Today’s hierarchical architecture for cellular networks created in the circuitswitched era became inefficient in supporting real-time IP services. The shift to flat IP networks in cellular will deliver substantial cost and flexibility to mobile operation as well as address the increasing requirements of emerging applications.
This chapter is dedicated to examine the technology paths to the all-IP network (AIPN) starting from basics of IP technology and continuing with advanced components of next-generation networks, which are widely used to structure WiMAX, LTE, and UMB standards.
KeywordsInternet Protocol Session Initiation Protocol User Datagram Protocol Local Mobility Anchor Mobile Access Gateway
Unable to display preview. Download preview PDF.
- 1.3GPP TS 35.201, “Technical Specification Group Services and System Aspects; 3G Security; Specification of the 3GPP Confidentiality and Integrity Algorithms,” http://www.3gpp.org.
- 2.3GPP TS 35.206, “3G Security Specification of the 3GPP Confidentiality and Integrity Algorithms,” http://www.3gpp.org.
- 3.3GPP TS 23.228, “IP Multimedia Subsystem (IMS) Stage 2,” http://www.3gpp.org.
- 4.3GPP TS 31.102, “Identity Module (USIM) application,” http://www.3gpp.org.
- 5.3GPP2 S.P0086-B, “IMS Security Framework,” http://www.3gpp2.org.
- 6.Rekhter, Y., Li, T., “A Border Gateway Protocol 4 (BGP-4),” RFC1771.Google Scholar
- 7.Poikselka, M., The IMS: IP Multimedia Concepts and Services, 2nd edition, Wiley, 2006.Google Scholar
- 8.Borman, C., et al., “Robust header compression (ROHC): Framework and four profiles: RTP, UDP, ESP, uncompressed.” IETF RFC3095, July, 2001.Google Scholar
- 9.Mathis, M., et al., “TCP selective acknowledgement options,” IETF RFC208, 1996.Google Scholar
- 10.Simpson, W., “The point-to-point protocol (PPP),” IETF RFC1661, July 1994.Google Scholar
- 11.Muratore, F., UMTS: Mobile Communications for Future, J Wiley, 2000.Google Scholar
- 13.Chen, W.-T., Huang, L.-C., “RSVP Mobility Support: A Signalling Protocol for Integrated Services Internet with Mobile Hosts,” INFOCOM vol. 3, pp. 1283–1292, 2000.Google Scholar
- 14.Montenegro, G., “Reverse Tunneling for Mobile IP,” RFC3024, January 2001.Google Scholar
- 16.Taylor, D., Herkersdorf, A., Doring, A., Dittman, G., “Robust Header Compression (ROHC) in Next Generation Network Processors” to appear in IEEE/ACM Trans. on Networking. Google Scholar
- 17.Bannister, J., Mather, P., Coope, S., Convergence Technologies for 3G Networks: IP, UMTS, EGRPS and ATM, Wiley, 2004.Google Scholar
- 18.Aissi, S., Dabbous, N., Prasan, A. R., Security for Mobile Networks and Platforms, Artech House, 2006.Google Scholar
- 19.Harkins, D. C., “The Internet Key Exchange (IKE),” RFC2409, November 1998.Google Scholar
- 20.Black, U., Internet Security Protocols: Protecting IP Traffic, Prentice Hall, 2000.Google Scholar
- 21.Frankel, S., Demystifying IPsec Puzzle, Artech House, 2001.Google Scholar
- 22.Holdrege, M., Srisuresh, P., “Protocol Complications with IP Network Address Translation,” RFC3027, January 2001.Google Scholar
- 23.Smith, R. E., Authentication: From Passwords to Public Keys, Addison Wesley, 2002.Google Scholar
- 24.“PPP PAP and CHAP,” RFC1334, October 1992.Google Scholar
- 25.Calhun, P., et al., “DiAMETER Base Protocol,” RFC3588, September 2003.Google Scholar
- 26.Aboba, B., Simon, D., “PPP EAP TLS Authentication Protocol,” RFC3588, September 2003.Google Scholar
- 27.Funk, P., Blake-Wilson, S., “EAP Tunneled TLS Authentication Protocol (EAP-TTLS),” Draft, draft-ietf-ppext-eap-ttls-03, IETF, August 2003.Google Scholar
- 28.IEEE Standard 802.16-2004, Part 16: Air interface for fixed broadband wireless access systems, June 2004.Google Scholar
- 29.IEEE Standard 802.16e-2005, Part 16: Air interface for fixed and mobile broadband wireless access systems, December 2005.Google Scholar
- 30.Johnston, D., Walker, J., “Overview of 802.16 Security,” IEEE Security and Privacy, pp. 40–48, May/June 2004.Google Scholar
- 31.Zuleger, H., “Mobile Internet Protocol v6 (MIPv6),” http://www.hznet.de/ipv6/mipv6-intro.pdf.
- 32.Aparicio, A.C., “Analysis of the handover in a WLAN MIPv6 scenario,” Global IPv6 Summit, Barcelona 2005.Google Scholar
- 33.Ergen, M., Puri, A., “MEWLANA-Mobile IP Enriched Wireless Local Area Network Architecture,” IEEE VTC, Vancouver September, 2002.Google Scholar
- 34.Ergen, M., et al., “Position Leverage Smooth Handover Algorithm For Mobile IP,” IEEE ICN Atlanta, August, 2002.Google Scholar
- 36.Tulloch, M., Microsoft Encyclopedia of Security, Microsoft Press, 2003.Google Scholar
- 37.“Digging Deeper into Deep Packet Inspecton,” Allot Communications, 2007.Google Scholar
- 38.Arkko, J., et al., “Using IPSec to protect mobile IPv6 signalling between mobile nodes and home agents,” IETF RFC3776, June 2004.Google Scholar
- 39.Balakrishna, H., et al. “A comparison of mechanisms for improving TCP performance over wireless links,” Proceedings of ACM/IEEE Mobicom, pp. 77–89, September 1997.Google Scholar
- 40.Jacobson, V., “Compressing TCP/IP headers for low-speed serial links,” IETF RFC1144, February 1990.Google Scholar
- 41.Johnson, D., Perkins, C., Arkko, J., “Mobility Support for IPv6,” IETF RFC3775, June 2004.Google Scholar