magazine 文章心得

Post on 02-Jan-2016

32 Views

Category:

Documents

2 Downloads

Preview:

Click to see full reader

DESCRIPTION

Magazine 文章心得. 學號: 643430007 姓名:蘇彥文. Abstract. A new method to support UMTS WLAN vertical handover using SCTP Interworking techniques and architectures for WLAN 3G integration toward 4G mobile data networks IEEE802.11 roaming and authentication in wireless LAN cellular mobile networks 心得. - PowerPoint PPT Presentation

TRANSCRIPT

Magazine文章心得

學號: 643430007姓名:蘇彥文

Abstract

1) A new method to support UMTS WLAN vertical handover using SCTP

2) Interworking techniques and architectures for WLAN 3G integration toward 4G mobile data networks

3) IEEE802.11 roaming and authentication in wireless LAN cellular mobile networks

4) 心得

Magazine 1

A new method to support UMTS WLAN vertical handover using SCTP

Note Abstract

UMTS networks and WLANs Third-generation cellular networks UMTS/WLAN vertical handover proble

m Overview of Mobile SCTP VERTICAL HANDOVER PROCEDURES

UMTS networks and WLANs UMTS

•wide-area connectivity •low data rate • high mobility

WLANs•higher data rate •low mobility

Third-generation cellular networks

Both UMTS and WLANs•WLAN offer higher bandwidth •Mobile users accessing the Internet via UMT

S/WLAN are free to move•Handover between UMTS and WLANs

•MIP from IETF •provides transparent support for host mobility •routing architecture of mobile host

•Difficult to maintain the continuity between UMTS and WLAN •Point of this article

UMTS/WLAN vertical handover problem

UMTS/WLAN verti cal handover support via two types of SCTP • single-homing asymmetric config uration •dual-homing symmetric configu ration

Inte grated UMTS/WLAN network architecture • tightly coupled solutions : connect UMTS and WLAN• loose coupling solutions : separate out UMTS and W

LAN• loose coupling offers several advantages over tight co

upling

Overview of Mobile SCTP (1)

Originally for VoIP of 3GPP Reliability Multi-homing

•established over multiple interfaces identified by multiple IP addresses

•An SCTP association between two hosts, say, A and B, is defined as •{[a set of IP addresses at A] + [Port-A]} + {[a set of IP addresses at B] + [Port-B]}.

Overview of Mobile SCTP (2)

base version of SCTP cannot be used directly to support UMTS/ WLAN vertical handover

Fortunately, the recently proposed DAR extension for SCTP enables the endpoints to add, delete, or change the IP addresses during an active SCTP association using address configuration (ASCONF) messages.• basis of mSCTP

Overview of Mobile SCTP (3)

mSCTP•Using for supporting UMTS/WLAN vertical h

andover•capabilities to add, delete, and change the I

P addresses dynamically during an active SCTP association

Overview of Mobile SCTP (4)

mSCTP Protocol architecture

VERTICAL HANDOVER PROCEDURES (1)

FS can also be configured for: •Single-homing: The FS provides only one IP

address to support handover.

•Dual-homing: The FS allows more than one (usually two) IP addresses to support

Handover procedure has three basic steps: •Add IP address

•Vertical handover triggering

•Delete IP address

VERTICAL HANDOVER PROCEDURES (2)

single-homing configuration

VERTICAL HANDOVER PROCEDURES (3)

dual-homing configuration

SIMULATION RESULTS AND DISCUSSIONS (1)

use network simulator ns-2 to perform the simulations and obtain •set to be 384 kb/s for the UMTS link and

2 Mb/s for the WLAN link

•delay is set to 100 ms

•FTP traffic is started at the MC at time 1 s

•handover triggering process is acti vated at time 5 s

SIMULATION RESULTS AND DISCUSSIONS (2)

simulation results •UMTS-to-WLAN handover delay is 533 ms

SIMULATION RESULTS AND DISCUSSIONS (3)

simulation results•WLAN-to-UMTS delay is 513 ms

SIMULATION RESULTS AND DISCUSSIONS (4)

throughput performance for vertical handover in both directions

Magazine 2

Interworking techniques and architectures for WLAN 3G integration toward 4G mobile data networks

Note Abstract WLAN/3G inter working function INTERWORKING MODEL AND REQUIREMEN

TS NETWORK SELECTION INTERWORKING SCENARIOS 3G-Based Access Control and Charging

•REFERENCE POINTS Access to 3G Packet-Switched Services

•REFERENCE POINTS CONCLUSIONS

WLAN/3G inter working function WLAN/3G inter working techniques and

architectures can support•Authentication•Authorization•Accounting •WLAN sharing•Consis tent service provisioning

INTERWORKING MODEL AND REQUIREMENTS (1)

high-level WLAN/3G interworking model.

