in St. Louis Mobile IPv6 Raj Jain Professor of Computer Science and Engineering Washington University in Saint Louis Saint Louis, MO 63130 Audio/Video recordings of this lecture are available at: http://www.cse.wustl.edu/~jain/cse574-08/

More information

Location Privacy Extensions for the Host Identity Protocol

Location Privacy Extensions for the Host Identity Protocol 978 REVISTA DO DETUA, VOL. 4,N 8, JUNHO 2007 Location Privacy Extensions for the Host Identity Protocol Alfredo Matos, Justino Santos, João Girão, Marco Liebsch, Rui Aguiar NEC Europe Ltd, Network Laboratories

More information

Mobility in IPv6 Standards and Upcoming Trends. Thomas C. Schmidt HAW Hamburg & link-lab

Mobility in IPv6 Standards and Upcoming Trends. Thomas C. Schmidt HAW Hamburg & link-lab Mobility in IPv6 Standards and Upcoming Trends Thomas C. Schmidt t.schmidt@ieee.org HAW Hamburg & link-lab Agenda Motivation Mobility Paradigm & Target Applications Key Issues & Approaches Limits of MIPv4

More information

2011 Elsevier B.V. Institutional Repository

2011 Elsevier B.V. Institutional Repository Institutional Repository This document is published in: Computer Networks 55 (2011) 7, pp. 1474-1486 DOI: 10.1016/j.comnet.2011.01.011 2011 Elsevier B.V. TRIM: An architecture for transparent IMS-based

More information

IEEE C /08

IEEE C /08 2003-01-10 IEEE C802.20-03/08 Project Title IEEE 802.20 Working Group on Mobile Broadband Wireless Access A Vision of an IP-based Cellular Network Date Submitted

More information

Technical White Paper for NAT Traversal

Technical White Paper for NAT Traversal V300R002 Technical White Paper for NAT Traversal Issue 01 Date 2016-01-15 HUAWEI TECHNOLOGIES CO., LTD. 2016. All rights reserved. No part of this document may be reproduced or transmitted in any form

More information

Network Based Seamless Mobility In Networks Of Future. M.Sc. Ahmet Cihat Toker

Network Based Seamless Mobility In Networks Of Future. M.Sc. Ahmet Cihat Toker Network Based Seamless Mobility In Networks Of Future M.Sc. Ahmet Cihat Toker ahmet-cihat.toker@dai-labor.de Networks Of Today Before we go on with how the networks will look like in the future, let s

More information

Framework of Vertical Multi-homing in IPv6-based NGN

Framework of Vertical Multi-homing in IPv6-based NGN ITU-T Recommendation Y.ipv6-vmh Framework of Vertical Multi-homing in IPv6-based NGN Summary This Recommendation describes a framework of vertical multi-homing in IPv6-based NGN. This Recommendation identifies

More information

nsctp: A New Transport Layer Tunnelling Approach to Provide Seamless Handover for Moving Network

nsctp: A New Transport Layer Tunnelling Approach to Provide Seamless Handover for Moving Network nsctp: A New Transport Layer Tunnelling Approach to Provide Seamless Handover for Moving Network Peyman Behbahani City University, London, UK p.behbahani@city.ac.uk Veselin Rakocevic City University, London,

More information

Authors: Carlos J. Bernardos, Santiago Zapata, Francisco J. Galera and Ignacio Soto.

