Virtual Private Ad Hoc Networking Jeroen Hoebeke, Gerry Holderbeke, Ingrid Moerman, Bard Dhoedt and Piet Demeester 2006 July 15, 2009.

Slides:



Advertisements
Similar presentations
Encrypting Wireless Data with VPN Techniques
Advertisements

Identifying MPLS Applications
Transitioning to IPv6 April 15,2005 Presented By: Richard Moore PBS Enterprise Technology.
Packet Switching COM1337/3501 Textbook: Computer Networks: A Systems Approach, L. Peterson, B. Davie, Morgan Kaufmann Chapter 3.
Secure Network Bootstrapping Infrastructure May 15, 2014.
Security in VoIP Networks Juan C Pelaez Florida Atlantic University Security in VoIP Networks Juan C Pelaez Florida Atlantic University.
Module 5: Configuring Access for Remote Clients and Networks.
IPv4 and IPv6 Mobility Support Using MPLS and MP-BGP draft-berzin-malis-mpls-mobility-00 Oleg Berzin, Andy Malis {oleg.berzin,
1 Configuring Virtual Private Networks for Remote Clients and Networks.
Extensible Networking Platform IWAN 2005 Extensible Network Configuration and Communication Framework Todd Sproull and John Lockwood
Rev A8/8/021 ABC Networks
Arsitektur Jaringan Terkini
1 Version 3.0 Module 8 Virtual LANs. 2 Version 3.0.
Lesson 11-Virtual Private Networks. Overview Define Virtual Private Networks (VPNs). Deploy User VPNs. Deploy Site VPNs. Understand standard VPN techniques.
Chapter 1 Read (again) chapter 1.
© 2006 Cisco Systems, Inc. All rights reserved. Implementing Secure Converged Wide Area Networks (ISCW) Module 4: Frame Mode MPLS Implementation.
Internet Protocol Security (IPSec)
Institute of Technology, Sligo Dept of Computing Semester 3, version Semester 3 Chapter 3 VLANs.
1 25\10\2010 Unit-V Connecting LANs Unit – 5 Connecting DevicesConnecting Devices Backbone NetworksBackbone Networks Virtual LANsVirtual LANs.
SMUCSE 8344 MPLS Virtual Private Networks (VPNs).
1 Semester 2 Module 6 Routing and Routing Protocols YuDa college of business James Chen
Network based IP VPN Architecture using Virtual Routers Jessica Yu CoSine Communications, Inc. Feb. 19 th, 2001.
Virtual LANs. VLAN introduction VLANs logically segment switched networks based on the functions, project teams, or applications of the organization regardless.
© 2012 Cisco and/or its affiliates. All rights reserved. 1 CCNA Security 1.1 Instructional Resource Chapter 10 – Implementing the Cisco Adaptive Security.
© 2007 Cisco Systems, Inc. All rights reserved.ISCW-Mod3_L7 1 Network Security 2 Module 6 – Configure Remote Access VPN.
Chapter 1: Hierarchical Network Design
Configuring Routing and Remote Access(RRAS) and Wireless Networking
Network Components: Assignment Three
Common Devices Used In Computer Networks
Remote Access Chapter 4. Learning Objectives Understand implications of IEEE 802.1x and how it is used Understand VPN technology and its uses for securing.
Denial of Service (DoS) Attacks in Green Mobile Ad–hoc Networks Ashok M.Kanthe*, Dina Simunic**and Marijan Djurek*** MIPRO 2012, May 21-25,2012, Opatija,
Objectives Configure routing in Windows Server 2008 Configure Routing and Remote Access Services in Windows Server 2008 Network Address Translation 1.
Repeaters and Hubs Repeaters: simplest type of connectivity devices that regenerate a digital signal Operate in Physical layer Cannot improve or correct.
Router and Routing Basics
11 SECURING YOUR NETWORK PERIMETER Chapter 10. Chapter 10: SECURING YOUR NETWORK PERIMETER2 CHAPTER OBJECTIVES  Establish secure topologies.  Secure.
Bypass a VPN, ACL, and VLAN ECE 4112 Alaric Craig and Pritesh Patel.
VIRTUAL PRIVATE NETWORK By: Tammy Be Khoa Kieu Stephen Tran Michael Tse.
Chapter 8: Virtual LAN (VLAN)
Chapter 2 Network Topology
Department of Information Technology – Broadband Communication Networks Virtual Private Ad Hoc Networks Next-generation network communication Jeroen Hoebeke,
Cisco 3 - LAN Perrine. J Page 110/20/2015 Chapter 8 VLAN VLAN: is a logical grouping grouped by: function department application VLAN configuration is.
AKARI New Generation Network Architecture SeungHo Lee.
Chapter Overview Bridging Switching Routing.
Adaptive Web Caching CS411 Dynamic Web-Based Systems Flying Pig Fei Teng/Long Zhao/Pallavi Shinde Computer Science Department.
OS Services And Networking Support Juan Wang Qi Pan Department of Computer Science Southeastern University August 1999.
WIRELESS AD-HOC NETWORKS Dr. Razi Iqbal Lecture 6.
1MPLS QOS 10/00 © 2000, Cisco Systems, Inc. rfc2547bis VPN Alvaro Retana Alvaro Retana
Cisco S3C3 Virtual LANS. Why VLANs? You can define groupings of workstations even if separated by switches and on different LAN segments –They are one.
Chapter 3 - VLANs. VLANs Logical grouping of devices or users Configuration done at switch via software Not standardized – proprietary software from vendor.
Introduction to Grids By: Fetahi Z. Wuhib [CSD2004-Team19]
Doc.: IEEE 11-04/0319r0 Submission March 2004 W. Steven Conner, Intel Corporation Slide 1 Architectural Considerations and Requirements for ESS.
© 2008 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 Chapter 11: Network Address Translation for IPv4 Routing And Switching.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco PublicITE I Chapter 6 1 Switching in an Enterprise Network Introducing Routing and Switching in the.
Internet of Things. IoT Novel paradigm – Rapidly gaining ground in the wireless scenario Basic idea – Pervasive presence around us a variety of things.
PART1: NETWORK COMPONENTS AND TRANSMISSION MEDIUM Wired and Wireless network management 1.
MPLS Introduction How MPLS Works ?? MPLS - The Motivation MPLS Application MPLS Advantages Conclusion.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco PublicITE I Chapter 6 1 Creating the Network Design Designing and Supporting Computer Networks – Chapter.
Windows Vista Configuration MCTS : Advanced Networking.
Mobile IP THE 12 TH MEETING. Mobile IP  Incorporation of mobile users in the network.  Cellular system (e.g., GSM) started with mobility in mind. 
Chapter 1: Explore the Network
Multi-layer software defined networking in GÉANT
Virtual Private Ad Hoc Networks Next-generation network communication
Instructor Materials Chapter 9: NAT for IPv4
Routing and Switching Essentials v6.0
Virtual LANs.
CSE 4340/5349 Mobile Systems Engineering
The Business Value of MPLS VPNs
Instructor Materials Chapter 9: NAT for IPv4
Chapter 3 VLANs Chaffee County Academy
Chapter 11: Network Address Translation for IPv4
Presentation transcript:

