OBAN Open Broadband Access Networks H. Almus, TU Berlin, EANTC Research The OBAN project is funded by the European Community’s Sixth Framework Programme,

Slides:



Advertisements
Similar presentations
Doc.: IEEE xxx Submission May 10-14, 2004 Alan Carlton, Interdigital CommunicationsSlide 1 Defining Layer 2.5 Alan Carlton Interdigital Communications.
Advertisements

Encrypting Wireless Data with VPN Techniques
Workshop on Telecommunications for Disaster Relief, February 2003, Geneva Dag Nielsen & Catherine Mulligan Ericsson Response WLAN in Disaster and.
Evolution of NGN and NGA scenario in Nepal Nepal Telecommunications Authority.
Copyright © Chang Gung University. Permission required for reproduction or display. On Femto Deployment Architecture and Macrocell Offloading Benefits.
OBAN, Exploiting the Local Loop for Public Wireless Broadband The OBAN project is funded by the European Community’s Sixth Framework Programme, project.
ONE PLANET ONE NETWORK A MILLION POSSIBILITIES Barry Joseph Director, Offer and Product Management.
CAPANINA Multimedia Applications Demo Specifications for Trial 1 Milan Lalovic Wireless Networks, BT Exact.
Firewalls By Tahaei Fall What is a firewall? a choke point of control and monitoring interconnects networks with differing trust imposes restrictions.
Security in VoIP Networks Juan C Pelaez Florida Atlantic University Security in VoIP Networks Juan C Pelaez Florida Atlantic University.
UMA (Unlicensed Mobile Access) El Ayoubi Ahmed Hjiaj Karim.
BASIC CRYPTOGRAPHY CONCEPT. Secure Socket Layer (SSL)  SSL was first used by Netscape.  To ensure security of data sent through HTTP, LDAP or POP3.
TF Mobility Group 22nd September A comparison of each national solution was made against Del C – “requirements”, the following solutions were assessed.
Network Isolation Using Group Policy and IPSec Paula Kiernan Senior Consultant Ward Solutions.
Wireless Design for Voice Last Update Copyright 2011 Kenneth M. Chipps Ph.D.
Rev A8/8/021 ABC Networks
TNC 2003 Wireless Campus project Coletta Elisa Marchioro -
Rev BMarch 2004 The ABC Service as a Research Infrastructure Rajesh Mishra Per Johansson Cahit Akin Salih Ergut.
Lesson 11-Virtual Private Networks. Overview Define Virtual Private Networks (VPNs). Deploy User VPNs. Deploy Site VPNs. Understand standard VPN techniques.
UCB Implementing QoS Jean Walrand EECS. UCB Outline What? Bandwidth, Delay Where? End-to-End, Edge-to-Edge, Edge-to-End, Overlay Mechanisms Access Control.
(Remote Access Security) AAA. 2 Authentication User named "flannery" dials into an access server that is configured with CHAP. The access server will.
Mesh Network Technical Guide for the Mesh AP Topic 2 Installation Knowledge / Network Design Copyright © PLANET Technology.
Faten Yahya Ismael.  It is technology creates a network that is physically public, but virtually it’s private.  A virtual private network (VPN) is a.
Virtual Private Network
Networking Components Chad Benedict – LTEC
Omniran OmniRAN Wi-Fi Hotspot Roaming Use Case Date: Authors: NameAffiliationPhone Max RiegelNSN
Virtual Private Network prepared by Rachna Agrawal Lixia Hou.
Course 201 – Administration, Content Inspection and SSL VPN
5 February 2003 Reality and Future Softswitch - Reality and Future Nikolay Ilyin Chief Technical Officer RealEast Networks ITEXPO.