Authors: Carlos J. Bernardos, Santiago Zapata, Francisco J. Galera and Ignacio Soto. Mo: Mobile Access Router. Providing Security and Localised Mobility support for Mobile Networks Workshop on Reasearch and Deployment Possibilities based on MIPv6 http://www.ist-daidalos.org Authors: Carlos

More information

Host Identity Protocol. Miika Komu Helsinki Institute for Information Technology

Host Identity Protocol. Miika Komu Helsinki Institute for Information Technology Host Identity Protocol Miika Komu Helsinki Institute for Information Technology 16.11.2009 Table of Contents Introduction Naming and Layering Control Plane Data Plane Introduction Motivation

More information

Configuring Multi-Tenants on SIP Trunks

Configuring Multi-Tenants on SIP Trunks The feature allows specific global configurations for multiple tenants on SIP trunks that allow differentiated services for tenants. allows each tenant to have their own individual configurations. The

More information

Vertical Handover Support for Multimode Mobile Terminal using Multi- Homed MIPv4

Vertical Handover Support for Multimode Mobile Terminal using Multi- Homed MIPv4 Vertical Handover Support for Multimode Mobile Terminal using Multi- Homed MIPv4 Tansir Ahmed, Kyandoghere Kyamakya *, Markus Ludwig, Kalenga Wa Ngoy Cyrille **, and Kalombo Masimango Monique S. BenQ Mobile,

More information

NETWORKING 3.0. Network Only Provably Cryptographically Identifiable Devices INSTANT OVERLAY NETWORKING. Remarkably Simple

NETWORKING 3.0. Network Only Provably Cryptographically Identifiable Devices INSTANT OVERLAY NETWORKING. Remarkably Simple NETWORKING 3.0 Network Only Provably Cryptographically Identifiable Devices INSTANT OVERLAY NETWORKING Highly Available Remarkably Simple Radically Secure IP complexity is holding your business back As

More information

OO Based Development of a Multi Media Application Server Prototype

OO Based Development of a Multi Media Application Server Prototype OO Based Development of a Multi Media Application Prototype E. GUL, G. WILLEKENS(team leader), F.HOSTE, T. BATSELE, R. SELDERSLAGHS, N. QUARTIER Alcatel Bell (A7) Francis Wellesplein 1 2018 Antwerpen,

More information

Integrating User Identity Management Systems with the Host Identity Protocol

Integrating User Identity Management Systems with the Host Identity Protocol Integrating User Identity Management Systems with the Host Identity Protocol Marc Barisch Institute of Communication Networks and Computer Engineering Universität Stuttgart marc.barisch@ikr.uni-stuttgart.de

More information

Network Layer (1) Networked Systems 3 Lecture 8

Network Layer (1) Networked Systems 3 Lecture 8 Network Layer (1) Networked Systems 3 Lecture 8 Role of the Network Layer Application Application The network layer is the first end-to-end layer in the OSI reference model Presentation Session Transport

More information

Mohammad Hossein Manshaei 1393

Mohammad Hossein Manshaei 1393 Mohammad Hossein Manshaei manshaei@gmail.com 1393 Mobile IP 2 Mobile Network Layer: Problems and Concerns Entities and Terminology in Mobile IP Mobile Indirect Routing Mobile IP Agent Advertisement Registration

More information

Step 1: Checking Computer Network Settings:

Step 1: Checking Computer Network Settings: Configuring your 3G18WV for VOIP The following steps will take you through the process of setting up your VOIP connection. Step 1: Checking Computer Network Settings: You will need to connect your computer

More information

T Yritysturvallisuuden seminaari

T Yritysturvallisuuden seminaari T-110.5690 Yritysturvallisuuden seminaari Chapter 10: Conceptual Security Architecture Lauri Helkkula 22.10.2007 Sources Chapter 10 of the book Sherwood, Clark, Lynas: Enterprise Security Architecture,

More information

Proxy Mobile IPv6 (PMIPv6)

Proxy Mobile IPv6 (PMIPv6) Proxy Mobile IPv6 (PMIPv6) Youn-Hee Han yhhan@kut.ac.kr Korea University of Technology and Education Internet Computing Laboratory http://icl.kut.ac.kr Outline Background PMIPv6 (Proxy Mobile IPv6) Overview

More information

Cisco Expressway Options with Cisco Meeting Server and/or Microsoft Infrastructure