Virtual Private Ad Hoc Networking Jeroen Hoebeke, Gerry Holderbeke, Ingrid Moerman, Bard Dhoedt and Piet Demeester 2006 July 15, 2009

Overview  Problem  How communication is evolving towards future large-scale and high-speed, enabling interconnectivity between a massive amount of devices and users anywhere, at anytime and from any device?  It Will overwhelm the user with available information, applications and services, a characteristic that is not always desired by the end user and that can result in potential security risk.  It is expected that an evolution towards network virtualization will take place, imposing a logical structure onto the one large-scale IP network.  Requirement & Characteristic  Membership configuration and management, Distributed Operation, Security, Self- organization and mobility management, Application support, Local private address space, Ad hoc routing and tunnel management, Scalability  Related Works  VLAN, VPN, P2P Overlay, Virtual distributed environment(VIOLIN)  Proposed Scheme  Virtual private ad hoc networks(VPAN)  Provide secure and self-organizing overlay networks on top of existing IP infrastructure that use ad hoc networking techniques to enable network connectivity.  Challenges  VPAN definition and management, Security, VPAN formation and self-organization, Addressing and routing, Member mobility management, Application middleware

Problem  How communication is evolving towards future large-scale and high-speed, enabling interconnectivity between a massive amount of devices and users anywhere, at anytime and from any device?  It will overwhelm the user with available information, applications and services, a characteristic that is not always desired by the end user and that can result in potential security risk.  It is expected that an evolution towards network virtualization will take place, imposing a logical structure onto the one large-scale IP network.  The virtual networks will form a shielded and trusted environment for their participants, with its own internal routing, naming, and addressing solutions, using the underlying base network as the enabler of connectivity and carrier of data.  They combine the network virtualization and ad hoc networking techniques (self-creating, self-organizing and self-administering).

Requirement & Characteristic  Membership configuration and management  Mechanisms to initialize new VPANs and to define, configure and manage its membership information are required.  Distributed Operation  Distributed members discovery and VPAN formation and maintenance are required.  Security  Self-organization and mobility management  Be able to discover each other and form a secure overlay without user intervention.  Application support  User should be able to specify which applications, services, data are reachable through or have access to a specific VPAN.  Local private address space  Each VPAN will have its own local private address space, separated from the global IP address space.  why? => Applications running within a VPAN use this private address independent of changes in the global address of the node due to node mobility.

Requirement & Characteristic(cont.)  Ad hoc routing and tunnel management  As the composition and the topology of the VPAN can be dynamic, ad hoc routing techniques will be used for efficient internal routing.  In many cases links between members are logical links, spanning multiple physical hops by tunnel mechanisms. => VPAN forwarding should encompass the notion of tunnels.  Scalability  The number of members forming the VPAN can become quite large.