INTERWORKING MODEL AND REQUIREMENTS (2)

WLAN/3G interworking must• provide 3G-based authentication

• support 802.1X access control

• support the legacy UAM and open access control schemes

NETWORK SELECTION

MS needs to perform the following selection proce dures • Select a WLAN that supports interworking with 3G PL

MNs

• MS must select one of the PLMNs

several solutions of network selection problem • broadcast an SSID with a suitable format

• transmitting a probe request including a predefined well-known (3G-specific) SSID

INTERWORKING SCENARIOS (1) Scenario 1 — Common Billing and Customer Care Scenario 2 — 3G-Based Access Control and

Charging Scenario 3 — Access to 3G Packet-Switched

Services Scenario 4 — Access to 3G Packet-Switched-Based

Ser vices with Service Continuity Scenario 5 — Access to 3G Packet-Switched-Based

Ser vices with Seamless Service Continuity Scenario 6 — Access to 3G Circuit-Switched-Based

Ser vices with Seamless Mobility

INTERWORKING SCENARIOS (1)

3G-Based Access Control and Charging (1)

INTERWORKING ARCHITECTURE

3G-Based Access Control and Charging (2)

AAA SIGNALING

3G-Based Access Control and Charging (3)

AAA SIGNALING1) MS sends its identity to the WLAN within an EAP-Resp

onse/Identity mes sage• MS’s identity is NAI-1 • username@realm

2) WLAN discovers route AAA messages to the 3G PLMN corresponding to this realm

3) AAA access request is sent to the identified 3G PLMN over the Wr interface

4) WLAN sends network advertisement data to the MS • use a new EAP method called 3G-Info • XML structure

REFERENCE POINTS (1)

3G internal interfaces •Wr/Wb

•carries AAA signaling between the WLAN and the 3G / home PLMN in a secure manner

•Support Radius by acrossWr/Wb

•Ws/Wc •provides the same functionality as Wr/Wb but ru

ns between a 3G AAA proxy and a 3G AAA server

REFERENCE POINTS (2)

•Wf •transport charging information toward the 3G op

erator’s CGw/CCF located in the visited or home PLMN

•Wo •used by the 3G AAA server to communicate with t

he 3G OCS

REFERENCE POINTS (3)

•Wx •between the 3G AAA server and the HSS •used primarily for accessing the WLAN subscripti

on profiles of the users

•D/Gr •used for exchanging subscription information be

tween the 3G AAA server and the HLR by means of the MAP protocol

Access to 3G Packet-Switched Services (1)

INTERWORKING ARCHITECTURE

Access to 3G Packet-Switched Services (2)

AAA SIGNALING

Access to 3G Packet-Switched Services (3)

AAA SIGNALING

Access to 3G Packet-Switched Services (4)

REFERENCE POINTS (1)

several additional interfaces Wn

•used for transporting tunneled user data between the WLAN and the WAG

Wm •located between the 3G AAA serv er and PDG •used to enable the 3G AAA server to retrieve

tunneling attributes and an MS’s IP configuration parameters from/via the PDG

REFERENCE POINTS (2)

Wi •provided via the Wi interface based on IP

Wg •used by the 3G AAA proxy to deliver routing

policy enforce ment information to the WAG Wp

•transports tunneled user data traffic between the WAG and the PDG

CONCLUSIONS

maintain access to the same 3G packet-switched services across several radio access technologies • such as IEEE 802.11, HiperLan/2,

UTRAN, and GERAN Ses sion mobility is an additional

requirement that needs further consideration and presents consid erable technical challenges

Magazine 3

IEEE802.11 roaming and authentication in wireless LAN cellular mobile networks

Note Abstract Integrate wireless LAN service IEEE 802.11 WIRELESS LAN ROAMING RADIUS PROXY IEEE 802.11 HORIZONTAL ROAMING MOBILE IP HANDOFF PERFORMANCE IMPROVEMENT WIRELESS TRANSMISSION PRIVACY SECURITY ANALYSIS AUTHENTICATION AND KEY NEGOTIATION DEMONSTR

ATION SUMMARY

Integrate wireless LAN service (1)

Integrate wireless LAN service (2)

IEEE802.11 service integration functionality •integrate into cellular networks

Wireless network security Service quality

•refers to handoff speed and packet loss rate

Integrate wireless LAN service (3)

IEEE 802.11 WIRELESS LAN ROAMING (1)

IEEE802.11 roaming structure is based on • AAA broker with a Remote Authentication Dial-In User

Service (RADIUS) server proxy

CA servers • are special servers that issue and verify certificates to

fixed nodes or net works upon request so that they have proofs to identify themselves

• are organized in a tree topology and working in a distributed way

IEEE 802.11 WIRELESS LAN ROAMING (2)

RADIUS PROXY

RADIUS server retrieves •remote server’s domain from the user’s r

equest •includes the network access identifier

•identifier@domain_name

IEEE 802.11 HORIZONTAL ROAMING (1)

Each network domain is interconnected by AAABs

In order to provide IP mobility • for eign agent (FA) is placed into the NAS

The architecture is able to process two hor izontal roaming scenarios •The current IEEE802.11 device connects to the netw

ork via the NAS •Seamless roaming

IEEE 802.11 HORIZONTAL ROAMING (2)

IEEE 802.11 HORIZONTAL ROAMING (3)

IEEE 802.11 HORIZONTAL ROAMING (4)

MOBILE IP HANDOFF PERFORMANCE IMPROVEMENT (1)

roam between a wireless LAN and a cellular network • routed to the mobile station through its HA

HA redi rects the data flow to the new IP address

For typical data applications is not necessary to use real-time seamless handoff

For real-time Internet applica tions like voice or streaming video , handoff latency and packet loss performance have become more and more critical

MOBILE IP HANDOFF PERFORMANCE IMPROVEMENT (2)

In order to reduce the latency of Mobile IP handoff • used to assist Mobile IP handoff

• pre-registration and authentication data can be sent to the mobile station before it moves

• Additional flow control should be taken in the handover perio

WIRELESS TRANSMISSION PRIVACY (1) built-in WEP encryption cannot guaran te

e data transmission privacy User location updates are transparent to

the scheme since user mobility is handled in the network layer

FA just relays the authentication message between the mobile station and its home network

WIRELESS TRANSMISSION PRIVACY (2) Authenticating parties share a secret key

• stored in either the mobile station or its Subscriber Identity Mod ule (SIM) card

Authenticating parties do not share a secret key • authentication between two mobile stations or

a mobile station and a fixed Internet server Visit the Internet public resourc

• no authentica tion is needed

WIRELESS TRANSMISSION PRIVACY (3) Authentication and key negotiation proto

col between two mobile sta tions belonging

WIRELESS TRANSMISSION PRIVACY (4) Scheme variation in various authenticatio

n scenarios

SECURITY ANALYSIS (1) MS1 finds MS2’s home address and creates a nonce w

ith the corresponding hash value HA1 decrypts the message from MS1; HA1 realizes that

MS1 intends to authenticate with a third party CA decrypts the message from HA1 and verifies IDHA1 HA1 decrypts the message from CA, and gets the public

key and device ID of HA2. HA1 stores the pubHA2 and IDHA2 pair

HA2 will buffer the latter if the latter comes that must not be compromised

SECURITY ANALYSIS (2)

AUTHENTICATION AND KEY NEGOTIATION DEMONSTRATION demonstration uses RSA as the public key al

go rithm •DES as the symmetric algorithm •MD5 as one-way hash functions

If the slowest net work connection speed is 14.4 kb/s in the cellu lar network with overhead of the transmission considered •data transmission can be fin ished in less than 3 s

SUMMARY The proposed architecture offers a smooth tr

ansition of wireless LAN hot spots from non-roaming-supported to seamless-roam-ing-supported

A fast network switchover mechanism is available to improve the performance of stream ing applications

wireless transmis sion security is carefully considered

心得 自從 2000年 3G行動網路開放以來,藉由市場發展與級數上的演進,逐漸發現到單一網路無法滿足行動上網的全方位需求,於是開行推行雙網的建佈,但由於 3G與無線網路基本運作方式的不同,加以行動上網對於無縫性通訊與安全性的要求,導致建構此一大型網路,面臨許多問題,從此 3篇 paper中,看到了這些問題的解決方案,相信對未來行動上網的建設有相當的助益。

Q & A

Thanks for your listen .

top related