Kirjoituspohja VTT Science

Total Page:16

File Type:pdf, Size:1020Kb

Kirjoituspohja VTT Science IENCE C • •S T S E C Small world for dynamic wireless cyber-physical N O H I N systems S O I V Dissertation L • O S 142 G T Y H • R Industries and consumer markets are today increasingly using G I E L VTT SCIEN CE S H E G services exposed from wireless sensor and actuator networks, A I R H C cyber-physical machine-to-machine systems. The motivation for H the research arises from problems detected in the remote 1 4 2 interaction with embedded devices over dynamic wireless networks in such systems. The selected approach is based on the application of the small- world paradigm to cyber-physical systems. It is here assumed that the concept of small world, "six degrees of separation", can be expanded to also cover communication with wireless embedded devices in cyber-physical systems context. The main contributions are the technical enablers referred to as dynamic communication spaces, dynamic M2M service spaces, configuration and remote use of services, communication overlay, access systems selection, integrated mobility, secure ad hoc networking, situated opportunistic communication, hierarchical networking for small-world networks, and short-cuts for network optimization. The enablers have been evaluated as separate technical methods and means by means of experiments and/or simulations. According to the evaluations, the enablers seem to work well as separate building blocks and that they can be combined to expand the concept of small world to also cover communication with embedded devices. Wireless short-cuts can improve the scalability and efficiency of dynamic wireless networking and weak links are essential in the neighbour discovery process. In sum, the provided enablers help the remote interaction with embedded devices and promote the application of the small-world concept to dynamic wireless cyber-physical systems. Small world for dynamic ISBN 978-951-38-8477-2 (Soft back ed.) wireless cyber-physical ISBN 978-951-38-8476-5 (URL: http://www.vttresearch.com/impact/publications) S m all w orld forISSN-L dyna 2242-119X mic wireless cyber-physical syste m s systems ISSN 2242-119X (Print) ISSN 2242-1203 (Online) http://urn.fi/URN:ISBN:978-951-38-8476-5 Juhani Latvakoski VTT SCIENCE 142 Small world for dynamic wireless cyber-physical systems ikoa L nahuJ i aL t ksokav i yt lucaF eht fo tnessa eht ht iw detneserp eb ot noi tat ress id cimedacA id ress tat noi ot eb detneserp iw ht eht tnessa fo eht lucaF yt yt i srevinU eht fo gni reenignE laci r tcelE dna ygolonhceT noi tamrofnI fo tamrofnI noi ygolonhceT dna tcelE r laci reenignE gni fo eht srevinU i yt ,aamnanniL , )2L muirot idua( i lasnuuniaK ni ecnefed ci lbup rof uluO fo uluO rof lbup ci ecnefed ni lasnuuniaK i idua( muirot )2L , ,aamnanniL .noon 21 ta ,6102 rebmeceD ts1 eht no eht ts1 rebmeceD ,6102 ta 21 .noon University of Oulu, Graduate School Faculty of Information Technology and Electrical Engineering Biomimetics and Intelligent Systems Group Infotech Oulu ISBN 978-951-38-8477-2 (Soft back ed.) ISBN 978-951-38-8476-5 (URL: http://www.vttresearch.com/impact/publications) VTT Science 142 ISSN-L 2242-119X ISSN 2242-119X (Print) ISSN 2242-1203 (Online) http://urn.fi/URN:ISBN:978-951-38-8476-5 Copyright © VTT 2016 JULKAISIJA – UTGIVARE – PUBLISHER Teknologian tutkimuskeskus VTT Oy PL 1000 (Tekniikantie 4 A, Espoo) 02044 VTT Puh. 020 722 111, faksi 020 722 7001 Teknologiska forskningscentralen VTT Ab PB 1000 (Teknikvägen 4 A, Esbo) FI-02044 VTT Tfn +358 20 722 111, telefax +358 20 722 7001 VTT Technical Research Centre of Finland Ltd P.O. Box 1000 (Tekniikantie 4 A, Espoo) FI-02044 VTT, Finland Tel. +358 20 722 111, fax +358 20 722 7001 Juvenes Print, Tampere 2016 Preface The work towards this thesis has been carried out during the years from circa 1999 to 2014 in several steps within