Home
Publications
Education & Positions
Graduate Courses
Optical
QoS
Inter-relationship
Closing lines ...

The Inter-relationship of QoS, Mobility and Security in Networking

Course description:

Often we study various engineering issues in isolation, which is fine in many scenarios. However, as packet switching has evolved, engineering each networking aspect as an isolated issue can result in unsatisfactory solutions due to conflicting and competing requirements. This course focuses on three basic networking issues: quality of service (QoS), mobility, and security and their inter-relationship. The emphasis of this course will be on understanding the conflicting requirements in order to have a better insight into their principles of operation.

In addition, this course will identify new and more complex networking issues for further research by graduate students. The course’s main perspective is networking over IP packet switching. Some sample topics that will be discussed in this context are: inter-relation of timely content delivery with copyright protection and mobility of end-users, inter-relation of mobility and user’s identification and authentication, inter-relation of interactive streaming media and wireless networking, inter-relation of interactive streaming media and firewalls, inter-relation of denial of service (DOS) and distributed DOS and QoS, and more.

The course will be largely self-contained though familiarity with networking protocols and principles are expected from students who will attend. However, there are no specific prerequisites for this course.
Top

Course objective:

The course primary objective is to provide Ph.D. students with in depth understanding of some of the current IP networking and distributed processing challenges, so they can formulate meaningful new questions and pursue their solutions.
Top

Reference list:

Will be provided.
Top

Course structure

What are the issues?
  • QoS vs. Mobility
  • Mobility vs. Security
  • Security vs. QoS
QoS in “Wired” Networks – Computing and Storage Support.
  • Reliable data transfer protocols for “Grid” computing and storage
  • Bursty data sources with self-similar traffic
  • Reliable multicast over asynchronous network
QoS in “Wired” Networks – Streaming Media Support.
  • Provisioning of flows with and without scheduling
  • Scheduling with common time reference for optical switching
  • Real-time multicast – one-to-many and many-to-many
Mobility – with fixes access points.
  • Local area– Wi-Fi basic principles and performance
  • Personal area – Bluetooth basic principles and performance
  • 2.5G/3G/4G/… cellular networks basic principles – the transition from circuit to packet switching
Mobility – with continuously changing access points Mobile ad-hoc wireless.
  • Topology maintenance
  • Temporary access “Hot-spot”
QoS and Mobility.
  • Bandwidth mismatch between optical backbone and wireless networks
  • Stabilizing wireless throughput and delay: using antennas and optical backbone
  • Streaming media to/from wireless networks
  • Handling instantaneous “too many” mobile users – a “very hot” spot scenario
Secure delivery of data packets – protection and authorization.
  • PKI (public key infrastructure) and CA (certification authority)
  • IPSec (IP security) and SSL (secure socket layer)
Trusted usage of copyright protected content by mobile users everywhere.
  • Content processing protection – digital right management (DRM)
  • Trusted processing in “hostile” end-user – the trusted computing platform
  • Payment methods for delivered content – mini and micro payments
  • Digital right management with TrustedFlow
Security and QoS.
  • Solving denial of service (DOS) and distributed DOS attacks while maintaining QoS of streaming media applications
  • Voice and video over IP vs. network protection – streaming through firewalls
  • Firewalls and the TrustedFlow protocol – DOS/DDOS avoidance
Security and Mobility.
  • Protecting network resources from (rogue) mobile users
  • User’s identification and authentication in (ad-hoc) wireless environment
  • Protecting the network (access points) from mobile users
  • Protecting mobile users from (rogue) access points using the TrustedFlow protocol

Course requirements

Individual project with presentation, written report and oral exam.
Top

Pages hosted by "Computer Networks and Mobility Group" - DIT - Università di Trento - Italy.
© Yoram Ofek Homepage, All Rights Reserved.
Last updated: 2009-07-02 07:02:30