Basics of All-IP Networking

  • Mustafa Ergen


Today’s hierarchical architecture for cellular networks created in the circuitswitched era became inefficient in supporting real-time IP services. The shift to flat IP networks in cellular will deliver substantial cost and flexibility to mobile operation as well as address the increasing requirements of emerging applications.

This chapter is dedicated to examine the technology paths to the all-IP network (AIPN) starting from basics of IP technology and continuing with advanced components of next-generation networks, which are widely used to structure WiMAX, LTE, and UMB standards.


Internet Protocol Session Initiation Protocol User Datagram Protocol Local Mobility Anchor Mobile Access Gateway 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.


Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.


  1. 1.
    3GPP TS 35.201, “Technical Specification Group Services and System Aspects; 3G Security; Specification of the 3GPP Confidentiality and Integrity Algorithms,”
  2. 2.
    3GPP TS 35.206, “3G Security Specification of the 3GPP Confidentiality and Integrity Algorithms,”
  3. 3.
    3GPP TS 23.228, “IP Multimedia Subsystem (IMS) Stage 2,”
  4. 4.
    3GPP TS 31.102, “Identity Module (USIM) application,”
  5. 5.
    3GPP2 S.P0086-B, “IMS Security Framework,”
  6. 6.
    Rekhter, Y., Li, T., “A Border Gateway Protocol 4 (BGP-4),” RFC1771.Google Scholar
  7. 7.
    Poikselka, M., The IMS: IP Multimedia Concepts and Services, 2nd edition, Wiley, 2006.Google Scholar
  8. 8.
    Borman, C., et al., “Robust header compression (ROHC): Framework and four profiles: RTP, UDP, ESP, uncompressed.” IETF RFC3095, July, 2001.Google Scholar
  9. 9.
    Mathis, M., et al., “TCP selective acknowledgement options,” IETF RFC208, 1996.Google Scholar
  10. 10.
    Simpson, W., “The point-to-point protocol (PPP),” IETF RFC1661, July 1994.Google Scholar
  11. 11.
    Muratore, F., UMTS: Mobile Communications for Future, J Wiley, 2000.Google Scholar
  12. 12.
    Perkins, C., “Mobile IP”, IEEE Communications Magazine, May 1997, vol.35, no.5, pp. 84–99.CrossRefMathSciNetGoogle Scholar
  13. 13.
    Chen, W.-T., Huang, L.-C., “RSVP Mobility Support: A Signalling Protocol for Integrated Services Internet with Mobile Hosts,” INFOCOM vol. 3, pp. 1283–1292, 2000.Google Scholar
  14. 14.
    Montenegro, G., “Reverse Tunneling for Mobile IP,” RFC3024, January 2001.Google Scholar
  15. 15.
    Gosh, D., Sarangan, V., Acharya, R., “Quality of Service Routing in IP Networks,” IEEE Trans. on Multimedia, vol.3, no.2, pp.200–208, June 2001.CrossRefGoogle Scholar
  16. 16.
    Taylor, D., Herkersdorf, A., Doring, A., Dittman, G., “Robust Header Compression (ROHC) in Next Generation Network Processors” to appear in IEEE/ACM Trans. on Networking. Google Scholar
  17. 17.
    Bannister, J., Mather, P., Coope, S., Convergence Technologies for 3G Networks: IP, UMTS, EGRPS and ATM, Wiley, 2004.Google Scholar
  18. 18.
    Aissi, S., Dabbous, N., Prasan, A. R., Security for Mobile Networks and Platforms, Artech House, 2006.Google Scholar
  19. 19.
    Harkins, D. C., “The Internet Key Exchange (IKE),” RFC2409, November 1998.Google Scholar
  20. 20.
    Black, U., Internet Security Protocols: Protecting IP Traffic, Prentice Hall, 2000.Google Scholar
  21. 21.
    Frankel, S., Demystifying IPsec Puzzle, Artech House, 2001.Google Scholar
  22. 22.
    Holdrege, M., Srisuresh, P., “Protocol Complications with IP Network Address Translation,” RFC3027, January 2001.Google Scholar
  23. 23.
    Smith, R. E., Authentication: From Passwords to Public Keys, Addison Wesley, 2002.Google Scholar
  24. 24.
    “PPP PAP and CHAP,” RFC1334, October 1992.Google Scholar
  25. 25.
    Calhun, P., et al., “DiAMETER Base Protocol,” RFC3588, September 2003.Google Scholar
  26. 26.
    Aboba, B., Simon, D., “PPP EAP TLS Authentication Protocol,” RFC3588, September 2003.Google Scholar
  27. 27.
    Funk, P., Blake-Wilson, S., “EAP Tunneled TLS Authentication Protocol (EAP-TTLS),” Draft, draft-ietf-ppext-eap-ttls-03, IETF, August 2003.Google Scholar
  28. 28.
    IEEE Standard 802.16-2004, Part 16: Air interface for fixed broadband wireless access systems, June 2004.Google Scholar
  29. 29.
    IEEE Standard 802.16e-2005, Part 16: Air interface for fixed and mobile broadband wireless access systems, December 2005.Google Scholar
  30. 30.
    Johnston, D., Walker, J., “Overview of 802.16 Security,” IEEE Security and Privacy, pp. 40–48, May/June 2004.Google Scholar
  31. 31.
    Zuleger, H., “Mobile Internet Protocol v6 (MIPv6),”
  32. 32.
    Aparicio, A.C., “Analysis of the handover in a WLAN MIPv6 scenario,” Global IPv6 Summit, Barcelona 2005.Google Scholar
  33. 33.
    Ergen, M., Puri, A., “MEWLANA-Mobile IP Enriched Wireless Local Area Network Architecture,” IEEE VTC, Vancouver September, 2002.Google Scholar
  34. 34.
    Ergen, M., et al., “Position Leverage Smooth Handover Algorithm For Mobile IP,” IEEE ICN Atlanta, August, 2002.Google Scholar
  35. 35.
    Boman, K., et al., “UMTS Security,” Electronics and Communication Engineering Journal, vol. 14, no.5, pp. 191–204, October 2002.CrossRefGoogle Scholar
  36. 36.
    Tulloch, M., Microsoft Encyclopedia of Security, Microsoft Press, 2003.Google Scholar
  37. 37.
    “Digging Deeper into Deep Packet Inspecton,” Allot Communications, 2007.Google Scholar
  38. 38.
    Arkko, J., et al., “Using IPSec to protect mobile IPv6 signalling between mobile nodes and home agents,” IETF RFC3776, June 2004.Google Scholar
  39. 39.
    Balakrishna, H., et al. “A comparison of mechanisms for improving TCP performance over wireless links,” Proceedings of ACM/IEEE Mobicom, pp. 77–89, September 1997.Google Scholar
  40. 40.
    Jacobson, V., “Compressing TCP/IP headers for low-speed serial links,” IETF RFC1144, February 1990.Google Scholar
  41. 41.
    Johnson, D., Perkins, C., Arkko, J., “Mobility Support for IPv6,” IETF RFC3775, June 2004.Google Scholar

Copyright information

© Springer Science+Business Media, LLC 2009

Authors and Affiliations

  • Mustafa Ergen
    • 1
  1. 1.BerkeleyUSA

Personalised recommendations