T-110.5110 Computer Networks II Introduction 17.9.2007 Adj. Prof. Sasu Tarkoma.

Slides:



Advertisements
Similar presentations
Using HIP to solve MULTI-HOMING IN IPv6 networks YUAN Zhangyi Beijing University of Posts and Telecommunications.
Advertisements

1Nokia Siemens Networks Presentation / Author / Date University of Twente On the Security of the Mobile IP Protocol Family Ulrike Meyer and Hannes Tschofenig.
CMPE 150- Introduction to Computer Networks 1 CMPE 150 Fall 2005 Lecture 25 Introduction to Computer Networks.
1 Address Selection, Failure Detection and Recovery in MULTI6 draft-arkko-multi6dt-failure-detection-00.txt Multi6 Design Team -- Jari Arkko, Marcelo Bagnulo,
Security in VoIP Networks Juan C Pelaez Florida Atlantic University Security in VoIP Networks Juan C Pelaez Florida Atlantic University.
BASIC CRYPTOGRAPHY CONCEPT. Secure Socket Layer (SSL)  SSL was first used by Netscape.  To ensure security of data sent through HTTP, LDAP or POP3.
SIP and IMS Enabled Residential Gateway Sergio Romero Telefónica I+D Jan Önnegren Ericsson AB Alex De Smedt Thomson Telecom.
1 © 2004 Cisco Systems, Inc. All rights reserved. Making NATs work for Online Gaming and VoIP Dr. Cullen Jennings
NAT TRAVERSAL FOR IPSEC Research Seminar on Datacommunications Software HIIT
1 Network Architecture and Design Advanced Issues in Internet Protocol (IP) IPv4 Network Address Translation (NAT) IPV6 IP Security (IPsec) Mobile IP IP.
COM555: Mobile Technologies Location-Identifier Separation.
Network Security Topologies Chapter 11. Learning Objectives Explain network perimeter’s importance to an organization’s security policies Identify place.
T Computer Networks II Summary
CS470, A.SelcukReal-Time Communication Issues1 Real-Time Communication Security IPsec & SSL Issues CS 470 Introduction to Applied Cryptography Instructor:
Telematics group University of Göttingen, Germany Overhead and Performance Study of the General Internet Signaling Transport (GIST) Protocol Xiaoming.
October 22, 2002Serguei A. Mokhov, 1 Intro to Internet-services from Security Standpoint, Part II SOEN321-Information-Systems Security.
T Computer Networks II Summary
Computer Communication1 Computer Communications Summary.
1 Computer Networks and Communications [Δίκτυα Υπολογιστών και Επικοινωνίες] Lectures 8&9: Internet Protocols in Detail – TCP/IP Univ. of the Aegean Financial.
School of Information Technologies Revision NETS3303/3603 Week 13.
Middle Boxes Lixia Zhang UCLA Computer Science Dept Sprint Research Symposium March 8-9, 2000.
ISOC-Chicago 2001John Kristoff - DePaul University1 Journey to the Center of the Internet John Kristoff DePaul University.
IPv6 and Overlays EE122 Introduction to Communication Networks Discussion Section.
SIP, NAT, Firewall SIP NAT Firewall How to Traversal NAT/Firewall for SIP.
1 A Course-End Conclusions and Future Studies Dr. Rocky K. C. Chang 28 November 2005.
Computer Communication1 Computer Communications Summary.
FIREWALLS & NETWORK SECURITY with Intrusion Detection and VPNs, 2 nd ed. 6 Packet Filtering By Whitman, Mattord, & Austin© 2008 Course Technology.
The Future of the Internet Jennifer Rexford ’91 Computer Science Department Princeton University
Network Layer IS250 Spring 2010
1 Lecture 20: Firewalls motivation ingredients –packet filters –application gateways –bastion hosts and DMZ example firewall design using firewalls – virtual.
