|
|
|
|
|
|
| | Inter-relationship |
|
|
|
|
The Inter-relationship of QoS, Mobility and Security in Networking
Course description:
Often we study various engineering issues in isolation, which is fine in many scenarios. However, as packet switching has evolved, engineering each networking aspect as an isolated issue can result in unsatisfactory solutions due to conflicting and competing requirements. This course focuses on three basic networking issues: quality of service (QoS), mobility, and security and their inter-relationship. The emphasis of this course will be on understanding the conflicting requirements in order to have a better insight into their principles of operation.
In addition, this course will identify new and more complex networking issues for further research by graduate students. The course’s main perspective is networking over IP packet switching. Some sample topics that will be discussed in this context are: inter-relation of timely content delivery with copyright protection and mobility of end-users, inter-relation of mobility and user’s identification and authentication, inter-relation of interactive streaming media and wireless networking, inter-relation of interactive streaming media and firewalls, inter-relation of denial of service (DOS) and distributed DOS and QoS, and more.
The course will be largely self-contained though familiarity with networking protocols and principles are expected from students who will attend. However, there are no specific prerequisites for this course.
Top
Course objective:
The course primary objective is to provide Ph.D. students with in depth understanding of some of the current IP networking and distributed processing challenges, so they can formulate meaningful new questions and pursue their solutions.
Top
Reference list:
Will be provided.
Top
Course structure
- What are the issues?
-
- QoS vs. Mobility
- Mobility vs. Security
- Security vs. QoS
- QoS in “Wired” Networks – Computing and Storage Support.
-
- Reliable data transfer protocols for “Grid” computing and storage
- Bursty data sources with self-similar traffic
- Reliable multicast over asynchronous network
- QoS in “Wired” Networks – Streaming Media Support.
-
- Provisioning of flows with and without scheduling
- Scheduling with common time reference for optical switching
- Real-time multicast – one-to-many and many-to-many
- Mobility – with fixes access points.
-
- Local area– Wi-Fi basic principles and performance
- Personal area – Bluetooth basic principles and performance
- 2.5G/3G/4G/… cellular networks basic principles – the transition from circuit to packet switching
- Mobility – with continuously changing access points Mobile ad-hoc wireless.
-
- Topology maintenance
- Temporary access “Hot-spot”
- QoS and Mobility.
-
- Bandwidth mismatch between optical backbone and wireless networks
- Stabilizing wireless throughput and delay: using antennas and optical backbone
- Streaming media to/from wireless networks
- Handling instantaneous “too many” mobile users – a “very hot” spot scenario
- Secure delivery of data packets – protection and authorization.
-
- PKI (public key infrastructure) and CA (certification authority)
- IPSec (IP security) and SSL (secure socket layer)
- Trusted usage of copyright protected content by mobile users everywhere.
-
- Content processing protection – digital right management (DRM)
- Trusted processing in “hostile” end-user – the trusted computing platform
- Payment methods for delivered content – mini and micro payments
- Digital right management with TrustedFlow
- Security and QoS.
-
- Solving denial of service (DOS) and distributed DOS attacks while maintaining QoS of streaming media applications
- Voice and video over IP vs. network protection – streaming through firewalls
- Firewalls and the TrustedFlow protocol – DOS/DDOS avoidance
- Security and Mobility.
-
- Protecting network resources from (rogue) mobile users
- User’s identification and authentication in (ad-hoc) wireless environment
- Protecting the network (access points) from mobile users
- Protecting mobile users from (rogue) access points using the TrustedFlow protocol
Course requirements
Individual project with presentation, written report and oral exam.
Top
|
|