1 Thrust 5: Secure Wireless Networking Technologies For future generation wireless packet networks, two most important aspects need to be addressed: QoS.

Slides:



Advertisements
Similar presentations
Why to learn OSI reference Model? The answer is too simple that It tells us that how communication takes place between computers on internet but how??
Advertisements

UMA (Unlicensed Mobile Access) El Ayoubi Ahmed Hjiaj Karim.
Group #1: Protocols for Wireless Mobile Environments.
Information Security 1 Information Security: Security Tools Jeffy Mwakalinga.
Optical communications & networking - an Overview
Mohamed Hefeeda 1 School of Computing Science Simon Fraser University, Canada Multimedia Streaming in Dynamic Peer-to-Peer Systems and Mobile Wireless.
1 SOWER: Self-Organizing Wireless Network for Messaging Márk Félegyházi {mark.felegyhazi, srdan.capkun, Srdjan Čapkun Jean-Pierre.
Middle Boxes Lixia Zhang UCLA Computer Science Dept Sprint Research Symposium March 8-9, 2000.
Chapter 15 The Third Component: Powerful Networks.
University of Kansas ITTC Research Overview Victor S. Frost Dan F. Servey Distinguished Professor Electrical Engineering and Computer Science Executive.
Telecommunications and Networks Business value of networks Network components Chapter 6 McGraw-Hill/Irwin Copyright © 2007 by The McGraw-Hill Companies,
CS541 Advanced Networking 1 Cognitive Radio Networks Neil Tang 1/28/2009.
WATERLOO ELECTRICAL AND COMPUTER ENGINEERING 10s: Communications and Information Systems 1 WATERLOO ELECTRICAL AND COMPUTER ENGINEERING 10s Communications.
Telecommunications. General Information Industry: Telecommunication Industry Patent Number: (US Patent) Title: Electronic Device Security.
1 10 THE INTERNET AND THE NEW INFORMATION TECHNOLOGY INFRASTRUCTURE.
I T & S A e r o s p a c eD e f e n c e Content adaptation for gradual Quality of Service Vania Conan, Arnaud Pierre Thales
Performance analysis and prediction of physically mobile systems Point view: Computational devices including Mobile phones are expanding. Different infrastructure.
© 2003, Cisco Systems, Inc. All rights reserved _03_2003_c4 © 2003, Cisco Systems, Inc. All rights reserved _03_2003_c4.
1. There are different assistant software tools and methods that help in managing the network in different things such as: 1. Special management programs.
Chapter 1 Introduction to Computer Networks and Data Communications Data Communications and Computer Networks: A Business User’s Approach.
Introduction to Multimedia Networking (2) Advanced Multimedia University of Palestine University of Palestine Eng. Wisam Zaqoot Eng. Wisam Zaqoot October.
Brussels, 1 June 2005 WP Strategic Objective Embedded Systems Tom Bo Clausen.
IT 351 Mobile &Wireless Computing Semester 2, Dr. Hala Mokhtar Room 79- 2nd floor.
1 Wireless technology for Research and Educational Communities in Azerbaijan September, 2002 Dr. Elchin R. Aliyev.
Cross Layer Design (CLD) for Wireless Networks. Future Wireless Systems Nth Generation Cellular Wireless Internet Access Wireless Video/Music Wireless.
Future Internet Architecture Panel Discussion 2006 Broadnets Conference San Jose October 4, 2006 John Musacchio Assistant Professor Technology and Information.
An Analysis of Bluetooth Security
Presentation by Papua New Guinea Telecommunication & Radiocommunication Technical Authority (PANGTEL) For: PNG COMPUTER SOCIETY ANNUAL SEMINAR, 4th November.
An Integrated QoS, Security and Mobility Framework for Delivering Ubiquitous Services Across All IP-based Networks Haitham Cruickshank University of Surrey.
I. Basic Network Concepts. I.1 Networks Network Node Address Packet Protocol.
Apartado Porto Codexwww.inescporto.pt tel (351) fax (351) /April/2005 Research Activities in 4G Networks at INESC Porto.
IT 351 Mobile &Wireless Computing Semester 1, Dr. Hala Mokhtar Room th floor.
Cognitive Radio Networks
Network Security Lecture 20 Presented by: Dr. Munam Ali Shah.
Grid-based Future Internet with Wireless sensor network By Mohammad Mehedi Hassan Student ID:
Chapter 15 – Part 2 Networks The Internal Operating System The Architecture of Computer Hardware and Systems Software: An Information Technology Approach.
Chapter 17 Internetworking: Concepts, Architecture, and Protocols
Covilhã, 30 June Atílio Gameiro Page 1 The information in this document is provided as is and no guarantee or warranty is given that the information is.
Internetworking Concept and Architectural Model Chapter 3.
BLUETOOTH Created By: Ajay Bahoriya. Agenda Introduction to Bluetooth Bluetooth Basics Mode of operation Technology Security Advantages Integrating BT.
1 BRUSSELS - 14 July 2003 Full Security Support in a heterogeneous mobile GRID testbed for wireless extensions to the.
1 Innovation in Services Business Service Design and Innovation Fostering the Economic and Legal Framework for Innovation Performance and Development of.
Wireless Networking Nandakumar.P. Web Resource
A New Revolution in Wireless Communications By Mike Yoho.
Data Network Designing and Evaluation
Task-Force 1 Softwarization of Networks ICT COST Action IC1304 Autonomous Control for a Reliable Internet of Services (ACROSS)
Problem in Current Internet - Supporting Seamless Connection in Heterogeneous Networks Future Internet term project KHU Computer Engineering Networking.
Ashley White.  Computing that is made to be found anywhere and everywhere.  A high degree of communication among devices and sensors through a ubiquitous.
Doc.: IEEE /843r0 Submission Cheng Hong, Tan Pek-Yew, Panasonic Slide 1 November 2003 Interworking – WLAN Control Cheng Hong & Tan Pek Yew Panasonic.
Computer Science and Engineering - University of Notre Dame Jimmy Neutron CSE 40827/60827 – Ubiquitous Computing December 9, 2009 Project Presentation.
Systems Analysis and Design in a Changing World, 6th Edition 1 Chapter 6 Essentials of Design.
Introduction Chapter 1. Business Applications of Networks A network with two clients and one server. Client-Server Model.
3G wireless system  Speeds from 125kbps-2Mbps  Performance in computer networking (WCDMA, WLAN Bluetooth) & mobile devices area (cell.
Data and Computer Communications Chapter 10 – Circuit Switching and Packet Switching.
4x4 Optimization Alkesh Patel & Hemant Patel. Background IP address – identify computer on the network Mobile domain - mobile host IP address is not restricted.
- D1 - FT/Networks and Carriers Division ITU-T WORKSHOP on NGN (Geneva 9-10 July 2003) NGN an architecture for 21st century networks? ITU-T NGN Workshop.
Survey on the Characterization and Classification of Wireless Sensor Network Application [1] CS 2310 Software Engineering Xiaoyu Liang.
Introduction Chapter 1. Uses of Computer Networks Business Applications Home Applications Mobile Users Social Issues.
Cooperative Resource Management in Cognitive WiMAX with Femto Cells Jin Jin, Baochun Li Department of Electrical and Computer Engineering University of.
Wired and Wireless network management 1. outline 2 Wireless applications Wireless LAN Wireless LAN transmission medium WLAN modes WLAN design consideration.
Jia Uddin Embedded System Lab.  MPLS  IMANET  IMANET network model  Proposed model of IMANET with MPLS  Conclusion.
 Abbreviation of fourth generation wireless technology  It will provide a comprehensive IP solution where voice, data and multimedia can be given to.
1 © 2007 Cisco Systems, Inc. All rights reserved.Cisco Public Network Architecture Characteristics  Explain four characteristics that are addressed by.
Decisive Themes, July, JL-1 ARTEMIS Decisive Theme for Integrasys Pedro A. Ruiz Integrasys July, 2011.
Voice Over Internet Protocol Nelson Kattula Computer Science, Masters.
Fundamentals of Information Systems, Sixth Edition
Chapter 1 – Part 1 Introduction.
DIFFERENT TYPES OF INTERNET CONNECTIONS.
Networking Computer network A collection of computing devices that are connected in various ways in order to communicate and share resources Usually,
Introduction to Networking Security
Presentation transcript:

1 Thrust 5: Secure Wireless Networking Technologies For future generation wireless packet networks, two most important aspects need to be addressed: QoS guarantee, and Security –Because the wireless access channels are the bottleneck of the end-to-end communication links, there is a need to develop resource management and traffic control schemes for wireless channels that provide QoS guarantees for heterogeneous traffic. –Security is very important particularly because of the broadcasting nature of the radio transmissions in wireless networks. Wireless networks are characterized by poor quality links, mobility, limited power, computational constraints and scarce spectrum resources. QoS and security mechanisms need to be specially investigated and treated.

2 Flagship Project with Commercial Potential A hybrid wireless data network architecture will be examined to develop the QoS guarantee and security mechanisms. The interactions of the QoS schemes and the security mechanisms will also be studied in detail. Lab software will be developed at first to test the QoS guarantee and security mechanisms. Because of the huge market for future generation wireless packet networks, we can easily transfer the technology to local industries in Puerto Rico and we have huge potentials for commercialization.

3 Market Positioning By looking at the US mobile phone statistics and the wireless web access statistics, we have a feeling of potential wireless market. Many of the problems dealt in this project is the first time to get the attention but really need to be solved. The QoS schemes and the security mechanisms developed in this project will be patented, therefore the technology developed will be protected. Software products will be developed to work with the wireless network hardware and the network infrastructure. US Mobile Phone Statistics US Wireless Web Access Statistics Over 120 Million mobile phone users in U.S in June 2001