COnvergence of fixed and Mobile BrOadband access/aggregation networks Work programme topic: ICT Future Networks Type of project: Large scale integrating.
What now for the telecom industry
“Securing IP Multimedia Subsystem (IMS) infrastructures …,” M. Tsagkaropoulos UNIVERSITY OF PATRAS Department of Electrical & Computer Engineering Wireless.
Copyright ©Universalinet.Com, LLC 2009 Implementing Secure Converged Wide Area Networks ( ISCW) Take-Aways Course 1: Cable (HFC) Technologies.
Network Security Lecture 9 Presented by: Dr. Munam Ali Shah.
UNIVERSITY OF PATRAS Department of Electrical & Computer Engineering Wireless Telecommunications Laboratory M. Tsagkaropoulos “Securing.
VIRTUAL PRIVATE NETWORK By: Tammy Be Khoa Kieu Stephen Tran Michael Tse.
Advanced Next gEneration Mobile Open NEtwork Tridentcom th International Conference on Testbeds and Research Infrastructures for the Development.
NuolSec VIspace Vientiane, Laos.
ﺑﺴﻢﺍﷲﺍﻠﺭﺣﻣﻥﺍﻠﺭﺣﻳﻡ. Group Members Nadia Malik01 Malik Fawad03.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Providing Teleworker Services Accessing the WAN – Chapter 6.
Providing Teleworker Services
 Introduction – Consumer Market  Benefits – Operational Cost & Flexibility  Challenges – Quality of Service & Securing VOIP  Legal Issuers  Risk.
1 Integrating security in a quality aware multimedia delivery platform Paul Koster 21 november 2001.
1 BRUSSELS - 14 July 2003 Full Security Support in a heterogeneous mobile GRID testbed for wireless extensions to the.
Demonstrators and Pan-European Services Laboratory WP5 session.
Femto Network Dr. Monir Hossen ECE, KUET Department of Electronics and Communication Engineering, KUET.
Doc.: IEEE /345r0 Submission May 2002 Albert Young, Ralink TechnologySlide 1 Enabling Seamless Hand-Off Across Wireless Networks Albert Young.
3G wireless system  Speeds from 125kbps-2Mbps  Performance in computer networking (WCDMA, WLAN Bluetooth) & mobile devices area (cell.
- D1 - FT/Networks and Carriers Division ITU-T WORKSHOP on NGN (Geneva 9-10 July 2003) NGN an architecture for 21st century networks? ITU-T NGN Workshop.
November 2001 Lars Falk, TeliaSlide 1 doc.: IEEE /617r1 Submission Status of 3G Interworking Lars Falk, Telia.
Michael G. Williams, Jeremey Barrett 1 Intro to Mobi-D Host based mobility.
S Postgraduate Course in Radio Communications. Application Layer Mobility in WLAN Antti Keurulainen,
WHAT IS SO SPECIAL? Wireless Router Analogue Telephone Adaptor + SMCWTVG.
For more course tutorials visit NTC 406 Entire Course NTC 406 Week 1 Individual Assignment Network Requirements Analysis Paper NTC 406.
5G Wireless Technology.
INTERNET PROTOCOL TELEVISION (IP-TV)
WIMAX AND LTE.
Instructor Materials Chapter 6: Quality of Service
Providing Teleworker Services
Module 8: Securing Network Traffic by Using IPSec and Certificates
Seminar on…. 5G Wireless Technology By: Niki Upadhyay
Providing Teleworker Services
INTERNET PROTOCOL TELEVISION (IP-TV)
IS4680 Security Auditing for Compliance
Virtual Private Network
Providing Teleworker Services
Providing Teleworker Services
Module 8: Securing Network Traffic by Using IPSec and Certificates
Providing Teleworker Services
Presentation transcript:

OBAN Open Broadband Access Networks H. Almus, TU Berlin, EANTC Research The OBAN project is funded by the European Community’s Sixth Framework Programme, project partners and the Swiss Bundesamt für Bildung und Wissenschaft The information in this document is provided as is and no guarantee or warranty is given that the information is fit for any particular purpose. The user thereof uses the information at its sole risk and liability

© 2006 H. AlmusTERENA Networking Conference An Open Network

© 2006 H. AlmusTERENA Networking Conference OBAN Concept To open private WLANs for public use –Allowing people who are passing by (visiting users) to get broadband access via privately owned WLAN access points Business idea beyond –Visiting users pay according to there usage –Contracts between all involved parties will assure appropriate earnings Private use Public use Access to broadband network WLAN ISP OBAN mobility support –Seamless handover and roaming Limited to velocities ≤ 15 km/h OBAN integrated extended services –Voice (VoWLAN, VoIP), Video –Location specific services Local content based on knowledge of coordinates of used broadband access

© 2006 H. AlmusTERENA Networking Conference Broadband access today and tomorrow xDSL technologies –Example ADSL, typical configured bandwidth 1 to 2 Mbps, mostly 8 Mbps possible –Example ADSL 2+, VDSL, VDSL2 provides from 24 Mbps to Mbps Cable modems in TV distribution networks Fiber cable to the home Wireless technologies –Extended use expected According to BT Group: WiMAX for home installation available at the end of 2006 Private flats and houses do have broadband access !!! –23% of the European households are using broadband connections –Broadband connections in Germany (end of 2005) around 10,4 million connections (27 % of German households)

© 2006 H. AlmusTERENA Networking Conference Use of capacities Most private users are using the rented bandwidth only for minor downloads –Usage heavily depends on the daytime Mostly used in the evening and on weekends Minor usage during common working hours Rented bandwidth usually below technical available bandwidth –Caused by price policy of ISPs –Most often, the rented bandwidth is 1 or 2 Mbit/s (downlink) –On average, the installed broadband access technology allows around 8 Mbit/s (downlink) –Estimated average use of a broadband access: ≤ 10 GByte per month Only around 3-4 % of the rented bandwidth is actually used Regarding the technical available bandwidth at the access points, only around 0,5 % is used

© 2006 H. AlmusTERENA Networking Conference Network evolution Today's mobile networks are evolving to broadband –Number of base stations and feeder lines will increase dramatically –Next step from today's UMTS may require optical cables in the feeder network –Granularity will become comparable to that of the fixed network The fixed network is continuously updated with advanced DSL technologies and optical cables –Most of the connected households and businesses will use WLAN technologies for in-house networking Extended use of WLANs as well as growing bandwidth demands will lead to a convergence of booth networks

© 2006 H. AlmusTERENA Networking Conference Networks & Cell sizes today and tomorrow WLAN Mobile network

© 2006 H. AlmusTERENA Networking Conference Parties involved ISP-VU Internet HU = Home User VU = Visiting User ANP= Access Network Provider ISP= Internet Service Provider RG = Residential Gateway (OBAN extended Access-Router) AP = WLAN Accesspoint AP RG HU VU ISP-HU ANP

© 2006 H. AlmusTERENA Networking Conference OBAN bandwidth management Simple bandwidth management –Home user retains the rented bandwidth and performance, independent from any access and usage by visiting users Conventional sharing concepts are based on a common use of the bandwidth rented by the home user (Boingo, Linkspot etc.) –Use of additional available bandwidth for visiting users –Solution by adapted bandwidth management 2 data paths with fixed, well defined access rates Extended bandwidth management –Bandwidth actually not used by the home user will be available for visiting users in addition to the extended bandwidth statically reserved for visiting users –Realization requires strict prioritization of the private users traffic in the limits of the rented bandwidth The OBAN approach is a provider oriented solution – it requires the involvement of the access network provider! –Solutions as offered by Boingo are just roaming agreements

© 2006 H. AlmusTERENA Networking Conference QoS in OBAN Bandwidth management, prioritization –based on e / WMM –OBAN QoS Broker Knows the capacity of the access network –Traffic policing, priority queuing manages QoS-Profiles for each OBAN user –Integrated in the backend, could be integrated in AAA server –Residential Gateway Capacity Distribution Algorithm (CDA) defines, which capacity an end system (terminal) gets assigned at a given time Traffic policing / shaping, priority queuing to ensure proper use Capacity tracking and adoption according to changing conditions –Terminal Supports traffic shaping, capacity tracking WLAN: –QoS enabled MAC (802.11e/WMM); priorities are mapped to WLAN access categories

© 2006 H. AlmusTERENA Networking Conference Mobility in OBAN Basic objectives of the OBAN project: –„Smart change“ of the IP network as well as seamless roaming between service providers –Single Sign On The user has to authenticate only once –Seamless IP Connectivity Change of network access, IP subnet as well as roaming shall not disturb or (noticeable) interrupt currently used IP services –No loss of TCP connections, SIP session etc. »Supported by use of Mobile IPv4 (MIP)

© 2006 H. AlmusTERENA Networking Conference Security in OBAN Security and privacy protection –Questions and requirements Who must have access to which data? Who isn't allowed to have access to which data? How can a OBAN network be realized in line with local and European laws? –25 country specific laws and regulations regarding service provisioning, protection of private data, encryption etc. Acceptance of OBAN by private and visiting users? –What kind of data security as well as privacy protection has to be offered?

