Triple Play / Multiplay Computer Networks 2007 Week 8 Lecture 2 by Donald Neal.

Slides:



Advertisements
Similar presentations
Umut Girit  One of the core members of the Internet Protocol Suite, the set of network protocols used for the Internet. With UDP, computer.
Advertisements

PPPoE Last Update Copyright Kenneth M. Chipps Ph.D. 1.
DSL Access Architectures and Protocols. xDSL Architecture.
History DHCP was first defined as a standards track protocol in RFC 1531 in October 1993, as an extension to the Bootstrap Protocol (BOOTP). The motivation.
Electronic Payment Billing for Internet Telephony and Services Edoardo Berera University of Nice Sophia Antipolis Telelinea 26 September 2001 Seminar on.
Radius Dave Grizzanti Steve Curti. What is RADIUS? Remote Authentication Dial-In User Service (RADIUS) is a protocol for remote user authentication and.
1 CHEETAH software OCS/AAA module Routing decision module Signaling module VLSR module Include TL1 proxy for Cisco MSPP Router disconnect module.
Chapter 18 RADIUS. RADIUS  Remote Authentication Dial-In User Service  Protocol used for communication between NAS and AAA server  Supports authentication,
Microsoft Windows Server 2003 TCP/IP Protocols and Services Technical Reference Slide: 1 Lesson 20 RADIUS and Internet Authentication Service.
1 Enabling Secure Internet Access with ISA Server.
70-291: MCSE Guide to Managing a Microsoft Windows Server 2003 Network Chapter 10: Remote Access.
A global, public network of computer networks. The largest computer network in the world. Computer Network A collection of computing devices connected.
Network Protocols. Why Protocols?  Rules and procedures to govern communication Some for transferring data Some for transferring data Some for route.
© 2007 Cisco Systems, Inc. All rights reserved.June The Network as the Platform: The Digital Revolution is Now! Monique Jeanne Morrow Distinguished.
Cs423-cotter1 P2P Discovering P2P (Miller) Internet.
 Introduction  VoIP  P2P Systems  Skype  SIP  Skype - SIP Similarities and Differences  Conclusion.
Remote Access Chapter 4. Learning Objectives Understand implications of IEEE 802.1x and how it is used Understand VPN technology and its uses for securing.
70-411: Administering Windows Server 2012
Objectives Configure routing in Windows Server 2008 Configure Routing and Remote Access Services in Windows Server 2008 Network Address Translation 1.
Dean Cheng Jouni Korhonen Mehamed Boucadair
COPS Common Open Policy Service Vemuri Namratha Kandaswamy Balasubramanian Venreddy Nireesha.
Vulnerabilities in peer to peer communications Web Security Sravan Kunnuri.
TCOM 509 – Internet Protocols (TCP/IP) Lecture 04_a Transport Protocols - UDP Instructor: Dr. Li-Chuan Chen Date: 09/22/2003 Based in part upon slides.

QUALCOMM Incorporated 1 Protocol Options for BSN- BSMCS Controller Interface Jun Wang, Kirti Gupta 05/16/2005 Notice: Contributors grant a free, irrevocable.
All Rights Reserved © Alcatel-Lucent 2006, ##### NZNOG 2007 Control Planes and RADIUS Bitses Alastair Johnson Senior IP Technologist, Alcatel-Lucent
70-291: MCSE Guide to Managing a Microsoft Windows Server 2003 Network, Enhanced Chapter 11: Internet Authentication Service.
Real-time Flow Management 2 BOF: Remote Packet Capture Extensions Jürgen Quittek NEC Europe Ltd, Heidelberg, Germany Georg Carle GMD.
1 Policy-based architecture. 2 Policy management view of the architecture IP MMed domain is a converged services domain where voice, video, data are provided.
RADIUS 2-Aug-2007.
AAA Services Authentication -Who ? -Management of the user’s identity Authorization -What can the user do? -Management of the granted services Accounting.
1 Week #5 Routing and NAT Network Overview Configuring Routing Configuring Network Address Translation Troubleshooting Routing and Remote Access.
© 2005,2006 NeoAccel Inc. Partners Presentation Authentication & Access Control.
RADIUS Protocol Sowjanya Talasila Shilpa Pamidimukkala.
ADVANCED COMPUTER NETWORKS Peer-Peer (P2P) Networks 1.
RADIUS What it is Remote Authentication Dial-In User Service
1 Chapter 13: RADIUS in Remote Access Designs Designs That Include RADIUS Essential RADIUS Design Concepts Data Protection in RADIUS Designs RADIUS Design.
Dean Cheng 81 st IETF Quebec City RADIUS Extensions for CGN Configurations draft-cheng-behave-cgn-cfg-radius-ext
Bit Torrent Nirav A. Vasa. Topics What is BitTorrent? Related Terms How BitTorrent works Steps involved in the working Advantages and Disadvantages.
Active Directory. Computers in organizations Computers are linked together for communication and sharing of resources There is always a need to administer.
JavaScript and Ajax (Internet Background) Week 1 Web site:
Computer Network Architecture Lecture 6: OSI Model Layers Examples 1 20/12/2012.
IETF66 PANA WG Problem Statement for a time-basis accounting in an "always-on“ Broadband scenario R. Maglione - Telecom Italia
COPS Common Open Policy Services Protocol IETF RFC 2748, 2749, 2753, 3084 Diana Rawlins WorldCom.
RADIUS By: Nicole Cappella. Overview  Central Authentication Services  Definition of RADIUS  “AAA Transaction”  Roaming  Security Issues and How.
Napster and Gnutella Protocols English micro-project Guillaume CASSIN May 31, 2001.
Virtual Private LAN Service
MBGP and Customer Routes
Scaling and Wholesale Computer Networks 2007 Week 7 Lecture 1 by Donald Neal.
Klara Nahrstedt Spring 2012
Module 3: Enabling Access to Internet Resources
Virtual Private Networks
Virtual Private Network (VPN)
Network Quality Monitoring System NQMS
Enabling Secure Internet Access with TMG
Firewall Issues Research Group GGF-15 Oct Boston, Ma Leon Gommans - University of Amsterdam Inder Monga - Nortel Networks.
EA C451 Vishal Gupta.
Klara Nahrstedt Spring 2014
Implementing TMG Server Publishing
Geoff Huston Research Scientist APNIC
Managing Online Services
Virtual Private Network (VPN)
Comparison of LAN, MAN, WAN
Server-to-Client Remote Access and DirectAccess
PPPoE Internet Point to Point Protocol over Ethernet
Goals Introduce the Windows Server 2003 family of operating systems
Lecture 3: Secure Network Architecture
AAA: A Survey and a Policy- Based Architecture and Framework
3GPP and SIP-AAA requirements
Computer Networks Protocols
Presentation transcript:

Triple Play / Multiplay Computer Networks 2007 Week 8 Lecture 2 by Donald Neal

Week 8 Lecture 2 COPS RADIUS CoA Triple Play / Quad Play / Multiplay Architecture

RADIUS, Again BRAS RADIUS Authentication RADIUS Accounting Access-Request Access-Accept (Policy) Authorisation at Session Start

RADIUS, Again BRAS RADIUS Authentication RADIUS Accounting Customer Database LDAP

(Self)Provisioning with RADIUS BRAS RADIUS Authentication RADIUS Accounting Customer Database LDAP WWW/Provisioning

Common Open Policy Service PEP Policy Enforcement Point Policy Server/ Policy Decision Point Client-Open (OPN) Client-Accept(CAT) One transaction per client type Keepalive (KA) Request (REQ) Decision (DEC) Report State (RPT)

Common Open Policy Service PEP Policy Enforcement Point Policy Server/ Policy Decision Point Decision (DEC) Report State (RPT) Delete Query State (DRQ) Report State(RPT) Client-Close Per-client type. Can be sent by PDP or by PEP.

Common Open Policy Service PEP Policy Enforcement Point Policy Server/ Policy Decision Point REQ causes the PDP to establish state for that IP address, ifindex and client type That state retained until PEP says it's no longer needed, or after contact with the PEP is lost. Every REQ has a DEC, but a DEC can be sent without a REQ.

(Self)Provisioning with COPS BRA S (PEP) RADIUS Authentication RADIUS Accounting Customer Database WWW COPS PDP (and accounting?)

COPS Authentication PEP Policy Enforcement Point Policy Server/ Policy Decision Point In Theory Client-Open (OPN) Client-Type AAA Client-Accept(CAT) Client-Open (OPN) Client-Type IP Client-Accept(CAT) Client-Open (OPN) Client-Type SIP... Not standardised?

The Goblin Channel BRA S (PEP) RADIUS Authentication Customer Database WWW COPS PDP (and accounting?) VIDEO INTERNET

Triple-Play Goblin Net BNG (PEP) RADIUS Authentication Customer Database Portal COPS Brains (PDP) VIDEO INTERNET VoIP

RADIUS Change of Authorisation BNG RADIUS Server CoA-Request CoA-Response Needs VSA.

RADIUS CoA - RFC | Code | Identifier | Length | | | | Authenticator | | | | Attributes Code The Code field is one octet, and identifies the type of RADIUS packet. Packets received with an invalid Code field MUST be silently discarded. RADIUS codes (decimal) for this extension are assigned as follows: 40 - Disconnect-Request [RFC2882] 41 - Disconnect-ACK [RFC2882] 42 - Disconnect-NAK [RFC2882] 43 - CoA-Request [RFC2882] 44 - CoA-ACK [RFC2882] 45 - CoA-NAK [RFC2882]

Triple Play / Quad Play / Multiplay

Geoff Huston in February 2006 “peer-to-peer file sharing has taken over the Internet, with estimates of between 45% to 70% of total internet traffic volumes being attributable to music and video sharing. This has turned the Internet into one of the more prodigious music and video distribution systems ever conceived. This shift in user behaviour has significant implications for the entertainment industry’s chosen distribution methods, and it is likely that the industry will ultimately come to terms with peer sharing technologies such as BitTorrent. The loser in all this is likely to be real time video delivery systems, so one reasonable conclusion is that real time content delivery, or Triple Play time, is over – BitTorrent has won over the user! -

And... Vodafone Apple Microsoft BBC DRM YouTube

Further Reading Broadband Network Architectures COPS RFC2748 – The COPS (Common Open Policy Service) Protocol RFC3084 – COPS Usage for Policy Provisioning RADIUS CoA RFC Dynamic Authorization Extensions to Remote Authentication Dial In User Service (RADIUS) BBC iPlayer Campaign Against DRM -

Reading for Next Lecture Pepelnjack & Guichard, MPLS and VPN Architectures pp. 5-30