53 research outputs found

    Traffic engineering in multihomed sites

    Get PDF
    It is expected that IPv6 multihomed sites will obtain as many global prefixes as direct providers they have, so traffic engineering techniques currently used in IPv4 multihomed sites is no longer suitable. However, traffic engineering is required for several reasons, and in particular, for being able to properly support multimedia communications. In this paper we present a framework for traffic engineering in IPv6 multihomed sites with multiple global prefixes. Within this framework, we have included several tools such as DNS record manipulation and proper configuration of the policy table defined in RFC 3484. To provide automation in the management of traffic engineering, we analyzed the usage of two mechanisms to configure the policy table.This work has been partly supported by the European Union under the E-Next Project FP6-506869 and by the OPTINET6 project TIC-2003-09042-C03-01.Publicad

    NAT64/DNS64 in the Networks with DNSSEC

    Get PDF
    ZvyĆĄuj?c? se pod?l resolverĆŻ a aplikac? pouĆŸ?vaj?c? DNS-over-HTTPSvede k vyĆĄ?mu pod?lu klientĆŻ pouĆŸ?vaj?c?ch DNS resolvery tƙet?chstran. KvĆŻli tomu ovĆĄem selhĂĄvĂĄ nejpouĆŸ?vanějĆĄ? NAT64 detekčn?metoda RFC7050[1], coĆŸ vede u klientĆŻ pouĆŸ?vaj?c?ch pƙechodovĂ©mechanismy NAT64/DNS64 nebo 464XLAT k neschopnosti tytopƙechodovĂ© mechanismy sprĂĄvně detekovat, a t?m k nedostupnostiobsahu dostupnĂ©ho pouze po IPv4. C?lem tĂ©to prĂĄce je navrhnoutnovou detekčn? metodu postavenou na DNS, kterĂĄ bude pracovati s resolvery tƙet?ch stran, a bude schopnĂĄ vyuĆŸ?t zabezpečen? DNSdat pomoc? technologie DNSSEC. PrĂĄce popisuje aktuĂĄlně standardizovanĂ©metody, protokoly na kterĂœch zĂĄvis?, jejich omezen?a interakce s ostatn?mi metodami. NavrhovanĂĄ metoda pouĆŸ?vĂĄ SRVzĂĄznamy k pƙenosu informace o pouĆŸitĂ©m NAT64 prefixu v globĂĄln?mDNS stromu. ProtoĆŸe navrĆŸenĂĄ metoda pouĆŸ?vĂĄ jiĆŸ standardizovanĂ©protokoly a typy zĂĄznamĆŻ, je snadno nasaditelnĂĄ bez nutnostimodifikovat jak DNS server, tak s?t'ovou infrastrukturu. ProtoĆŸemetoda pouĆŸ?vĂĄ k distribuci informace o pouĆŸitĂ©m prefixu globĂĄln?DNS strom, umoĆŸĆˆuje to metodě pouĆŸ?t k zabezpečen? technologiiDNSSEC. To tĂ©to metodě dĂĄvĂĄ lepĆĄ? bezpečnostn? vlastnosti neĆŸjakĂ© vykazuj? pƙedchoz? metody. Tato prĂĄce vytváƙ? standardizačn?bĂĄzi pro standardizaci v rĂĄmci IETF.The rising number of DNS-over-HTTPS capable resolvers and applicationsresults in the higher use of third-party DNS resolvers byclients. Because of that, the currently most deployed method of theNAT64 prefix detection, the RFC7050[1], fails to detect the NAT64prefix. As a result, clients using either NAT64/DNS64 or 464XLATtransition mechanisms fail to detect the NAT64 prefix properly,making the IPv4-only resources inaccessible. The aim of this thesisis to develop a new DNS-based detection method that would workwith foreign DNS and utilize added security by the DNS securityextension, the DNSSEC. The thesis describes current methods ofthe NAT64 prefix detection, their underlying protocols, and theirlimitations in their coexistence with other network protocols. Thedeveloped method uses the SRV record type to transmit the NAT64prefix in the global DNS tree. Because the proposed method usesalready existing protocols and record types, the method is easilydeployable without any modification of the server or the transportinfrastructure. Due to the global DNS tree usage, the developedmethod can utilize the security provided by the DNSSEC and thereforeshows better security characteristics than previous methods.This thesis forms the basis for standardization effort in the IETF.

