The third edition of this seminar - entitled 'Mobile Systems III' - discusses in the first section 'War Driving'. While the search for open, unsecured, and publicly available Wireless Local Area Networks (WLAN) occurred to be a 'sports event', today a well established group of people keep track of those activities. This talk outlines the range of actions, goals of these activities, and the environment in which these people operate.
The second section addresses the area of secure networking across public networks. In particular it lists and discusses known Virtual Private Networks (VPN) as well as IPSec. Their comparison and use in wired and wireless networking domains conclude this section.
The third section is driven by demands of real-time applications, which require a real-time networking infrastructure. Therefore, the key aspects of real-time support of wired and wireless networking devices are discussed and major mechanisms in support of those demands are compared.
Due to the existence of wireless networks the support of mobility has changed tremendously the usage of services of today's Internet users. Therefore, the fourth section focuses in more detail on this area, in particular on micro-mobility support in IP-based networks as well as Mobile IP extensions in terms of hand-off optimization and paging. A quite extensive comparison of existing protocols concludes this section.
The fifth section deals with QoS issues in the WLAN environment and outlines respective standards available in LANs. This includes a discussion of IEEE 802.1p and IEEE 802.1Q as well as a definition of QoS and one possible metering framework for QoS, the Real-Time Flow Measurement (RTFM) work.
Driven by possible solutions and key security concerns in mobile networks, section six develops a view on advanced concepts for security in those ones. The standard IEEE 802.11i addresses wireless security mechanisms, which are analyzed and advantages as well as drawbacks are discussed. Protocol-independent security measures are included in this section as well.
Due to the current security debate, section seven deals with intrusion detection systems, in particular addressing mobile environments. Key functionality is described and methods applied are discussed, while a view on wireless systems is being made.
Finally, section eight presents an overview on software environments for mobile devices. The key role plays the Operating System (OS), and major requirements in a mobile environment are discussed. Existing OS are presented and evaluated. Finally, J2ME is outlined as a programming environment for mobile systems.
«The third edition of this seminar - entitled 'Mobile Systems III' - discusses in the first section 'War Driving'. While the search for open, unsecured, and publicly available Wireless Local Area Networks (WLAN) occurred to be a 'sports event', today a well established group of people keep track of those activities. This talk outlines the range of actions, goals of these activities, and the environment in which these people operate.
The second section addresses the area of secure networking...
»