© 2006 H. AlmusTERENA Networking Conference Security Extended requirements Extended protection against manipulation required because –OBAN WLAN APs and RG are located in private homes HU could try to fake an OBAN WLAN AP and to forward modified visiting user data to the RG (Man-in-the-Middle-Attack) HU could also manipulate the RG itself to modify information (e.g. billing relevant date) –OBAN WLAN APs are interconnected to the private network of the HU VUs could attack and try to manipulate OBAN WLAN AP to get access to private data of the HU OBAN networks have to securely separate the data of HUs and VUs –Separated VPNs for HU and VU are required –The identity of the HU has to be hidden to the VUs as well as vice versa OBAN hardware and software components must be protected against manipulation and misuse

© 2006 H. AlmusTERENA Networking Conference Mobility MIP / Handover OBAN has to support a secured data exchange in combination with a change of the used network without service interruption –OBAN project objectives include the support of interactive multimedia services like videoconferencing and VoIP –OBAN tries to achieve handover times less than 120 ms (Layer 3) Typical handover times of 350 ms ore even higher (like 8-10 s in MIP environments) are not acceptable. Consequences: –The handover process including re-authentication has to take place automatically - without any user interaction –The used Mobile IP solution has to be compatible with common encryption techniques (VPN, IPSec and SSL) Encryption must be setup as overlay on top of MIP, end points of encrypted tunnels are terminated in MIP OBAN terminals (notebooks, PDAs) have to support Mobile IP as well as some OBAN specific extensions OBAN users will have to install some OBAN specific software

© 2006 H. AlmusTERENA Networking Conference Handover performance How to minimize the WLAN handover delay? Code optimization alone will not be a solution to the OBAN goal (< 120 ms on Layer 3) WLAN technology doesn’t support “make before break” as used in GSM/UMTS networks Extended mobility management is required –Residential Gateway (RG) acts as access router Extended functions to avoid painful delays (DHCP etc.) –Sophisticated authentication mechanisms To support fast and automated re-authentication –Extended services and functions to be implemented proxy servers mobility broker –Knows about neighbored APs, network configuration –Supports fast re-authentication QoS broker –Knows about currently available QoS on neighbored APs

© 2006 H. AlmusTERENA Networking Conference Authentication Full authentication (via AAA server) when changing AP / roaming is by far to slow Alternate solutions discussed within OBAN 1.Delayed Authentication 1.Data traffic without previous authentication allowed for a limited time period 2.Full authentication done immediately in parallel to initial use 2.Use of Kerberos Tickets 1.Split of authentication process 1.Traditional full authentication via AAA server for the 1st access 2.Specific authentication on shared secrets, partly shared in advance 3.Time-shifted computing 1.Based on mutual authentication between terminal and Residential Gateway in conjunction with a secured information and trusted points Solution 1 –Delayed authentication may be forbidden by law at least in some European countries the ISP has explicitly inform the user about the approach and the risks regarding the initial data exchange Solution 2 and 3 –Use of topographic knowledge required (neighborhood relations) Knowledge about reachable APs, additional information for re-authentication, Protocol extensions (801.X, EAP-xxx)

© 2006 H. AlmusTERENA Networking Conference OBAN proof of concept Field trial (Telenor) –continuously used to test solutions as soon as available, Testbed at TU Berlin –Used for additional functional testing Field Trial in Paris (France Telecom) –scheduled for the final phase of the project to test the integrated OBAN environment Portable Demonstrator –Used for specific tests as well as for demonstration purposes at exhibitions Portable demonstrator: Configuration example for "inter- provider handover” testing

© 2006 H. AlmusTERENA Networking Conference Extended Services IP Zones, SIP-UA, … Different portals for Visiting Users (VU) und Home Users (HU) –VU: location specific offers Exact location of Residential Gateway is known! Local events, special offers, … Taxi stand next door, timetable of nearby located bus stops & undergrounds Navigation: distance to events, friends, …. –HU: may offer specific services to VUs Garage sale today Print Service (if HU is at home) SIP-UA: OBAN aware application –SIP based videoconferencing with automated adaptations Adopt codec used and image size in accordance with available QoS –Information provided by OBAN QoS broker

© 2006 H. AlmusTERENA Networking Conference OBAN project partners The OBAN concepts, ideas and solutions presented are the results of the common efforts of all OBAN partners

© 2006 H. AlmusTERENA Networking Conference Thank you! Questions? More information is available on the OBAN public web pages: