HotNets-VI 1 Architecting Citywide Ubiquitous Wi-Fi Access Nishanth Sastry Jon Crowcroft, Karen Sollins.

Slides:



Advertisements
Similar presentations
Computer Concepts – Illustrated 8th edition
Advertisements

MIGRATION OF GSM TO GPRS
© 2007 Cisco Systems, Inc. All rights reserved.ISCW-Mod3_L7 1 Network Security 2 Module 6 – Configure Remote Access VPN.
A New Method for Symmetric NAT Traversal in UDP and TCP
1 Resonance: Dynamic Access Control in Enterprise Networks Ankur Nayak, Alex Reimers, Nick Feamster, Russ Clark School of Computer Science Georgia Institute.
1 Resonance: Dynamic Access Control in Enterprise Networks Ankur Nayak, Alex Reimers, Nick Feamster, Russ Clark School of Computer Science Georgia Institute.
How to extend Intranet security to the home
All rights reserved © 2000, Alcatel 1 CPE-based VPNs Hans De Neve Alcatel Network Strategy Group.
Fred P. Baker CCIE, CCIP(security), CCSA, MCSE+I, MCSE(2000)
0 - 0.
Addition Facts
The internet. Background Created in 1969, connected computers at UCLA, Stanford Research Institute, U. of Utah, and UC at Santa Barbara With an estimated.
© 2006 Cisco Systems, Inc. All rights reserved. MPLS v MPLS TE Overview Configuring MPLS TE on Cisco IOS Platforms.
All Rights Reserved © Alcatel-Lucent 2009 Enhancing Dynamic Cloud-based Services using Network Virtualization F. Hao, T.V. Lakshman, Sarit Mukherjee, H.
Any Questions?.
© 2006 Cisco Systems, Inc. All rights reserved. MPLS v MPLS VPN Technology Introducing the MPLS VPN Routing Model.
Countering DoS Attacks with Stateless Multipath Overlays Presented by Yan Zhang.
1 Network Address Translation (NAT) Relates to Lab 7. Module about private networks and NAT.
06-Sep-2006Copyright (C) 2006 Internet Initiative Japan Inc.1 Prevent DoS using IP source address spoofing MATSUZAKI ‘maz’ Yoshinobu.
Virtual Private Networks COSC541 Project Jie Qin & Sihua Xu October 11, 2014.
Addition 1’s to 20.
Week 1.
VPN AND REMOTE ACCESS Mohammad S. Hasan 1 VPN and Remote Access.
Network Security Essentials Chapter 11
Wide Area Wi-Fi Sam Bhoot. Wide Area Wi-Fi  Definition: Wi-Fi (Wireless Fidelity) n. – popular term for high frequency wireless local area networks operating.
Traversing symmetric NAT with predictable port allocation function SIN 2014 Dušan Klinec, Vashek Matyáš Faculty of Informatics, Masaryk University.
Transitioning to IPv6 April 15,2005 Presented By: Richard Moore PBS Enterprise Technology.
Firewalls By Tahaei Fall What is a firewall? a choke point of control and monitoring interconnects networks with differing trust imposes restrictions.
Guide to Network Defense and Countermeasures Second Edition
SCSC 455 Computer Security Virtual Private Network (VPN)
Network Security Topologies Chapter 11. Learning Objectives Explain network perimeter’s importance to an organization’s security policies Identify place.
Firewall Configuration Strategies
Lesson 18-Internet Architecture. Overview Internet services. Develop a communications architecture. Design a demilitarized zone. Understand network address.
Security Awareness: Applying Practical Security in Your World
More about Skype. Overview Any node with a public IP address having sufficient CPU, memory and network bandwidth is a candidate to become a super node.
Lesson 20 – OTHER WINDOWS 2000 SERVER SERVICES. DHCP server DNS RAS and RRAS Internet Information Server Cluster services Windows terminal services OVERVIEW.
Copyright Kenneth M. Chipps Ph.D. 1 VPN Last Update
1 © 2001, Cisco Systems, Inc. All rights reserved. Session Number Presentation_ID Cisco Easy VPN Solutions Applications and Implementation with Cisco IOS.
Network Topology. Cisco 2921 Integrated Services Router Security Embedded hardware-accelerated VPN encryption Secure collaborative communications with.
11 ASSIGNING IP ADDRESSES Chapter 2. Chapter 2: ASSIGNING IP ADDRESSES2 CHAPTER OVERVIEW  Describe the structure of IP addresses and subnet masks. 
Virtual Private Network
Network Services Lesson 6. Objectives Skills/ConceptsObjective Domain Description Objective Domain Number Setting up common networking services Understanding.
Polycom Conference Firewall Solutions. 2 The use of Video Conferencing Is Rapidly Growing More and More people are adopting IP conferencing Audio and.
Windows XP Home Networking Scott Manchester Technical Evangelist Home Networking.
Network+ Guide to Networks 6 th Edition Chapter 10 Virtual Networks and Remote Access.
Internal NetworkExternal Network. Hub Internal NetworkExternal Network WS.
Firewalls Paper By: Vandana Bhardwaj. What this paper covers? Why you need a firewall? What is firewall? How does a network firewall interact with OSI.
Page 1 NAT & VPN Lecture 8 Hassan Shuja 05/02/2006.
Copyright ©Universalinet.Com, LLC 2009 Implementing Secure Converged Wide Area Networks ( ISCW) Take-Aways Course 1: Cable (HFC) Technologies.
1 Chapter 6: Proxy Server in Internet and Intranet Designs Designs That Include Proxy Server Essential Proxy Server Design Concepts Data Protection in.
11 SECURING YOUR NETWORK PERIMETER Chapter 10. Chapter 10: SECURING YOUR NETWORK PERIMETER2 CHAPTER OBJECTIVES  Establish secure topologies.  Secure.
1 Chapter 12: VPN Connectivity in Remote Access Designs Designs That Include VPN Remote Access Essential VPN Remote Access Design Concepts Data Protection.
CHAPTER 3 PLANNING INTERNET CONNECTIVITY. D ETERMINING INTERNET CONNECTIVITY REQUIREMENTS Factors to be considered in internet access strategy: Sufficient.
1 Chapter 7: NAT in Internet and Intranet Designs Designs That Include NAT Essential NAT Design Concepts Data Protection in NAT Designs NAT Design Optimization.
IPv6 for ISP Industry Sify Technologies Ltd Somasundaram Padmanabhan Network Engineering IPv6 Awareness Workshop.
BZUPAGES.COM. What is a VPN VPN is an acronym for Virtual Private Network. A VPN provides an encrypted and secure connection "tunnel" path from a user's.
Lecture 16 Page 1 Advanced Network Security Perimeter Defense in Networks: Virtual Private Networks Advanced Network Security Peter Reiher August, 2014.
VPN. What is VPN An arrangement that provides connections between: An arrangement that provides connections between: –Offices –remote workers and –the.
Wireless Network Design Principles Mobility Addressing Capacity Security.
1 Week #5 Routing and NAT Network Overview Configuring Routing Configuring Network Address Translation Troubleshooting Routing and Remote Access.
Security fundamentals Topic 10 Securing the network perimeter.
Connection Technologies and IP Addressing CONNECTING TO THE INTERNET.
: MobileIP. : r Goal: Allow machines to roam around and maintain IP connectivity r Problem: IP addresses => location m This is important for efficient.
IPv6 Security Issues Georgios Koutepas, NTUA IPv6 Technology and Advanced Services Oct.19, 2004.
NT1210 Introduction to Networking
Mobile IP THE 12 TH MEETING. Mobile IP  Incorporation of mobile users in the network.  Cellular system (e.g., GSM) started with mobility in mind. 
Instructor Materials Chapter 6 Building a Home Network
Chapter 12 Communications Security & Countermeasures
Firewalls Routers, Switches, Hubs VPNs
Cengage Learning: Computer Networking from LANs to WANs
Presentation transcript:

HotNets-VI 1 Architecting Citywide Ubiquitous Wi-Fi Access Nishanth Sastry Jon Crowcroft, Karen Sollins

HotNets-VI 2 Architecting Citywide Ubiquitous Wi-Fi Access I: Whats wrong with sharing Wi-Fi? II: Tunneling based Architecture to safely & securely share Wi-Fi

Nishanth Sastry Hotnets-VI 3/14 Guest Host AP + Firewall + NAT Terminology Guests Home Host

Nishanth Sastry Hotnets-VI 4/14 Whats wrong with sharing Wi-Fi? (1/2) Malicious guests can... be bandwidth hogs infect host computers download illegal content be part of DDoS botnet * Use bandwidth limiters & firewalls Hosts have to trust guests to be well-behaved * Where each flow is too small to be detected

Nishanth Sastry Hotnets-VI 5/14 Whats wrong with sharing Wi-Fi? (1/2) Then there are the freeloaders... seeking better connectivity than their homes And kids escaping parental control home How do we induce hosts to share Wi-Fi?

Nishanth Sastry Hotnets-VI 6/14 Whats wrong with sharing Wi-Fi? (1/2) Captive portals, commonly used for logins at public hotspots (e.g. cafés & Fon), are essentially dynamic firewalls & are susceptible to users who sniff & spoof an authenticated users address

Nishanth Sastry Hotnets-VI 7/14 Whats wrong with sharing Wi-Fi? (2/2) Hosts can be malicious too. e.g. Pharming Guest has to trust host router!

Nishanth Sastry Hotnets-VI 8/14 safely How to safely share Wi-Fi? Home takes on responsibility for guests traffic hides guest traffic from host by encrypting acts as trusted source for guest DNS/IP Eliminate latent trust dependencies

Nishanth Sastry Hotnets-VI 9/14 Host Guest Host AP + Firewall + NAT Tunneling removes dependencies Guests Home vpn-local IP Trusted Services VPN server Tunnel Guests DHCP NAT beyond tunnel

Nishanth Sastry Hotnets-VI 10/14 Guest Host AP + Firewall + NAT Guests Home STUN Co-op distributes two registries: Coop-local IP Member ID Mapping of members ISP assigned IP Tunnel setup: Co-operative coop-local IP

Nishanth Sastry Hotnets-VI 11/14 But, what about performance? Path length inflation Intra-City Latency 3060ms [Lakshminarayanan IMC03] Guest downlink = home downlink+uplink! Asymmetric broadband limited uplinks Median uplink bandwith = 212 Kbps [ibid] Sufficient for emergency response [LeMay earlier ] Performance comparable to p2p flows

Nishanth Sastry Hotnets-VI 12/14 Scale and scope of the co-op depends on: regional laws governing legal content technical factors... end2end latency sizeof(coop-local IP space) AP memory for home & coop-local IP tables Works for citywide co-ops (broadband members)

Nishanth Sastry Hotnets-VI 13/14 Technical summary Guest 4. Guests Home 2. STUN 1.coop-local IP 3.Tunnel 5. vpn-local IP

Nishanth Sastry Hotnets-VI 14/14 Key features enabled by home Guest 4. Guests Home 2. STUN 1.coop-local IP 3.Tunnel 5. vpn-local IP Accountability in IP tracebacks Simultaneous access through multiple hosts crucial for access with weak signals

Nishanth Sastry Hotnets-VI 15/14 Two paths to adoption I: Without ISP support: Will hosts ISP let it share its connection? hinges on what internet connection is mandate sharing! unlicensed spectrum is public good II: With ISP support: offer business model Think Comcast Voice citywide! Co-op can benefit from ISP: increase uplink bandwidth for guest access make better tunnels (e.g. MPLS VPNs)

Nishanth Sastry Hotnets-VI 16/14 Mesh networks dense deployment

Nishanth Sastry Hotnets-VI 17/14 Co-op tunnels Mobile IP tunnels X Triangular routing not possible External node typically initiates contact Need to register care-of address precludes highly mobile guests like cars

Nishanth Sastry Hotnets-VI 18/14 Local IP addresses vpn-local/coop-local IPs are private IPs vpn-local is local to guest-home pair can be reused by host & other guests coop-local is local to guest-host pair can be reused on office VPNs of guest/host

Nishanth Sastry Hotnets-VI 19/14 Dealing with NATs Restricted Cone or Symmetric NAT Punch holes separately to each member NATs with deep packet inspection STUN/rendezvous server acts as relay