Related Works VLANVPNP2P OverlayVirtual distributed environment(VIOLOIN) Protocol stack layer Layer 2Layer 3Application Layer Membership configuration and management Based on switch port or Layer 3 information. Manual, semi-automated or fully automatic configuration Statically configured in tunnel endpoints. Central tunnel management in LeetNet Running P2P softwareBy the owner of the VIOLIN, having administrator privileges. Distributed Operation Limited to on Ethernet system. Tunnel endpoints are distributed Distributed system, sometimes supported by centralized facilities. Distributed overlay of virtual machines. SecurityAccess based on VLAN membership. Traffic containment within VLAN. No other security mechanisms. Authentication of tunnel endpoints, confidentiality and authenticity of data transferred between these endpoint. In some case authentication, trust, anonymity, overlay access control can be offered. Depends on the network protocol used within the VIOLIN, as their packets are transferred over UDP tunnels. Self-organization and mobility management Automatically formed and maintained. Support mobility within the same Ethernet system. No mobility management. Some aspects of self- organization in dynamic VPNs. Self-organization through direct or indirect discovery of other peers for overlay formation. On-demand creation of virtual machines and the interconnecting virtual IP network. Dynamic topology adaptation possible.

Related Works(cont.) VLANVPNP2P OverlayVirtual distributed environment(VIOLOIN) Application support XXOO Local private address space(session continuity) All members share a common address space. Depend on schemes deployed in networks behind the endpoints Public IP addresses are usedPrivate IP addresses are used in order to confine all communication within the VIOLIN Dynamic internal routing and tunnel management Layer2 switching, no routing involved. OPublic IP address are used to obtain end-to-end P2P connectivity. No tunneling needed. Has Virtual routers for internal routing. Topology adaptation.

Proposed Scheme  Virtual private ad hoc networks(VPAN)  Secure and self-organizing overlay networks on top of existing IP infrastructure that use ad hoc networking techniques to enable network connectivity.  Creates a transparent, shielded and trusted environment for the applications and services running on the participants' devices.

High-level Network architecture  Localized VPAN  All members are interconnected either wired or wireless without using any non-member nodes.

High-level Network architecture(cont.)  Distributed infrastructured VPAN  The members are interconnected over the Internet, using nodes in the infrastructure a relay.  Tunneling needed.  Infrastructure support can assist the VPAN membership management, member discovery, formation, routing and mobility management.

High-level Network architecture(cont.)  Distributed Ad Hoc VPAN  Non-member ad hoc nodes are used as relays.  VPAN membership management, member discovery, formation, routing and mobility management has to be done in a completely distributed manner.

High-level node architecture  Middleware  Firewall  Content adaptation according to the capabilities of service.  Convergence Layer  De-multiplexing incoming packets to the corresponding VPAN and forwarding outgoing packets to the corresponding interface.  Management Plane  Management of the access right of the application and services.  Management of the VPAN and its member  Management and exchange of context and cross-layer information  Data Plane  Managing data  Control Plane  Managing VPAN configuration

Challenges  VPAN definition and management  At first, its policies and its members, or its membership rules, to be defined.  Who is the creator of the VPAN?  How and where is the VPAN definition and membership information stored and/or distributed?  When can the VPAN be formed and become operational?  How are new members added to the VPAN(membership policies)?  Member authentication?  Possible Solutions  Service provider, individual person.  One of the members invite or request join to creator.  Define membership rules and automating the process of member addition.  Security  Member identification and authentication  Authentication of communication between VAPN members.  Confidentiality of communication between VPAN members.

Challenges(cont.)  VPAN formation and self-organization  Member discovery mechanisms form the basis of the formation of the VPAN overlay, as it is needed for secure link and tunnel establishment between member nodes.  Addressing and routing  Each VPAN will have its own local address space and each member is assigned one address, independent of its number of interfaces.  All applications and services that communicate within the VPAN will use the local address and it is invisible to the outside world by tunneling or link encryption.  When running multiple VPANs within the same device, their need to be distinguishable => Different VPAN using different address prefix.  Overlay ad hoc routing depend on multiple factors: application requirements, traffic, on- demand or always-on VPAN formation, context…  Member mobility management  Localized VPAN  Member discovery and link break detection mechanisms can improve VPAN maintenance.  Other  Member mobility => change of public IP address => breakdown of tunnels established between members of the VPAN overlay => require dynamic tunnel reestablishment mechanisms and interaction with the membership management or member discovery framework.

Challenges(cont.)  Application middleware  The main functionality of this component is to act as a firewall for the resources and services at the higher layer.  Provides VPAN members to be able to specify to what extent their applications and services have access to the VPAN  Provides VPAN members to be able to specify to what extent other VPAN members have rights to access these applications and services.  Etc  Naming, QoS, context information to improve networking and management, intrusion detection, dealing with multiple or event hierarchical VPANs, traffic optimization.