the VTT Technical Research Centre of Finland. It is obvious that such a long period of time has not only covered working on this thesis, but the time period has also contained multiple parallel challenges and efforts that have required a fair share of my mental energy. However, a number of these “side efforts” have yielded ideas that have had a major impact on the contents of this thesis. For example, the ITEA Mobi project in the early 2000s was a very useful exercise in mobilizing the Internet. From the research projects Auto, Sonet and Conet, I learnt a lot about the technologies related to mobile ad hoc and self-organizing systems (2001–2006). International research projects under the ITEA/Artemis frameworks (2006–), such as Usenet, A2Nets, IoE and M2MGrids (ongoing), were essential in terms of understanding the dimensions of research, R&D, industrial impact and innovations, and especially the wide range of technologies related Machine-to-Machine and Cyber-Physical systems, e.g., from perspectives of applications, information, services, networking, and radio technologies with multiple business stakeholders from different domains. The EU FET Bionets project was essential for discovering the links for self- organization out of the computer science box. The parallel projects and research team leadership have been essential in terms of learning organization dynamics and understanding the importance of social links and networking between people on a global scale – it’s a small world with weak links I would say. The exercise carried out concerning the establishment of the spin-off company (Splitstreem, later Envault Corp) was essential for learning the multiple aspects of entrepreneurship and especially operating with intellectual properties within the security domain, which has also been an important technical action area in this doctoral thesis process. Today, the impact of these projects, processes and efforts can be seen in a crystallized form in this doctoral thesis publication. There are several people that have had an essential impact on the process of this work. I would particularly like to thank the supervisor of this thesis, Dr Tech, Professor Juha Röning for asking me several times during the last 10 years “why you never do a doctoral thesis”? Thank you, Juha, for your excellent encouragement and guidance during the writing process of this thesis! In addition, this work would have never happened without the support from Dr Jussi Paakkari, Dr Mikko Sallinen, Dr Tuomo Tuikka, Dr Tua Huomo and especially Mr Hannu Honka, thank you for making this work possible. During the process, the work was influenced by many discussions with multiple colleagues, e.g. Mr Johann Moreels, Dr Mahdi Ben Alaya, Mr Pertti Puolakanaho, Mr Herve Ganem, Mr Janne Göös, Mr Niclas Granqvist, Dr Taavi Hirvonen, Mr Hannu Lohi, Mr Heikki Rantanen, Mr Jyrki Huusko, Dr Arto Peterzens and a number of other important persons, which I probably remember tomorrow. Thank you all for the positive research collaborations and valuable discussions! In addition, there are a number of people, such as Pekka Pääkkönen, Pekka Välitalo, Tommi Aapaoja, Teemu Väisänen, Miika Vahtola, Arto Lappalainen, Timo Aarnipuro, Jyri Toivonen, Tero Riipinen, Kalle Määttä, Antti Iivari, Tomi Hautakoski and Jouni Heikkinen who have contributed to some projects referred to 1 above with some experiments and simulations related to the scope of this thesis. Thank you all for the excellent work! The evaluation process of the thesis produced several good proposals and recommendations for improvements. I would like to thank Professor Tullio Salmon Cinotti from the University of Bologna and Professor Dr Andreas Timm-Giel from the University of Hamburg for their willingness to consume their valuable time for pre-examining the thesis and making the evaluation. However, the most essential basis