    IPv6-kotiverkon liittÀminen Internetin nimipalveluun

    Get PDF
    Current home networks are very simple containing only a few devices. As the number of devices connected to the home network increases, there is no reasonable way for a user to access devices using only IP addresses. Due to the exponential growth of devices connected to the Internet, the addresses of the current IP version are however soon to be depleted. A new IP version has already been implemented in the Internet, containing a very large amount of addresses compared to the current IP version. Addresses in the new IP address version are also much longer and more complicated. Therefore it is not reasonable to try to use IP addresses alone to access devices anymore. The previous facts force to implement a name service to the home network. Name service is quite similar to that used in the Internet, although the home network version should be much more automatic and user friendly. This means that users do not have to type IP addresses anymore to be able to access services, but they can use meaningful names like in the Internet. The first objective of the thesis is to examine methods to implement as automated name service as possible to the home network. Second objective is to examine connecting the home network name service to the Internet name service. Accomplishing this allows users to access services at home from the Internet. This has to be made in a secure manner to protect the integrity and authenticity of the user information. A live experiment of the thesis concentrates to the second objective of the thesis by establishing the connection and transferring the name service information between home network and the Internet name service. The study and the live experiments indicate that there is still work to be done before the two objectives can be fully accomplished. At the moment there is no convenient way to automatically name devices at home. Connecting to the Internet name service involves also quite a lot of effort, thus requiring more than basic computing skills from the user

    An investigation into Off-Link IPv6 host enumeration search methods

    Get PDF
    This research investigated search methods for enumerating networked devices on off-link 64 bit Internet Protocol version 6 (IPv6) subnetworks. IPv6 host enumeration is an emerging research area involving strategies to enable detection of networked devices on IPv6 networks. Host enumeration is an integral component in vulnerability assessments (VAs), and can be used to strengthen the security profile of a system. Recently, host enumeration has been applied to Internet-wide VAs in an effort to detect devices that are vulnerable to specific threats. These host enumeration exercises rely on the fact that the existing Internet Protocol version 4 (IPv4) can be exhaustively enumerated in less than an hour. The same is not true for IPv6, which would take over 584,940 years to enumerate a single network. As such, research is required to determine appropriate host enumeration search methods for IPv6, given that the protocol is seeing increase global usage. For this study, a survey of Internet resources was conducted to gather information about the nature of IPv6 usage in real-world scenarios. The collected survey data revealed patterns in the usage of IPv6 that influenced search techniques. The research tested the efficacy of various searching algorithms against IPv6 datasets through the use of simulation. Multiple algorithms were devised to test different approaches to host enumeration against 64 bit IPv6 subnetworks. Of these, a novel adaptive heuristic search algorithm, a genetic algorithm and a stripe search algorithm were chosen to conduct off-link IPv6 host enumeration. The suitability of a linear algorithm, a Monte Carlo algorithm and a pattern heuristics algorithm were also tested for their suitability in searching off-link IPv6 networks. These algorithms were applied to two test IPv6 address datasets, one comprised of unique IPv6 data observed during the survey phase, and one comprised of unique IPv6 data generated using pseudorandom number generators. Searching against the two unique datasets was performed in order to determine appropriate strategies for off-link host enumeration under circumstances where networked devices were configured with addresses that represented real-word IPv6 addresses, and where device addresses were configured through some randomisation function. Whilst the outcomes of this research support that an exhaustive enumeration of an IPv6 network is infeasible, it has been demonstrated that devices on IPv6 networks can be enumerated. In particular, it was identified that the linear search technique and the variants tested in this study (pattern search and stripe search), remained the most consistent means of enumerating an IPv6 network. Machine learning methods were also successfully applied to the problem. It was determined that the novel adaptive heuristic search algorithm was an appropriate candidate for search operations. The adaptive heuristic search algorithm successfully enumerated over 24% of the available devices on the dataset that was crafted from surveyed IPv6 address data. Moreover, it was confirmed that stochastic address generation can reduce the effectiveness of enumeration strategies, as all of the algorithms failed to enumerate more than 1% of hosts against a pseudorandomly generated dataset. This research highlights a requirement for effective IPv6 host enumeration algorithms, and presents and validates appropriate methods. The methods presented in this thesis can help to influence the tools and utilities that are used to conduct host enumeration exercises

    Analyzing challenging aspects of IPv6 over IPv4

    Get PDF
    The exponential expansion of the Internet has exhausted the IPv4 addresses provided by IANA. The new IP edition, i.e. IPv6 introduced by IETF with new features such as a simplified packet header, a greater address space, a different address sort, improved encryption, powerful section routing, and stronger QoS. ISPs are slowly seeking to migrate from current IPv4 physical networks to new generation IPv6 networks. ‎The move from actual IPv4 to software-based IPv6 is very sluggish, since billions of computers across the globe use IPv4 addresses. The configuration and actions of IP4 and IPv6 protocols are distinct. Direct correspondence between IPv4 and IPv6 is also not feasible. In terms of the incompatibility problems, all protocols can co-exist throughout the transformation for a few years. Compatibility, interoperability, and stability are key concerns between IP4 and IPv6 protocols. After the conversion of the network through an IPv6, the move causes several issues for ISPs. The key challenges faced by ISPs are packet traversing, routing scalability, performance reliability, and protection. Within this study, we meticulously analyzed a detailed overview of all aforementioned issues during switching into ipv6 network

    Mobility management across converged IP-based heterogeneous access networks

    Get PDF
    This thesis was submitted for the degree of Doctor of Philosophy and awarded by Brunel University, 8/2/2010.In order to satisfy customer demand for a high performance “global” mobility service, network operators (ISPs, carriers, mobile operators, etc.) are facing the need to evolve to a converged “all-IP” centric heterogeneous access infrastructure. However, the integration of such heterogeneous access networks (e.g. 802.11, 802.16e, UMTS etc) brings major mobility issues. This thesis tackles issues plaguing existing mobility management solutions in converged IP-based heterogeneous networks. In order to do so, the thesis firstly proposes a cross-layer mechanism using the upcoming IEEE802.21 MIH services to make intelligent and optimized handovers. In this respect, FMIPv6 is integrated with the IEEE802.21 mechanism to provide seamless mobility during the overall handover process. The proposed solution is then applied in a simulated vehicular environment to optimize the NEMO handover process. It is shown through analysis and simulations of the signalling process that the overall expected handover (both L2 and L3) latency in FMIPv6 can be reduced by the proposed mechanism by 69%. Secondly, it is expected that the operator of a Next Generation Network will provide mobility as a service that will generate significant revenues. As a result, dynamic service bootstrapping and authorization mechanisms must be in place to efficiently deploy a mobility service (without static provisioning), which will allow only legitimate users to access the service. A GNU Linux based test-bed has been implemented to demonstrate this. The experiments presented show the handover performance of the secured FMIPv6 over the implemented test-bed compared to plain FMIPv6 and MIPv6 by providing quantitative measurements and results on the quality of experience perceived by the users of IPv6 multimedia applications. The results show the inclusion of the additional signalling of the proposed architecture for the purpose of authorization and bootstrapping (i.e. key distribution using HOKEY) has no adverse effect on the overall handover process. Also, using a formal security analysis tool, it is shown that the proposed mechanism is safe/secure from the induced security threats. Lastly, a novel IEEE802.21 assisted EAP based re-authentication scheme over a service authorization and bootstrapping framework is presented. AAA based authentication mechanisms like EAP incur signalling overheads due to large RTTs. As a result, overall handover latency also increases. Therefore, a fast re-authentication scheme is presented which utilizes IEEE802.21 MIH services to minimize the EAP authentication process delays and as a result reduce the overall handover latency. Analysis of the signalling process based on analytical results shows that the overall handover latency for mobility protocols will be approximately reduced by 70% by the proposed scheme

    IP Mobility in Wireless Operator Networks

    Get PDF
    Wireless network access is gaining increased heterogeneity in terms of the types of IP capable access technologies. The access network heterogeneity is an outcome of incremental and evolutionary approach of building new infrastructure. The recent success of multi-radio terminals drives both building a new infrastructure and implicit deployment of heterogeneous access networks. Typically there is no economical reason to replace the existing infrastructure when building a new one. The gradual migration phase usually takes several years. IP-based mobility across different access networks may involve both horizontal and vertical handovers. Depending on the networking environment, the mobile terminal may be attached to the network through multiple access technologies. Consequently, the terminal may send and receive packets through multiple networks simultaneously. This dissertation addresses the introduction of IP Mobility paradigm into the existing mobile operator network infrastructure that have not originally been designed for multi-access and IP Mobility. We propose a model for the future wireless networking and roaming architecture that does not require revolutionary technology changes and can be deployed without unnecessary complexity. The model proposes a clear separation of operator roles: (i) access operator, (ii) service operator, and (iii) inter-connection and roaming provider. The separation allows each type of an operator to have their own development path and business models without artificial bindings with each other. We also propose minimum requirements for the new model. We present the state of the art of IP Mobility. We also present results of standardization efforts in IP-based wireless architectures. Finally, we present experimentation results of IP-level mobility in various wireless operator deployments.Erilaiset langattomat verkkoyhteydet lisÀÀntyvÀt Internet-kykyisten teknologioiden muodossa. Lukuisten eri teknologioiden pÀÀllekkÀinen kÀyttö johtuu vÀhitellen ja tarpeen mukaan rakennetusta verkkoinfrastruktuurista. Useita radioteknologioita (kuten WLAN, GSM ja UMTS) sisÀltÀvien pÀÀtelaitteiden (kuten Àlypuhelimet ja kannettavat tietokoneet) viimeaikainen kaupallinen menestys edesauttaa uuden verkkoinfrastruktuurin rakentamista, sekÀ mahdollisesti johtaa verkkoteknologioiden kirjon lisÀÀntymiseen. Olemassa olevaa verkkoinfrastruktuuria ei kaupallisista syistÀ kannata korvata uudella teknologialla yhdellÀ kertaa, vaan vaiheittainen siirtymÀvaihe kestÀÀ tyypillisesti useita vuosia. Internet-kykyiset pÀÀtelaitteet voivat liikkua joko saman verkkoteknologian sisÀllÀ tai eri verkkoteknologioiden vÀlillÀ. VerkkoympÀristöstÀ riippuen liikkuvat pÀÀtelaitteet voivat liittyÀ verkkoon useiden verkkoyhteyksien kautta. NÀin ollen pÀÀtelaite voi lÀhettÀÀ ja vastaanottaa tietoliikennepaketteja yhtÀaikaisesti lukuisia verkkoja pitkin. TÀmÀ vÀitöskirja kÀsittelee Internet-teknologioiden liikkuvuutta ja nÀiden teknologioiden tuomista olemassa oleviin langattomien verkko-operaattorien verkkoinfrastruktuureihin. KÀsiteltÀviÀ verkkoinfrastruktuureita ei alun perin ole suunniteltu Internet-teknologian liikkuvuuden ja monien yhtÀaikaisten yhteyksien ehdoilla. TÀssÀ työssÀ ehdotetaan tulevaisuuden langattomien verkkojen arkkitehtuurimallia ja ratkaisuja verkkovierailujen toteuttamiseksi. Ehdotettu arkkitehtuuri voidaan toteuttaa ilman mittavia teknologisia mullistuksia. Mallin mukaisessa ehdotuksessa verkko-operaattorin roolit jaetaan selkeÀsti (i) verkko-operaattoriin, (ii) palveluoperaattoriin ja (iii) yhteys- sekÀ verkkovierailuoperaattoriin. Roolijako mahdollistaa sen, ettÀ kukin operaattorityyppi voi kehittyÀ itsenÀisesti, ja ettÀ teennÀiset verkkoteknologiasidonnaisuudet poistuvat palveluiden tuottamisessa. TyössÀ esitetÀÀn myös alustava vaatimuslista ehdotetulle mallille, esimerkiksi yhteysoperaattorien laatuvaatimukset. VÀitöskirja esittelee myös liikkuvien Internet-teknologioiden viimeisimmÀn kehityksen. TyössÀ nÀytetÀÀn lisÀksi standardointituloksia Internet-kykyisissÀ langattomissa arkkitehtuureissa

    In the IP of the Beholder: Strategies for Active IPv6 Topology Discovery

    Get PDF
    Existing methods for active topology discovery within the IPv6 Internet largely mirror those of IPv4. In light of the large and sparsely populated address space, in conjunction with aggressive ICMPv6 rate limiting by routers, this work develops a different approach to Internet-wide IPv6 topology mapping. We adopt randomized probing techniques in order to distribute probing load, minimize the effects of rate limiting, and probe at higher rates. Second, we extensively analyze the efficiency and efficacy of various IPv6 hitlists and target generation methods when used for topology discovery, and synthesize new target lists based on our empirical results to provide both breadth (coverage across networks) and depth (to find potential subnetting). Employing our probing strategy, we discover more than 1.3M IPv6 router interface addresses from a single vantage point. Finally, we share our prober implementation, synthesized target lists, and discovered IPv6 topology results

    Distributed mobility management solutions for next mobile network architectures

    Get PDF
    The architecture of current operator infrastructures is being challenged by the non-stopping growing demand of data hungry services appearing every day. While currently deployed operator networks have been able to cope with traffic demands so far, the architectures for the 5th generation of mobile networks (5G) are expected to support unprecedented traffic loads while decreasing costs associated to the network deployment and operations. Distributed Mobility Management (DMM) helps going into this direction, by flattening the network, hence improving its scalability, and enabling local access to the Internet and other communication services, like mobile-edge clouds. Initial proposals have been based on extending existing IP mobility protocols, such as Mobile IPv6 and Proxy Mobile IPv6, but these need to further evolve to comply with the requirements of future networks, which include, among others, higher flexibility. Software Defined Networking (SDN) appears as a powerful tool for operators looking forward to increased flexibility and reduced costs. In this article, we first propose a Proxy Mobile IPv6 based DMM solution which serves as a baseline for exploring the evolution of DMM towards SDN, including the identification of DMM design principles and challenges. Based on this investigation, we propose a SDN-based DMM solution which is evaluated against our baseline from analytic and experimental viewpoints.This work has been funded by the European Union’s Horizon 2020 programme under the grant agreement no. 671598 “5GCrosshaul: the 5G integrated fronthaul/backhaul”

    A hybrid network/host mobility management scheme for next generation networks

    Get PDF
    Includes bibliographical references.The author proposes a hybrid network/host interworking scheme to allow the MN to transition smoothly between different access networks supporting two distinct mobility approaches
    • 

    corecore