ABI Working Title: Messaging NSLP
|
|
- Marylou Bradford
- 6 years ago
- Views:
Transcription
1 ABI Working Title: Messaging NSLP University of Helsinki Helsinki University of Technology VTT Technical Research Centre of Finland September 19, 2006 i
2 Contents 1 Introduction 1 2 NSIS Framework NSIS Working Group The GIST New Messaging Protocol Design Goals Messages Messaging Applications and Application Interface Messaging NSLP process read write Messaging NSLP Message and Object Formats Application data object Bibliography 7 ii
3 1 Introduction Traditional signaling protocols are mainly focused on Quality of Service. Also other signaling purposes exists, for example to modify routing depending on resource availability of routers. It is necessary to transfer information between routers, or in some cases between router and end host of communication. One specific case is routing in mesh network when taking account of very limited resources of mesh routers. More use scenarios can be found from [FIXME: ref]. In this paper we present basic design of a new messaging protocol that is to be used to transfer generic data between signaling nodes. The protocol will use existing NSIS framework [6] as transport mechanism (Next Steps In Signaling), and it is going to form a new NSLP (NSIS Signaling Layer Protocol). While our first goal is to create this new protocol to transfer measurement/monitoring data, we will create generic messaging protocol. It is going to work on top of the existing transfer service to keep the protocol itself very simple. We focus on router-to-router communications, but the protocol is meant to be extensible so it will be usable also in other scenarios. 1
4 2 NSIS Framework Old signaling protocols, for example Resource ReServation Protocol (RSVP), have been around for years [11]. While developing further, the RSVP has became very complicated. Next Steps in Signaling Working Group was formed at IETF to standardize an IP signaling protocol suite. In this section we briefly introduce their work. 2.1 NSIS Working Group The NSIS Working Group was formed to develop new two-layer signaling framework, that simplifies process of creating new signaling applications by separating signaling applications from transport and other needed basic services. It was not necessary to re-invent everything, for example, RSVP (Resource ReServation Protocol) [11] concepts are used as much as possible. Some goals for NSIS (Next Steps In Signaling) Working Group are given in RFC 3726 Requirements for Signaling Protocols [1]. Also RFC 4094, Analysis of Existing Quality-of-Service Signaling Protocols [10] is not to be forgotten as a background information. Some NSIS documents are already published as RFCs, but there are many drafts also. Here is a short list of the most interesting documents: RFC 4080 Next Steps in Signaling (NSIS): Framework [6]. How is the whole thing supposed to work. In NSIS framework only unicast data flows are considered. The NSIS framework uses two layer approach: lower layer is generic, and it provides some services (for example transport) to the upper layer where signaling applications reside. RFC 4081 Security Threats for Next Steps in Signaling (NSIS)[13]. Security can not be forgotten, and this document lists numerous security threats. There are some generic threats for all protocols (not specific to NSIS) like message injection, modification and replay. Also some interesting (considering our NSLP) NSIS specific threats are listed in RFC We have to be careful at least with these attacks and threats: flooding, identity spoofing and denial of service. GIST General Internet Signaling Transport [12] provides transport service to signaling protocols (lower layer at the NSIS framework). More details are given a bit later in this documenta. NSIS Extensibility NSIS Extensibility Model [9]. How is the NSIS supposed to be extended. Some details and practices we have to follow (NSLP identifier, routing method to use...). Diagnostics NSLP Design Options of NSIS Diagnostics NSLP [4]. Example of NSIS Signaling Layer Protocol, focuses on NSIS/GIST diagnostics. Metering NSLP NSLP for Metering Configuration Signaling [3]. Another NSLP. Focuses on metering packets of given data flows. Authorization for NSLPs Authorization for NSIS Signaling Layer Protocols [7] describes Session Authorization Object that provides more strict authorization for NSLPs than basic GIST methods. As stated before, the NSIS framework is divided to two layers. Upper layer, the signaling applications, use services provided by the lower layer. This separation is done to make signaling application design easier and simpler, and to reuse already existing, widely accepted methods. 2
5 2.2 The GIST In our point of view, the most important existing work is the GIST, General Internet Signaling Transport, that provides us reliable transport mechanism and routing. It also includes mechanisms to protect message integrity and confidentiality. Existing protocols and methods are being used in GIST where possible. For example TLS is used in security and transport is done using existing protocols like tcp and udp. At least two different implementations of GIST exists [5], [2]. The API that GIST provides to signaling applications is quite simple concerning amount of functions. There are only six different functions (SendMessage, RcvMessage, MessageStatus, NetworkNotification, SetStateLifetime and InvalidateRoutingState ) in it. In reality the GIST is much more complicated due to numerous parameters each function accepts. The basic GIST protocol stack is shown in Figure 1 Nat/Firewall NSLP QoS NSLP GIST TCP/UDP/TLS/dTLS IPv4 / IPv6 Figure 1: NSIS Protocol stack with existing signaling layer protocols 3
6 3 New Messaging Protocol The new messaging protocol is going to be used to transfer messages between signaling nodes in network. Main motivation to design this new protocol is the need to transfer monitoring information between routers, but it can be utilized also in other domains. More scenarios are defined in [8]. The NSIS protocol suite, GIST to be exact, provides transport service that seems to fulfill our transport level needs. In addition, GIST has some security related services, for example per node authentication. It also provides message protection: messages can be protected against modification, injection, replay and eavesdropping [12]. The protocol stack with our new NSLP (NSIS Signaling Layer Protocol) would then be similar to one at Figure 2. Application Application Application Messaging NSLP GIST TCP/UDP/TLS/dTLS IPv4 / IPv6 Figure 2: Protocol stack with new NSLP 3.1 Design Goals One important goal is to keep the new protocol simple. The protocol itself does not need to know what kind of data is going to be sent or received. The new protocol itself will be stateless. State management is done, if needed, in application level. While protocol itself is kept very simple, it is meant to be flexible by independent applications. In terms of messaging NSLP, a new application can be created by allocating new application identifier, no further modifications to the NSLP is needed. 3.2 Messages The basic message type is notification, that can be sent by application with or without explicit request message. These two messages are shown in Figure 3. Regardless of message type, all received messages are passed to suitable application. If suitable application is not found, the received message will be (FIXME: silently?) discarded. There will be two message types, request and notification. 4