for all the efforts for this thesis were established a long time ago by my parents, Maire and Veikko, who succeeded to create a positive attitude towards education and a “never give up” attitude into my head. During the period of and efforts for this thesis work, the most important element has been the positive co-living, mental support and patience from my wife Marita, thank you! In addition, I would like to thank all our children for arranging me with some other things to do, which have been essential for learning high sensitivity to weak signals, flexibility and adaptiveness. In fact, these lessons have been very essential in leading international research collaboration projects with multiple industrial and research organizations. So, thank you all! Oulu, 9th November 2016 Juhani Latvakoski 2 Academic dissertation Supervisor Prof. Dr Tech. Juha Röning University of Oulu Oulu, Finland Reviewers Prof. Dr Andreas Timm-Giel Technical University of Hamburg Institute of Communication Networks Hamburg, Germany Prof. Dr Tullio Salmon Cinotti University of Bologna Bologna, Italy Opponent Research Associate Prof. Dr Vincenzo Mancuso IMDEA Networks Institute Madrid, Spain 3 List of publications This thesis is based on the following original publications, which are referred in the text as I–X. The publications have been reproduced with kind permission from the publishers in the latter part of this thesis book. The contribution of the author has been clarified in Section 1.2 of the thesis. I Latvakoski, J., Pakkala, D., Pääkkönen, P. A Communication Architecture for Spontaneous Systems. IEEE Wireless Communications, June 2004, Vol. 11, Issue 3, pp. 36–42. Special Issue on Migration toward 4G Wireless Communications II Latvakoski, J., Hautakoski, T., Väisänen, T., Toivonen, J., Lappalainen, A., Aarnipuro, T. Secure M2M Service Space in Residential Home. The Fourth International Conference on COMmunication System softWAre and middleware. 15–19 June 2009, Trinity College Dublin, Ireland. 8 p. III Latvakoski, J., Pääkkönen, P. Remote Interaction with Networked Appliances attached in a Mobile Personal Area Network. IEEE International Conference on Communications, ICC '03.
Recommended publications
  • Ubuntu Kung Fu
    Prepared exclusively for Alison Tyler Download at Boykma.Com What readers are saying about Ubuntu Kung Fu Ubuntu Kung Fu is excellent. The tips are fun and the hope of discov- ering hidden gems makes it a worthwhile task. John Southern Former editor of Linux Magazine I enjoyed Ubuntu Kung Fu and learned some new things. I would rec- ommend this book—nice tips and a lot of fun to be had. Carthik Sharma Creator of the Ubuntu Blog (http://ubuntu.wordpress.com) Wow! There are some great tips here! I have used Ubuntu since April 2005, starting with version 5.04. I found much in this book to inspire me and to teach me, and it answered lingering questions I didn’t know I had. The book is a good resource that I will gladly recommend to both newcomers and veteran users. Matthew Helmke Administrator, Ubuntu Forums Ubuntu Kung Fu is a fantastic compendium of useful, uncommon Ubuntu knowledge. Eric Hewitt Consultant, LiveLogic, LLC Prepared exclusively for Alison Tyler Download at Boykma.Com Ubuntu Kung Fu Tips, Tricks, Hints, and Hacks Keir Thomas The Pragmatic Bookshelf Raleigh, North Carolina Dallas, Texas Prepared exclusively for Alison Tyler Download at Boykma.Com Many of the designations used by manufacturers and sellers to distinguish their prod- ucts are claimed as trademarks. Where those designations appear in this book, and The Pragmatic Programmers, LLC was aware of a trademark claim, the designations have been printed in initial capital letters or in all capitals. The Pragmatic Starter Kit, The Pragmatic Programmer, Pragmatic Programming, Pragmatic Bookshelf and the linking g device are trademarks of The Pragmatic Programmers, LLC.
