506 research outputs found

    IMPLEMENTASI INTERKONEKSI SIP USER AGENT IPV6 DAN IPV4 DENGAN METODA TRANSLASI PROTOKOL PADA JARINGAN VOIP

    Get PDF
    ABSTRAKSI: Sebagaimana IP versi 6 (IPv6) telah mendapat dukungan luas, akan terdapat suatu periode transisi di mana host yang menggunakan IP versi 4 (IPv4) akan berkeinginan membentuk sesi dengan host yang menggunakan IPv6 ataupun sebaliknya. Begitu juga yang terjadi pada aplikasi VoIP (Voice over Internet Protocol) yang mana telah dimungkinkan untuk dapat berlangsung pada kedua versi IP tersebut. Dari beberapa banyak metode transisi antara IPv6 dan IPv4 yang memungkinkan, metode efisien yang disarankan untuk itu yakni metode Translasi Protokol (Protocol Translation). Hal itu didasarkan pada kekurangan dan kelebihan dari masing-masing protokol serta realita jaringan yang telah terimplementasi sekarang ini. Dalam tugas akhir ini didesain suatu sistem translator yang disebut “Border Router” untuk aplikasi VoIP dengan standar SIP (Session Initiation Protocol) yang meliputi sub-sistem NAT-PT (Network Address Translation – Protocol Translation) dan ALG (Application Layer Gateway) sehingga SIP User Agent IPv6 dapat menghubungi SIP User Agent IPv4 dan sebaliknya, serta menjelaskan proses yang terjadi sehingga kedua host dengan protokol yang berbeda tersebut dapat saling berkomunikasi. Pembangunan sistem interkoneksi SIP tersebut dilakukan tanpa memodifikasi software pada masing-masing endpoint. Sehingga investasi yang telah dilakukan terhadap perangkat dan sistem yang lama (jaringan SIPv4) dapat tetap digunakan sebagaimana mestinya.Kata Kunci : -ABSTRACT: As IP version 6 (IPv6) gains acceptance, there will be a period of transition during which host using IP version 4 (IPv4) will wish to establish session with host using IPv6 or vice versa. So also that happened at VoIP (Voice over Internet Protocol) application which have been enabled to work both of the IP version. From many conducive transition method between IPv6 and IPv4, the efficient method which suggested for that namely Protocol Translation method. That thing is based on excess and insuffiency from each protocol and also network reality which have been implemented at this time. In this final project, it was designed translator system called “Border Router” for VoIP application with SIP (Session Initiation Protocol) standard that covering subsystems, like NAT-PT (Network Address Translation - Protocol Translation) and ALG (Application Layer Gateway), that allow SIP User Agent IPv6 to call SIP User Agent IPv4 and vice versa, and also explain process that happened at both of host with the different protocol can communicate each other. Development of the SIP interconnection system is conducted without modifying software at each endpoint. So that investment which have been done to peripheral and past system (SIPv4 network) earn remain to be used properly.Keyword:

    Secure SIP between IPv4 endpoints and IPv6 endpoints

    Get PDF
    The Internet Protocol version 6 (IPv6) is designed to replace the current version IPv4. However, there will continue to be a demand for IPv4-based end users to access IPv6-based services, and vice versa. Some transition mechanisms are necessary to make IPv6 and IPv4 compatible. Network Address Translation--Protocol Translation (NAT-PT) can provide protocol translation at the network layer. The Session Initiation Protocol (SIP) is an application layer control protocol that can initiate, modify and terminate interactive communication sessions between end users. When SIP is used with NAT-PT, a special Application Level Gateway (ALG) is required to handle the translation of the addresses inside the SIP messages. This thesis introduces an implementation of a SIP-ALG. The SIP-ALG is responsible for translating IPv6 addresses in a SIP packet into the corresponding IPv4 addresses, and vice versa, relying on the functionalities of NAT-PT as the packet traverses across the boundary between IPv6 and IPv4. In addition, this thesis describes and models a SIP end-to-end security solution between IPv4 end points and IPv6 end points, given that involvement of the SIP-ALG seems to be in conflict with the primary requirements of the end-to-end security. The proposed mechanism lets a SIP endpoint authorize a security proxy server to encrypt the SIP bodies on behalf of the end point. The security proxy will discover the capabilities of the receiving party and encrypt the SIP bodies for the other SIP security proxy server in the receiving domain. IP address translation must be done before the encryption at the sending security proxy or after the decryption at the receiving security proxy

    ALEX: Improving SIP Support in Systems with Multiple Network Addresses

    Get PDF
    The successful and increasingly adopted session initiation protocol (SIP) does not adequately support hosts with multiple network addresses, such as dual-stack (IPv4-IPv6) or IPv6 multi-homed devices. This paper presents the Address List Extension (ALEX) to SIP that adds effective support to systems with multiple addresses, such as dual-stack hosts or multi-homed IPv6 hosts. ALEX enables IPv6 transport to be used for SIP messages, as well as for communication sessions between SIP user agents (UAs), whenever possible and without compromising compatibility with ALEX-unaware UAs and SIP servers

    A Survey on Handover Management in Mobility Architectures

    Full text link
    This work presents a comprehensive and structured taxonomy of available techniques for managing the handover process in mobility architectures. Representative works from the existing literature have been divided into appropriate categories, based on their ability to support horizontal handovers, vertical handovers and multihoming. We describe approaches designed to work on the current Internet (i.e. IPv4-based networks), as well as those that have been devised for the "future" Internet (e.g. IPv6-based networks and extensions). Quantitative measures and qualitative indicators are also presented and used to evaluate and compare the examined approaches. This critical review provides some valuable guidelines and suggestions for designing and developing mobility architectures, including some practical expedients (e.g. those required in the current Internet environment), aimed to cope with the presence of NAT/firewalls and to provide support to legacy systems and several communication protocols working at the application layer

    IP-Based Mobility Management and Handover Latency Measurement in heterogeneous environments

    Get PDF
    One serious concern in the ubiquitous networks is the seamless vertical handover management between different wireless technologies. To meet this challenge, many standardization organizations proposed different protocols at different layers of the protocol stack. The Internet Engineering Task Force (IETF) has different groups working on mobility at IP level in order to enhance mobile IPv4 and mobile IPv6 with different variants: HMIPv6 (Hierarchical Mobile IPv6), FMIPv6 (Fast Mobile IPv6) and PMIPv6 (Proxy Mobile IPv6) for seamless handover. Moreover, the IEEE 802.21 standard provides another framework for seamless handover. The 3GPP standard provides the Access Network and Selection Function (ANDSF) to support seamless handover between 3GPP – non 3GPP networks like Wi-Fi, considered as untrusted, and WIMAX considered as trusted networks. In this paper, we present an in-depth analysis of seamless vertical handover protocols and a handover latency comparison of the main mobility management approaches in the literature. The comparison shows the advantages and drawbacks of every mechanism in order to facilitate the adoption of the convenient one for vertical handover within Next Generation Network (NGN) environments. Keywords: Seamless vertical handover, mobility management protocols, IEEE 802.21 MIH, handover latenc

    Providing End-to-End Connectivity to SIP User Agents Behind NATs

    Get PDF
    The widespread diffusion of private networks in SOHO scenarios is fostering an increased deployment of Network Address Translators (NATs). The presence of NATs seriously limits end-to-end connectivity and prevents protocols like the Session Initiation Protocol (SIP) from working properly. This document shows how the Address List Extension (ALEX), which was originally developed to provide dual-stack and multi-homing support to SIP, can be used, with minor modifications, to ensure end-to-end connectivity for both media and signaling flows, without relying on intermediate relay nodes whenever it is possibl

    Roaming Real-Time Applications - Mobility Services in IPv6 Networks

    Full text link
    Emerging mobility standards within the next generation Internet Protocol, IPv6, promise to continuously operate devices roaming between IP networks. Associated with the paradigm of ubiquitous computing and communication, network technology is on the spot to deliver voice and videoconferencing as a standard internet solution. However, current roaming procedures are too slow, to remain seamless for real-time applications. Multicast mobility still waits for a convincing design. This paper investigates the temporal behaviour of mobile IPv6 with dedicated focus on topological impacts. Extending the hierarchical mobile IPv6 approach we suggest protocol improvements for a continuous handover, which may serve bidirectional multicast communication, as well. Along this line a multicast mobility concept is introduced as a service for clients and sources, as they are of dedicated importance in multipoint conferencing applications. The mechanisms introduced do not rely on assumptions of any specific multicast routing protocol in use.Comment: 15 pages, 5 figure

    A unified mobility and session management platform for next generation mobile networks

    Get PDF

    Development of a communication environment between IPv6 and IPv4

    Get PDF
    The aim of this paper is to present the design, specification, implementation and testing of a demonstration environment for examining a genuinely new communication technique. This technique ensures that 3G mobile networks can communicate with legacy Internet phones. More than one levels of the TCP/IP protocol family are necessary for the communication, so we had to develop device drivers and user level applications too. The different levels require various development techniques and tools, whose efficiently combined usage is emphasized

    IPv6 Network Mobility

    Get PDF
    Network Authentication, Authorization, and Accounting has been used since before the days of the Internet as we know it today. Authentication asks the question, “Who or what are you?” Authorization asks, “What are you allowed to do?” And fi nally, accounting wants to know, “What did you do?” These fundamental security building blocks are being used in expanded ways today. The fi rst part of this two-part series focused on the overall concepts of AAA, the elements involved in AAA communications, and highlevel approaches to achieving specifi c AAA goals. It was published in IPJ Volume 10, No. 1[0]. This second part of the series discusses the protocols involved, specifi c applications of AAA, and considerations for the future of AAA
    • …
    corecore