Peer-to-Peer Wireless Network Confederation (P2PWNC) Mobile Multimedia Laboratory Athens University of Economics and Business Athens MMAPPS Meeting, September.

Slides:



Advertisements
Similar presentations
Lemonade and Mobile e- mail Stéphane H. Maes – Lemonade Intermediate meeting Vancouver, BC October 2004.
Advertisements

MCTS Guide to Microsoft Windows Server 2008 Network Infrastructure Configuration Chapter 6 Managing and Administering DNS in Windows Server 2008.
Information Security 1 Information Security: Security Tools Jeffy Mwakalinga.
Elias C. Efstathiou Mobile Multimedia Lab Computer Science Department Athens University of Economics and Business Athens 10434, Greece
Configuring your Home Network Configuring your Home Network Jay Ferron ADMT, CISM, CISSP, MCDBA, MCSE, MCT, NSA-IAM.
Simple ways to secure Wireless Computers Jay Ferron, ADMT, CISM, CISSP, MCSE, MCSBA, MCT, NSA-IAM, TCI.
Information Security 1 Information Security: Demo of Some Security Tools Jeffy Mwakalinga.
Designing a Peer-to-Peer Wireless Network Confederation Elias C. Efstathiou and George C. Polyzos Department of Computer Science Athens University of Economics.
P2PWNC Wireless Community Network CMSC 711: Computer Networks Yee Lin Tan Adam Phillippy.
This work is supported by the National Science Foundation under Grant Number DUE Any opinions, findings and conclusions or recommendations expressed.
Security Awareness: Applying Practical Security in Your World
Wireless Networking WAN Design Module-06 Jerry Bernardini Community College of Rhode Island 6/18/20151Wireless Networking J. Bernardini.
A Peer-to-Peer Approach to Wireless LAN Roaming George C. Polyzos Mobile Multimedia Laboratory Department of Informatics Athens University of Economics.
CCNA Exploration Semester 3 Modified by Profs. Ward and Cappellino
Wireless Networking WAN Design Module-06
Peer WLAN Consortium: A P2P Case Study Mobile Multimedia Laboratory Department of Informatics Athens University of Economics & Business Athens MMAPPS Meeting,
IGD Working Committee Update Ulhas Warrier Chair, IGD Intel Corporation.
Chapter 3 Application Level Security in Wireless Network IWD2243 : Zuraidy Adnan : Sept 2012.
Week #10 Objectives: Remote Access and Mobile Computing Configure Mobile Computer and Device Settings Configure Remote Desktop and Remote Assistance for.
Clinic Security and Policy Enforcement in Windows Server 2008.
Module 4 - Networking MIS5122: Enterprise Architecture for the IT Auditor.
Shared success Outline What is network security? Why do we need security? Who is vulnerable? Common security attacks and countermeasures. How to secure.
Dartmouth’s Wireless Network May 16, 2005 David W. Bourque.
Computation for Physics 計算物理概論 Introduction to Linux.
Module 13: Network Load Balancing Fundamentals. Server Availability and Scalability Overview Windows Network Load Balancing Configuring Windows Network.
Network Protocols. Why Protocols?  Rules and procedures to govern communication Some for transferring data Some for transferring data Some for route.
Chapter 10 Intro to Routing & Switching.  Upon completion of this chapter, you should be able to:  Explain how the functions of the application layer,
NetworkProtocols. Objectives Identify characteristics of TCP/IP, IPX/SPX, NetBIOS, and AppleTalk Understand position of network protocols in OSI Model.
Eduroam Louis Twomey HEAnet Library Services Day 20 th November 2014.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco PublicITE I Chapter 6 1 Configure a Wireless Router LAN Switching and Wireless – Chapter 7.
Objectives Configure routing in Windows Server 2008 Configure Routing and Remote Access Services in Windows Server 2008 Network Address Translation 1.
Module 12: Routing Fundamentals. Routing Overview Configuring Routing and Remote Access as a Router Quality of Service.
Module 3: Designing IP Addressing. Module Overview Designing an IPv4 Addressing Scheme Designing DHCP Implementation Designing DHCP Configuration Options.
1 C-DAC/Kolkata C-DAC All Rights Reserved Computer Security.
TECHNOLOGY GUIDE THREE Protecting Your Information Assets.
VIRTUAL PRIVATE NETWORK By: Tammy Be Khoa Kieu Stephen Tran Michael Tse.
Module 9: Designing Network Access Protection. Scenarios for Implementing NAP Verifying the health of: Roaming laptops Desktop computers Visiting laptops.
Author: Bill Buchanan. 1. Broadcast: What is the MAC address of this network address? 2. Requested host: All the hosts read the broadcast and checks.
Information Flow Across the Internet. What is the Internet? A large group of computers that link together to form the Worldwide Area Network (WAN)
Chapter 9 Networking & Distributed Security. csci5233 computer security & integrity (Chap. 9) 2 Outline Overview of Networking Threats Wiretapping, impersonation,
1 Presentation_ID © 1999, Cisco Systems, Inc. Cisco All-IP Mobile Wireless Network Reference Model Presentation_ID.
Welcome Windows Server 2008 安全功能 -NAP. Network Access Protection in Windows Server 2008.
A policy-based per-flow mobility management system design
Akbar Rahman Juan Carlos Zúñiga Guang Lu IETF 78, July P2P Streaming for Mobile Nodes: Scenarios.
TCP/IP (Transmission Control Protocol / Internet Protocol)
Network Location Awareness Vision And Scenarios Tracey Yao Program Manager Windows Wireless Networking microsoft.com Microsoft Corporation.
3GPP2 Charging Betsy Kidwell Chair, 3GPP2 TSG-X Lucent Technologies OMA-MCC Bangkok, Thailand June 2004.
Authentication has three means of authentication Verifies user has permission to access network 1.Open authentication : Each WLAN client can be.
Motivation - The Edge Lab Motivation Communication as a co-operative multi-party act: But interests diverge … Core question: how can we distribute control.
.  Hubs send data from one computer to all other computers on the network. They are low-cost and low-function and typically operate at Layer 1 of the.
Also known as hardware/physi cal address Customer Computer (Client) Internet Service Provider (ISP) MAC Address Each Computer has: Given by NIC card.
2.2 Interfacing Computers MR JOSEPH TAN CHOO KEE TUESDAY 1330 TO 1530
LINCWorks Mesh Networking User Guide. This user guide will give a brief overview of mesh networking followed by step by step instructions for configuring.
Chapter 7: Using Network Clients The Complete Guide To Linux System Administration.
Networks and Security Great Demo
1 Wireless Networks Lecture 17 GPRS: General Packet Radio Service (Part I) Dr. Ghalib A. Shah.
Discovery Internetworking Module 9 JEOPARDY K. Martin.
Munix Bus WiFi Authentication, Log Management, Internet Security, Content Filter & VPN Service Internet Gateway & Business Intelligence
Wireless Ethernet Programming
Module 9: Configuring Network Access
Instructor Materials Chapter 6 Building a Home Network
A Peer-to-Peer Approach to Wireless LAN Roaming
TECHNOLOGY GUIDE THREE
SECURING NETWORK TRAFFIC WITH IPSEC
IPSec VPN Chapter 13 of Malik.
Design Unit 26 Design a small or home office network
Design Unit 26 Design a small or home office network
NAT Configuration For ZyXEL ADSL Wireless Router
Application Layer Mobility Management Scheme for Wireless Internet
Cengage Learning: Computer Networking from LANs to WANs
Presentation transcript:

Peer-to-Peer Wireless Network Confederation (P2PWNC) Mobile Multimedia Laboratory Athens University of Economics and Business Athens MMAPPS Meeting, September , 2003

10/09/2003MMAPPS P2PWNC2 of 40 Overview Introduction Internals Usage Demo Issues

10/09/2003MMAPPS P2PWNC3 of 40 Introduction

10/09/2003MMAPPS P2PWNC4 of 40 Background P2PWNC: A P2P approach to WISP roaming Substantial autonomy for the roaming partners Easy for networks to participate: less administrative overhead Provisions for identity and location privacy

10/09/2003MMAPPS P2PWNC5 of 40 Terminology Visited Domain  Providing Peer User Devices: Unique Hardware (MAC) Address Home Domain  Consuming Peer Registered Users: Unique P2PWNC ID ( ) Peer Names  Domain Names aueb.gr bt.com Consuming Peer Providing Peer

10/09/2003MMAPPS P2PWNC6 of 40 Service Fundamentals Ubiquitous wireless Internet access Rules and accounting Lightweight devices ( WLAN interface, TCP/IP and a web-browser ) QoS Device mobility

10/09/2003MMAPPS P2PWNC7 of 40 Usage

10/09/2003MMAPPS P2PWNC8 of 40 Usage Scenario 1. User visits a peer domain 3. Uses P2PWNC ID to login 2. Activates device 4. Accesses the Internet 5. Leaves or turns off device

10/09/2003MMAPPS P2PWNC9 of 40 Before Authentication

10/09/2003MMAPPS P2PWNC10 of 40 Before Authentication

10/09/2003MMAPPS P2PWNC11 of 40 Login

10/09/2003MMAPPS P2PWNC12 of 40 Successful Visitor Login

10/09/2003MMAPPS P2PWNC13 of 40 Internals

10/09/2003MMAPPS P2PWNC14 of 40 Session Types Only roaming sessions require a P2P negotiation 1. visiting users 2. their own roaming users 3. their own registered users when at home Rules have no meaning for users when at home Peers keep track of: Two session types: local and roaming

10/09/2003MMAPPS P2PWNC15 of 40 Layered Peer Architecture P2PWNC Application WLAN Service Network Services Authentication Packet sniffer Firewall Rate control Wireless tools Routing / NATDHCP Visitor Negotiation WLAN listenerWLAN object calls