    [Show full text]
  • QUESTION 20-1/2 Examination of Access Technologies for Broadband Communications
    International Telecommunication Union QUESTION 20-1/2 Examination of access technologies for broadband communications ITU-D STUDY GROUP 2 3rd STUDY PERIOD (2002-2006) Report on broadband access technologies eport on broadband access technologies QUESTION 20-1/2 R International Telecommunication Union ITU-D THE STUDY GROUPS OF ITU-D The ITU-D Study Groups were set up in accordance with Resolutions 2 of the World Tele- communication Development Conference (WTDC) held in Buenos Aires, Argentina, in 1994. For the period 2002-2006, Study Group 1 is entrusted with the study of seven Questions in the field of telecommunication development strategies and policies. Study Group 2 is entrusted with the study of eleven Questions in the field of development and management of telecommunication services and networks. For this period, in order to respond as quickly as possible to the concerns of developing countries, instead of being approved during the WTDC, the output of each Question is published as and when it is ready. For further information: Please contact Ms Alessandra PILERI Telecommunication Development Bureau (BDT) ITU Place des Nations CH-1211 GENEVA 20 Switzerland Telephone: +41 22 730 6698 Fax: +41 22 730 5484 E-mail: [email protected] Free download: www.itu.int/ITU-D/study_groups/index.html Electronic Bookshop of ITU: www.itu.int/publications © ITU 2006 All rights reserved. No part of this publication may be reproduced, by any means whatsoever, without the prior written permission of ITU. International Telecommunication Union QUESTION 20-1/2 Examination of access technologies for broadband communications ITU-D STUDY GROUP 2 3rd STUDY PERIOD (2002-2006) Report on broadband access technologies DISCLAIMER This report has been prepared by many volunteers from different Administrations and companies.
    [Show full text]
  • Mobile IP Administration Guide
    Mobile IP Administration Guide Sun Microsystems, Inc. 901 San Antonio Road Palo Alto, CA 94303-4900 U.S.A. Part Number 806-6542–10 January 2001 Copyright 2001 Sun Microsystems, Inc. 901 San Antonio Road, Palo Alto, California 94303-4900 U.S.A. All rights reserved. This product or document is protected by copyright and distributed under licenses restricting its use, copying, distribution, and decompilation. No part of this product or document may be reproduced in any form by any means without prior written authorization of Sun and its licensors, if any. Third-party software, including font technology, is copyrighted and licensed from Sun suppliers. Parts of the product may be derived from Berkeley BSD systems, licensed from the University of California. UNIX is a registered trademark in the U.S. and other countries, exclusively licensed through X/Open Company, Ltd. Sun, Sun Microsystems, the Sun logo, docs.sun.com, AnswerBook, AnswerBook2, and Solaris are trademarks, registered trademarks, or service marks of Sun Microsystems, Inc. in the U.S. and other countries. All SPARC trademarks are used under license and are trademarks or registered trademarks of SPARC International, Inc. in the U.S. and other countries. Products bearing SPARC trademarks are based upon an architecture developed by Sun Microsystems, Inc. The OPEN LOOK and SunTM Graphical User Interface was developed by Sun Microsystems, Inc. for its users and licensees. Sun acknowledges the pioneering efforts of Xerox in researching and developing the concept of visual or graphical user interfaces for the computer industry. Sun holds a non-exclusive license from Xerox to the Xerox Graphical User Interface, which license also covers Sun’s licensees who implement OPEN LOOK GUIs and otherwise comply with Sun’s written license agreements.