Copyright 2003 CCNA 1 Chapter 7 TCP/IP Protocol Suite and IP Addressing By Your Name.
Host Identity Protocol
1 © 2003, Cisco Systems, Inc. All rights reserved. CCNA 1 v3.0 Module 9 TCP/IP Protocol Suite and IP Addressing.
HIIT’s Future Internet Research Programme Kimmo Raatikainen Programme Director: Future Internet
Host Mobility for IP Networks CSCI 6704 Group Presentation presented by Ye Liang, ChongZhi Wang, XueHai Wang March 13, 2004.
Packet Filtering. 2 Objectives Describe packets and packet filtering Explain the approaches to packet filtering Recommend specific filtering rules.
CCNA 1 v3.0 Module 9 TCP/IP Protocol Suite and IP Addressing
Remote Access Chapter 4. Learning Objectives Understand implications of IEEE 802.1x and how it is used Understand VPN technology and its uses for securing.
1.1 What is the Internet What is the Internet? The Internet is a shared media (coaxial cable, copper wire, fiber optics, and radio spectrum) communication.
Update on the Internet Research Task Force Aaron Falk IRTF Chair IETF-72 – Dublin.
Network Security by Behzad Akbari Spring 2012 In the Name of the Most High.
T Computer Networks II Introduction Prof. Sasu Tarkoma.
1 Transport Protocols Relates to Lab 5. An overview of the transport protocols of the TCP/IP protocol suite. Also, a short discussion of UDP.
1 November 2006 in Dagstuhl, Germany
T Computer Networks II Introduction Prof. Sasu Tarkoma.
First, by sending smaller individual pieces from source to destination, many different conversations can be interleaved on the network. The process.
Chapter 2 Protocols and the TCP/IP Suite 1 Chapter 2 Protocols and the TCP/IP Suite.
Security, NATs and Firewalls Ingate Systems. Basics of SIP Security.
Chapter 13 The Internet.
1 Chapters 2 & 3 Computer Networking Review – The TCP/IP Protocol Architecture.
CSE5803 Advanced Internet Protocols and Applications (14) Introduction Developed in recent years, for low cost phone calls (long distance in particular).
Interactive Connectivity Establishment : ICE
Network Layer (OSI and TCP/IP) Lecture 9, May 2, 2003 Data Communications and Networks Mr. Greg Vogl Uganda Martyrs University.
T Network Application Frameworks and XML Summary and Conclusions Sasu Tarkoma.
Teacher:Quincy Wu Presented by: Ying-Neng Hseih
1 Review – The Internet’s Protocol Architecture. Protocols, Internetworking & the Internet 2 Introduction Internet standards Internet standards Layered.
CIS6930: IP Quality of Service General Information What are we going to cover? What are you expected to do?
K. Salah1 Security Protocols in the Internet IPSec.
Computer Science and Engineering Computer System Security CSE 5339/7339 Session 27 November 23, 2004.
Cisco I Introduction to Networks Semester 1 Chapter 7 JEOPADY.
SOSIMPLE: A Serverless, Standards- based, P2P SIP Communication System David A. Bryan and Bruce B. Lowekamp College of William and Mary Cullen Jennings.
COM594: Mobile Technologies Location-Identifier Separation.
HIP-Based NAT Traversal in P2P-Environments
4.1.5 multi-homing.
OSI model vs. TCP/IP MODEL
Multiple Addresses in Transport - For Discussion
Net 431: ADVANCED COMPUTER NETWORKS
Transport Protocols Relates to Lab 5. An overview of the transport protocols of the TCP/IP protocol suite. Also, a short discussion of UDP.
Application Layer Mobility Management Scheme for Wireless Internet
Presentation transcript:

T Computer Networks II Introduction Adj. Prof. Sasu Tarkoma

Contents Course Outline Carrying out the course Lectures Material

Course Outline 4 credit course During Autumn 2007, we will look at protocols and architectures related to mobility management, session management, authentication, authorization and accounting (AAA) services and quality of service (QoS). The course consists of the lectures and a final exam. The purpose is that the participants actively read the material beforehand and discuss problem areas during the lectures. Networks II lectures start on Monday in T2. Registration happens on this first lecture. Course material will be in English. Lectures will be in English if required.

Course Goals Understand advanced networking techniques Learn state of the art Get a glimpse to near-future technologies and long haul development

Time and Place Time and place: Mondays at 14: :45 in T2 during the first period. Lectures will be held in T3 in the second period. Adj. Prof. Sasu Tarkoma gives the lecture unless otherwise indicated.

Carrying out the Course The course grade consists of partication to lectures and a final exam. Final exams will be held as follows: – at T1. – at T1. Required preliminary knowledge –T Telecommunication Architectures –T Computer Networks –T Information Security Technology

Lectures Introduction Transport issues Invited lecture given by Dr. Pasi Sarolahti / Nokia Research Center Mobility I Lectured by Prof. Jukka Manner NAT (STUN, ICE, TURN) QoS I Lectured by Prof. Jukka Manner Mobility II (MIP, HMIP, NEMO,..) No lecture (exam period) QoS continued and signalling (NSIS) AAA HIP I HIP II Invited lecture given by M.Sc. Miika Komu / HIIT Privacy and identity management Summary

Contact Points Send Follow course web-page –Results and updates will be posted to the Web Reception –After the lectures –Otherwise send to arrange a meeting –Exam reception will be scheduled after results

Summary of Course As discussed the course focuses on several important features of current networking systems – Mobility, QoS, Security, Privacy We observe that these features were not important for the original Internet architecture They are important now –Mobility, QoS, Security are coming with IPv6 –IPv6 deployment does not look promising Hence, many proposals to solve issues in the current Internet Also many solutions to solve expected problems in the Future Internet

Layered Architecture Internet has a layered architecture Four layers in TCP/IP –Application (L7) –Transport (L4) –Network (L3) –Link layer / physical (L2-L1) We will talk a lot about layering –Benefits, limitations, possibilities (cross-layer) –It is not always clear what is a good layering A lot of interesting networking developments are happening on application layer

The Internet has Changed A lot of the assumptions of the early Internet has changed –Trusted end-points –Stationary, publicly addressable addresses –End-to-End We will have a look at these in the light of recent developments End-to-end broken by NATs and firewalls

Network has Value A network is about delivering data between endpoints Data delivery creates value Data is the basis for decision making We have requirements to the network –Timeliness –Scalability –Security –...

Looking at the Layers Link Layer / Physical Network –We will look at mobility, security, and QoS on L3 –Mobile IP, network mobility, HIP, NAT Traversal Transport –Basic properties of transport layer protocols TCP variants, DCCP, TLS, dTLS –Mobility and security on L4 Application –Security, identity management Goal: have an understanding of the solutions and tradeoffs on each layer and discussion on the role of layering

Role of Standards On this course, we will talk a lot about standards –IETF is the main standards body for Internet technologies –Instruments: RFCs, Internet drafts –Working groups –IRTF Other relevant standards bodies –W3C, OMA, 3GPP, OMG

Transport Issues Network layer (IP) provides basic unreliable packet delivery between end-points Transport layer needs to provide reliability, congestion control, flow control, etc. for applications TCP variants SCTP DCCP TLS dTLS

Mobility What happens when network endpoints start to move? What happens when networks move? Problem for on-going conversations –X no longer associated with address –Solution: X informs new address Problem for future conversations –Where is X? what is the address? –Solution: X makes contact address available In practice not so easy. Security is needed!

NAT Traversal As mentioned, end-to-end is broken Firewalls block and drop traffic NATs do address and port translation –Hide subnetwork and private IPs How to work with NATs –Tricky: two NATs between communications –NAT and NAPT –One part is to detect NATs –Another is to get ports open IETF efforts –STUN –ICE –TURN –NSIS

QoS By default, there is no QoS support on the Internet IP is unreliable, packet types are handled differently (TCP/UDP/ICMP) No guarantees on TCP flow priority (OS and NW stack issue) IETF work –DiffServ, IntServ, NSIS

Security Features IPSec provides basic security (tunnel,transport) with IKE Solution for autentication, authorization, accounting is needed (AAA) –Radius, Diameter Case: WLAN access network

HIP HIP is a proposal to unify mobility, multi-homing, and security features that are needed by applications Identity-based addressing realizing locator-identity split Change in the networking stack that is not very visible to applications (no IP addresses though!) HIP architecture, HIP implementation for Linux

Privacy and Identity Management Privacy and trust matters a lot Services on the Web Single sign-on –Liberty, OpenID, GAA,.. Recent developments

Questions and Discussion