7 When request is received, it is passed to suitable application, identified by application id. Host 1 Host 2 Host 1 Host 2 Notification Request Notification Notification Figure 3: Two messaging scenarios: Notify with and without request 3.3 Messaging Applications and Application Interface There can be several different applications that use the messaging service provided by the Messaging NSLP. Each application has an unique application identifier that is used by the Messaging NSLP to find proper recipient application for each message received. Interface regarding applications is very simple with no more than two operations, read and write (Figure 4). All communication between application and Messaging NSLP is done by application with these two operations. Application read() write() Messaging NSLP GIST Figure 4: Messaging NSLP application interface Messaging NSLP process While GIST is handling the actual sending and receiving of messages, it can not understand the content of Messaging NSLP messages. When the GIST receives a message with NSLP identifier matching to Messaging NSLP, it is passed to Messaging NSLP process. Messaging NSLP process interprets the message headers, and selects proper messaging application to which the message data is delivered read Read operation is used by application to transfer data from the Messaging NSLP process. Application identifier is given as a parameter, so Messaging NSLP can associate read request to applicable data. 5
8 3.3.3 write Write operation is used by application to transfer data to the Messaging NSLP. In addition to the actual message data, are application identifier and destination address provided as parameters. 3.4 Messaging NSLP Message and Object Formats While Messaging NSLP itself has only small header, NSIS message header contains mandatory parts defined in GIST specification. One mandatory part is NSIS Signaling Layer Protocol Identifier (NSLPID), allocated by IANA (Internet Assigned Numbers Authority). Also session identifier (SID) is present in every NSIS message. Session identifiers should be selected so that it can not be guessed by hypothetical attacker. Messaging NSLP header contains following fields: type Type of message (request or notify). length Length of following application data object. appid Application identifier. reserved Some reserved fields also exists type r r r r Application ID (24bit) r r r r length (32bit) Application data object When messaging application sends message to another NSIS host the messaging NSLP encapsulates the message data into an application data object. It has a header that contains following fields: type Application specific message type. length Object data length. application specific Application specific header type length Application specific header (24bit)
9 The basic structure of our NSLP message header can be seen in Figure 5. There is a reserved range of NSLPIDs ( ) for private/experimental use. Common header * version number * message type * size * NSLPID... Originating node Authentication information Data Figure 5: Coarse-grained message header of our NSLP References [1] M. Brunner, ed. Requirements for Signaling Protocols. RFC 3726, The Internet Engineering Task Force, April [2] NSIS Java Implementation. URL: May [3] F. Dressler et al. NSLP for Metering Configuration Signaling. Internet-draft (work in progress), The Internet Engineering Task Force, June [4] X. Fu, I. Juchem, C. Dickmann, and H. Tschofenig. Design Options of NSIS Diagnostics NSLP. Internet-draft (work in progress), The Internet Engineering Task Force, March [5] NSIS Implementation. URL: May [6] R. Hancock, G. Karagiannis, J. Loughney, and S. Van den Bosch. Next Steps in Signaling (NSIS): Framework. RFC 4080, The Internet Engineering Task Force, June [7] J.Manner, M. Stiemerling, and H. Tschofenig. Authorization for NSIS Signaling Layer Protocols. Internet-draft (work in progress), The Internet Engineering Task Force, June [8] J. Kilpi. Working title: Plug-in visions. [9] J. Loughney. NSIS Extensibility Model. Internet-draft (work in progress), The Internet Engineering Task Force, March [10] J. Manner and X. Fu. Analysis of Existing Quality-of-Service Signaling Protocols. RFC 4094, The Internet Engineering Task Force, May [11] Resource ReServation Protocol (RSVP) Version 1 Functional Specification. RFC 2205, The Internet Engineering Task Force, September [12] H. Schulzrinne and R. Hancock. GIST: General Internet Signaling Transport. Internet-draft (work in progress), The Internet Engineering Task Force, August [13] H. Tschofenig and D. Kroeselberg. Security Threats for Next Steps in Signaling (NSIS). RFC 4081, The Internet Engineering Task Force, June
Performance Study of the NSIS QoS-NSLP Protocol
Performance Study of the NSIS QoS-NSLP Protocol Mayutan Arumaithurai, Xiaoming Fu, Bernd Schloer and Hannes Tschofenig Institute of Computer Science, University of Goettingen, Germany, Email : arumaithurai,
More informationQoS Support for Mobile Users Using NSIS
QoS Support for Mobile Users Using NSIS Roland Bless and Martin Röhricht Institute of Telematics Universität Karlsruhe (TH) Zirkel 2, D 76128 Karlsruhe, Germany {bless,roehricht}@tm.uka.de Abstract. Resource
More informationQoS Support for Mobile Users using NSIS
QoS Support for Mobile Users using NSIS Roland Bless and Martin Röhricht Institute of Telematics Universität Karlsruhe (TH) Zirkel 2, D 76128 Karlsruhe, Germany Email: {bless, roehricht}@tm.uka.de Abstract
More informationThe NSIS QOS Model for Inter-domain Signaling to Enable End-to-End QoS Provisioning Over Heterogeneous Domains
The NSIS QOS Model for Inter-domain Signaling to Enable End-to-End QoS Provisioning Over Heterogeneous Domains Jian Zhang and Edmundo Monteiro Laboratory of Communications and Telematics (LCT), University
More informationQoS in 4G scenarios using NSIS protocol
QoS in 4G scenarios using NSIS protocol Fábio Ferreira, Susana Sargento, Rui L. Aguiar Abstract - This paper presents quality of service mechanisms, based on the NSIS (Next Steps In Signaling) protocol.
More informationUsing NSIS (Next Steps in Signaling) for support of QoS aware multimedia services
Master of Science Thesis University of Twente Design and Analysis of Communication Systems Using NSIS (Next Steps in Signaling) for support of QoS aware multimedia services Ruud Klaver Februari 9, 2007
More informationInternet Engineering Task Force (IETF) Category: Informational ISSN: J. Loughney Nokia E. Davies, Ed. Folly Consulting October 2010
Internet Engineering Task Force (IETF) Request for Comments: 5978 Category: Informational ISSN: 2070-1721 J. Manner Aalto University R. Bless KIT J. Loughney Nokia E. Davies, Ed. Folly Consulting October
More informationNSIS for NS-2. N4 TCP connection. Figure 1: TCP connection reuse
NSIS for NS-2 NSIS (Next Steps in Signalling) is a signalling framework being developed by the IETF, based on various signalling protocols, of which the Resource Reservation Protocol (RSVP) is the corner
More informationIPv6 Flow Label Specification
IPv6 Flow Label Specification draft-ietf-ipv6-flow-label-02.txt Jarno Rajahalme Alex Conta Brian E. Carpenter Steve Deering IETF #54, Yokohama 1 7/18/2002 IPv6 Flow Label Specification Changes since -
More informationTCP/IP stack is the family of protocols that rule the current internet. While other protocols are also used in computer networks, TCP/IP is by far
TCP/IP stack is the family of protocols that rule the current internet. While other protocols are also used in computer networks, TCP/IP is by far the most common of them. TCP/IP can be compared to the
More informationInternet Engineering Task Force (IETF) Category: Experimental Columbia U. ISSN: Samsung J. Bang Samsung AIT March 2011
Internet Engineering Task Force (IETF) C. Shen Request for Comments: 5979 H. Schulzrinne Category: Experimental Columbia U. ISSN: 2070-1721 S. Lee Samsung J. Bang Samsung AIT March 2011 Abstract NSIS Operation
More informationModeling and Analysis of General Internet Signaling Transport Protocol (GIST) using Coloured Petri Nets
Modeling and Analysis of General Internet Signaling Transport Protocol (GIST) using Coloured Petri Nets Atul Kumar Lecturer(CSE & IT Dept.) Baba Banda Singh Bahadur Polytechnic College Fatehgarh Sahib(Punjab),
More informationA Firewall/NAT Traversal Client for CASP
Internet Engineering Task Force INTERNET-DRAFT draft-tschofenig-nsis-casp-midcom-01.ps Status of this Memo A Firewall/NAT Traversal Client for CASP H. Tschofenig, H. Schulzrinne, C. Aoun Siemens/Columbia
More informationNetwork Working Group. Category: Standards Track BBN September 1997
Network Working Group Request for Comments: 2207 Category: Standards Track L. Berger FORE Systems T. O Malley BBN September 1997 RSVP Extensions for IPSEC Data Flows Status of this Memo This document specifies
More informationSecuring the Next Steps in Signaling (NSIS) Protocol Suite
Securing the Next Steps in Signaling (NSIS) Protocol Suite Hannes Tschofenig Siemens AG, Corporate Technology Otto-Hahn-Ring 6, Munich 81739, Germany Fax: +49 89 636 48000, E-mail: hannes.tschofenig@siemens.com
More informationSecuring the Next Steps In Signalling (NSIS) protocol suite. Hannes Tschofenig* Xiaoming Fu
Int. J. Internet Protocol Technology, Vol. 1, No. 4, 2006 271 Securing the Next Steps In Signalling (NSIS) protocol suite Hannes Tschofenig* Siemens AG, Corporate Technology, Otto-Hahn-Ring 6, Munich 81739,
More informationOperational Security Capabilities for IP Network Infrastructure
Operational Security Capabilities F. Gont for IP Network Infrastructure G. Gont (opsec) UTN/FRH Internet-Draft September 1, 2008 Intended status: Informational Expires: March 5, 2009 Status of this Memo
More informationETSF05/ETSF10 Internet Protocols Network Layer Protocols
