Wireless IP, The Killer Application !?

My website and thesis captures the essential elements in the convergence path of wireless networks and Internet protocols resulting in the new paradigm of "Wireless IP." It covers all the important 1G/2G cellular technologies that I have seen in the past decade, along with 3G and 4G, Wireless Local Area Network (WLAN) technologies,including modifications required in protocols, architectures, and framework in virtually every area such as QoS, security, mobility, and so on.

The thesis can be useful for anyone who is interested in the convergence of the wireless and IP networks and for them who need to understand how packet data services and IP work in the wireless world. Furthermore, the thesis represents my views and opinions , based on my technical understanding and experience in these areas

Because the increase of higher system capacities and data rates provided by latest and proposed wireless network technologies, and their closer integration with the Internet enabled by the IP technologies used in these wireless networks are enabling many new ways for people to communicate.
Also people on moving vehicles (e.g. cars, trains, boats and airplanes) may access the Internet or their enterprise networks the same way as when they are at their offices or homes. They may be able to surf the Internet, access their corporate networks, download games from the network, play games with remote users, obtain tour guidance information, obtain real-time traffic and route conditions information.

Wireless networks are evolving into wireless IP networks to overcome the limitations of traditional circuit-switched wireless networks. Wireless IP networks are more suitable for supporting the rapidly growing mobile data and multimedia applications.
IP technologies (such as Mobile IP) are the most promising solutions available today for supporting data and multimedia applications over wireless networks. IP-based wireless networks will bring the globally successful Internet service into wireless networks. The mobile or wireless Internet will be an extension to the current Internet.

Advanced mobile data and multimedia applications such as; MMS, play games in real time with remote users, Voice over wireless (VoIP calls) and broadcasting of audio and video advertisements to mobile phone users such as: advertiser supported phone calls, Wireless IP-enabled radio and watch TV, will grow very fast. New IP broadcasting techniques such as DVB-H (Digital Video Broadcasting for Handhelds), will make it possible to bring video broadcasting services to handheld receivers.

In particular, the growth of advanced mobile data and multimedia applications such as Voice-over-IP (VoIP) help increase multimedia traffic over the wireless networks significantly. Thus, Wireless IP can also be a killer sometimes. Therefore future Wireless IP networks can only be able to service those mobile data and multimedia applications without congestions in the Wireless network, if those Wireless IP networks are ready for it. In other words, "those networks need to be controlled (e.g. by QoS parameters or other specific protocols) end must have enough bandwidth to support all this types of services. Wireless networks and the IP technologies within those networks have to be reviewed and evolved constantly.

Remark these words:
The traffic on broadband wireless networks will be increasingly IP

Oct
22

Security in Wireless IP Networks

By

Acknowledging the higher risk of security problems in wireless networks opens up new problems due to the inherent mobility functionality associated with wireless networks. While mobility is a great convenience to wireless users, it demands a lot of intelligence and complexity on the network side. Mobility provides that users can establish a wireless subscription with one service provider in their hometown and can roam nationally or internationally.

This introduces a connection between roaming and security functionality that the users must be authenticated and authorized for gaining access to network services in the visiting network that they are currently roaming to. The user must provide credentials that are used to identify the home network where he or she belongs, and then the access is provided after performing the security functions. On the flip side, the security function also involves the home network to ensure that the user is an unalloyed user who has subscribed to its services. There are numerous security protocols in use on the Internet.

Taking mobility into consideration, IPSec provides a robust security framework to satisfy the requirements of the wireless IP networks. It offers access control, connectionless integrity, data origin authentication, protection against replays (a form of partial sequence integrity), confidentiality (encryption), and limited traffic flow confidentiality. IPSec security features are handled at the IP layer, offering protection for IP- and/or upper-layer protocols.
There are two traffic security protocols, the Authentication Header (AH) and the Encapsulated Security Payload (ESP), that are used as part of the IPSec.

AH provides connectionless integrity, data origin authentication, and an optional anti-replay service. The ESP may provide confidentiality (encryption) and limited traffic flow confidentiality and it may also provide connectionless integrity, data origin authentication, and anti-replay service. AH and ESP can be used individually or in combination with each other to provide a desired set of security services in IPv4 and IPv6.
A security association is uniquely identified by a triple consisting of a Security Parameter Index (SPI), an IP destination address, and a security protocol (AH or ESP) identifier. Internet Key Exchange (IKE) is the default automated key management protocol to negotiate protocols and algorithms and to create security associations and generate authentication keys. A security policy database can be used as input data to the IKE

Part of the thesis: Wireless IP, The Killer Application !?

Categories : Thesis