10/09/2003MMAPPS P2PWNC16 of 40 Initial Events P2PWNC Application WLAN Service Network Services Authentication DHCP 4. CGI receives user credentials 1. IP address leased 2. MAC address is new 3. New device event 5. Authentication succeeded 6. New login event

10/09/2003MMAPPS P2PWNC17 of 40 Local Events GUI

10/09/2003MMAPPS P2PWNC18 of 40 Local Sessions GUI

10/09/2003MMAPPS P2PWNC19 of 40 Local Sessions WLAN Service Local SessionsRoaming Sessions TrafficDurationUserRate TrafficDurationUserRate Traffic DetailsDurationUserRate getUsers() getTrafficDetails() getDuration() getRate()

10/09/2003MMAPPS P2PWNC20 of 40 Roaming Sessions GUI

10/09/2003MMAPPS P2PWNC21 of 40 Roaming Sessions WLAN Service getUser() getTrafficDetails() getDuration() getRate() Roaming Sessions Consumer Stub Consumer Stub Consumer Stub Consumer Stub Consumer Stub Consumer Local Sessions WLAN Service Visited domainHome domain

10/09/2003MMAPPS P2PWNC22 of 40 Visitor Negotiation Visitor Negotiation MMAPPS Negotiation Visitor Session WLAN Visitor Negotiation MMAPPS Negotiation Listener WLAN Visited domain - Provider Home domain - Consumer 1. Visitor credentials check 2. Negotiate 3. Request service 4a. MMAPPS negotiation 4b. Balance check 5. Start 6. Balance OK: Proceed

10/09/2003MMAPPS P2PWNC23 of 40 Visitor Logout Timeout-based logout Provider and consumer GUIs updated Provider and consumer declare session terminated Balances updated

10/09/2003MMAPPS P2PWNC24 of 40 Rules and Policies GUI

10/09/2003MMAPPS P2PWNC25 of 40 Breaking the Rules If rule is broken, consuming peer receives a negotiation abort Provider can configure rule with one parameter ( benevolence ) Even then, provider can provide some connection time “for free”

10/09/2003MMAPPS P2PWNC26 of 40 QoS GUI

10/09/2003MMAPPS P2PWNC27 of 40 QoS Scheme Split link bandwidth into two parts: home and visitors Current scheme is inflexible Allocate guaranteed bandwidth for specific locally registered users Allocate guaranteed percentage of visitor bandwidth for specific domains

10/09/2003MMAPPS P2PWNC28 of 40 Demo

10/09/2003MMAPPS P2PWNC29 of 40 Demo Setup aueb.grbt.com switch Channel 01 SSID aueb.gr Mode Ad hoc Channel 11 SSID bt.com Mode Ad hoc

10/09/2003MMAPPS P2PWNC30 of 40 Network Settings GUI

10/09/2003MMAPPS P2PWNC31 of 40 User Accounts GUI

10/09/2003MMAPPS P2PWNC32 of 40 Issues

10/09/2003MMAPPS P2PWNC33 of 40 Accounting Events Volume-based events A rule, similar to the current one, taking these under consideration Time-based events QoS-based events

10/09/2003MMAPPS P2PWNC34 of 40 Lightweight Clients We assumed no special software on the client device Consuming peer is not aware of the actual service May be required, however, to verify received service authoritatively Who else can independently observe the provider?

10/09/2003MMAPPS P2PWNC35 of 40 Offline Peers Password-based authentication cannot work A user’s home domain may be offline No consumer peer available to negotiate on the user’s behalf Could the user device act as a peer? Could another peer act as the user’s home?

10/09/2003MMAPPS P2PWNC36 of 40 DNS Substitute Resolve this to the peer’s current IP address ( which may change ) Need to support unique, logical, location-independent peer names Enhanced MMAPPS Search? Based on a DHT? not just ‘aueb.gr’ or ‘bt.com’ but also ‘Elias_Athens_ADSL_Peer’

10/09/2003MMAPPS P2PWNC37 of 40 More General Issues That take peer heterogeneity into account? Efficient rules Distributed accounting Secure, fault-tolerant

10/09/2003MMAPPS P2PWNC38 of 40 Privacy Hide current location from home peer Location privacy ( untraceability ) Identity privacy ( anonymity ) Hide real P2PWNC ID from visited peer

10/09/2003MMAPPS P2PWNC39 of 40 Privacy Architecture Peer ‘P’ Peer ‘A’ (mix 1) Peer ‘B’ (mix 2) Peer ‘C’ “My P2PWNC ID is (Credentials include real ID and a mix chain -- encrypted using nested public-key encryptions) { MIX, B, { MIX, C, { STOP, X } C } B } A { MIX, C, { STOP, X } C } B { STOP, X } C

10/09/2003MMAPPS P2PWNC40 of 40 Thank You