Cisco Expressway Options with Cisco Meeting Server and/or Microsoft Infrastructure Cisco Expressway Options with Cisco Meeting Server and/or Microsoft Infrastructure Deployment Guide First Published: December 2016 Last Updated: October 2017 Expressway X8.9.2 Cisco Systems, Inc. www.cisco.com

More information

Mobile QoS provisioning by Flow Control Management in Proxy Mobile IPv6

Mobile QoS provisioning by Flow Control Management in Proxy Mobile IPv6 Mobile QoS provisioning by Flow Control Management in Proxy Mobile IPv6 Taihyong Yim, Tri M. Nguyen, Youngjun Kim and Jinwoo Park School of Electrical Engineering Korea University Seoul, Rep. of Korea

More information

Mobile Communications Chapter 8: Network Protocols/Mobile IP

Mobile Communications Chapter 8: Network Protocols/Mobile IP Mobile Communications Chapter 8: Network Protocols/Mobile IP Motivation Data transfer, Encapsulation Security, IPv6, Problems Micro mobility support DHCP Ad-hoc networks, Routing protocols Prof. Jó Ueyama

More information

NEWSKY Project. SAI Subcommittee Meeting, August 2008, Vienna

NEWSKY Project. SAI Subcommittee Meeting, August 2008, Vienna NEWSKY Project Mobile aeronautical communication network Based on Internet technologies For cockpit and cabin services Integrating satellite and terrestrial data links SAI Subcommittee Meeting, August

More information

Host Identity Protocol (HIP):

Host Identity Protocol (HIP): Host Identity Protocol (HIP): Towards the Secure Mobile Internet Andrei Gurtov Helsinki Institute for Information Technology (HUT), Finland A John Wiley & Sons, Ltd, Publication Contents About the Author

More information

Cross-over Mobility Anchor Point based Hierarchical Mobility Management Protocol for Mobile IPv6 Network

Cross-over Mobility Anchor Point based Hierarchical Mobility Management Protocol for Mobile IPv6 Network Cross-over Mobility Anchor Point based Hierarchical Mobility Management Protocol for Mobile IPv6 Network A.K.M. Mahtab Hossain & Kanchana Kanchanasut Internet Education and Research Laboratory Asian Institute

More information

Host Identity Protocol (HIP): Connectivity, Mobility, Multi-Homing, Security, and Privacy over IPv4 and IPv6

Host Identity Protocol (HIP): Connectivity, Mobility, Multi-Homing, Security, and Privacy over IPv4 and IPv6 Host Identity Protocol (HIP): Connectivity, Mobility, Multi-Homing, Security, and Privacy over IPv4 and IPv6 by Pekka Nikander, Andrei Gurtov, and Thomas R. Henderson Johannes Bachhuber Jacobs University

More information

Rolling the Root KSK. Geoff Huston. APNIC Labs. September 2017

Rolling the Root KSK. Geoff Huston. APNIC Labs. September 2017 Rolling the Root KSK Geoff Huston APNIC Labs September 2017 Will this break the Internet? Why? If we stuff up this trust anchor key roll then resolvers that perform DNSSEC validation will fail to provide

More information

Overlay and P2P Networks. Introduction and unstructured networks. Prof. Sasu Tarkoma

Overlay and P2P Networks. Introduction and unstructured networks. Prof. Sasu Tarkoma Overlay and P2P Networks Introduction and unstructured networks Prof. Sasu Tarkoma 14.1.2013 Contents Overlay networks and intro to networking Unstructured networks Overlay Networks An overlay network

More information

Contents. Mobile Middleware Course. Introduction and Overview Sasu Tarkoma. Lecture Outline. Course Book. Mobile Evolution.

Contents. Mobile Middleware Course. Introduction and Overview Sasu Tarkoma. Lecture Outline. Course Book. Mobile Evolution. Contents Mobile Middleware Course Introduction and Overview Sasu Tarkoma Lecture outline Motivation Mobile middleware overview Examples Summary Lecture Outline Course Book 16.3. 16-18 Introduction and

More information

Introduction Mobility Support Handover Management Conclutions. Mobility in IPv6. Thomas Liske. Dresden University of Technology

Introduction Mobility Support Handover Management Conclutions. Mobility in IPv6. Thomas Liske. Dresden University of Technology 2005 / High Speed Networks II Outline Introduction Mobility Support Overview of IPv6 Mobility Support Handover Management Mobility Support What means Mobility Support? allow transparent routing of IPv6

More information

Tik Network Application Frameworks. IPv6. Pekka Nikander Professor (acting) / Chief Scientist HUT/TML / Ericsson Research NomadicLab

Tik Network Application Frameworks. IPv6. Pekka Nikander Professor (acting) / Chief Scientist HUT/TML / Ericsson Research NomadicLab Pekka Nikander TKK/TML Tik-110.448 Network Application Frameworks IPv6 Pekka Nikander Professor (acting) / Chief Scientist HUT/TML / Ericsson Research NomadicLab 1 Pekka.Nikander@hut.fi Pekka Nikander

More information

SOFTSWITCH PROTOCOL INTERWORKING

SOFTSWITCH PROTOCOL INTERWORKING High Performance Switching and Routing IEEE Workshop 2003 SOFTSWITCH PROTOCOL INTERWORKING Gumier Matteo Customer Engineer Status of packet network Best-effort traffic is highly growing, but the revenues

More information

IPv6: An Introduction

IPv6: An Introduction Outline IPv6: An Introduction Dheeraj Sanghi Department of Computer Science and Engineering Indian Institute of Technology Kanpur dheeraj@iitk.ac.in http://www.cse.iitk.ac.in/users/dheeraj Problems with

More information

Network Working Group Request for Comments: 4177 Category: Informational September Architectural Approaches to Multi-homing for IPv6

Network Working Group Request for Comments: 4177 Category: Informational September Architectural Approaches to Multi-homing for IPv6 Network Working Group G. Huston Request for Comments: 4177 APNIC Category: Informational September 2005 Status of this Memo Architectural Approaches to Multi-homing for IPv6 This memo provides information

More information

Mobile Group Communication

Mobile Group Communication Mobile Group Communication Mobility & Multicast Status The Multicast Mobility Problem Listener Mobility ASM Source Mobility SSM Source Mobility Conclusions & Outlook 1 Prof. Dr. Thomas Schmidt http:/www.informatik.haw-hamburg.de/~schmidt

More information

HIP Host Identity Protocol. October 2007 Patrik Salmela Ericsson

HIP Host Identity Protocol. October 2007 Patrik Salmela Ericsson HIP Host Identity Protocol October 2007 Patrik Salmela Ericsson Agenda What is the Host Identity Protocol (HIP) What does HIP try to solve HIP basics Architecture The HIP base exchange HIP basic features

More information

SIP and VoIP What is SIP? What s a Control Channel? History of Signaling Channels

SIP and VoIP What is SIP? What s a Control Channel? History of Signaling Channels Network Security - ISA 656 Voice Over IP (VoIP) Security Simple SIP ing Alice s Bob Session Initiation Protocol Control channel for Voice over IP (Other control channel protocols exist, notably H.323 and

More information

Mobile Communications Chapter 9: Network Protocols/Mobile IP

Mobile Communications Chapter 9: Network Protocols/Mobile IP Mobile Communications Chapter 9: Network Protocols/Mobile IP Motivation Data transfer Encapsulation Security IPv6 Problems DHCP Ad-hoc s Routing protocols 9.0.1 Motivation for Mobile IP Routing based on

More information

Hierarchical Mobile IPv6 Implementation Experiences

Hierarchical Mobile IPv6 Implementation Experiences neumann@ft.ee.tu-berlin.de Hierarchical Mobile IPv6 Implementation Experiences Axel Neumann Andreas Festag TKN, TU-Berlin festag@ee.tu-berlin.de Siemens IPv6 Workshop, June 3, 2002 1 Overview SeQoMo Project

