Page 1 Unclassified 10302002_NB_Next Steps.ppt Phillip E. Paulsen Space Communications Office NASA Glenn Research Center (GRC) Cleveland, Ohio 6 November.

Slides:



Advertisements
Similar presentations
Transitioning to IPv6 April 15,2005 Presented By: Richard Moore PBS Enterprise Technology.
Advertisements

TANDBERG Video Communication Server March TANDBERG Video Communication Server Background  SIP is the future protocol of video communication and.
Guide to Network Defense and Countermeasures Second Edition
CP Networking1 WAN and Internet Access. CP Networking2 Introduction What is Wide Area Networking? What is Wide Area Networking? How Internet.
Module 3 Windows Server 2008 Branch Office Scenario.
1 Securing Mobile Networks An Enabling Technology for National and International Security and Beyond.
1 IP Security Outline of the session –IP Security Overview –IP Security Architecture –Key Management Based on slides by Dr. Lawrie Brown of the Australian.
Protocols and the TCP/IP Suite Chapter 4 (Stallings Book)
Mobility in the Internet Part II CS 444N, Spring 2002 Instructor: Mary Baker Computer Science Department Stanford University.
A Study of Mobile IP Kunal Ganguly Wichita State University CS843 – Distributed Computing.
Protocols and the TCP/IP Suite
Goal of The Paper  What exactly is a VPN?  Why do you need a VPN?  what are some of the technologies used in deploying a VPN?  How does a VPN work?
Satellite Communications Systems and Emergency Communications Dr. Joseph S. Bravman Omnisat, LLC December 12, 2005.
1 A Course-End Conclusions and Future Studies Dr. Rocky K. C. Chang 28 November 2005.
Internet Protocol Security (IPSec)
The Future of the Internet Jennifer Rexford ’91 Computer Science Department Princeton University
NEtwork MObility By: Kristin Belanger. Contents Introduction Introduction Mobile Devices Mobile Devices Objectives Objectives Security Security Solution.
Network Topology. Cisco 2921 Integrated Services Router Security Embedded hardware-accelerated VPN encryption Secure collaborative communications with.
Copyright Microsoft Corp Ramnish Singh IT Advisor Microsoft Corporation Secure Remote Access Challenges, Choices, Best Practices.
Lecture 1, 1Spring 2003, COM1337/3501Computer Communication Networks Rajmohan Rajaraman COM1337/3501 Textbook: Computer Networks: A Systems Approach, L.
Virtual Private Network prepared by Rachna Agrawal Lixia Hou.
Route Optimization Requirements for Operational Use in Aeronautics and Space Exploration Mobile Networks (draft-eddy-nemo-aero-reqs-01) Wes Eddy – Verizon.
Neah Bay Presentation. Introduction Western DataCom has been in business for 20+ years providing data communications security solutions to the US Government,
1 Wide Area Network. 2 What is a WAN? A wide area network (WAN ) is a data communications network that covers a relatively broad geographic area and that.
Protocols and the TCP/IP Suite Chapter 4. Multilayer communication. A series of layers, each built upon the one below it. The purpose of each layer is.
CECS 5460 – Assignment 3 Stacey VanderHeiden Güney.
1 Kyung Hee University Prof. Choong Seon HONG Network Control.
Host Mobility for IP Networks CSCI 6704 Group Presentation presented by Ye Liang, ChongZhi Wang, XueHai Wang March 13, 2004.
Using LISP for Secure Hybrid Cloud Extension draft-freitasbellagamba-lisp-hybrid-cloud-use-case-00 Santiago Freitas Patrice Bellagamba Yves Hertoghs IETF.
Common Devices Used In Computer Networks
