Advisor : Whai-En Chen Speaker : Yen-Neng Pan 1 Author by : Chien-Chn Huang-Fu and Yi-Bing Lin, National Chiao Tung University. Herman Chung-Hwa Rao, Far.

Slides:



Advertisements
Similar presentations
Virtual Trunk Protocol
Advertisements

Networks and Telecommunications (on OLC)
A New Method for Symmetric NAT Traversal in UDP and TCP
Doc.: IEEE /0046r0 Submission July 2009 Ari Ahtiainen, NokiaSlide 1 A Cooperation Mechanism for Coexistence between Secondary User Networks on.
Exercises and Solutions Lecture 1
All Rights Reserved © Alcatel-Lucent 2009 Enhancing Dynamic Cloud-based Services using Network Virtualization F. Hao, T.V. Lakshman, Sarit Mukherjee, H.
Mobile IP By Keenan Yang May 29, 2003 MultiMedia Systems CSE 228.
1 Network Address Translation (NAT) Relates to Lab 7. Module about private networks and NAT.
© 2006 Cisco Systems, Inc. All rights reserved. ICND v2.3—2-1 Extending Switched Networks with Virtual LANs Introducing VLAN Operations.
1 © 2003, Cisco Systems, Inc. All rights reserved. CCNA TCP/IP Protocol Suite and IP Addressing Halmstad University Olga Torstensson
CST Computer Networks NAT CST 415 4/10/2017 CST Computer Networks.
CCNA – Network Fundamentals
IST 201 Chapter 9. TCP/IP Model Application Transport Internet Network Access.
CHAPTER 8: SECURITY IN COMPUTER NETWORKS Encryption Encryption Authentication Authentication Security Security Secure Sockets Layer Secure.
Doc.: IEEE /0040r0 Submission April 2011 Miika Laaksonen, NokiaSlide 1 Coexistence Discovery Procedures Notice: This document has been prepared.
Transmission Control Protocol (TCP) Basics
Natting NATTING. Private vs Public IP Addresses Whatever connects directly into Internet must have public (globally unique) IP address There is a shortage.
Rheeve: A Plug-n-Play Peer- to-Peer Computing Platform Wang-kee Poon and Jiannong Cao Department of Computing, The Hong Kong Polytechnic University ICDCSW.
MIGSOCK Migratable TCP Socket in Linux Demonstration of Functionality Karthik Rajan Bryan Kuntz.
NAT (Network Address Translator) Atif Karamat In the name of God the most merciful and the most compassionate.
DirectAccess is an Enterprise Solution: No support for Windows 7 Professional Requires two consecutive public IP addresses Cannot NAT to the DirectAccess.
Understanding Networks. Objectives Compare client and network operating systems Learn about local area network technologies, including Ethernet, Token.
Chapter 6 Network Address Translation (NAT). Network Address Translation  Modification of source or destination IP address  Needed by networks using.
A Distributed Search Service for Peer-to-Peer File Sharing in Mobile Application Presented by Tony Sung On Loy, MC Lab, CUHK IE 1 A Distributed Search.
Introduction To Networking
Transport Layer Pertemuan 24 Matakuliah: H0484/Jaringan Komputer Tahun: 2007.
Subnetting.
1 CCNA 2 v3.1 Module Intermediate TCP/IP CCNA 2 Module 10.
WXES2106 Network Technology Semester /2005 Chapter 8 Intermediate TCP CCNA2: Module 10.
Peer-to-peer file-sharing over mobile ad hoc networks Gang Ding and Bharat Bhargava Department of Computer Sciences Purdue University Pervasive Computing.
Boyu Chen Yulin Xia Haoyu Xu Viterbi School of Engineering University of Southern California P2P file sharing system with a central server.
ECCP A Formally-Verified Migration Protocol For Mobile, Multi-Homed Hosts Matvey Arye Joint work with: Erik Nordström, Robert Kiefer Jennifer Rexford, Michael.
CS378 - Mobile Computing Connecting Devices. How to pass data between devices? – Chat – Games – Driving Options: – Use the cloud and a service such as.
A Secure Protocol for Spontaneous Wireless Ad Hoc Networks Creation.
1 © 2003, Cisco Systems, Inc. All rights reserved. CCNA 4 v3.0 Module 1 Scaling IP Addresses.
FILE100% FILE 25%. FILE100% Downloadin g Strategy FILE 40% FILE 10%
1 Semester 2 Module 10 Intermediate TCP/IP Yuda college of business James Chen
1 NAT Network Address Translation Motivation for NAT To solve the insufficient problem of IP addresses IPv6 –All software and hardware need to be updated.
© 2008 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 Chapter 7: Transport Layer Introduction to Networking.
Chapter 1: Introduction to Web Applications. This chapter gives an overview of the Internet, and where the World Wide Web fits in. It then outlines the.
LWIP TCP/IP Stack 김백규.
1 The INI is a cooperative endeavor of:Electrical and Computer EngineeringSchool of Computer Science Graduate School of Industrial AdministrationHeinz.
NEARBY: HYBRID NETWORK MOBILE APPLICATION Shuai Zhang, Ziwen Zhang, Jikai Yin.
TURN-Lite: A Lightweight TURN Architecture and Specification (draft-wang-tram-turnlite-01)draft-wang-tram-turnlite-01 Aijun Wang (China Telecom) Bing Liu.
1 Design and Implementation of a SIP-Based Mobile and Vehicular Wireless Network With Push Mechanism Yu-Chee Tseng, Jen-Jee Chen, and Yu-Li Cheng National.
Cisco 3 - LAN Perrine. J Page 110/20/2015 Chapter 8 VLAN VLAN: is a logical grouping grouped by: function department application VLAN configuration is.
The Inter-network is a big network of networks.. The five-layer networking model for the internet.
Bjorn Landfeldt, The University of Sydney 1 NETS 3303 Networked Systems Revision.
Efficient Mobility Management for Vertical Handoff between WWAN and WLAN IEEE Communications Magazine November 2003.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Planning the Addressing Structure Working at a Small-to-Medium Business.
Wireless Network Design Principles Mobility Addressing Capacity Security.
1 © 2003, Cisco Systems, Inc. All rights reserved. CCNA 4 v3.0 Module 1 Scaling IP Addresses.
COP 5611 Operating Systems Spring 2010 Dan C. Marinescu Office: HEC 439 B Office hours: M-Wd 2:00-3:00 PM.
,294,967,296 Q. What are private IP addresses? A. The Internet Assigned Numbers Authority (IANA) has reserved the following three blocks of the.
1 © 2003, Cisco Systems, Inc. All rights reserved. CCNA 3 v3.0 Module 9 Virtual Trunking Protocol.
Client/Server Model: A Business View The different Client/server implementations differ according to: 1.Where the processing for the presentation of information.
Efficient Resource Allocation for Wireless Multicast De-Nian Yang, Member, IEEE Ming-Syan Chen, Fellow, IEEE IEEE Transactions on Mobile Computing, April.
© 2002, Cisco Systems, Inc. All rights reserved..
1 Computer Communication & Networks Lecture 23 & 24 Transport Layer: UDP and TCP Waleed Ejaz
Computer Network Architecture Lecture 7: OSI Model Layers Examples II 1 26/12/2012.
Planning the Addressing Structure
改良UDP洞穿技術設計物聯網通訊: 以遠端門鈴監控系統為例 Improving UDP Hole Punching Technique For IoT Communications: A Remote Door-bell Monitoring System 報告時間28~32分佳 楊凱勝 指導教授:柯開維.
Introducing To Networking
WGSN: WLAN-based GPRS Support Node
Planning the Addressing Structure
Delivering the Data.
Cengage Learning: Computer Networking from LANs to WANs
Author: Ikeda, H.   Sugawa, J.   Ashi, Y.   Sakamoto, K.  From:
Network Address Translation (NAT)
Presentation transcript:

Advisor : Whai-En Chen Speaker : Yen-Neng Pan 1 Author by : Chien-Chn Huang-Fu and Yi-Bing Lin, National Chiao Tung University. Herman Chung-Hwa Rao, Far EasTone Telecommunications Co., LTD. IEEE Wireless Communications April 2009

HYBRID P2P Utilized centralized servers to maintain the mapping between the identifications PURE P2P Query for identifying the transport address of participating peer is flooded through the network To implement a P2P system for mobile devices that have the capability to access mobile telecommunication networks, such as the Universal Mobile Telecommunications System, this paper propose a pure P2Psystem called iP2P. 2

Step 1 – peer start the P2P application, which attach to IP network Step 2 – the peer registers to the centralized server by providing its id and address Step 3 – the calling peer queries the centralized server to retrieve the address of the called peer Step 4 – upon receipt the address, the calling peer establihe a P2P connection to called peer without centralized server. 3

Use Mobile Station ISDN number as the peer identification which is globally unique. The iP2P control message are encapsulated in SMS. iP2P module iP2P Control Function is responsible accessing iP2P Control Message through the SMS API and controlling the connection through the iP2P Socket API iP2P Socket API is the standard socket API with minor modifications. 4

5

8

9

STUNT solution pose problems: Setting an appropriate TTL value of SYN packet might not be trivial. The port prediction server cannot guarantee to provide transport mapping of the public and private transport address for the NAT server.(especially some NAT server randomly assign.) 10

11

iP2P reuse UMTS mobility management mechanism and SMS as th control protocol Implemented the system on Windows Mobile 6.0 Professional OS. The measured data from 200 experiments: Connection set-up time: sec SMS Delivery time: sec WiFi Network Attach time :9.428 sec 12

Advantage Efficient query without a requirement to implement its own centralized server. Use SMS push mechanism to establish P2P connection can significantly save power consumption in the mobile device Allow more flexible IP address allocation 13