CASP – Future Work Plans and Ideas Henning Schulzrinne & LQS team August 27, 2002.

Slides:



Advertisements
Similar presentations
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Addressing the Network – IPv4 Network Fundamentals – Chapter 6.
Advertisements

RSVP Cryptographic Authentication "...RSVP requires the ability to protect its messages against corruption and spoofing. This document defines a mechanism.
Authorization of a QoS path based on Generic AAA SC2002 Baltimore NOV Bas van Oudenaarde Advanced Internet Research Group University of Amsterdam.
Rev A8/8/021 ABC Networks
Telematics group University of Göttingen, Germany Overhead and Performance Study of the General Internet Signaling Transport (GIST) Protocol Xiaoming.
TCP/IP Protocol Suite 1 Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display. Chapter 30 Internet Security.
Next Step In Signaling (NSIS) and Internet Routing Dynamics Charles Shen and Henning Columbia University in the City of New York Internet.
History Since created in 1995, RADIUS has been used to provide authentication, authorization and generate accounting information for dial-in users. However,
Interdomain and end-to- end QoS issues Henning Schulzrinne Columbia University NSF QoS workshop – April 2002.
NSIS Transport Layer draft-ietf-nsis-ntlp-00.txt Slides:
SIP Security Matt Hsu.
Presented by Henning Schulzrinne Columbia University
Telcordia - June 21, Internet data-plane signaling - revisiting RSVP Henning Schulzrinne Dept. of Computer Science Columbia University
July 2008IETF 72 - NSIS1 Permission-Based Sending (PBS) NSLP: Network Traffic Authorization draft-hong-nsis-pbs-nslp-01 Se Gi Hong & Henning Schulzrinne.
LQS Project QoS Client Protocol Jochen Eisl ICM N PG SP RC
1 IETF 64th meeting, Vancouver, Canada Context Transfer Using GIST Xiaoming Fu John Loughney.
CASP – Cross- Application Signaling Protocol Henning Schulzrinne August 27, 2002.
1 A Course-End Conclusions and Future Studies Dr. Rocky K. C. Chang 28 November 2005.
Master Thesis Proposal By Nirmala Bulusu Advisor – Dr. Edward Chow Implementation of Protected Extensible Protocol (PEAP) – An IEEE 802.1x wireless LAN.
Chapter 16 AAA. AAA Components  AAA server –Authenticates users accessing a device or network –Authorizes user to perform specific activities –Performs.
E J B J A V A X M L C O R B A M P L S D i f f S e r v I P V P N Q o S I P v 6 G P R S U M T S An Analysis.
Basavaraj Patil IETF 78.  Implementation details: Implemented on Nokia N900 and Ubuntu 10, and Debian 5 linux variants TLS connection is established.
Network Topology. Cisco 2921 Integrated Services Router Security Embedded hardware-accelerated VPN encryption Secure collaborative communications with.
Faten Yahya Ismael.  It is technology creates a network that is physically public, but virtually it’s private.  A virtual private network (VPN) is a.
MPLS networking at PSP Co Multi-Protocol Label Switching Presented by: Hamid Sheikhghanbari 1.
Slide 1, Dr. Wolfgang Böhm, Mobile Internet, © Siemens AG 2001 Dr. Wolfgang Böhm Siemens AG, Mobile Internet Dr. Wolfgang.
1 The SpaceWire Internet Tunnel and the Advantages It Provides For Spacecraft Integration Stuart Mills, Steve Parkes Space Technology Centre University.
NSIS Authentication, Authorization and Accounting Issues (draft-tschofenig-nsis-aaa-issues-00.txt) Authors: Hannes Tschofenig Henning Schulzrinne Maarten.
NSIS NATFW NSLP: A Network Firewall Control Protocol draft-ietf-nsis-nslp-natfw-08.txt IETF NSIS Working Group January 2006 M. Stiemerling, H. Tschofenig,
Copyright ©Universalinet.Com, LLC 2009 Implementing Secure Converged Wide Area Networks ( ISCW) Take-Aways Course 1: Cable (HFC) Technologies.
TCP/SYN Attack – use ACL to allow traffic from TCP connections that were established from the internal network and block packets from an external network.
Remote Access Chapter 4. Learning Objectives Understand implications of IEEE 802.1x and how it is used Understand VPN technology and its uses for securing.
1 © 2005 Cisco Systems, Inc. All rights reserved. 111 © 2004, Cisco Systems, Inc. All rights reserved.
Federal Aviation Administration Federal Aviation Administration 1 Presentation to: Name: Date: Federal Aviation Administration AMHS Security Security Sub-Group.
TeraPaths TeraPaths: establishing end-to-end QoS paths - the user perspective Presented by Presented by Dimitrios Katramatos, BNL Dimitrios Katramatos,
Chapter 18: Doing Business on the Internet Business Data Communications, 4e.
NSIS IETF 56 MONDAY, March 17, 2003: Morning Session TUESDAY, March 18, 2003: Afternoon Sessions I.
21-07-xxxx IEEE MEDIA INDEPENDENT HANDOVER DCN: xxxx Title: Secure Handover with QoS Support Date Submitted: November, 14,
Modest networking Henning Schulzrinne Columbia University MIND Workshop – London, Oct. 7, 2002 Keynote Address Joint work with Maria Papadopouli Hannes.
NTLP Design Considerations draft-mcdonald-nsis-ntlp-considerations-00.txt NSIS Interim Meeting – Columbia University February 2003.
Telematics group University of Göttingen, Germany Overhead and Performance Study of the General Internet Signaling Transport (GIST) Protocol Xiaoming.
1 TCP/IP based TML for ForCES Protocol Hormuzd Khosravi Furquan Ansari Jon Maloy 61 st IETF Meeting, DC.
TeraPaths TeraPaths: Establishing End-to-End QoS Paths through L2 and L3 WAN Connections Presented by Presented by Dimitrios Katramatos, BNL Dimitrios.
1 Integrating security in a quality aware multimedia delivery platform Paul Koster 21 november 2001.
NTLP Design Considerations draft-mcdonald-nsis-ntlp-considerations-00.txt NSIS Interim Meeting – Columbia University February 2003.
輔大資工所 在職研一 報告人:林煥銘 學號: Public Access Mobility LAN: Extending The Wireless Internet into The LAN Environment Jun Li, Stephen B. Weinstein, Junbiao.
1 Protecting Network Quality of Service against Denial of Service Attacks Douglas S. Reeves S. Felix Wu Chandru Sargor N. C. State University / MCNC October.
1 TeraPaths and dynamic circuits  Strong interest to expand testbed to sites connected to Internet2 (especially US ATLAS T2 sites)  Plans started in.
Interface to The Internet Routing System (IRS) draft-atlas-irs-problem-statement-00 draft-ward-irs-framework-00 Alia Atlas Thomas Nadeau David Ward IETF.
(Slide set by Norvald Stol/Steinar Bjørnstad
1 Computer Engineering Department Islamic University of Gaza ECOM 6303: Advanced Computer Networks (Graduate Course) Spr Prof. Mohammad A. Mikki.
Implications of Trust Relationships for NSIS Signaling (draft-tschofenig-nsis-casp-midcom.txt) Authors: Hannes Tschofenig Henning Schulzrinne.
Cryptography and Network Security Chapter 16 Fifth Edition by William Stallings Lecture slides by Lawrie Brown.
1 ForCES Applicability Statement Alan Crouch Mark Handley Hormuzd Khosravi 65 th IETF Meeting, Dallas.
1 Signaling Interworking for IPv6 Network 55 th IETF NSIS WG, Atlanta Jun Kyun Choi, Min Ho Kang, Gyu Myoung Lee (ICU) Joo Uk Um, Yong.
IETF 62 NSIS WG1 Porgress Report: Metering NSLP (M-NSLP) Georg Carle, Falko Dressler, Changpeng Fan, Ali Fessi, Cornelia Kappler, Andreas Klenk, Juergen.
Pseudo-Wire Protection Ping Pan IETF 65.
IETF 58 PANA WG PANA Implementation Report Hannes Tschofenig Marcus Tegnander Srinath Thiruvengadam.
-1- Georgia State UniversitySensorweb Research Laboratory CSC4220/6220 Computer Networks Dr. WenZhan Song Professor, Computer Science.
Computer Science and Engineering Computer System Security CSE 5339/7339 Session 27 November 23, 2004.
Supporting Advanced Scientific Computing Research Basic Energy Sciences Biological and Environmental Research Fusion Energy Sciences High Energy Physics.
Interface to The Internet Routing System (IRS) Framework documents Joel Halpern IETF 84 – Routing Area Open Meeting 1.
1 NSIS: A New Extensible IP Signaling Protocol Suite Myungchul Kim Tel:
Cryptography and Network Security Chapter 16
Implementing TMG Server Publishing
Securing Access to Mobile Operator Core Networks using IKEv2
Transport Protocols Relates to Lab 5. An overview of the transport protocols of the TCP/IP protocol suite. Also, a short discussion of UDP.
Securing the CASP Protocol
IEEE MEDIA INDEPENDENT HANDOVER
IEEE MEDIA INDEPENDENT HANDOVER
Presentation transcript:

CASP – Future Work Plans and Ideas Henning Schulzrinne & LQS team August 27, 2002

© Siemens, 2001ICM templ-1-o-example.ppt 12/07/2001Page 2 CASP – Future work Implementation –Message layer (in-band, hop-by-hop) likely, Linux or FreeBSD –Discovery mechanisms routing-based (OSPF) scout protocol –QoS client –out-of-band messaging "bandwidth broker" or NAC model –integrate with traffic control e.g., ALTQ Enhancements –use with BGRP for sink-tree reservations –investigate tunnels

© Siemens, 2001ICM templ-1-o-example.ppt 12/07/2001Page 3 CASP future work Performance analysis –message handling –TCP and TLS set-up overhead –maximum number of simultaneous connections Specify additional client protocols –NAT and firewall control ("midcom") –MPLS or lightpath setup? –denial-of-service traffic filter? –router QoS management  gather performance statistics Interaction with AAA –authentication, authorization and accounting –something other than COPS? IETF –submit Internet Draft to IETF NSIS working group –pursue standardization

© Siemens, 2001ICM templ-1-o-example.ppt 12/07/2001Page 4 CASP future work Planned projects and implementations: –CASP implementation in project SeQoMo-LQS (TU Berlin) –CASP implementation at Columbia University –Use within KING and Aquila projects? –Implementation of basic CASP and security aspects in master thesis (CT IC 3) –Implementation of QoS client layer in master thesis (ICM N PG SP) Planned project LQS II starting September 2002 Continue LQS II as part of the NSIS activity at Siemens –Key players: LQS core team & Robert Hancock (RMR) Possible collaboration with Siemens optical switching group