EA C451 Vishal Gupta.

Slides:



Advertisements
Similar presentations
Welcome to Middleware Joseph Amrithraj
Advertisements

Module 5: Configuring Access to Internal Resources.
6 The IP Multimedia Subsystem Selected Topics in Information Security – Bazara Barry.
1-1 Introduction to Computer Networks and Data Communications.
Chapter 16 AAA. AAA Components  AAA server –Authenticates users accessing a device or network –Authorizes user to perform specific activities –Performs.
A Guide to major network components
Using RADIUS Within the Framework of the School Environment Charles Bolen Systems Engineer December 6, 2011.
Using RADIUS Within the Framework of the School Environment Ed Register Consultant April 6, 2011.
Chapter Overview Network Communications.
Network Components: Assignment Three
Networks – Network Architecture Network architecture is specification of design principles (including data formats and procedures) for creating a network.
11 SECURING YOUR NETWORK PERIMETER Chapter 10. Chapter 10: SECURING YOUR NETWORK PERIMETER2 CHAPTER OBJECTIVES  Establish secure topologies.  Secure.
Module 11: Remote Access Fundamentals
VIRTUAL PRIVATE NETWORK By: Tammy Be Khoa Kieu Stephen Tran Michael Tse.
Network Security. 2 SECURITY REQUIREMENTS Privacy (Confidentiality) Data only be accessible by authorized parties Authenticity A host or service be able.
Client/Server Model: A Business View The different Client/server implementations differ according to: 1.Where the processing for the presentation of information.
Network Components David Blakeley LTEC HUB A common connection point for devices in a network. Hubs are commonly used to connect segments of a LAN.
ITGS Network Architecture. ITGS Network architecture –The way computers are logically organized on a network, and the role each takes. Client/server network.
© 2005,2006 NeoAccel Inc. Partners Presentation Authentication & Access Control.
Access Control Chapter 3 Part 4 Pages 227 to 241.
Computer Network Architecture Lecture 7: OSI Model Layers Examples II 1 26/12/2012.
BITS Pilani Pilani | Dubai | Goa | Hyderabad EA C451 Vishal Gupta.
4.3 Network Layer Logical Addressing
Chapter Objectives In this chapter, you will learn:
Sensors Journal, IEEE, Issue Date: May 2013,
Chapter 1 Introduction to Networking
Security Methods and Practice CET4884
Authors: Jiang Xie, Ian F. Akyildiz
Introduction Wireless devices offering IP connectivity
Module 3: Enabling Access to Internet Resources
Virtual Private Networks
MANAGEMENT AND METHODS OF MOBILE IP SECURITY
Simplified AeroMACS Testbed ( 1 MS and 1 BS)
Integration of and Third-Generation Wireless Data Networks
NETWORK Unit 1 Module: 2 Objective: 7.
Enabling Secure Internet Access with TMG
CONNECTING TO THE INTERNET
Networking Devices.
Connecting LANs, Backbone Networks
Computer Data Security & Privacy
Securing the Network Perimeter with ISA 2004
Server Concepts Dr. Charles W. Kann.
Implementing TMG Server Publishing
Chapter 3: Windows7 Part 4.
Wireless Communication CDMA EVDO Systems
Chapter 9 Internetworking
IS4550 Security Policies and Implementation
15-1 Networking Computer network A collection of computing devices that are connected in various ways in order to communicate and share resources Usually,
Lecture # 7 Firewalls الجدر النارية. Lecture # 7 Firewalls الجدر النارية.
Chapter 1 Data Communications and NM Overview 1-1 Chapter 1
* Essential Network Security Book Slides.
PPPoE Internet Point to Point Protocol over Ethernet
ISMS Information Security Management System
IS4680 Security Auditing for Compliance
Goals Introduce the Windows Server 2003 family of operating systems
Master in progettista di servizi radiomobili Web Based Overview
Application Layer Mobility Management Scheme for Wireless Internet
NETWORK Unit 1 Module: 2 Objective: 7.
NETWORK Unit 1 Module: 2 Objective: 7.
Networking Computer network A collection of computing devices that are connected in various ways in order to communicate and share resources Usually,
Networking Computer network A collection of computing devices that are connected in various ways in order to communicate and share resources Usually,
AbbottLink™ - IP Address Overview
Traffic Processing in the Internet
Networking Computer network A collection of computing devices that are connected in various ways in order to communicate and share resources Usually,
Introduction to Network Security
By Seferash B Asfa Wossen Strayer University 3rd December 2003
Networking Computer network A collection of computing devices that are connected in various ways in order to communicate and share resources Usually,
Computer Networks Protocols
Networking Computer network A collection of computing devices that are connected in various ways in order to communicate and share resources Usually,
Network programming Lecture 1 Prepared by: Dr. Osama Mokhtar.
Presentation transcript:

EA C451 Vishal Gupta

Agenda: Few 3G-WLAN Internetworking Architectures

Hybrid Coupling with Radio Access system

NOTE: You are required to understand the following architectures and analyze is, logically. Try to answer the open questions given at the end. You are not required to remember these architectures. These are proposed by individual researchers. Of course, from examination point of view (of EA C451), you can be given any new architecture to analyze it. The idea is to show you that how you can explore further in this field and take up research further.

Questions How to map the ID’s information into IP address. Is it possible?? Source station always knows the destination IP address. Is it possible ?? If node becomes mobile, the serving Base station/wlan/RNC changes. Since this information is correctly required in the IP address, how mobility is achieved ?? Which network entity is responsible to populate the various databases ?? Can similar architecture function for tight coupling also ?? Who is responsible for AAA services ??

Integration of 802.11 and Third-Generation Wireless Data Networks

Gateway Design

Security/Accounting subsystem Radius Server Remote Authentication Dial In User Service (RADIUS) is a networking protocol that provides centralized Authentication, Authorization, and Accounting (AAA) management for computers to connect and use a network service. it is often used by ISPs and enterprises to manage access to the Internet or internal networks, wireless networks, and integrated e-mail services. RADIUS is a client/server protocol that runs in the application layer, using UDP as transport. RADIUS serves three functions: to authenticate users or devices before granting them access to a network to authorize those users or devices for certain network services to account for usage of those services.

Mobile IP agent Dynamic Firewall QoS module Accounting module Implements mobile IP agent functionality. Supports role of both home agent and foreign agent. Dynamic Firewall It is used to install complex sets of packet filtering rules that depend on per user policy. QoS module Accounting module Integrated web cache

Improved Mobility Management Scheme

Intra Domain Mobility Management Protocol Fig: Network Architecture

Fig: Signaling flow during interdomain movement

Improved Version of previous one