More information

Networking and Internetworking 1

Networking and Internetworking 1 Networking and Internetworking 1 Today l Networks and distributed systems l Internet architecture xkcd Networking issues for distributed systems Early networks were designed to meet relatively simple requirements

More information

Barracuda Networks NG Firewall 7.0.0

Barracuda Networks NG Firewall 7.0.0 RSA SECURID ACCESS Standard Agent Implementation Guide Barracuda Networks.0 fal, RSA Partner Engineering Last Modified: 10/13/16 Solution Summary The Barracuda NG Firewall

More information

FutureNet IV Fourth International Workshop on the Network of the Future, in conjunction with IEEE ICC

FutureNet IV Fourth International Workshop on the Network of the Future, in conjunction with IEEE ICC Sasu Tarkoma, Dmitriy Kuptsov, and Petri Savolainen Helsinki Institute for Information Technology University of Helsinki and Aalto University Pasi Sarolahti Aalto University FutureNet IV Fourth International

More information

Design of Next Generation Internet Based on Application-Oriented Networking

Design of Next Generation Internet Based on Application-Oriented Networking Design of Next Generation Internet Based on Application-Oriented Networking Yu Cheng Department of Electrical and Computer Engineering Illinois Institute of Technology Chicago, Illinois, USA cheng@iit.edu

More information

Cisco Expressway Session Classification

Cisco Expressway Session Classification Cisco Expressway Session Classification Deployment Guide First Published: December 2016 Last Updated: December 2017 Expressway X8.10 Cisco Systems, Inc. www.cisco.com 2 Preface Preface Change History Table

More information

LECTURE 8. Mobile IP

LECTURE 8. Mobile IP 1 LECTURE 8 Mobile IP What is Mobile IP? The Internet protocol as it exists does not support mobility Mobile IP tries to address this issue by creating an anchor for a mobile host that takes care of packet

More information

Host Identity Protocol

Host Identity Protocol Host Identity Protocol V.Gowri 1, M.Nirmala Kumari 2, R.Devendra Reddy 3 Associate Professor, Dept of CSE, Sri Venkatesa Perumal College of Engineering, Andhra Pradesh, India Assistant Professor, Dept

More information

A new protocol for location management in Mobile IPv6

A new protocol for location management in Mobile IPv6 A new protocol for location management in Mobile IPv6 Christian Veigner 1 and Chunming Rong Stavanger University College Box 8002, 4068 Stavanger, Norway christian.veigner@his.no, chunming.rong@his.no

More information

Foreword xxiii Preface xxvii IPv6 Rationale and Features

Foreword xxiii Preface xxvii IPv6 Rationale and Features Contents Foreword Preface xxiii xxvii 1 IPv6 Rationale and Features 1 1.1 Internet Growth 1 1.1.1 IPv4 Addressing 1 1.1.2 IPv4 Address Space Utilization 3 1.1.3 Network Address Translation 5 1.1.4 HTTP

More information

Network Security. Security of Mobile Internet Communications. Chapter 17. Network Security (WS 2002): 17 Mobile Internet Security 1 Dr.-Ing G.

Network Security. Security of Mobile Internet Communications. Chapter 17. Network Security (WS 2002): 17 Mobile Internet Security 1 Dr.-Ing G. Network Security Chapter 17 Security of Mobile Internet Communications Network Security (WS 2002): 17 Mobile Internet Security 1 Motivation for Mobile IP Routing in the Internet: Based on IP destination

More information

Configuring Proxy Mobile IPv6

Configuring Proxy Mobile IPv6 Information About Proxy Mobile IPv6, page 1 Restrictions on Proxy Mobile IPv6, page 3 (GUI), page 4 (CLI), page 6 Information About Proxy Mobile IPv6 Proxy Mobile IPv6 (PMIPv6) is a network-based mobility

More information

Configuring Application Visibility and Control for Cisco Flexible Netflow

Configuring Application Visibility and Control for Cisco Flexible Netflow Configuring Application Visibility and Control for Cisco Flexible Netflow First published: July 22, 2011 This guide contains information about the Cisco Application Visibility and Control feature. It also

More information

On the use of SHIM6 for Mobility Support in IMS Networks

On the use of SHIM6 for Mobility Support in IMS Networks On the use of SHIM6 for Mobility Support in IMS Networks John Ronan, Sasitharan Balasubramaniam Telecommunications Software and Systems Group Waterford Instiute of Technology, Carriganore Waterford, Ireland

More information

Mobile Internet Protocol v6 MIPv6

Mobile Internet Protocol v6 MIPv6 Mobile Internet Protocol v6 MIPv6 A brief introduction Holger.Zuleger@hznet.de 13-dec-2005 Holger Zuleger 1/15 > c Defined by MIPv6 RFC3775: Mobility Support in IPv6 (June 2004) RFC3776: Using IPsec to

More information

Chapter 4 Communication

Chapter 4 Communication DISTRIBUTED SYSTEMS Principles and Paradigms Second Edition ANDREW S. TANENBAUM MAARTEN VAN STEEN Chapter 4 Communication Layered Protocols (1) Figure 4-1. Layers, interfaces, and protocols in the OSI

More information

Multimedia Streaming. Mike Zink

Multimedia Streaming. Mike Zink Multimedia Streaming Mike Zink Technical Challenges Servers (and proxy caches) storage continuous media streams, e.g.: 4000 movies * 90 minutes * 10 Mbps (DVD) = 27.0 TB 15 Mbps = 40.5 TB 36 Mbps (BluRay)=

More information

Configuring CWMP Service

Configuring CWMP Service CHAPTER 12 This chapter describes how to configure the CWMP service in Cisco Broadband Access Center (BAC). Topics covered are:, page 12-1 Configuring Service Ports on the DPE, page 12-2 Disabling Connection

More information

Migration to IPv6 from IPv4. Is it necessary?

Migration to IPv6 from IPv4. Is it necessary? Introduction Today Internet plays a big role in every aspect of our lives and IP acted as an important pillar of Internet. Since its inception the Internet has reached almost all corners of globe and it

More information

AUTHENTICATION MECHANISM FOR FAST HANDOVER PMIPv6 NETWORKS

AUTHENTICATION MECHANISM FOR FAST HANDOVER PMIPv6 NETWORKS INTERNATIONAL JOURNAL OF RESEARCH IN COMPUTER APPLICATIONS AND ROBOTICS ISSN 2320-7345 AUTHENTICATION MECHANISM FOR FAST HANDOVER PMIPv6 NETWORKS N.S.Nandhinee PG Student Department of Computer Science

More information

DAY 2. HSPA Systems Architecture and Protocols

DAY 2. HSPA Systems Architecture and Protocols DAY 2 HSPA Systems Architecture and Protocols 1 LTE Basic Reference Model UE: User Equipment S-GW: Serving Gateway P-GW: PDN Gateway MME : Mobility Management Entity enb: evolved Node B HSS: Home Subscriber

More information

Assigning a Home Address on the Home Agent

Assigning a Home Address on the Home Agent CHAPTER 4 This chapter discusses how the Cisco Mobile Wireless Home Agent assigns home addresses to a mobile node, the different address types, and provides configuration details and examples. This chapter

More information

Shim6: Network Operator Concerns. Jason Schiller Senior Internet Network Engineer IP Core Infrastructure Engineering UUNET / MCI

Shim6: Network Operator Concerns. Jason Schiller Senior Internet Network Engineer IP Core Infrastructure Engineering UUNET / MCI Shim6: Network Operator Concerns Jason Schiller Senior Internet Network Engineer IP Core Infrastructure Engineering UUNET / MCI Not Currently Supporting IPv6? Many parties are going forward with IPv6 Japan

More information

Eduardo

Eduardo Eduardo Silva @edsiper eduardo@treasure-data.com About Me Eduardo Silva Github & Twitter Personal Blog @edsiper http://edsiper.linuxchile.cl Treasure Data Open Source Engineer Fluentd / Fluent Bit http://github.com/fluent

More information

CE693: Adv. Computer Networking

CE693: Adv. Computer Networking CE693: Adv. Computer Networking L-17 Naming Acknowledgments: Lecture slides are from the graduate level Computer Networks course thought by Srinivasan Seshan at CMU. When slides are obtained from other

More information

Category: Standards Track June Mobile IPv6 Support for Dual Stack Hosts and Routers

Category: Standards Track June Mobile IPv6 Support for Dual Stack Hosts and Routers Network Working Group H. Soliman, Ed. Request for Comments: 5555 Elevate Technologies Category: Standards Track June 2009 Status of This Memo Mobile IPv6 Support for Dual Stack Hosts and Routers This document

More information

Techological Advantages of Mobile IPv6

Techological Advantages of Mobile IPv6 Techological Advantages of Mobile IPv6 Nokia Research Center Mountain View, CA USA Charles E. Perkins http://people.nokia.net/charliep charliep@iprg.nokia.com 1 NOKIA NERD2000.PPT/ 11/20/00 / HFl Outline

More information

P2PNS: A Secure Distributed Name Service for P2PSIP

P2PNS: A Secure Distributed Name Service for P2PSIP P2PNS: A Secure Distributed Name Service for P2PSIP Mobile P2P 2008, Hong Kong, China Outline Decentralized VoIP (P2PSIP) Peer-to-Peer name service (P2PNS) Architecture Two-stage name resolution P2PNS

More information

ETSI TS V ( )

ETSI TS V ( ) TS 123 327 V12.0.0 (2014-09) TECHNICAL SPECIFICATION Digital cellular telecommunications system (Phase 2+); Universal Mobile Telecommunications System (UMTS); LTE; Mobility between 3GPP-Wireless Local

More information

Mobility in IPv6 Networks

Mobility in IPv6 Networks Mobility in IPv6 Networks o Mobility Paradigm o Mobile IPv4 IPv6 o Basic MIPv6 o Handover, Security o Temporal Optimisation VCoIP in Praxis VCoIP in Praxis VCoIP in Praxis IP Mobility Approaches o Application:

More information

SIP security and the great fun with Firewall / NAT Bernie Höneisen SURA / ViDe, , Atlanta, GA (USA)

SIP security and the great fun with Firewall / NAT Bernie Höneisen SURA / ViDe, , Atlanta, GA (USA) security and the great fun with Firewall / NAT Bernie Höneisen SURA / ViDe, 29.03.2006, Atlanta, GA (USA) 2006 SWITCH Content and Firewall and NAT Privacy / Encryption SpIT / Authentication Identity General

More information

Service-Centric Networking for the Developing World

Service-Centric Networking for the Developing World GAIA workshop Service-Centric Networking for the Developing World Arjuna Sathiaseelan, Liang Wang, Andrius Aucinas, Gareth Tyson*, Jon Crowcroft N4D Lab liang.wang@cl.cam.ac.uk Cambridge University, UK

More information

Wireless Access Protocol(WAP) architecture

Wireless Access Protocol(WAP) architecture Wireless Access Protocol(WAP) architecture While the evolution of cellular networks has resulted in many mobile services, such services are primarily for voice. Mobile phone users do have the desire to

More information

Extended Correspondent Registration Scheme for Reducing Handover Delay in Mobile IPv6

Extended Correspondent Registration Scheme for Reducing Handover Delay in Mobile IPv6 Extended Correspondent Registration Scheme for Reducing Handover Delay in Mobile IPv6 Ved P. Kafle Department of Informatics The Graduate University for Advanced Studies Tokyo, Japan Eiji Kamioka and Shigeki

More information