Skip to main content

Basics of All-IP Networking

  • Chapter
  • First Online:
  • 1569 Accesses

Abstract

Today’s hierarchical architecture for cellular networks created in the circuitswitched era became inefficient in supporting real-time IP services. The shift to flat IP networks in cellular will deliver substantial cost and flexibility to mobile operation as well as address the increasing requirements of emerging applications.

This chapter is dedicated to examine the technology paths to the all-IP network (AIPN) starting from basics of IP technology and continuing with advanced components of next-generation networks, which are widely used to structure WiMAX, LTE, and UMB standards.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   89.00
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   119.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD   169.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. 3GPP TS 35.201, “Technical Specification Group Services and System Aspects; 3G Security; Specification of the 3GPP Confidentiality and Integrity Algorithms,” http://www.3gpp.org.

  2. 3GPP TS 35.206, “3G Security Specification of the 3GPP Confidentiality and Integrity Algorithms,” http://www.3gpp.org.

  3. 3GPP TS 23.228, “IP Multimedia Subsystem (IMS) Stage 2,” http://www.3gpp.org.

  4. 3GPP TS 31.102, “Identity Module (USIM) application,” http://www.3gpp.org.

  5. 3GPP2 S.P0086-B, “IMS Security Framework,” http://www.3gpp2.org.

  6. Rekhter, Y., Li, T., “A Border Gateway Protocol 4 (BGP-4),” RFC1771.

    Google Scholar 

  7. Poikselka, M., The IMS: IP Multimedia Concepts and Services, 2nd edition, Wiley, 2006.

    Google Scholar 

  8. Borman, C., et al., “Robust header compression (ROHC): Framework and four profiles: RTP, UDP, ESP, uncompressed.” IETF RFC3095, July, 2001.

    Google Scholar 

  9. Mathis, M., et al., “TCP selective acknowledgement options,” IETF RFC208, 1996.

    Google Scholar 

  10. Simpson, W., “The point-to-point protocol (PPP),” IETF RFC1661, July 1994.

    Google Scholar 

  11. Muratore, F., UMTS: Mobile Communications for Future, J Wiley, 2000.

    Google Scholar 

  12. Perkins, C., “Mobile IP”, IEEE Communications Magazine, May 1997, vol.35, no.5, pp. 84–99.

    Article  MathSciNet  Google Scholar 

  13. Chen, W.-T., Huang, L.-C., “RSVP Mobility Support: A Signalling Protocol for Integrated Services Internet with Mobile Hosts,” INFOCOM vol. 3, pp. 1283–1292, 2000.

    Google Scholar 

  14. Montenegro, G., “Reverse Tunneling for Mobile IP,” RFC3024, January 2001.

    Google Scholar 

  15. Gosh, D., Sarangan, V., Acharya, R., “Quality of Service Routing in IP Networks,” IEEE Trans. on Multimedia, vol.3, no.2, pp.200–208, June 2001.

    Article  Google Scholar 

  16. Taylor, D., Herkersdorf, A., Doring, A., Dittman, G., “Robust Header Compression (ROHC) in Next Generation Network Processors” to appear in IEEE/ACM Trans. on Networking.

    Google Scholar 

  17. Bannister, J., Mather, P., Coope, S., Convergence Technologies for 3G Networks: IP, UMTS, EGRPS and ATM, Wiley, 2004.

    Google Scholar 

  18. Aissi, S., Dabbous, N., Prasan, A. R., Security for Mobile Networks and Platforms, Artech House, 2006.

    Google Scholar 

  19. Harkins, D. C., “The Internet Key Exchange (IKE),” RFC2409, November 1998.

    Google Scholar 

  20. Black, U., Internet Security Protocols: Protecting IP Traffic, Prentice Hall, 2000.

    Google Scholar 

  21. Frankel, S., Demystifying IPsec Puzzle, Artech House, 2001.

    Google Scholar 

  22. Holdrege, M., Srisuresh, P., “Protocol Complications with IP Network Address Translation,” RFC3027, January 2001.

    Google Scholar 

  23. Smith, R. E., Authentication: From Passwords to Public Keys, Addison Wesley, 2002.

    Google Scholar 

  24. “PPP PAP and CHAP,” RFC1334, October 1992.

    Google Scholar 

  25. Calhun, P., et al., “DiAMETER Base Protocol,” RFC3588, September 2003.

    Google Scholar 

  26. Aboba, B., Simon, D., “PPP EAP TLS Authentication Protocol,” RFC3588, September 2003.

    Google Scholar 

  27. Funk, P., Blake-Wilson, S., “EAP Tunneled TLS Authentication Protocol (EAP-TTLS),” Draft, draft-ietf-ppext-eap-ttls-03, IETF, August 2003.

    Google Scholar 

  28. IEEE Standard 802.16-2004, Part 16: Air interface for fixed broadband wireless access systems, June 2004.

    Google Scholar 

  29. IEEE Standard 802.16e-2005, Part 16: Air interface for fixed and mobile broadband wireless access systems, December 2005.

    Google Scholar 

  30. Johnston, D., Walker, J., “Overview of 802.16 Security,” IEEE Security and Privacy, pp. 40–48, May/June 2004.

    Google Scholar 

  31. Zuleger, H., “Mobile Internet Protocol v6 (MIPv6),” http://www.hznet.de/ipv6/mipv6-intro.pdf.

  32. Aparicio, A.C., “Analysis of the handover in a WLAN MIPv6 scenario,” Global IPv6 Summit, Barcelona 2005.

    Google Scholar 

  33. Ergen, M., Puri, A., “MEWLANA-Mobile IP Enriched Wireless Local Area Network Architecture,” IEEE VTC, Vancouver September, 2002.

    Google Scholar 

  34. Ergen, M., et al., “Position Leverage Smooth Handover Algorithm For Mobile IP,” IEEE ICN Atlanta, August, 2002.

    Google Scholar 

  35. Boman, K., et al., “UMTS Security,” Electronics and Communication Engineering Journal, vol. 14, no.5, pp. 191–204, October 2002.

    Article  Google Scholar 

  36. Tulloch, M., Microsoft Encyclopedia of Security, Microsoft Press, 2003.

    Google Scholar 

  37. “Digging Deeper into Deep Packet Inspecton,” Allot Communications, 2007.

    Google Scholar 

  38. Arkko, J., et al., “Using IPSec to protect mobile IPv6 signalling between mobile nodes and home agents,” IETF RFC3776, June 2004.

    Google Scholar 

  39. Balakrishna, H., et al. “A comparison of mechanisms for improving TCP performance over wireless links,” Proceedings of ACM/IEEE Mobicom, pp. 77–89, September 1997.

    Google Scholar 

  40. Jacobson, V., “Compressing TCP/IP headers for low-speed serial links,” IETF RFC1144, February 1990.

    Google Scholar 

  41. Johnson, D., Perkins, C., Arkko, J., “Mobility Support for IPv6,” IETF RFC3775, June 2004.

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Rights and permissions

Reprints and permissions

Copyright information

© 2009 Springer Science+Business Media, LLC

About this chapter

Cite this chapter

Ergen, M. (2009). Basics of All-IP Networking. In: Mobile Broadband. Springer, Boston, MA. https://doi.org/10.1007/978-0-387-68192-4_3

Download citation

  • DOI: https://doi.org/10.1007/978-0-387-68192-4_3

  • Published:

  • Publisher Name: Springer, Boston, MA

  • Print ISBN: 978-0-387-68189-4

  • Online ISBN: 978-0-387-68192-4

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics