...IPSec in Mobile IP DONE BY: SALEM ITANI SUBMITTED TO: Dr. AYMAN KAYSSI DATE: MAY 21, 2001 ID #: 20011003 INTRODUCTION As mobile computing has become a reality, new technologies and protocols have been developed to provide to mobile users the services that already exist for non-mobile users. Mobile IP, one of these technologies, enables a node to change its point of attachment to an internet in a manner transparent to applications running on top of the protocol stack, since its IP address does not change. To provide this transparency, new elements are required: the “home agent”(HA), located in the home network, will forward all incoming packets addressed to the mobile node’s (MN) new location. The foreign agent (FA) is responsible for providing a temporary address to the MN. The flexibility of communication through the Internet allows the existence of such protocols as Mobile IP. As much as this is true, it is as well the fact that every time new protocols or services are made available on the Internet, new security challenges arise. IPSec has been developed as a protocol to provide security at the IP layer. That is to say, using IPSec all communications on the Internet can be accomplished in a secure fashion. Providing security is not an easy task, since many situations have to be taken into account. The approach IPSec uses to address security is by managing two key concepts: privacy and authentication. In this paper, the MOBILE IPv4 & MOBILE...
Words: 9748 - Pages: 39
...Department of Integrated Communications Systems Student research project (Mobile IP in Source Routing Systems) Supervisor: Dipl.-Inf. Florian Liers Editor: Imad kailouh Ilmenau, July 2010 1. Introduction ............................................................................................................. 4 1.1 Motivation .......................................................................................................... 4 1.2 Purpose of the work .......................................................................................... 4 2. Basics ..................................................................................................................... 5 2.1 Internet Protocol (IP) ......................................................................................... 5 2.1.1 IP Routing....................................................................................................... 5 2.1.1.1 What is routing ...................................................................................... 5 2.1.1.2 Source vs. Hop by Hop Routing ............................................................ 5 2.2 Mobile IP ........................................................................................................... 7 2.2.1 Terminology in Mobile IP ............................................................................. 7 2.2.2 How Mobile IP Works ...........................................................................
Words: 7747 - Pages: 31
...THE SPECIFICATIONS AND INFORMATION REGARDING THE PRODUCTS IN THIS MANUAL ARE SUBJECT TO CHANGE WITHOUT NOTICE. ALL STATEMENTS, INFORMATION, AND RECOMMENDATIONS IN THIS MANUAL ARE BELIEVED TO BE ACCURATE BUT ARE PRESENTED WITHOUT WARRANTY OF ANY KIND, EXPRESS OR IMPLIED. USERS MUST TAKE FULL RESPONSIBILITY FOR THEIR APPLICATION OF ANY PRODUCTS. THE SOFTWARE LICENSE AND LIMITED WARRANTY FOR THE ACCOMPANYING PRODUCT ARE SET FORTH IN THE INFORMATION PACKET THAT SHIPPED WITH THE PRODUCT AND ARE INCORPORATED HEREIN BY THIS REFERENCE. IF YOU ARE UNABLE TO LOCATE THE SOFTWARE LICENSE OR LIMITED WARRANTY, CONTACT YOUR CISCO REPRESENTATIVE FOR A COPY. The following information is for FCC compliance of Class A devices: This equipment has been tested and found to comply with the limits for a Class A digital device, pursuant to part 15 of the FCC rules. These limits are designed to provide reasonable protection against harmful interference when the equipment is operated in a commercial environment. This equipment generates, uses, and can radiate radio-frequency energy and, if not installed and used in accordance with the instruction manual, may cause harmful interference to radio communications. Operation of this equipment in a residential area is likely to cause harmful interference, in which case users will be required to correct the interference at their own expense. The following information is for FCC compliance of Class B devices: This equipment has been tested and found to comply with...
Words: 26881 - Pages: 108
... MIS589 Week 5 Homework June 4, 2014 R17. What is the difference between a permanent address and a care-of address? Who assigns a care-of address? In mobile network a permanent address for a mobile node is its IP address when it is at its home network. A care-of-address is the one its gets when it is visiting a foreign network In the Mobile Internet Protocol (Mobile IP), a home address is the relatively permanent IP address given to a mobile node. The home address remains unchanged no matter where the mobile node is located. The Internet Engineering Task Force (IETF) defines the home address in RFC 2002, IP Mobility Support, which describes an enhancement to the Internet Protocol (IP) that makes it easier to replug a mobile device into networks other than its home network. Care-of-Address, on the other hand is, is a temporary IP address for a mobile node (mobile device) that enables message delivery when the device is connecting from somewhere other than its home network. The care-of address identifies a mobile node's current point of attachment to the Internet and makes it possible to connect from a different location without changing the device's home address (permanent IP address). The Foreign Agent that on the visiting or foreign network assigns the Care-Of-Address to the mobile node. R1. What are the differences between message confidentiality and message integrity? Can you have confidentiality without integrity? Can you have integrity...
Words: 538 - Pages: 3
...It converts the host name into an Internet Protocol (IP) addresses. Domain names are in alphabetic form easy for human to remember. Nonetheless, the World Wide Web (WWW) is run based on IP addresses. Therefore, without the DNS the internet would be very difficult to access. Today, there are two versions of IP 4 and 6 that use DNS. With the growing number of devices with internet IP address, IPv4 is running out of addresses and will eventually be replaced by IPv6. But until then, it is important to understand the many similarities and contrast between both versions. Domain Name Servers and Internet Protocol The core of how the internet works is the DNS, which was created to simplify the unmanageable computer naming. Thus, allowing us to use a more human friendly host name while exchanging email or accessing web pages. An IP address is a numerical label assigned by the Internet Assigned Numbers Authority (IANA) to every host in order to communicate. (Gralla, 2006). The DNS will translate host name like www.google.com into a raw IP address number 173.194.40.197. DNS structure is a hierarchical distributed database. At the top level there is a root server. Many categories were created under the root called the top level domains: .Com, .Net, .Org, .Mil, .Edu, .Gov, and .Int. When a client device requests a communication with a host like www.google.com, the DNS client uses a resolver to convert the host name into an IP address. First, the DNS will send a request to the root...
Words: 1390 - Pages: 6
...Getting a Mobile IP is extremely important for any kind of mobile devices linked to the internet. In case there was no Mobile IP, a computer device would need to get a fresh IP each time it shifted from one network to a different one. The reason is since TCP/IP depends on origin as well as destination IP handles for being referenced in the data packet headers: Which means the mobile devices are not able of modifying the IP address as well as maintaining a continuous link. That's the place where Mobile IP comes into play as well as altered that. Having Mobile IP every time a device goes to afresh network, the IP address of the device is provided. One of the benefits of using Mobile IP which is obvious to everybody is that it lets the cordless devices to move around freely into new networks without losing net connection. For users which use cordless devices on a regular basis, it means that maintaining online connectivity to VPNs as well as company intranets, enhances employees efficiency. (Cisco, 2007)Just like anything else there are also drawbacks to Mobile IP. There are lots of routers on the market which are designed to throw away packages which are meant for IP addresses that do not exist in the networks. This is chiefly carried out prevent the network from any attacks. So as to fix this issue, there will have to be enhanced header sizes, that leads to a higher amount of net traffic loads. There are lots of items that are keeping back Mobile IP. Obsolete as well as rival proprietary...
Words: 322 - Pages: 2
...Wireless IP Solutions Enhancement Business Plan 2014 September 17 draft Rosemary Thorsen TBS Complex Mobile Solutions Content Market Problem and Opportunity Market Analysis Market & Product Strategy Product Requirements Project Schedule Business Advantages Success Criteria Risk Assessment Implementation & Launch Plans Financial Data 2 TELUS Confidential 2 Market Problem and Opportunity Wireless IP Solution Portfolio – Problem and Opportunity What was this portfolio designed for? capabilities - Originally designed to support CDMA Architecture 7 years ago - Built to implement 2 to 3 enterprise clients per month - Focused on modem market in the enterprise segment (C BAN Only) - Mostly in ILEC territories with MPLS network (in Canada) Where does this need to evolve to? - Support M2M & Non M2M (Smartphone) growth on LTE network and beyond - >500K+ loads annually and more in coming years - Across ENT, TBS and Partner segments for all devices (Modems, POS, Routers, Smartphones, Tablets, ATMs, Cars) - Across ILEC / Non ILEC territories (TELUS, Non TELUS, Internet) and even international connectivity 4 TELUS Confidential TELUS restricted and confidential– not for distribution 4 Mobile Business Drivers the courage to innovate TBS Segment • Provide controlled real-time access to business applications and systems for mobile workers in the business market Machine-to-Machine • Provide secure...
Words: 5354 - Pages: 22
...ITT Technical Institute NT2640 IP Networking Onsite Course SYLLABUS Credit hours: 4.5 Contact/Instructional hours: 56 (34 Theory Hours, 22 Lab Hours) Prerequisite(s) and/or Corequisite(s): Prerequisites: NT1210 Introduction to Networking or equivalent Course Description: This course explores network design and implementation by applying the TCP/IP protocols to provide connectivity and associated services. Planning and deployment of network addressing structures, as well as router and switch configurations, are also examined. IP Networking Syllabus Where Does This Course Belong? This course is required in the associate degree program in Network Systems Administration and associate degree in Mobile Communications Technology. The following diagrams indicate how this course relates to other courses in respective programs: Network Systems Administration NT2799 NSA Capstone Project NT2580 Introduction to Information Security NT2670 Email and Web Services NT2640 IP Networking PT2520 Database Concepts NT1330 Client-Server Networking II NT1230 Client-Server Networking I NT1430 Linux Networking PT1420 Introduction to Programming NT1110 Computer Structure and Logic NT1201 Introduction to Networking NT1310 Physical Networking CO2520 Communications SP2750 Group Theories EN1420 Composition II EN1320 Composition I GS1140 Problem Solving Theory GS1145 Strategies for the Technical Professional MA1210 College Mathematics...
Words: 2573 - Pages: 11
...request will be shocking to some organizations, which is why American Registry for Internet Numbers (ARIN) is trying to get the word out now on the importance of moving to Internet Protocol version six (IPv6). The Internet Protocol version six (IPv6) address space, the next generation of Internet Protocol (IP) addressing, provides 340 trillion trillion trillion (34x10 to the 38th power) internet addresses. The question is what will happen to Internet Protocol version four (IPv4) in future? Is Internet Prorocol version four (IPv4) may be available for a longer period of time? Before further discussing the topic, we should know what is Internet Protocol (IP). Internet Protocol (IP) is a set of technical rules that defines how computers communicate over a network. Now, there are two versions of Internet Protocol (IP), there are Internet Protocol version four (IPv4) and Interner Protocol version six (IPv6). Internet Protocol version four (IPv4) was the first version of Internet Protocol (IP) to be widely used, and accounts for most of today’s Internet traffic. There are just over four billion Internet Protocol version four (IPv4) addresses. While that is a lot of Internet Protocol (IP) addresses, but it is not enough to last forever. Internet Protocol version four (IPv4) is a system of addresses used to...
Words: 3742 - Pages: 15
...increasing number of standards, terminologies and buzz-words used within the video conferencing industry that can make understanding what is both available and compatible a minefield. We have the H.300's, the G.700's, the T.120's and the H.460's, not to mention ISDN, LAN, WAN, ADSL, VPN and POTS all mixed with NTSC, PAL and CIF. To complicate matters more, we also have to deal with the forthcoming media-enabled 3G mobile phone and how this links in with existing systems. This document explains what these standards, terminologies and buzz-words mean, how they relate to the various communications infrastructures of video conferencing and how they relate to each other. It is assumed that the reader has a general knowledge of Video Conferencing systems. However, the following technical papers are available to provide more information: * How do I choose a Video Conferencing system? * H.323 Terminals, Gatekeepers, Gateways & MCUs. * Global Dialling Scheme (GDS) for Schools VideoConferencing. * H.323 Dial Plan and Service Codes used by Gatekeepers etc. * IP Ports and Protocols used by H.323 Devices. * Cost Efficient ISDN Conferencing, including Multipoint Access. * H.221 Framing used in ISDN Conferences. International Telecommunications Union & The Internet Engineering Task Force. Telecommunications standards are set by the United Nations agency, International Telecommunications Union (ITU)and the Internet Engineering Task Force (IETF). Products that...
Words: 5144 - Pages: 21
...Expectations from students: The aim of this Term Paper is to produce a Programming logic or Animation on the assigned Topic. The assignment is to read the existing system/problem and create a program of your concept to obtain the expected results. Assistance from text and reference books, articles and reports on the concerned topics from Internet can be taken but the animation logic should be your own piece of work. Along with, students are supposed to write an abstract of the topic with example, real world applications, and impact on society or solutions recommended. Abstract submission: (3-4 pages) • Description of the topic • Example of the given topic • Future plan of the given work. The Abstract (Synopsis) of the topic must be submitted latest by 15thof Sept and submission will be accepted thereafter. Final submission: a) A report containing following contents: 1. Introduction Provide a brief textual description of the problem. Elaborate on the given problem statement, providing some more detail. 2. Background a. What was the weakness in the previous algorithm/concepts and requirement of existing algorithm/concept? 3. Methodology : a. Steps of making the program (graphics be used to showcase the output) 4. Observation a. Result in the form of output and a well formatted report. 5. Future Scope and Suggestion --- Suggestion to improve the existing...
Words: 835 - Pages: 4
...To view a Netflix video from a pc or mobile, first you need to be connected to a broadband internet service. This could be through a cable or either a wireless network such as Wi-Fi. Wi-Fi is a type of wireless networking protocol that allows devices to communicate without cords or cables. Broadband internet is a service of data communication which allows you to connect your browser with internet and communicate through a network much faster than dial-up connections. In a process of watching a video on Netflix, your computer, your router, Netflix servers and Comcast which acts as the ISP (Internet service provider) are all a part of the network. A network consists of two or more computers or any other devices such as mobiles that are linked. Each of these devices which are connected directly or indirectly to the internet has unique internet protocol address or IP address. An IP address is a binary number that uniquely identifies computers and other devices on a TCP/IP network and helps computers find each other. Netflix uses a unique delivery method called streaming video. The process is that it sends a small segment of the video to your computer through data packets. While you are viewing this segment, Netflix send the next segment and so on until the video end. This way, your device, can plays the video while it continues to receive it without even storing the data on its hard drive. These segments or any other information that you send or receive through the network, are also...
Words: 411 - Pages: 2
...IP Security. Simplified! In recent years, IP surveillance products have really picked up steam and have been widely accepted by the security industry. This could be attributed to lowered costs and eased concerns over their pitfalls. Although, their rapid adaptation can be attributed to their attractive standardized use of HD quality resolution (1080p or 2MP), their path to complete market domination has been stunted by their ever-demanding storage capacity and bandwidth requirements. Good news is that this too is slowly but surely becoming a thing of the past. Issue over their storage limitations have been eased by employing a newer, more efficient video compression algorithm—h.264, and by utilizing more expensive but larger capacity hard disk drives. And bandwidth-related issues such as network overflow, bottlenecking, and network crashes, can be alleviated by having a seasoned IT/networking specialist on duty. Albeit—at all times. And because of this, chances are you are either completely ignoring the IP video trend, or searching for that perfect solution that works well for you and your client’s needs without having to throw copious amounts of money at it. Simpler solution is to just stick to what you know—analogue-based installations; however, looking at the rising number of HD TV’s, megapixel cameras, and powerful smart personal communication devices, which now all utilizes 1080p resolution or better displays and recording mechanics, why shouldn’t you...
Words: 861 - Pages: 4
...NT1210 Introduction to Networking Unit 1: Mid-Term Mid Term Review 1 Nibble, Byte, Word, Double Word Nibble, Byte, Word, Double Word Figure 1-2 2 Kilobyte, Megabyte, Gigabyte, Terabyte Size (2N Bytes) Term Size (Bytes) Kilobyte Megabyte Gigabyte Terabyte 1024 1,048,576 1,073,741,824 1,099,511,627,776 Kilobyte, Megabyte, Gigabyte, Terabyte 210 220 230 240 Rounded by Size (Bytes) 1,000 1,000,000 1,000,000,000 1,000,000,000,000 Table 1-1 3 Random Access Memory (RAM) Physically exists as set of microchips installed on plastic card (memory module) Central Processing Unit (CPU) uses RAM like people g ( ) p p use notepad Stores binary value so can use it later Can read data from RAM to recall value stored earlier CPU sends electrical signal over bus (electrical pathway) to communicate with RAM 4 Random Access Memory (RAM) (cont.) RAM uses address for each unique memory location where byte can be stored To write to RAM: CPU sends signal to RAM over the bus g to write (store) value into byte of RAM Address in RAM Value to be written To read from RAM: CPU uses similar process (see example in Figure 1-3 on next slide) 5 CPU Reads Byte 4 from RAM The CPU uses the same bus to read the current value of a byte in RAM as it does to send a message to RAM. The read request lists the address of the particular byte, asking for its value. RAM returns the binary value stored at that address. CPU Reads Byte 4 from RAM 6 Figure 1-3 Writing Individual Bits in Byte 4 of RAM...
Words: 11596 - Pages: 47
...A permanent address for a mobile node is its IP address when it is at its home network. A care-of-address is the one its gets when it is visiting a foreign network. The COA is assigned by the foreign agent (which can be the edge router in the foreign network or the mobile node itself). •Chapter 8—Questions R1, R3, R29. R1. Confidentiality is the property that the original plaintext message can not be determined by an attacker who intercepts the ciphertext-encryption of the original plaintext message.Message integrity is the property that the receiver can detect whether the message sent (whether encrypted or not) was altered in transit. The two are thus different concepts,and one can have one without the other. An encrypted message that is altered in transmit may still be confidential (the attacker can not determine the original plaintext) but will not have message integrity if the error is undetected. Similarly, a message that is altered in transit (and detected) could have been sent in plaintext and thus would not be confidential. R3. In symmetric key systems, the keys of receiver and sender are identical and are secret. In public key systems, a pair of keys is used. One of the keys is known to both receiver and sender, or in other word, to the whole world, while the other key is known only by sender. That’s the major difference between the two systems. R29. Stateful and Stateless IP .. There are several advantages to using a static IP filter. It has a combination...
Words: 320 - Pages: 2