58 research outputs found

    Convergence: the next big step

    Get PDF
    Recently, web based multimedia services have gained popularity and have proven themselves to be viable means of communication. This has inspired the telecommunication service providers and network operators to reinvent themselves to try and provide value added IP centric services. There was need for a system which would allow new services to be introduced rapidly with reduced capital expense (CAPEX) and operational expense (OPEX) through increased efficiency in network utilization. Various organizations and standardization agencies have been working together to establish such a system. Internet Protocol Multimedia Subsystem (IMS) is a result of these efforts. IMS is an application level system. It is being developed by 3GPP (3rd Generation Partnership Project) and 3GPP2 (3rd Generation Partnership Project 2) in collaboration with IETF (Internet Engineering Task Force), ITU-T (International Telecommunication Union – Telecommunication Standardization Sector), and ETSI (European Telecommunications Standards Institute) etc. Initially, the main aim of IMS was to bring together the internet and the cellular world, but it has extended to include traditional wire line telecommunication systems as well. It utilizes existing internet protocols such as SIP (Session Initiation Protocol), AAA (Authentication, Authorization and Accounting protocol), and COPS (Common Open Policy Service) etc, and modifies them to meet the stringent requirements of reliable, real time communication systems. The advantages of IMS include easy service quality management (QoS), mobility management, service control and integration. At present a lot of attention is being paid to providing bundled up services in the home environment. Service providers have been successful in providing traditional telephony, high speed internet and cable services in a single package. But there is very little integration among these services. IMS can provide a way to integrate them as well as extend the possibility of various other services to be added to allow increased automation in the home environment. This thesis extends the concept of IMS to provide convergence and facilitate internetworking of the various bundled services available in the home environment; this may include but is not limited to communications (wired and wireless), entertainment, security etc. In this thesis, I present a converged home environment which has a number of elements providing a variety of communication and entertainment services. The proposed network would allow effective interworking of these elements, based on IMS architecture. My aim is to depict the possible advantages of using IMS to provide convergence, automation and integration at the residential level

    Internet Authentication for Remote Access

    Get PDF
    It is expected that future IP devices will employ a variety of different network access technologies to gain ubiquitous connectivity. Currently there are no authentication protocols available that are lightweight, can be carried over arbitrary access networks, and are flexible enough to be re-used in the many different contexts that are likely to arise in future Internet remote access. Furthermore, existing access procedures need to be enhanced to offer protection against Denial-of-Service (DoS) attacks, and do not provide non-repudiation. In addition to being limited to specific access media, some of these protocols are limited to specific network topologies and are not scalable. This thesis reviews the authentication infrastructure challenges for future Internet remote access supporting ubiquitous client mobility, and proposes a series of solutions obtained by adapting and reinforcing security techniques arising from a variety of different sources. The focus is on entity authentication protocols that can be carried both by the IETF PANA authentication carrier and by the EAP mechanisms, and possibly making use of an AAA infrastructure. The core idea is to adapt authentication protocols arising from the mobile telecommunications sphere to Internet remote access. A proposal is also given for Internet access using a public key based authentication protocol. The subsequent security analysis of the proposed authentication protocols covers a variety of aspects, including: key freshness, DoS-resistance, and "false-entity-in-the-middle" attacks, in addition to identity privacy of users accessing the Internet via mobile devices. This work aims primarily at contributing to ongoing research on the authentication infrastructure for the Internet remote access environment, and at reviewing and adapting authentication solutions implemented in other spheres, for instance in mobile telecommunications systems, for use in Internet remote access networks supporting ubiquitous mobilit

    Intégration et gestion de mobilité de bout en bout dans les réseaux mobiles de prochaine génération

    Get PDF
    Résumé - Pendant les dix derniÚres années, l'utilisation des systÚmes de communication sans fil est devenue de plus en plus populaire tant chez les entreprises que chez les particuliers. Cette nouvelle tendance du marché est due, en grande partie, à la performance grandissante des réseaux mobiles qui concurrencent davantage les réseaux filaires en termes de bande passante, de coût et de couverture. Toutefois, cette catégorie de solutions sans fil est conçue pour des services spécifiques et utilise des technologies trÚs variées. De plus, les usagers sont de plus en plus mobiles et requiÚrent des applications sensibles au délai (voix, multimédia, etc.). Dans ce nouveau contexte de mobilité, la prochaine génération des réseaux sans fil (4G) s'annonce comme l'ultime solution visant à satisfaire les exigences des usagers tout en tirant profit de la complémentarité des services offerts par les systÚmes mobiles existants. Pour ce faire, la principale vocation de la future génération (4G) consiste en l'intégration et la convergence des technologies sans fil existantes et celles à venir. Cette intégration passe obligatoirement par l'utilisation du protocole IP (Internet Protocol) qui permet de cacher l'hétérogénéité des systÚmes intégrés puisqu'il demeure l'unique couche commune à toutes les plateformes mobiles. Plusieurs solutions d'intégration ont été proposées dans la littérature. Celles-ci concernent des architectures d'intégration et des mécanismes de gestion de mobilité. Cependant, les approches proposées ne font pas l'unanimité et souffrent de plusieurs handicaps liés, en particulier, à l'interopérabilité et la garantie des relÚves sans coupures.----------ABSTRACT During the last few years, the use of wireless systems is becoming more and more popular. This tendency can be explained by the fact that mobile technologies are gaining in performance in terms of bandwidth, coverage and cost compared to the traditional wired solutions. However, each mobile network is tailored for a specific type of services and users. Moreover, end users are expected to become more and more mobile and show an increasing interest to real-time applications. In these circumstances, the next generation of mobile networks (4G) appears to be the ultimate solution that will satisfy mobile user demands and take benefit of the existing wireless systems. Indeed, the future generation consists of integrating, in an intelligent manner, the existing/future wireless systems in a way that users can obtain their services via the best available network. This integration passes through the use of the Internet Protocol (IP) that will hide the heterogeneity pertaining to the integrated networks. To deal with this very important task, several solutions are available in the literature. The proposed approaches cover some basic topics such as interworking architecture and mobility management. Nevertheless, these proposals suffer from drawbacks relevant to the guarantee of QoS through heterogeneous technologies

    On the development of Voice over IP

    Get PDF
    This record of study documents the experience acquired during my internship at Sonus Networks, Inc. for the Doctor of Engineering Program. In this record of study, I have surveyed and analyzed the current standardization status of Voice over Internet Protocol (VoIP) security and proposed an Internet draft on secure retargeting and response identity. The draft provides a simple and comprehensive solution to the response identity, call recipient identity and intermediate server retargeting problems in the Session Initiation Protocol (SIP) call setup process. To support product line development and enable product evolution in the quickly growing VoIP market, I have proposed a generic development framework for SIP application servers. The common and open architecture of the framework supports multiple products development and facilitates integration of new service modules. The systematical reuse of proven software design and implementation enables companies to reduce the development cost and shorten the time-to-market. As the development and diffusion of VoIP can never be isolated from the social sphere, I have investigated the current status, influence and interaction of three most important factors: standardization, market forces and government regulation on the development and diffusion of VoIP. The worldwide deregulation and market privatization have caused the transition of the standards development model. This transition in turn influences the market diffusion. Other than standardization, market forces including customer needs, the revenue pressure on carriers and vendors, competitive and economic environment, social culture and regulation uncertainties create both threats and opportunities. I have examined market drivers and obstacles in the current VoIP adoption stage, analyzed current VoIP market players and their strategies, and predicted the direction of VoIP business. The regulation creates the macro environment in which VoIP develops and diffuses. I have explored modern telecommunications regulation principles based on which government makes decisions on most current issues, including 911 support, mergers and acquisitions, interconnection obligation and leasing rights, rate structure and universal service fees

    IP Mobility in Wireless Operator Networks

    Get PDF
    Wireless network access is gaining increased heterogeneity in terms of the types of IP capable access technologies. The access network heterogeneity is an outcome of incremental and evolutionary approach of building new infrastructure. The recent success of multi-radio terminals drives both building a new infrastructure and implicit deployment of heterogeneous access networks. Typically there is no economical reason to replace the existing infrastructure when building a new one. The gradual migration phase usually takes several years. IP-based mobility across different access networks may involve both horizontal and vertical handovers. Depending on the networking environment, the mobile terminal may be attached to the network through multiple access technologies. Consequently, the terminal may send and receive packets through multiple networks simultaneously. This dissertation addresses the introduction of IP Mobility paradigm into the existing mobile operator network infrastructure that have not originally been designed for multi-access and IP Mobility. We propose a model for the future wireless networking and roaming architecture that does not require revolutionary technology changes and can be deployed without unnecessary complexity. The model proposes a clear separation of operator roles: (i) access operator, (ii) service operator, and (iii) inter-connection and roaming provider. The separation allows each type of an operator to have their own development path and business models without artificial bindings with each other. We also propose minimum requirements for the new model. We present the state of the art of IP Mobility. We also present results of standardization efforts in IP-based wireless architectures. Finally, we present experimentation results of IP-level mobility in various wireless operator deployments.Erilaiset langattomat verkkoyhteydet lisÀÀntyvÀt Internet-kykyisten teknologioiden muodossa. Lukuisten eri teknologioiden pÀÀllekkÀinen kÀyttö johtuu vÀhitellen ja tarpeen mukaan rakennetusta verkkoinfrastruktuurista. Useita radioteknologioita (kuten WLAN, GSM ja UMTS) sisÀltÀvien pÀÀtelaitteiden (kuten Àlypuhelimet ja kannettavat tietokoneet) viimeaikainen kaupallinen menestys edesauttaa uuden verkkoinfrastruktuurin rakentamista, sekÀ mahdollisesti johtaa verkkoteknologioiden kirjon lisÀÀntymiseen. Olemassa olevaa verkkoinfrastruktuuria ei kaupallisista syistÀ kannata korvata uudella teknologialla yhdellÀ kertaa, vaan vaiheittainen siirtymÀvaihe kestÀÀ tyypillisesti useita vuosia. Internet-kykyiset pÀÀtelaitteet voivat liikkua joko saman verkkoteknologian sisÀllÀ tai eri verkkoteknologioiden vÀlillÀ. VerkkoympÀristöstÀ riippuen liikkuvat pÀÀtelaitteet voivat liittyÀ verkkoon useiden verkkoyhteyksien kautta. NÀin ollen pÀÀtelaite voi lÀhettÀÀ ja vastaanottaa tietoliikennepaketteja yhtÀaikaisesti lukuisia verkkoja pitkin. TÀmÀ vÀitöskirja kÀsittelee Internet-teknologioiden liikkuvuutta ja nÀiden teknologioiden tuomista olemassa oleviin langattomien verkko-operaattorien verkkoinfrastruktuureihin. KÀsiteltÀviÀ verkkoinfrastruktuureita ei alun perin ole suunniteltu Internet-teknologian liikkuvuuden ja monien yhtÀaikaisten yhteyksien ehdoilla. TÀssÀ työssÀ ehdotetaan tulevaisuuden langattomien verkkojen arkkitehtuurimallia ja ratkaisuja verkkovierailujen toteuttamiseksi. Ehdotettu arkkitehtuuri voidaan toteuttaa ilman mittavia teknologisia mullistuksia. Mallin mukaisessa ehdotuksessa verkko-operaattorin roolit jaetaan selkeÀsti (i) verkko-operaattoriin, (ii) palveluoperaattoriin ja (iii) yhteys- sekÀ verkkovierailuoperaattoriin. Roolijako mahdollistaa sen, ettÀ kukin operaattorityyppi voi kehittyÀ itsenÀisesti, ja ettÀ teennÀiset verkkoteknologiasidonnaisuudet poistuvat palveluiden tuottamisessa. TyössÀ esitetÀÀn myös alustava vaatimuslista ehdotetulle mallille, esimerkiksi yhteysoperaattorien laatuvaatimukset. VÀitöskirja esittelee myös liikkuvien Internet-teknologioiden viimeisimmÀn kehityksen. TyössÀ nÀytetÀÀn lisÀksi standardointituloksia Internet-kykyisissÀ langattomissa arkkitehtuureissa

    A network mobility management architecture for a heteregeneous network environment

    Get PDF
    Network mobility management enables mobility of personal area networks and vehicular networks across heterogeneous access networks using a Mobile Router. This dissertation presents a network mobility management architecture for minimizing the impact of handoffs on the communications of nodes in the mobile network. The architecture addresses mobility in legacy networks without infrastructure support, but can also exploit infrastructure support for improved handoff performance. Further, the proposed architecture increases the efficiency of communications of nodes in the mobile network with counter parts in the fixed network through the use of caching and route optimization. The performance and costs of the proposed architecture are evaluated through empirical and numerical analysis. The analysis shows the feasibility of the architecture in the networks of today and in those of the near future.Verkkojen liikkuuvudenhallinta mahdollistaa henkilökohtaisten ja ajoneuvoihin asennettujen verkkojen liikkuvuuden heterogeenisessÀ verkkoympÀristössÀ kÀyttÀen liikkuvaa reititintÀ. TÀmÀ vÀitöskirja esittÀÀ uuden arkkitehtuurin verkkojen liikkuvuudenhallintaan, joka minimoi verkonvaihdon vaikutuksen pÀÀtelaitteiden yhteyksiin. Vanhoissa verkoissa, joiden infrastruktuuri ei tue verkkojen liikkuvuutta, verkonvaihdos tÀytyy hallita liikkuvassa reitittimessa. Standardoitu verkkojen liikkuvuudenhallintaprotokolla NEMO mahdollistaa tÀmÀn kÀyttÀen ankkurisolmua kiinteÀssÀ verkossa pakettien toimittamiseen pÀÀtelaitteiden kommunikaatiokumppaneilta liikkuvalle reitittimelle. NEMO:ssa verkonvaihdos aiheuttaa kÀynnissÀ olevien yhteyksien keskeytymisen yli sekunnin mittaiseksi ajaksi, aiheuttaen merkittÀvÀÀ hÀiriötÀ viestintÀsovelluksille. EsitetyssÀ arkkitehtuurissa verkonvaihdon vaikutus minimoidaan varustamalla liikkuva reititin kahdella radiolla. KÀyttÀen kahta radiota liikkuva reititin pystyy suorittamaan verkonvaihdon keskeyttÀmÀttÀ pÀÀtelaitteiden yhteyksiÀ, mikÀli verkonvaihtoon on riittÀvÀsti aikaa. KÀytettÀvissa oleva aika riippuu liikkuvan reitittimen nopeudesta ja radioverkon rakenteesta. Arkkitehtuuri osaa myös hyödyntÀÀ infrastruktuurin tukea saumattomaan verkonvaihtoon. Verkkoinfrastruktuurin tuki nopeuttaa verkonvaihdosprosessia, kasvattaenmaksimaalista verkonvaihdos tahtia. TÀllöin liikkuva reitin voi kÀyttÀÀ lyhyen kantaman radioverkkoja, joiden solun sÀde on yli 80m, ajonopeuksilla 90m/s asti ilman, ettÀ verkonvaihdos keskeyttÀÀ pÀÀtelaitteiden yhteyksiÀ. LisÀksi ehdotettu arkkitehtuuri tehostaa kommunikaatiota kÀyttÀen cache-palvelimia liikkuvassa ja kiinteÀssÀ verkossa ja optimoitua reititystÀ liikkuvien pÀÀtelaitteiden ja kiinteÀssÀ verkossa olevien kommunikaatiosolmujen vÀlillÀ. Cache-palvelinarkkitehtuuri hyödyntÀÀ vapaita radioresursseja liikkuvan verkon cache-palvelimen vÀlimuistin pÀivittÀmiseen. HeterogeenisessÀ verkkoympÀristossÀ cache-palvelimen pÀivitys suoritetaan lyhyen kantaman laajakaistaisia radioverkkoja kÀyttÀen. Liikkuvan reitittimen siirtyessÀ laajakaistaisen radioverkon peitealueen ulkopuolelle pÀÀtelaitteille palvellaan sisÀltöÀ, kuten www sivuja tai videota cache-palvelimelta, sÀÀstÀen laajemman kantaman radioverkon rajoitetumpia resursseja. Arkkitehtuurissa kÀytetÀÀn optimoitua reititystÀ pÀÀtelaitteiden ja niiden kommunikaatiokumppaneiden vÀlillÀ. Optimoitu reititysmekanismi vÀhentÀÀ liikkuvuudenhallintaan kÀytettyjen protokollien langattoman verkon resurssien kulutusta. LisÀksi optimoitu reititysmekanismi tehostaa pakettien reititystÀ kÀyttÀen suorinta reittiÀ kommunikaatiosolmujen vÀlillÀ. Esitetyn arkkitehtuurin suorituskyky arvioidaan empiirisen ja numeerisen analyysin avulla. Analyysi arvioi arkkitehtuurin suorituskykyÀ ja vertaa sitÀ aikaisemmin ehdotettuihin ratkaisuihin ja osoittaa arkkitehtuurin soveltuvan nykyisiin ja lÀhitulevaisuuden langattomiin verkkoihin.reviewe

    Collaboration Enforcement In Mobile Ad Hoc Networks

    Get PDF
    Mobile Ad hoc NETworks (MANETs) have attracted great research interest in recent years. Among many issues, lack of motivation for participating nodes to collaborate forms a major obstacle to the adoption of MANETs. Many contemporary collaboration enforcement techniques employ reputation mechanisms for nodes to avoid and penalize malicious participants. Reputation information is propagated among participants and updated based on complicated trust relationships to thwart false accusation of benign nodes. The aforementioned strategy suffers from low scalability and is likely to be exploited by adversaries. To address these problems, we first propose a finite state model. With this technique, no reputation information is propagated in the network and malicious nodes cannot cause false penalty to benign hosts. Misbehaving node detection is performed on-demand; and malicious node punishment and avoidance are accomplished by only maintaining reputation information within neighboring nodes. This scheme, however, requires that each node equip with a tamper-proof hardware. In the second technique, no such restriction applies. Participating nodes classify their one-hop neighbors through direct observation and misbehaving nodes are penalized within their localities. Data packets are dynamically rerouted to circumvent selfish nodes. In both schemes, overall network performance is greatly enhanced. Our approach significantly simplifies the collaboration enforcement process, incurs low overhead, and is robust against various malicious behaviors. Simulation results based on different system configurations indicate that the proposed technique can significantly improve network performance with very low communication cost
    • 

    corecore