    [Show full text]
  • Free As in Freedom
    Daily Diet Free as in freedom ... • The freedom to run the program, for any purpose (freedom 0). Application Seen elsewhere Free Software Choices • The freedom to study how the program works, and adapt it to Text editor Wordpad Kate / Gedit/Vi/ Emacs your needs (freedom 1). Access to the source code is a precondition for this. Office Suite Microsoft Office KOffice / Open Office • The freedom to redistribute copies so you can help your Word Processor Microsoft Word Kword / Writer Presentation PowerPoint KPresenter / Impress neighbor (freedom 2). Spreadsheet Excel Kexl / Calc • The freedom to improve the program, and release your Mail & Info Manager Outlook Thunderbird / Evolution improvements to the public, so that the whole community benefits (freedom 3). Access to the source code is a Browser Safari, IE Konqueror / Firefox precondition for this. Chat client MSN, Yahoo, Gtalk, Kopete / Gaim IRC mIRC Xchat Non-Kernel parts = GNU (GNU is Not Unix) [gnu.org] Netmeeting Ekiga Kernel = Linux [kernel.org] PDF reader Acrobat Reader Kpdf / Xpdf/ Evince GNU Operating Syetem = GNU/Linux or GNU+Linux CD - burning Nero K3b / Gnome Toaster Distro – A flavor [distribution] of GNU/Linux os Music, video Winamp, Media XMMS, mplayer, xine, player rythmbox, totem Binaries ± Executable Terminal>shell>command line – interface to type in command Partition tool Partition Magic Gparted root – the superuser, administrator Graphics and Design Photoshop, GIMP, Image Magick & Corel Draw Karbon14,Skencil,MultiGIF The File system Animation Flash Splash Flash, f4l, Blender Complete list- linuxrsp.ru/win-lin-soft/table-eng.html, linuxeq.com/ Set up Broadband Ubuntu – set up- in terminal sudo pppoeconf.
    [Show full text]
  • Guidelines for the Secure Deployment of Ipv6
    Special Publication 800-119 Guidelines for the Secure Deployment of IPv6 Recommendations of the National Institute of Standards and Technology Sheila Frankel Richard Graveman John Pearce Mark Rooks NIST Special Publication 800-119 Guidelines for the Secure Deployment of IPv6 Recommendations of the National Institute of Standards and Technology Sheila Frankel Richard Graveman John Pearce Mark Rooks C O M P U T E R S E C U R I T Y Computer Security Division Information Technology Laboratory National Institute of Standards and Technology Gaithersburg, MD 20899-8930 December 2010 U.S. Department of Commerce Gary Locke, Secretary National Institute of Standards and Technology Dr. Patrick D. Gallagher, Director GUIDELINES FOR THE SECURE DEPLOYMENT OF IPV6 Reports on Computer Systems Technology The Information Technology Laboratory (ITL) at the National Institute of Standards and Technology (NIST) promotes the U.S. economy and public welfare by providing technical leadership for the nation’s measurement and standards infrastructure. ITL develops tests, test methods, reference data, proof of concept implementations, and technical analysis to advance the development and productive use of information technology. ITL’s responsibilities include the development of technical, physical, administrative, and management standards and guidelines for the cost-effective security and privacy of sensitive unclassified information in Federal computer systems. This Special Publication 800-series reports on ITL’s research, guidance, and outreach efforts in computer security and its collaborative activities with industry, government, and academic organizations. National Institute of Standards and Technology Special Publication 800-119 Natl. Inst. Stand. Technol. Spec. Publ. 800-119, 188 pages (Dec. 2010) Certain commercial entities, equipment, or materials may be identified in this document in order to describe an experimental procedure or concept adequately.
    [Show full text]
  • Fedora 17 System Administrator's Guide
    Fedora 17 System Administrator's Guide Deployment, Configuration, and Administration of Fedora 17 Jaromír Hradílek Douglas Silas Martin Prpič Stephen Wadeley Eliška Slobodová Tomáš Čapek Petr Kovář John Ha System Administrator's Guide David O'Brien Michael Hideo Don Domingo Fedora 17 System Administrator's Guide Deployment, Configuration, and Administration of Fedora 17 Edition 1 Author Jaromír Hradílek [email protected] Author Douglas Silas [email protected] Author Martin Prpič [email protected] Author Stephen Wadeley [email protected] Author Eliška Slobodová [email protected] Author Tomáš Čapek [email protected] Author Petr Kovář [email protected] Author John Ha Author David O'Brien Author Michael Hideo Author Don Domingo Copyright © 2012 Red Hat, Inc. and others. The text of and illustrations in this document are licensed by Red Hat under a Creative Commons Attribution–Share Alike 3.0 Unported license ("CC-BY-SA"). An explanation of CC-BY-SA is available at http://creativecommons.org/licenses/by-sa/3.0/. The original authors of this document, and Red Hat, designate the Fedora Project as the "Attribution Party" for purposes of CC-BY-SA. In accordance with CC-BY-SA, if you distribute this document or an adaptation of it, you must provide the URL for the original version. Red Hat, as the licensor of this document, waives the right to enforce, and agrees not to assert, Section 4d of CC-BY-SA to the fullest extent permitted by applicable law. Red Hat, Red Hat Enterprise Linux, the Shadowman logo, JBoss, MetaMatrix, Fedora, the Infinity Logo, and RHCE are trademarks of Red Hat, Inc., registered in the United States and other countries.
    [Show full text]
  • Mobile IP Versus Ipsec Tunneling with MOBIKE: a Comparison Under Wireless Vertical Handover with NS-2
    ENSC835: COMMUNICATION NETWORKS SPRING 2011 FINAL PROJECT Mobile IP versus IPsec Tunneling with MOBIKE: A Comparison Under Wireless Vertical Handover With NS-2 http://www.sfu.ca/~cdk4 Christopher Kilgour 301106137 [email protected] Team #1 Abstract Mobile devices are increasingly including support for multiple heterogeneous wireless networks like 3G cellular, 4G, and IEEE 802.11. When an IP-equipped mobile device attaches to a network, it typically obtains a temporary network address allocated by the visited network provider. One approach to provide a permanent IP address to a mobile device is Mobile IP. Mobile IP has some objectionable aspects: it often requires network provider support, and it can drop data during vertical handover. IPsec tunneling with IKEv2 Mobility and Multihoming Protocol (MOBIKE) may be used as an alternative to Mobile IP. IPsec tunnels do not require any special support from the network provider. Because it supports multi-homing, MOBIKE can provide make-before-break operation, eliminating the data interruption during vertical handover. The ns-2 simulation tool is enhanced, and a comparison of vertical handover scenarios is performed, in this report. Table of Contents Introduction.....................................................................................................................................................4 IP Mobility And Tunneling............................................................................................................................5 Mobile IP....................................................................................................................................................5
    [Show full text]
  • Copyrighted Material
    37_125052 bindex.qxp 3/23/07 6:36 PM Page 343 Index Applications (Ubuntu Help Centre Symbols and Numerics window), 288 (@) at character, 70 Applications menu (GNOME desktop) (\) backslash character, 66 Accessories menu, 151 (:) colon character, 70 Add & Remove menu, 152 802.11a networks, 96 Games menu, 151 802.11b networks, 95–96 Graphics menu, 152 802.11g networks, 95–96 Internet menu, 152 802.11i networks, 95–96 Office menu, 152 802.11n networks, 96 Sound & Video menu, 152 (/) slash character, 65 applications, starting, 164–165 (~) tilde character, 70 APs (Access Points) overview, 98 unencrypted APs, 93, 97, 98–102 • A • WEP-encrypted APs, 93, 98, 102–103 WPA-encrypted