magazine 文章心得

64
Magazine 文文文文 學學643430007 學學 學學學

Upload: kirk-mullins

Post on 02-Jan-2016

32 views

Category:

Documents


2 download

DESCRIPTION

Magazine 文章心得. 學號: 643430007 姓名:蘇彥文. Abstract. A new method to support UMTS WLAN vertical handover using SCTP Interworking techniques and architectures for WLAN 3G integration toward 4G mobile data networks IEEE802.11 roaming and authentication in wireless LAN cellular mobile networks 心得. - PowerPoint PPT Presentation

TRANSCRIPT

Page 1: Magazine 文章心得

Magazine文章心得

學號: 643430007姓名:蘇彥文

Page 2: Magazine 文章心得

Abstract

1) A new method to support UMTS WLAN vertical handover using SCTP

2) Interworking techniques and architectures for WLAN 3G integration toward 4G mobile data networks

3) IEEE802.11 roaming and authentication in wireless LAN cellular mobile networks

4) 心得

Page 3: Magazine 文章心得

Magazine 1

A new method to support UMTS WLAN vertical handover using SCTP

Page 4: Magazine 文章心得

Note Abstract

UMTS networks and WLANs Third-generation cellular networks UMTS/WLAN vertical handover proble

m Overview of Mobile SCTP VERTICAL HANDOVER PROCEDURES

Page 5: Magazine 文章心得

UMTS networks and WLANs UMTS

•wide-area connectivity •low data rate • high mobility

WLANs•higher data rate •low mobility

Page 6: Magazine 文章心得

Third-generation cellular networks

Both UMTS and WLANs•WLAN offer higher bandwidth •Mobile users accessing the Internet via UMT

S/WLAN are free to move•Handover between UMTS and WLANs

•MIP from IETF •provides transparent support for host mobility •routing architecture of mobile host

•Difficult to maintain the continuity between UMTS and WLAN •Point of this article

Page 7: Magazine 文章心得

UMTS/WLAN vertical handover problem

UMTS/WLAN verti cal handover support via two types of SCTP • single-homing asymmetric config uration •dual-homing symmetric configu ration

Inte grated UMTS/WLAN network architecture • tightly coupled solutions : connect UMTS and WLAN• loose coupling solutions : separate out UMTS and W

LAN• loose coupling offers several advantages over tight co

upling

Page 8: Magazine 文章心得

Overview of Mobile SCTP (1)

Originally for VoIP of 3GPP Reliability Multi-homing

•established over multiple interfaces identified by multiple IP addresses

•An SCTP association between two hosts, say, A and B, is defined as •{[a set of IP addresses at A] + [Port-A]} + {[a set of IP addresses at B] + [Port-B]}.

Page 9: Magazine 文章心得

Overview of Mobile SCTP (2)

base version of SCTP cannot be used directly to support UMTS/ WLAN vertical handover

Fortunately, the recently proposed DAR extension for SCTP enables the endpoints to add, delete, or change the IP addresses during an active SCTP association using address configuration (ASCONF) messages.• basis of mSCTP

Page 10: Magazine 文章心得

Overview of Mobile SCTP (3)

mSCTP•Using for supporting UMTS/WLAN vertical h

andover•capabilities to add, delete, and change the I

P addresses dynamically during an active SCTP association

Page 11: Magazine 文章心得

Overview of Mobile SCTP (4)

mSCTP Protocol architecture

Page 12: Magazine 文章心得

VERTICAL HANDOVER PROCEDURES (1)

FS can also be configured for: •Single-homing: The FS provides only one IP

address to support handover.

•Dual-homing: The FS allows more than one (usually two) IP addresses to support

Handover procedure has three basic steps: •Add IP address

•Vertical handover triggering

•Delete IP address

Page 13: Magazine 文章心得

VERTICAL HANDOVER PROCEDURES (2)

single-homing configuration

Page 14: Magazine 文章心得

VERTICAL HANDOVER PROCEDURES (3)

dual-homing configuration

Page 15: Magazine 文章心得

SIMULATION RESULTS AND DISCUSSIONS (1)

use network simulator ns-2 to perform the simulations and obtain •set to be 384 kb/s for the UMTS link and

2 Mb/s for the WLAN link

•delay is set to 100 ms

•FTP traffic is started at the MC at time 1 s

•handover triggering process is acti vated at time 5 s

Page 16: Magazine 文章心得

SIMULATION RESULTS AND DISCUSSIONS (2)

simulation results •UMTS-to-WLAN handover delay is 533 ms

Page 17: Magazine 文章心得

SIMULATION RESULTS AND DISCUSSIONS (3)

simulation results•WLAN-to-UMTS delay is 513 ms

Page 18: Magazine 文章心得

SIMULATION RESULTS AND DISCUSSIONS (4)

throughput performance for vertical handover in both directions

Page 19: Magazine 文章心得

Magazine 2

Interworking techniques and architectures for WLAN 3G integration toward 4G mobile data networks

Page 20: Magazine 文章心得

Note Abstract WLAN/3G inter working function INTERWORKING MODEL AND REQUIREMEN

TS NETWORK SELECTION INTERWORKING SCENARIOS 3G-Based Access Control and Charging

•REFERENCE POINTS Access to 3G Packet-Switched Services

•REFERENCE POINTS CONCLUSIONS

Page 21: Magazine 文章心得

WLAN/3G inter working function WLAN/3G inter working techniques and

architectures can support•Authentication•Authorization•Accounting •WLAN sharing•Consis tent service provisioning

Page 22: Magazine 文章心得

INTERWORKING MODEL AND REQUIREMENTS (1)

high-level WLAN/3G interworking model.

Page 23: Magazine 文章心得

INTERWORKING MODEL AND REQUIREMENTS (2)

WLAN/3G interworking must• provide 3G-based authentication

• support 802.1X access control

• support the legacy UAM and open access control schemes

Page 24: Magazine 文章心得

NETWORK SELECTION

MS needs to perform the following selection proce dures • Select a WLAN that supports interworking with 3G PL

MNs

• MS must select one of the PLMNs

several solutions of network selection problem • broadcast an SSID with a suitable format

• transmitting a probe request including a predefined well-known (3G-specific) SSID

Page 25: Magazine 文章心得

INTERWORKING SCENARIOS (1) Scenario 1 — Common Billing and Customer Care Scenario 2 — 3G-Based Access Control and

Charging Scenario 3 — Access to 3G Packet-Switched

Services Scenario 4 — Access to 3G Packet-Switched-Based

Ser vices with Service Continuity Scenario 5 — Access to 3G Packet-Switched-Based

Ser vices with Seamless Service Continuity Scenario 6 — Access to 3G Circuit-Switched-Based

Ser vices with Seamless Mobility

Page 26: Magazine 文章心得

INTERWORKING SCENARIOS (1)

Page 27: Magazine 文章心得

3G-Based Access Control and Charging (1)

INTERWORKING ARCHITECTURE

Page 28: Magazine 文章心得

3G-Based Access Control and Charging (2)

AAA SIGNALING

Page 29: Magazine 文章心得

3G-Based Access Control and Charging (3)

AAA SIGNALING1) MS sends its identity to the WLAN within an EAP-Resp

onse/Identity mes sage• MS’s identity is NAI-1 • username@realm

2) WLAN discovers route AAA messages to the 3G PLMN corresponding to this realm

3) AAA access request is sent to the identified 3G PLMN over the Wr interface

4) WLAN sends network advertisement data to the MS • use a new EAP method called 3G-Info • XML structure

Page 30: Magazine 文章心得

REFERENCE POINTS (1)

3G internal interfaces •Wr/Wb

•carries AAA signaling between the WLAN and the 3G / home PLMN in a secure manner

•Support Radius by acrossWr/Wb

•Ws/Wc •provides the same functionality as Wr/Wb but ru

ns between a 3G AAA proxy and a 3G AAA server

Page 31: Magazine 文章心得

REFERENCE POINTS (2)

•Wf •transport charging information toward the 3G op

erator’s CGw/CCF located in the visited or home PLMN

•Wo •used by the 3G AAA server to communicate with t

he 3G OCS

Page 32: Magazine 文章心得

REFERENCE POINTS (3)

•Wx •between the 3G AAA server and the HSS •used primarily for accessing the WLAN subscripti

on profiles of the users

•D/Gr •used for exchanging subscription information be

tween the 3G AAA server and the HLR by means of the MAP protocol

Page 33: Magazine 文章心得

Access to 3G Packet-Switched Services (1)

INTERWORKING ARCHITECTURE

Page 34: Magazine 文章心得

Access to 3G Packet-Switched Services (2)

AAA SIGNALING

Page 35: Magazine 文章心得

Access to 3G Packet-Switched Services (3)

AAA SIGNALING

Page 36: Magazine 文章心得

Access to 3G Packet-Switched Services (4)

Page 37: Magazine 文章心得

REFERENCE POINTS (1)

several additional interfaces Wn

•used for transporting tunneled user data between the WLAN and the WAG

Wm •located between the 3G AAA serv er and PDG •used to enable the 3G AAA server to retrieve

tunneling attributes and an MS’s IP configuration parameters from/via the PDG

Page 38: Magazine 文章心得

REFERENCE POINTS (2)

Wi •provided via the Wi interface based on IP

Wg •used by the 3G AAA proxy to deliver routing

policy enforce ment information to the WAG Wp

•transports tunneled user data traffic between the WAG and the PDG

Page 39: Magazine 文章心得

CONCLUSIONS

maintain access to the same 3G packet-switched services across several radio access technologies • such as IEEE 802.11, HiperLan/2,

UTRAN, and GERAN Ses sion mobility is an additional

requirement that needs further consideration and presents consid erable technical challenges

Page 40: Magazine 文章心得

Magazine 3

IEEE802.11 roaming and authentication in wireless LAN cellular mobile networks

Page 41: Magazine 文章心得

Note Abstract Integrate wireless LAN service IEEE 802.11 WIRELESS LAN ROAMING RADIUS PROXY IEEE 802.11 HORIZONTAL ROAMING MOBILE IP HANDOFF PERFORMANCE IMPROVEMENT WIRELESS TRANSMISSION PRIVACY SECURITY ANALYSIS AUTHENTICATION AND KEY NEGOTIATION DEMONSTR

ATION SUMMARY

Page 42: Magazine 文章心得

Integrate wireless LAN service (1)

Page 43: Magazine 文章心得

Integrate wireless LAN service (2)

IEEE802.11 service integration functionality •integrate into cellular networks

Wireless network security Service quality

•refers to handoff speed and packet loss rate

Page 44: Magazine 文章心得

Integrate wireless LAN service (3)

Page 45: Magazine 文章心得

IEEE 802.11 WIRELESS LAN ROAMING (1)

IEEE802.11 roaming structure is based on • AAA broker with a Remote Authentication Dial-In User

Service (RADIUS) server proxy

CA servers • are special servers that issue and verify certificates to

fixed nodes or net works upon request so that they have proofs to identify themselves

• are organized in a tree topology and working in a distributed way

Page 46: Magazine 文章心得

IEEE 802.11 WIRELESS LAN ROAMING (2)

Page 47: Magazine 文章心得

RADIUS PROXY

RADIUS server retrieves •remote server’s domain from the user’s r

equest •includes the network access identifier

•identifier@domain_name

Page 48: Magazine 文章心得

IEEE 802.11 HORIZONTAL ROAMING (1)

Each network domain is interconnected by AAABs

In order to provide IP mobility • for eign agent (FA) is placed into the NAS

The architecture is able to process two hor izontal roaming scenarios •The current IEEE802.11 device connects to the netw

ork via the NAS •Seamless roaming

Page 49: Magazine 文章心得

IEEE 802.11 HORIZONTAL ROAMING (2)

Page 50: Magazine 文章心得

IEEE 802.11 HORIZONTAL ROAMING (3)

Page 51: Magazine 文章心得

IEEE 802.11 HORIZONTAL ROAMING (4)

Page 52: Magazine 文章心得

MOBILE IP HANDOFF PERFORMANCE IMPROVEMENT (1)

roam between a wireless LAN and a cellular network • routed to the mobile station through its HA

HA redi rects the data flow to the new IP address

For typical data applications is not necessary to use real-time seamless handoff

For real-time Internet applica tions like voice or streaming video , handoff latency and packet loss performance have become more and more critical

Page 53: Magazine 文章心得

MOBILE IP HANDOFF PERFORMANCE IMPROVEMENT (2)

In order to reduce the latency of Mobile IP handoff • used to assist Mobile IP handoff

• pre-registration and authentication data can be sent to the mobile station before it moves

• Additional flow control should be taken in the handover perio

Page 54: Magazine 文章心得

WIRELESS TRANSMISSION PRIVACY (1) built-in WEP encryption cannot guaran te

e data transmission privacy User location updates are transparent to

the scheme since user mobility is handled in the network layer

FA just relays the authentication message between the mobile station and its home network

Page 55: Magazine 文章心得

WIRELESS TRANSMISSION PRIVACY (2) Authenticating parties share a secret key

• stored in either the mobile station or its Subscriber Identity Mod ule (SIM) card

Authenticating parties do not share a secret key • authentication between two mobile stations or

a mobile station and a fixed Internet server Visit the Internet public resourc

• no authentica tion is needed

Page 56: Magazine 文章心得

WIRELESS TRANSMISSION PRIVACY (3) Authentication and key negotiation proto

col between two mobile sta tions belonging

Page 57: Magazine 文章心得

WIRELESS TRANSMISSION PRIVACY (4) Scheme variation in various authenticatio

n scenarios

Page 58: Magazine 文章心得

SECURITY ANALYSIS (1) MS1 finds MS2’s home address and creates a nonce w

ith the corresponding hash value HA1 decrypts the message from MS1; HA1 realizes that

MS1 intends to authenticate with a third party CA decrypts the message from HA1 and verifies IDHA1 HA1 decrypts the message from CA, and gets the public

key and device ID of HA2. HA1 stores the pubHA2 and IDHA2 pair

HA2 will buffer the latter if the latter comes that must not be compromised

Page 59: Magazine 文章心得

SECURITY ANALYSIS (2)

Page 60: Magazine 文章心得

AUTHENTICATION AND KEY NEGOTIATION DEMONSTRATION demonstration uses RSA as the public key al

go rithm •DES as the symmetric algorithm •MD5 as one-way hash functions

If the slowest net work connection speed is 14.4 kb/s in the cellu lar network with overhead of the transmission considered •data transmission can be fin ished in less than 3 s

Page 61: Magazine 文章心得

SUMMARY The proposed architecture offers a smooth tr

ansition of wireless LAN hot spots from non-roaming-supported to seamless-roam-ing-supported

A fast network switchover mechanism is available to improve the performance of stream ing applications

wireless transmis sion security is carefully considered

Page 62: Magazine 文章心得

心得 自從 2000年 3G行動網路開放以來,藉由市場發展與級數上的演進,逐漸發現到單一網路無法滿足行動上網的全方位需求,於是開行推行雙網的建佈,但由於 3G與無線網路基本運作方式的不同,加以行動上網對於無縫性通訊與安全性的要求,導致建構此一大型網路,面臨許多問題,從此 3篇 paper中,看到了這些問題的解決方案,相信對未來行動上網的建設有相當的助益。

Page 63: Magazine 文章心得

Q & A

Page 64: Magazine 文章心得

Thanks for your listen .