Remote Access Chapter 4. Learning Objectives Understand implications of IEEE 802.1x and how it is used Understand VPN technology and its uses for securing.
Networks – Network Architecture Network architecture is specification of design principles (including data formats and procedures) for creating a network.
Space-Based Network Centric Operations Research. Secure Autonomous Integrated Controller for Distributed Sensor Webs Objective Develop architectures and.
June 2004 SIW-4 - IP in Space Implementation Guide 1 Handbook for Using IP Protocols for Space Missions James Rash - NASA/GSFC Keith Hogie, Ed Criscuolo,
Practical Considerations for Securely Deploying Mobility Will Ivancic NASA Glenn Research Center (216)
The Grid System Design Liu Xiangrui Beijing Institute of Technology.
Hierarchical Network Design – a Review 1 RD-CSY3021.
1 Presentation_ID © 1999, Cisco Systems, Inc. Cisco All-IP Mobile Wireless Network Reference Model Presentation_ID.
OS Services And Networking Support Juan Wang Qi Pan Department of Computer Science Southeastern University August 1999.
1 Mobile-IP Priority Home Agents for Aerospace and Military Applications Terry Bell, Will Ivancic, Dave Stewart, Dan Shell and Phil Paulsen.
First, by sending smaller individual pieces from source to destination, many different conversations can be interleaved on the network. The process.
1 Securing Mobile and Wireless Networks Is It Possible?
NETWORKING FUNDAMENTALS. Network+ Guide to Networks, 4e2.
1 Securing Mobile Networks in an Operational Setting Will Ivancic (216)
CHAPTER 4 PROTOCOLS AND THE TCP/IP SUITE Acknowledgement: The Slides Were Provided By Cory Beard, William Stallings For Their Textbook “Wireless Communication.
1 © 1999, Cisco Systems, Inc. Mobile Router Technology Development Dan Shell - Cisco Will Ivancic - NASA Glenn.
1. Mobile Router Networks in Motion (tm) 2. Mobile Router Features Uses Internet standards-bases Mobile-IP technology - RFC 2002 Mobile Router allows.
Challenges in the Next Generation Internet Xin Yuan Department of Computer Science Florida State University
Glenn Research Center Satellite Networks & Architectures Branch Communications Technology Division IEEE Aerospace Conference March Architecture.
Building Corporate Data Networks – A Case Study
1 Mobile Router Technology Development David Stewart, Will Ivancic, Dan Shell, Kent Leung, Brian Kachmar and Terry Bell.
IS3220 Information Technology Infrastructure Security
Computer Science and Engineering Computer System Security CSE 5339/7339 Session 27 November 23, 2004.
Leveraging SDN for The 5G Networks: Trends, Prospects and Challenges ADVISOR: 林甫俊教授 Presenter: Jimmy DATE: 2016/3/21 1.
Lecture 10 Page 1 CS 236 Online SSL and TLS SSL – Secure Socket Layer TLS – Transport Layer Security The common standards for securing network applications.
Mobile Ad Hoc Networking By Shaena Price. What is it? Autonomous system of routers and hosts connected by wireless links Can work flawlessly in a standalone.
Chapter 1: Explore the Network
Planning and Troubleshooting Routing and Switching
EA C451 Vishal Gupta.
Protocols and the TCP/IP Suite
Securing Mobile Networks
IS4680 Security Auditing for Compliance
Virtual Private Network
Distributed Space/Ground Network Centric Operations Research Testbed
Mobile Router Technology Development
Practical Considerations for Securely Deploying Mobility
DISN Evolution Mr. Charles Osborn
Protocols and the TCP/IP Suite
Presentation transcript:

Page 1 Unclassified _NB_Next Steps.ppt Phillip E. Paulsen Space Communications Office NASA Glenn Research Center (GRC) Cleveland, Ohio 6 November 2002 Secure Mobile Networking : Next Steps

Page 2 Unclassified _NB_Next Steps.ppt Do you have any further questions concerning the technology? Did we hit the mark with regards to: –Interoperability? –Transparency? –Scalability? –Mobility? –Use of Shared Infrastructure? –Security? –Bandwidth? Secure Mobile Networking Follow Up

Page 3 Unclassified _NB_Next Steps.ppt Existing Systems Satellite Dedicated Operations Dedicated Infrastructure Scheduled Service Fully Optimized Every Mission Unique Commanded Satellite Isolated, Stove-piped Communications Path Manual Fault Detection, Isolation, & Recovery Highly Asymmetric Data Flow Data Archived & Shipped to End Users at Later Date Future IP-Based Systems Satellite & Network Connection Shared Operations Shared Infrastructure Autonomous Service on Demand Best Available Commonality Across Missions Tasked Satellite System Integrated, Networked Communications Path Autonomous Fault Detection, Isolation, & Recovery Moderately Asymmetric Data Flow Data Archived and Shipped to Multiple End User Locations in Real Time Secure Mobile Networking Background: System Comparison

Page 4 Unclassified _NB_Next Steps.ppt As of November 2002, secure mobile network technology became commercially available. –The end-to-end implementation strategy for the new technology has not yet been developed. Policy, doctrine, and trust management all need to be defined, tested, and implemented. Issue: Technology offices typically do not fund the development of end-to-end solutions because they assume that the infrastructure already exists. –Individual missions pay to solve “mission unique” development issues. To be fully effective, we need to work with other organizations to develop systems that address the end-to-end issues that are inevitable with this type of state-of-the-art technology development. Secure Mobile Networking Technology Readiness Level Issue

Page 5 Unclassified _NB_Next Steps.ppt Continue development of mobile Internet hardware (mobile router and encryption devices). –Develop an integrated, scalable, survivable, secure solution for complex mobile networks. Firewalls, proxies, egress and ingress filtering, and Authentication, Authorization, and Accounting (AAA). Multiple nested, prioritized mobile routers and home agents. Dynamic multicast routing environments with multiple data sources and a large number of field data users. –Conduct penetration testing of integrated mobile networks. Active hacking / denial of services. –Research and development of IPv6 for mobile networks. –Development of radio link technology. New modem designs to share link layer information with higher layers to improve system throughput by differentiating between link errors and network congestion. Secure Mobile Networking NASA’s Future Research Directions

Page 6 Unclassified _NB_Next Steps.ppt Intelligence Control Center Secure Mobile Networking Future Research: Nested, Prioritized, Mobile Routers Home Agent Deployed in Battle Group Command Center (BGCC) Foreign-Agent deployed in Mobile Command Post. Foreign-Agent deployed in UAVs Foreign-Agent deployed in AWACS

Page 7 Unclassified _NB_Next Steps.ppt Continue development of mobile Internet hardware (mobile router and encryption devices). –Qualification of mini-router and packet encryptor for space using multi- vehicle environments and perform radiation hardness testing to failure. Identify qualification issues associated with commercial network product designs and processes. –Flight of mini-router and packet encryptor in space. Access on demand by fixed, mobile, and commercial systems. Secure Mobile Networking NASA’s Future Research Directions

Page 8 Unclassified _NB_Next Steps.ppt Secure Mobile Networking Flight Demonstration Concept

Page 9 Unclassified _NB_Next Steps.ppt LEO bird (or adjunct to a LEO bird). Capable of communicating across a wide variety of domains. –NASA GS. –TDRSS SN. –MILSTAR SN. –AFSCN GS. –Commercial GS. –Foreign GS. –Mobile / transportable elements (air, sea, land). Fully interoperable with current terrestrial networks (no IP wrapping, proxies, or gateway conversion). Dynamic IP security (HAIPE). On-orbit system router and radio reconfiguration and secure key exchange. Sufficient bandwidth to explore moderate data rates (10’s of Mbps). Virtual mission operations suite. Links to unsophisticated users in remote locations. Predictive routing. Contingency operations. Secure Mobile Networking Desirable Flight Demonstration Attributes

Page 10 Unclassified _NB_Next Steps.ppt Secure Mobile Networking MANTIS Demonstration Layout

Page 11 Unclassified _NB_Next Steps.ppt Are there other directions for the technology? Are there requirements that we missed? Do you have platforms that can leverage our technology? Can you lead us to others who could also benefit from this technology? Do we need to continue this discussion in a secure facility? Secure Mobile Networking Other Research Directions?

Page 12 Unclassified _NB_Next Steps.ppt Phillip E. Paulsen M.S NASA Glenn Research Center Brookpark Road Cleveland, Oh Phone: (216) E Mail: Publications IP in Space Contact Information