ETSF05/ETSF10 Internet Protocols Network Layer Protocols 2016 Jens Andersson Agenda Internetworking IPv4/IPv6 Framentation/Reassembly ICMPv4/ICMPv6 IPv4 to IPv6 transition VPN/Ipsec NAT (Network Address
More informationCASP Cross-Application Signaling Protocol
Georg-August-Universität Göttingen Institut für Informatik ISSN 1611 1044 Nummer IFI TB 2003 001 Technischer Bericht CASP Cross-Application Signaling Protocol Henning Schulzrinne, Hannes Tschofenig, Xiaoming
More informationMobile SCTP for IP Mobility Support in All-IP Networks
Mobile SCTP for IP Mobility Support in All-IP Networks Seok Joo Koh sjkoh@cs.knu.ac.kr Abstract The Stream Control Transmission Protocol (SCTP) is a new transport protocol that is featured multi-streaming
More informationRequest for Comments: University of Twente/Ericsson J. Loughney Nokia S. Van den Bosch Alcatel June 2005
Network Working Group Request for Comments: 4080 Category: Informational R. Hancock Siemens/RMR G. Karagiannis University of Twente/Ericsson J. Loughney Nokia S. Van den Bosch Alcatel June 2005 Status
More informationGossip-based Signaling Dissemination Extension for Next Steps In Signaling
Gossip-based Signaling Dissemination Extension for Next Steps In Signaling M. Femminella, R. Francescangeli, G. Reali DIEI University of Perugia Perugia, Italy {femminella,francescangeli,reali}@diei.unipg.it
More informationAn Industry view of IPv6 Advantages
An Industry view of IPv6 Advantages March 2002 Yanick.Pouffary@Compaq.Com Imagine what IPv6 can do for you! 1 Where we are Today IPv4 a victim of its own success IPv4 addresses consumed at an alarming
More informationIPv4 to IPv6 Transition Mechanisms
IPv4 to IPv6 The mechanisms for the changeover from IPv4 to IPv6 are described in RFC 4213, updating the original mechanisms described in RFC 2893. As mentioned in the notes for IP, a portion of the IPv6
More informationTCP Roadmap 2.0. Alexander Zimmermann
TCP Roadmap 2.0 Alexander Zimmermann 1 Document history (1/4) draft-zimmermann-tcpm-tcp-rfc4614bis-00 No content-related updates Only xml code were updated à new boilerplate and new structure of reference
More informationCS-435 spring semester Network Technology & Programming Laboratory. Stefanos Papadakis & Manolis Spanakis
CS-435 spring semester 2016 Network Technology & Programming Laboratory University of Crete Computer Science Department Stefanos Papadakis & Manolis Spanakis CS-435 Lecture #4 preview ICMP ARP DHCP NAT
More informationInteroperability and Security of TraSH: A Transport Layer Seamless Handover
Interoperability and Security of TraSH: A Transport Layer Seamless Handover Panel Session at 23 rd IEEE International Performance, Computing, and Communications Conference April 16, 2004 Dr. Mohammed Atiquzzaman
More informationInterworking of B-ISDN Signaling and Internet Protocol
Interworking of -ISDN Signaling and Internet Protocol Muneyoshi Suzuki NTT Information Sharing Platform Laboratories 3-9-11, Midori-cho, Musashino-shi, Tokyo 180-8585, Japan suzuki@nal.ecl.net Abstract.
More informationA Flow Label Based QoS Scheme for End-to-End Mobile Services
A Flow Label Based QoS Scheme for End-to-End Mobile Services Tao Zheng, Lan Wang, Daqing Gu Orange Labs Beijing France Telecom Group Beijing, China e-mail: {tao.zheng; lan.wang; daqing.gu}@orange.com Abstract
More informationdraft-ietf-ipsec-nat-t-ike-01.txt W. Dixon, B. Swander Microsoft V. Volpe Cisco Systems L. DiBurro Nortel Networks 23 October 2001
IP Security Protocol Working Group (IPSEC) INTERNET-DRAFT draft-ietf-ipsec-nat-t-ike-01.txt Expires: 23 April 2001 T. Kivinen, M. Stenberg SSH Communications Security A. Huttunen F-Secure Corporation W.
More informationLecture 33. Firewalls. Firewall Locations in the Network. Castle and Moat Analogy. Firewall Types. Firewall: Illustration. Security April 15, 2005
Firewalls Lecture 33 Security April 15, 2005 Idea: separate local network from the Internet Trusted hosts and networks Intranet Firewall DMZ Router Demilitarized Zone: publicly accessible servers and networks
More informationMIP4 Working Group. Generic Notification Message for Mobile IPv4 draft-ietf-mip4-generic-notification-message-16
MIP4 Working Group Internet-Draft Intended status: Standards Track Expires: April 28, 2011 H. Deng China Mobile H. Levkowetz Netnod V. Devarapalli WiChorus S. Gundavelli Cisco Systems B. Haley Hewlett-Packard
More informationLecture 13 Page 1. Lecture 13 Page 3
IPsec Network Security: IPsec CS 239 Computer Software March 2, 2005 Until recently, the IP protocol had no standards for how to apply security Encryption and authentication layered on top Or provided
More informationDa t e: August 2 0 th a t 9: :00 SOLUTIONS
Interne t working, Examina tion 2G1 3 0 5 Da t e: August 2 0 th 2 0 0 3 a t 9: 0 0 1 3:00 SOLUTIONS 1. General (5p) a) Place each of the following protocols in the correct TCP/IP layer (Application, Transport,
More informationOn Distributed Communications, Rand Report RM-3420-PR, Paul Baran, August
The requirements for a future all-digital-data distributed network which provides common user service for a wide range of users having different requirements is considered. The use of a standard format
More informationInternet Engineering Task Force. Intended status: Standards Track. June 7, 2014
Internet Engineering Task Force Internet-Draft Intended status: Standards Track Expires: December 9, 2014 N. Akiya C. Pignataro D. Ward June 7, 2014 Seamless Bidirectional Forwarding Detection (BFD) for
More informationQoS Signaling Across Heterogeneous Wired/Wireless Networks: Resource Management in Diffserv Using the NSIS Protocol Suite
QoS Signaling Across Heterogeneous Wired/Wireless Networks: Resource Management in Diffserv Using the NSIS Protocol Suite Attila Báder 1, Georgios Karagiannis 2, Lars Westberg 3, Cornelia Kappler 4, Tom
More informationPANA applicability in constrained environments
PANA applicability in constrained environments Mitsuru Kanda Yoshihiro Ohba Subir Das Stephen Chasko
More informationNetwork Security - ISA 656 IPsec IPsec Key Management (IKE)
Network Security - ISA 656 IPsec IPsec (IKE) Angelos Stavrou September 28, 2008 What is IPsec, and Why? What is IPsec, and Why? History IPsec Structure Packet Layout Header (AH) AH Layout Encapsulating
More informationGossip-based Signaling Dissemination Extension for Next Steps In Signaling
Gossip-based Signaling Dissemination Extension for Next Steps In Signaling M. Femminella, R. Francescangeli, G. Reali DIEI University of Perugia Perugia, Italy {femminella,francescangeli,reali}@diei.unipg.it
More informationB.Sc. (Hons.) Computer Science with Network Security B.Eng. (Hons) Telecommunications B.Sc. (Hons) Business Information Systems
B.Sc. (Hons.) Computer Science with Network Security B.Eng. (Hons) Telecommunications B.Sc. (Hons) Business Information Systems Bridge BTEL/PT BCNS/14/FT BIS/14/FT BTEL/14/FT Examinations for 2014-2015
More informationCategory: Standards Track June Mobile IPv6 Support for Dual Stack Hosts and Routers
Network Working Group H. Soliman, Ed. Request for Comments: 5555 Elevate Technologies Category: Standards Track June 2009 Status of This Memo Mobile IPv6 Support for Dual Stack Hosts and Routers This document
More informationTopics in Computer Networking Switch SS7 PSTN/ISDN. Gatekeeper/ Proxy Server. Topics in Computer Networking Н.
Outline SCTP Stream Control Transmission Protocol NGN and Motivation for SCTP Protocol Overview Packet format Protection against SYN Flooding Multistreaming Multihoming Research Activities at Kau Summary
More informationLecture 12 Page 1. Lecture 12 Page 3
IPsec Network Security: IPsec CS 239 Computer Software February 26, 2003 Until recently, the IP protocol had no standards for how to apply security Encryption and authentication layered on top Or provided
More informationThis tutorial will help you in understanding IPv4 and its associated terminologies along with appropriate references and examples.
About the Tutorial Internet Protocol version 4 (IPv4) is the fourth version in the development of the Internet Protocol (IP) and the first version of the protocol to be widely deployed. IPv4 is described
More informationIP Security Protocol Working Group (IPSEC) draft-ietf-ipsec-nat-t-ike-03.txt. B. Swander Microsoft V. Volpe Cisco Systems 24 June 2002
IP Security Protocol Working Group (IPSEC) INTERNET-DRAFT draft-ietf-ipsec-nat-t-ike-03.txt Expires: 24 December 2002 T. Kivinen SSH Communications Security A. Huttunen F- Secure Corporation B. Swander
More informationA ULE Security Approach for Satellite Networks on PLATINE Test Bed
A ULE Security Approach for Satellite Networks on PLATINE Test Bed L. Liang, L. Fan, H. Cruickshank, and Z. Sun Centre of Communication System Research, University of Surrey, Guildford, Surrey, UK C. Baudoin
More informationExperimental Extensions to RSVP Remote Client and One-Pass Signalling
1 Experimental Extensions to RSVP Remote Client and One-Pass Signalling Industrial Process and System Communications, Darmstadt University of Technology Merckstr. 25 D-64283 Darmstadt Germany Martin.Karsten@KOM.tu-darmstadt.de
More informationInternetworking/Internetteknik, Examination 2G1305 Date: August 18 th 2004 at 9:00 13:00 SOLUTIONS
Internetworking/Internetteknik, Examination 2G1305 Date: August 18 th 2004 at 9:00 13:00 SOLUTIONS 1. General (5p) a) The so-called hourglass model (sometimes referred to as a wine-glass ) has been used
More informationInternet Security. - IPSec, SSL/TLS, SRTP - 29th. Oct Lee, Choongho
Internet Security - IPSec, SSL/TLS, SRTP - 29th. Oct. 2007 Lee, Choongho chlee@mmlab.snu.ac.kr Contents Introduction IPSec SSL / TLS SRTP Conclusion 2/27 Introduction (1/2) Security Goals Confidentiality
More informationOur Narrow Focus Computer Networking Security Vulnerabilities. Outline Part II
Our Narrow Focus 15-441 15-441 Computer Networking 15-641 Lecture 22 Security: DOS Peter Steenkiste Fall 2016 www.cs.cmu.edu/~prs/15-441-f16 Yes: Creating a secure channel for communication (Part I) Protecting
More informationCIS 5373 Systems Security
CIS 5373 Systems Security Topic 4.1: Network Security Basics Endadul Hoque Slide Acknowledgment Contents are based on slides from Cristina Nita-Rotaru (Northeastern) 2 Network Security INTRODUCTION 3 What
More informationOn Distributed Communications, Rand Report RM-3420-PR, Paul Baran, August 1964
The requirements for a future all-digital-data distributed network which provides common user service for a wide range of users having different requirements is considered. The use of a standard format
More informationInternet Engineering Task Force (IETF) Request for Comments: 7660 Category: Standards Track. October 2015
Internet Engineering Task Force (IETF) Request for Comments: 7660 Category: Standards Track ISSN: 2070-1721 L. Bertz S. Manning Sprint B. Hirschman October 2015 Diameter Congestion and Filter Attributes
More informationCost of deploying new technologies
Cost of deploying new technologies Erkka Honkavaara Helsinki University of Technology erkka.honkavaara@tkk.fi Abstract The current Internet is very different from how it was originally designed. These
More informationInternet Engineering Task Force (IETF) Request for Comments: 6028 Category: Experimental ISSN: October 2010
Internet Engineering Task Force (IETF) G. Camarillo Request for Comments: 6028 A. Keranen Category: Experimental Ericsson ISSN: 2070-1721 October 2010 Abstract Host Identity Protocol (HIP) Multi-Hop Routing
More informationIntended status: Informational Expires: March 7, 2019 Huawei Technologies N. Leymann Deutsche Telekom G. Swallow Independent September 3, 2018
MPLS Working Group Internet-Draft Intended status: Informational Expires: March 7, 2019 L. Andersson Bronze Dragon Consulting S. Bryant A. Malis Huawei Technologies N. Leymann Deutsche Telekom G. Swallow
More informationDepartment of Computer Science. Burapha University 6 SIP (I)
Burapha University ก Department of Computer Science 6 SIP (I) Functionalities of SIP Network elements that might be used in the SIP network Structure of Request and Response SIP messages Other important
More informationControl Plane Security Overview
Control Plane Security Overview Wes Doonan Control Plane R&D Hybrid Networks Packet-based Delivery ( ) Packets delivered via standard IP infrastructure Routes configured or learned, packets forwarded per
More informationMasterarbeit. Implementation and Performance Testing of the NAT/FW NSIS Signaling Layer Protocol
Georg-August-Universität Göttingen Zentrum für Informatik ISSN Nummer 1612-6793 ZFI-BM-2005-41 Masterarbeit im Studiengang Angewandte Informatik Implementation and Performance Testing of the NAT/FW NSIS
More informationCSCE 715: Network Systems Security
CSCE 715: Network Systems Security Chin-Tser Huang huangct@cse.sc.edu University of South Carolina Security in Network Layer Implementing security in application layer provides flexibility in security
More informationLARGE SCALE IP ROUTING LECTURE BY SEBASTIAN GRAF
LARGE SCALE IP ROUTING LECTURE BY SEBASTIAN GRAF MODULE 05 MULTIPROTOCOL LABEL SWITCHING (MPLS) AND LABEL DISTRIBUTION PROTOCOL (LDP) 1 by Xantaro IP Routing In IP networks, each router makes an independent
More informationNetwork Working Group. Category: Standards Track February 2009
Network Working Group M. Stapp Request for Comments: 5460 Cisco Systems, Inc. Category: Standards Track February 2009 Status of This Memo DHCPv6 Bulk Leasequery This document specifies an Internet standards
More informationIP Security IK2218/EP2120
IP Security IK2218/EP2120 Markus Hidell, mahidell@kth.se KTH School of ICT Based partly on material by Vitaly Shmatikov, Univ. of Texas Acknowledgements The presentation builds upon material from - Previous
More informationCSC 4900 Computer Networks: Security Protocols (2)
CSC 4900 Computer Networks: Security Protocols (2) Professor Henry Carter Fall 2017 Chapter 8 roadmap 8.1 What is network security? 8.2 Principles of cryptography 8.3 Message Integrity 8.4 End point Authentication
More informationEnd-To-End QoS Control Architecture and Route Selection Method for IP Networks
End-To-End QoS Control Architecture and Route Selection Method for IP Networks V Akiko Yamada V Keiichi Nakatsugawa V Akira Chugo (Manuscript received April 17, 2006) In this paper, we propose a new end-to-end
More informationIntroduction to IPv6. Unit -2. Prepared By:- NITIN PANDYA Assistant Professor, SVBIT.
Introduction to IPv6 Unit -2 Prepared By:- NITIN PANDYA Assistant Professor, SVBIT. IP Network Addressing INTERNET world s largest public data network, doubling in size every nine months IPv4, defines
More informationThe use of COPS and NSIS in the EuQoS Project
The use of COPS and NSIS in the EuQoS Project E. Monteiro, F. Boavida, P. Simões, J. Sá Silva, L. Cordeiro, R. Eugénio, M. Carmo University of Coimbra Laboratory of Communications and Telematics CISUC-DEI
More informationRequest for Comments: E. Demaria Telecom Italia J. Bournelle Orange Labs R. Lopez University of Murcia September 2009
Network Working Group Request for Comments: 5637 Category: Informational G. Giaretta Qualcomm I. Guardini E. Demaria Telecom Italia J. Bournelle Orange Labs R. Lopez University of Murcia September 2009
More informationThe use of COPS and NSIS in the EuQoS Project
The use of COPS and NSIS in the EuQoS Project Edmundo Monteiro, Fernando Boavida, Paulo Simões, Jorge Sá Silva, Marilia Curado, Luís Cordeiro, Romulo Ribeiro, Maxweel Carmo, Jian Zhang University of Coimbra
More informationNext Step In Signaling Transport Protocol/General Internet Signaling Protocol (NTLP/GIST)
Next Step In Signaling Transport Protocol/General Internet Signaling Protocol (NTLP/GIST) Master of Science Thesis October, 10 2005 Examination Committee Dr. ir. G. Karagiannis (Supervisor, UT) Dr. ir.
More informationRequest for Comments: Toshiba B. Patil H. Tschofenig Nokia Siemens Networks A. Yegin Samsung May 2008
Network Working Group Request for Comments: 5191 Category: Standards Track D. Forsberg Nokia Y. Ohba, Ed. Toshiba B. Patil H. Tschofenig Nokia Siemens Networks A. Yegin Samsung May 2008 Protocol for Carrying
More informationinterface Question 1. a) Applications nslookup/dig Web Application DNS SMTP HTTP layer SIP Transport layer OSPF ICMP IP Network layer
TDTS06 Computer networks, August 23, 2008 Sketched answers to the written examination, provided by Juha Takkinen, IDA, juhta@ida.liu.se. ( Sketched means that you, in addition to the below answers, need
More informationInternetworking Over SpaceWire: A Link-Layer Layer Broadcast Service for Network Stack Support
Internetworking Over SpaceWire: A Link-Layer Layer Broadcast Service for Network Stack Support Robert Klar, Sandra G. Dykes, Allison Roberts, Chris Mangels, Buddy Walls, Mark A. Johnson, Kristian Persson
More informationETSF10 Internet Protocols Network Layer Protocols
ETSF10 Internet Protocols Network Layer Protocols 2012, Part 2, Lecture 3.1 Kaan Bür, Jens Andersson Network Layer Protocols IPv4, IPv6 [ed.4 ch.20.3+19.2] [ed.5 ch.22.1.1-2+22.2] Transition from IPv4
More informationTik Network Application Frameworks. IPv6. Pekka Nikander Professor (acting) / Chief Scientist HUT/TML / Ericsson Research NomadicLab
Pekka Nikander TKK/TML Tik-110.448 Network Application Frameworks IPv6 Pekka Nikander Professor (acting) / Chief Scientist HUT/TML / Ericsson Research NomadicLab 1 Pekka.Nikander@hut.fi Pekka Nikander
More informationMasterarbeit. Implementation and Performance Evaluation of the IETF QoS NSLP Protocol
Georg-August-Universität Göttingen Zentrum für Informatik ISSN 1612-6793 Nummer GAUG-ZFI-BM-2007-37 Masterarbeit im Studiengang "Angewandte Informatik" Implementation and Performance Evaluation of the
More informationIPSec. Slides by Vitaly Shmatikov UT Austin. slide 1
IPSec Slides by Vitaly Shmatikov UT Austin slide 1 TCP/IP Example slide 2 IP Security Issues Eavesdropping Modification of packets in transit Identity spoofing (forged source IP addresses) Denial of service
More informationRSVP Petri Jäppilä Nokia Telecommunications P.O Box Nokia Group, Finland
RSVP Petri Jäppilä Nokia Telecommunications P.O Box 330 0004 Nokia Group, Finland Email: petri.jappila@nokia.com Abstract Resource ReSerVation Protocol, RSVP, is a protocol to provide resources reservation,
More informationNetworking: Network layer
control Networking: Network layer Comp Sci 3600 Security Outline control 1 2 control 3 4 5 Network layer control Outline control 1 2 control 3 4 5 Network layer purpose: control Role of the network layer
More informationInternet Control Message Protocol
Internet Control Message Protocol The Internet Control Message Protocol is used by routers and hosts to exchange control information, and to inquire about the state and configuration of routers and hosts.
More informationDesign and Implementation of an Anycast Efficient QoS Routing on OSPFv3
Design and Implementation of an Anycast Efficient QoS Routing on OSPFv3 Han Zhi-nan Yan Wei Zhang Li Wang Yue Computer Network Laboratory Department of Computer Science & Technology, Peking University
More informationRequest for Comments: 2711 Category: Standards Track BBN October 1999
Network Working Group Request for Comments: 2711 Category: Standards Track C. Partridge BBN A. Jackson BBN October 1999 IPv6 Router Alert Option Status of this Memo This document specifies an Internet
More informationNetwork Working Group Request for Comments: September IANA Considerations for the IPv4 and IPv6 Router Alert Options
Network Working Group Request for Comments: 5350 Updates: 2113, 3175 Category: Standards Track J. Manner TKK A. McDonald Siemens/Roke September 2008 IANA Considerations for the IPv4 and IPv6 Router Alert
More informationINFS 766 Internet Security Protocols. Lecture 1 Firewalls. Prof. Ravi Sandhu INTERNET INSECURITY
INFS 766 Internet Security Protocols Lecture 1 Firewalls Prof. Ravi Sandhu INTERNET INSECURITY Internet insecurity spreads at Internet speed Morris worm of 1987 Password sniffing attacks in 1994 IP spoofing
More informationETSI TS V ( )
TS 124 322 V12.1.0 (2014-10) TECHNICAL SPECIFICATION Universal Mobile Telecommunications System (UMTS); LTE; Tunnelling of IP Multimedia Subsystem (IMS) services over restrictive access networks; Stage
More informationExam Questions Demo https://www.certifyforsure.com/dumps/ Cisco. Exam Questions CCIE Security Written Exam.
Cisco Exam Questions 400-251 CCIE Security Written Exam Version:Demo 1.. According to RFC 4890, which three message must be dropped at the transit firewall/router?(choose three.) A. Router Renumbering(Type
More informationQoS in IPv6. Madrid Global IPv6 Summit 2002 March Alberto López Toledo.
QoS in IPv6 Madrid Global IPv6 Summit 2002 March 2002 Alberto López Toledo alberto@dit.upm.es, alberto@dif.um.es Madrid Global IPv6 Summit What is Quality of Service? Quality: reliable delivery of data
More informationTCP/IP protocol suite
TCP/IP protocol suite The TCP/IP protocol suite was developed prior to the OSI model. Therefore, the layers in the TCP/IP protocol suite do not match exactly with those in the OSI model. The original TCP/IP
More informationCCNA Exploration Network Fundamentals. Chapter 06 Addressing the Network IPv4
CCNA Exploration Network Fundamentals Chapter 06 Addressing the Network IPv4 Updated: 20/05/2008 1 6.0.1 Introduction Addressing is a key function of Network layer protocols that enables data communication
More informationVirtual Private Networks (VPN)
CYBR 230 Jeff Shafer University of the Pacific Virtual Private Networks (VPN) 2 Schedule This Week Mon September 4 Labor Day No class! Wed September 6 VPN Project 1 Work Fri September 8 IPv6? Project 1
More informationDistributed Systems. 27. Firewalls and Virtual Private Networks Paul Krzyzanowski. Rutgers University. Fall 2013
Distributed Systems 27. Firewalls and Virtual Private Networks Paul Krzyzanowski Rutgers University Fall 2013 November 25, 2013 2013 Paul Krzyzanowski 1 Network Security Goals Confidentiality: sensitive
More informationNetwork Security. Thierry Sans
Network Security Thierry Sans HTTP SMTP DNS BGP The Protocol Stack Application TCP UDP Transport IPv4 IPv6 ICMP Network ARP Link Ethernet WiFi The attacker is capable of confidentiality integrity availability
More informationSecurity Engineering. Lecture 16 Network Security Fabio Massacci (with the courtesy of W. Stallings)
Security Lecture 16 Network Security Fabio Massacci (with the courtesy of W. Stallings) Lecture Outline Network Attacks Attive Attacks Passive Attacks TCP Attacks Contermeasures IPSec SSL/TLS Firewalls
More informationRequest for Comments: 3989 Category: Informational T. Taylor Nortel February Middlebox Communications (MIDCOM) Protocol Semantics
Network Working Group Request for Comments: 3989 Category: Informational M. Stiemerling J. Quittek NEC T. Taylor Nortel February 2005 Status of This Memo Middlebox Communications (MIDCOM) Protocol Semantics
More informationVoIP Security Threat Analysis
2005/8/2 VoIP Security Threat Analysis Saverio Niccolini, Jürgen Quittek, Marcus Brunner, Martin Stiemerling (NEC, Network Laboratories, Heidelberg) Introduction Security attacks taxonomy Denial of Service
More informationELEC5616 COMPUTER & NETWORK SECURITY
ELEC5616 COMPUTER & NETWORK SECURITY Lecture 17: Network Protocols I IP The Internet Protocol (IP) is a stateless protocol that is used to send packets from one machine to another using 32- bit addresses
More informationInternet Engineering Task Force. G. Karagiannis University of Twente. February 2004
Internet Engineering Task Force INTERNET-DRAFT Expires July 2004 A. Bader L. Westberg Ericsson G. Karagiannis University of Twente RMD (Resource Management in Diffserv) QoS-NSLP model draft-bader-rmd-qos-model-00.txt
More informationTransitioning to IPv6
Transitioning to IPv6 麟瑞科技區域銷售事業處副處長張晃崚 CCIE #13673 2007 Cisco Systems, Inc. All rights reserved. ICND2 v1.0 7-1 IPv4 and IPv6 Currently, there are approximately 1.3 billion usable IPv4 addresses available.
More informationTransition Strategies from IPv4 to IPv6: The case of GRNET
Transition Strategies from IPv4 to IPv6: The case of GRNET C. Bouras 1,2, P. Ganos 1, A. Karaliotas 1,2 1 Research Academic Computer Technology Institute, Patras, Greece 2 Department of Computer Engineering
More information