AAA/SWITCH Info Day 2010 Project Idea: A 4 -Mesh Thomas Staub and Torsten Braun University of Bern, Switzerland.

Slides:



Advertisements
Similar presentations
Computer Networks & Distributed University of Bern Torsten Braun Institute of Computer Science and Applied Mathematics Universität Bern
Advertisements

Overview of local security issues in Campus Grid environments Bruce Beckles University of Cambridge Computing Service.
© 2011 Aerohive Networks CONFIDENTIAL WI-FI DESIGN 101: QUESTIONS EVERY MANAGER SHOULD ANSWER BEFORE PURCHASING WI-FI.
28 th TF-Mobility and Network Middleware Meeting A4-Mesh: Authentication, Authorization, Accounting, and Auditing in Wireless Mesh Networks Torsten Braun.
1 © 2005 Cisco Systems, Inc. All rights reserved. CONFIDENTIAL AND PROPRIETARY INFORMATION Cisco Wireless Strategy Extending and Securing the Network Bill.
SCENARIO Suppose the presenter wants the students to access a file Supply Credenti -als Grant Access Is it efficient? How can we make this negotiation.
Interconnecting Sensor Networks and Research Networks by Wireless (Mesh) Technology Project Idea and further statements Kurt Baumann
March 13, 2006 Location Tracking System & Sensor Based Communications For Mining Response to RIN 1219-AB44.
1 William Lee Duke University Department of Electrical and Computer Engineering Durham, NC Analysis of a Campus-wide Wireless Network February 13,
Security Controls – What Works
Designing and Implementing a Safety & Health Check System for Home Environment.
This work is supported by the National Science Foundation under Grant Number DUE Any opinions, findings and conclusions or recommendations expressed.
WIRELESS SECURITY DEFENSE T-BONE & TONIC: ALY BOGHANI JOAN OLIVER MIKE PATRICK AMOL POTDAR May 30, /30/2009.
Catnet “Catallactic Mechanisms for Service Control and Resource Allocation in Large Scale Dynamic Application Networks” EU project: IST Partners:
Flexible Network Access Overview. Flexible Access an Integral part of Universal Access Policy Universal Access to Campus IT Resources Managed LAN portsFlexible.
Wireless MESH network Tami Alghamdi. Mesh Architecture – Mesh access points (MAPs). – Mesh clients. – Mesh points (MPs) – MP uses its Wi-Fi interface.
Joint Presentation Real-Time Locating System for Boarding Support and Rescue: A Case Study Multi-Agent System for Controlling the Unloading of Illegal.
Doc.: IEEE leci Submission Project: IEEE P Working Group for Wireless Personal Area Networks (WPANs) Submission Title: [Low Energy.
PNNL Outdoor Campus Public Safety Camera System Creating a “Virtual Fence” around an open campus 2009 DOE Integrated Safety Management (ISM) Conference.
2007 © SWITCH TNC2007 Extending SWITCH Public Wireless LAN with EAP-SIM Kurt Baumann SWITCHmobile Project Leader
NUAGA May 22,  IT Specialist, Utah Department of Technology Services (DTS)  Assigned to Department of Alcoholic Beverage Control  PCI Professional.
Copyright © 2006 CyberRAVE LLC. All rights reserved. 1 Virtual Private Network Service Grid A Fixed-to-Mobile Secure Communications Framework Managed Security.
HIPAA COMPLIANCE WITH DELL
IP-Based Emergency Applications and Services for Next Generation Networks PEACE Presented by Suji Gunaratne PhD.
QoS-Driven Wireless Broadband Home Networking Based on Multihop Wireless Mesh Networks Authors : B. Park, W. Lee, S. Ahn, and Sungjoon Ahn Published :
1 Digital Video Surveillance Systems: An Overview  Michael Dillon Vice President, Business Development Global Municipal and Public Safety Markets.
SMUCSE 8344 Wireless Mesh. SMUCSE 8344 The Premise.
Networks for Security Applications Defense Security Innovation Quebec City, Nov. 16, 2007 Prof. Howard M. Schwartz.
Chapter 6 of the Executive Guide manual Technology.
© 2006 Cisco Systems, Inc. All rights reserved. Optimizing Converged Cisco Networks (ONT) Module 6: Implement Wireless Scalability.
Information Assurance Policy Tim Shimeall
DOE Wireless and Sensing Honeywell DOE Wireless and Sensing Program.
1 IMT-2000 Operation System and Advanced Multimedia Services Infrastructure Kouzou Sakae Operation Development Department NTT DoCoMo, Inc.
Geo-localisation in CERN’s underground facilities CERN has recently deployed a digital radio network, based on TETRA technology, to be used by the Fire.
Doc.: IEEE /0166r1 Submission March 2005 Ike Nassi & Jorjeta Jetcheva, FiretideSlide 1 The Advantages of Invisibility and Cooperation Notice:
© 2006 Cisco Systems, Inc. All rights reserved. Optimizing Converged Cisco Networks (ONT) Module 6: Implement Wireless Scalability.
College of Engineering Anchor Nodes Placement for Effective Passive Localization Karthikeyan Pasupathy Major Advisor: Dr. Robert Akl Department of Computer.
Wireless Mesh-Networks for Interconnection of Remote Sites to Fixed Broadband Networks Feasibility Study Kurt Baumann TF-Mobility.
Chapter 2 Securing Network Server and User Workstations.
Emergency Services Workshop, 21th-24 th of October, Vienna, Austria Page 1 IP-Based Emergency Applications and Services for Next Generation Networks PEACE.
Apr CONFIDENTIAL.  ASN develops and markets a 2-way, mid-range, robust and flexible Wireless Sensors Network (WSN) platform to control and acquire.
A^4 Mesh Project 16. February 2011, Lyon
Wireless at UW-Madison What the new service offers Deployment status Guest wireless On the horizon.
Sebastian Max Radio and Frequency Assignment in Multi-Radio Multi-Channel Wireless Mesh Networks Radio and Frequency Assignment in Multi-Radio Multi-Channel.
Access Point Fall Semester, School of Computer Science & Engineering, Seoul National University. Professor Yanghee Choi Student : MyungHoon Kim.
Mobile Analyzer A Distributed Computing Platform Juho Karppinen Helsinki Institute of Physics Technology Program May 23th, 2002 Mobile.
Wireless LAN Requirements (1) Same as any LAN – High capacity, short distances, full connectivity, broadcast capability Throughput: – efficient use wireless.
Cognitive Radio Wireless Sensor Networks: Applications, Challenges and Research Trends Prepared by: Ameer Sameer Hamood University of Babylon - Iraq Information.
Lecture 8: Wireless Sensor Networks By: Dr. Najla Al-Nabhan.
Understanding Your Options
Medium Access Control. MAC layer covers three functional areas: reliable data delivery access control security.
In the name of God.
Firetide Wireless Solutions |Utilities
PrioСom Company Introduction
Integration of and Third-Generation Wireless Data Networks
Success Stories.
Network Infrastructure
Northwestern Lab for Internet and Security Technology (LIST) Yan Chen Department of Computer Science Northwestern University.
Catherine Murphy-O’Connor – Eduardo Jiménez
Routing In Wireless Mesh Networks
ISMS Information Security Management System
SECURING WIRELESS LANS WITH CERTIFICATE SERVICES
WLAN Mesh in CAPWAP Architecture
VHT SG Report to EC Date: Authors: July 2008 April 2007
WLAN Mesh in CAPWAP Architecture
Shibboleth in Switzerland
Community Wireless Mesh Networks
Wireless Campus project
Global One Communications
Task Manager & Profile Interface
Presentation transcript:

AAA/SWITCH Info Day 2010 Project Idea: A 4 -Mesh Thomas Staub and Torsten Braun University of Bern, Switzerland

A 4 -Mesh: Motivation Thomas Staub, Project Idea 2  Not all locations are sufficiently covered with broadband network services for research and daily operation.  Wireless Mesh Networks could enhance network coverage of the universities.

A 4 -Mesh: Motivation II  Broadband network access to campus networks in remote areas / in case of events  Research and applications in the following fields require broadband network access in remote areas: —Environmental monitoring —Agricultural monitoring —Weather monitoring —Biology —Surveillance of restricted areas —Avoidance and investigations of environmental offenses Thomas Staub, Project Idea 3  Cost-efficient network access, easily deployable, integrated in normal authentication and authorization infrastructure (SWITCHaai)

A 4 -Mesh: Goals  Easily deployable, cost-efficient, and functional wireless mesh infrastructure including: —Authentication and Authorization – Network node authentication (SWITCHaai / IEEE x) – Client authentication (SWITCHaai / IEEE x) – Authorization of users and administrators (SWITCHaai / eduroam) —Accounting – Traffic accountable to individual users – Monitoring network conditions (self-awareness) – Distributed accounting architecture —Auditing – Detection of inconsistent or erroneous node states, autonomous recovery / alarms – Increased network robustness and low maintenance costs by self- healing mechanisms Thomas Staub, Project Idea 4

A 4 -Mesh: Planned Activities  Indoor test beds (UniBE, UniNE) —Development networks  Outdoor test bed (Payerne – Neuchâtel) —Testing of A 4 -Mesh in a deployment for environmental research Thomas Staub, Project Idea 5

A 4 -Mesh: Planned Activities  Pilot network at UniBE (area of INSEL hospital) —Pilot with real users, integration in existing campus WLAN infrastructures  Public demonstrations  Publicly available source code Thomas Staub, Project Idea 6

A 4 -Mesh: Partners  Insitut für Informatik und angewandte Mathematik, UniBE  Institut d‘informatique, UniNE  IT services, UniBE  IT services, UniNE  SWITCH  We are currently searching for additional end users ( IT departments, environmental research, etc.). Thomas Staub, Project Idea 7

A 4 -Mesh: Questions? Thomas Staub, Project Idea 8