APs, 98, 103–110 About GNOME option (GNOME desktop), apt-get utility 153 package installation with, 298 About OpenOffice.org, 289 package updating with, 296 About Ubuntu (Ubuntu Help Centre Archive Manager, 167 window), 288 asymmetric keys, 324 About Ubuntu option (GNOME desktop), at (@) character, 70 153 Audacity sound editor access points (APs) converting files, 267–268 overview, 98 installing, 266 unencrypted APs, 93, 97, 98–102 multimedia, 266–268 WEP-encrypted APs, 93, 98, 102–103 setting up, 266–267 WPA-encrypted APs, 98, 103–110 audio CDs, burning, 265–270 accessories, 167–168 audio files, playing, 257–258 Accessories menu (GNOME desktop), 151 automatic suspension, programming your activating the new settings for static IP computer for, 76 addresses, 89–90 COPYRIGHTEDautomatic MATERIAL update system for Firefox, 188 Add/Remove application, 170 Add & Remove menu
    [Show full text]
  • Linphone a Good Working Skype Voice Over IP Alternative
    Walking in Light with Christ - Faith, Computing, Diary Articles & tips and tricks on GNU/Linux, FreeBSD, Windows, mobile phone articles, religious related texts http://www.pc-freak.net/blog Linphone a good working Skype voice over IP alternative Author : admin If you never tried linphone I warmly recommend it. 2 days ago, with a friend of mine we tested a bunch of Linux softwares to find out what is the situation with possible alternatives to Skype to transmit Voice and Video. I've been interested into Skype Alternative programs since about 2 years, but so far I never found good and easy to set up working Linux alternative. We first tried Ekiga. Though it is said to be a good Linux SKype alternative, my ekiga client running on Debian Linux stable Squeeze ver. 3.2.7.2 failed to connect to SIP account I've created on ekiga.net. I've tried hard to make ekiga connect to account SIP created from ekiga.net but all time I was getting an error on connect: Ekiga did not manage to configure your network settings automatically. You can still use it, but you need to configure your network settings manually. Please see http://wiki.ekiga.org/index.php/Enable_port_forwarding_manually for instructions After continously trying to follow instructions from above pointed URL and making proper settings on my DL-524 Wireless Router and all time ending up with the annoying error, we decided to finally completely abondoned it and try some other voice over IP clients. We tried Jitsi and few others which prooved to be unworking.
    [Show full text]
  • Secure Firewall Traversal in Mobile IP Network
    Secure Firewall Traversal in Mobile IP Network Jung-Min Park1, Min-Jung Jin2, and Kijoon Chae2 1 Intelligent System Control Research Center, KIST, Korea [email protected] 2 Department of Computer Science and Engineering, Ewha Womans Univ., Korea {mjjin,kjchae}@ewha.ac.kr Abstract. With recent advances in wireless communication technology, mobile computing is an importance research area. Mobile IP is designed to provide IP services to roaming nodes. Mobile users take advantage of this protocol to ob- tain the services as if they were connected to their home network. In many cases mobile users is connected through a wireless link and is protected by corpora- tion’s firewall in virtual private network. In order to have a successful deploy- ment of Mobile IP as an extension of a private network, security services should be provided as if the mobile node were attached to its home network. In this pa- per, we propose the security mechanism of combining Mobile IP and IPSec tun- nels, which can provide secure traversal of firewall in a home network. The simulation results show that the proposed mechanism provides the secure and efficient communication. 1 Introduction Mobility in IP networks is a significant issue due to the recent increase of many port- able devices such as notebook and PDA and the development of wireless network interface. Many popular applications such as E-commerce and remote access require transmission of highly sensitive information, often over wireless links. Mobility im- plies higher security risk than static operation in fixed network, because the traffic may at times take unexpected network paths with unknown or unpredictable security characteristics.
    [Show full text]
  • U | UML | Xen | Wine REVIEWED Vmware 5.5
    Jon “maddog” Hall | GPL 3 | GCJ | VMware | QEMU | UML | Xen | Wine REVIEWED VMware 5.5 ™ Since 1994: The Original Magazine of the Linux Community MAY 2006 | www.linuxjournal.com Virtual Linux NEW COLUMN: Jon “maddog” Hall’s Beachhead Tales from the Beach Embedded Java with GCJ Using RTNETLINK AN PUBLICATION USA $5.00 PLUS CAN $6.50 U|xaHBEIGy03102ozXv!:; Is Linux VoIP Ready? MAY 2006 CONTENTS Issue 145 FEATURES ON THE COVER: IMAGE BY AYAAZ RATTANSI 60 RUNNING SOUND APPLICATIONS UNDER WINE 72 XEN You can make Linux sound better with a little Wine. Xen’s unusual approach to virtual systems can give it a speed edge. Dave Phillips Irfan Habib 64 USER-MODE LINUX ON THE COVER Run Linux on top of Linux? It makes sense. Really. • VMware 5.5, p. 56 Matthew E. Hoskins • Jon "maddog" Hall's Beachhead, p. 46 68 QEMU: A MULTIHOST, MULTITARGET EMULATOR • Embedded Java with GCJ, p. 76 Can a free virtual system offer what you need? • Using RTNETLINK, p. 86 Daniel Bartholomew • Is Linux VoIP Ready? p. 80 2 | may 2006 www.linuxjournal.com MAY 2006 CONTENTS Issue 145 COLUMNS REVIEW 22 REUVEN LERNER’S 56 VMWARE WORKSTATION 5.5 AT THE FORGE FOR LINUX HOSTS Google Web Services Mick Bauer 28 MARCEL GAGNÈ’S COOKING WITH LINUX The Virtual Streets of $HOME INDEPTH 80 IS LINUX VOICE OVER IP READY? 76 EMBEDDED JAVA WITH GCJ 34 DAVE TAYLOR’S GCJ may not be for end-user applications, WORK THE SHELL but it’s the bomb for embedded systems. Counting Cards Gene Sally Next Month 36 MICK BAUER’S 80 IS LINUX VOICE OVER IP READY? PARANOID PENGUIN What are the viable VoIP options for Linux Security Features in Debian 3.1 and how do they compare? Machtelt Garrels STORAGE 42 DEE-ANN LEBLANC’S Next month, we’re going fishing.
    [Show full text]
  • Ipv6 Configuration Guide, Cisco IOS XE Everest 16.5.1A (Catalyst 3850 Switches)
    IPv6 Configuration Guide, Cisco IOS XE Everest 16.5.1a (Catalyst 3850 Switches) First Published: 2017-05-31 Americas Headquarters Cisco Systems, Inc. 170 West Tasman Drive San Jose, CA 95134-1706 USA http://www.cisco.com Tel: 408 526-4000 800 553-NETS (6387) Fax: 408 527-0883 © 2017 Cisco Systems, Inc. All rights reserved. CONTENTS CHAPTER 1 Configuring MLD Snooping 1 Finding Feature Information 1 Information About Configuring IPv6 MLD Snooping 1 Understanding MLD Snooping 2 MLD Messages 3 MLD Queries 3 Multicast Client Aging Robustness 4 Multicast Router Discovery 4 MLD Reports 4 MLD Done Messages and Immediate-Leave 4 Topology Change Notification Processing 5 How to Configure IPv6 MLD Snooping 5 Default MLD Snooping Configuration 5 MLD Snooping Configuration Guidelines 6 Enabling or Disabling MLD Snooping on the Switch (CLI) 6 Enabling or Disabling MLD Snooping on a VLAN (CLI) 7 Configuring a Static Multicast Group (CLI) 8 Configuring a Multicast Router Port (CLI) 9 Enabling MLD Immediate Leave (CLI) 10 Configuring MLD Snooping Queries (CLI) 10 Disabling MLD Listener Message Suppression (CLI) 12 Displaying MLD Snooping Information 13 Configuration Examples for Configuring MLD Snooping 13 Configuring a Static Multicast Group: Example 13 Configuring a Multicast Router Port: Example 14 Enabling MLD Immediate Leave: Example 14 IPv6 Configuration Guide, Cisco IOS XE Everest 16.5.1a (Catalyst 3850 Switches) iii Contents Configuring MLD Snooping Queries: Example 14 CHAPTER 2 Configuring IPv6 Unicast Routing 15 Finding Feature Information 15
    [Show full text]