By Topic

2005 Symposium on Applications and the Internet Workshops (SAINT 2005 Workshops)

Date Jan. 31 2005-Feb. 4 2005

Filter Results

Displaying Results 1 - 25 of 120
  • 2005 Symposium on Applications and the Internet Workshops - Cover

    Publication Year: 2005, Page(s): c1
    Request permission for commercial reuse | PDF file iconPDF (36 KB)
    Freely Available from IEEE
  • 2005 Symposium on Applications and the Internet Workshops - Title Page

    Publication Year: 2005, Page(s):i - ii
    Request permission for commercial reuse | PDF file iconPDF (79 KB)
    Freely Available from IEEE
  • 2005 Symposium on Applications and the Internet Workshops - Copyright Page

    Publication Year: 2005, Page(s): iv
    Request permission for commercial reuse | PDF file iconPDF (41 KB)
    Freely Available from IEEE
  • 2005 Symposium on Applications and the Internet Workshops - Table of contents

    Publication Year: 2005, Page(s):v - xviii
    Request permission for commercial reuse | PDF file iconPDF (72 KB)
    Freely Available from IEEE
  • Welcome from the Workshop Co-Chairs

    Publication Year: 2005, Page(s): xix
    Request permission for commercial reuse | PDF file iconPDF (26 KB) | HTML iconHTML
    Freely Available from IEEE
  • Organizing Committee members

    Publication Year: 2005, Page(s): xx
    Request permission for commercial reuse | PDF file iconPDF (32 KB)
    Freely Available from IEEE
  • Workshop Introductions

    Publication Year: 2005, Page(s):xxi - xxx
    Request permission for commercial reuse | PDF file iconPDF (54 KB) | HTML iconHTML
    Freely Available from IEEE
  • New Internet Security and Privacy Models Enabled by IPv6

    Publication Year: 2005, Page(s):2 - 5
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (200 KB) | HTML iconHTML

    This paper identifies some of the features of IPv6 technology that provide security and privacy benefits to Internet users and commercial network operators. It is clearly shown that deployment of IPv6 technology is a critical step on the path towards a more secure and trustworthy networking infrastructure for the future. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Proposal of Configuring IPv6 End-to-End Secure Channels for Closed Members

    Publication Year: 2005, Page(s):6 - 9
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (82 KB) | HTML iconHTML

    Establishing secure channels between a pair of hosts is an attractive way when they want to exchange important data directly. Especially in an IPv6 environment, end-to-end secure communication is required because IPv6 hosts can get global IP addresses easily. IPsec provides various security services for the traffic at the IP layer so it seems to be best suited for this purpose. However, IPsec is d... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Deployment of a Policy-Based Management System for the Dynamic Provision of IPsec-Based VPNs in IPv6 Networks

    Publication Year: 2005, Page(s):10 - 13
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (128 KB) | HTML iconHTML

    Security is considered as a key service in IP networks. This is equally true for IPv4- and IPv6-based networks, and for them the IPsec protocol was defined to provide security at the network layer. IPsec can be used in different scenarios, being the VPN the most widely used. However, IPsec-based VPNs are experiencing important limitations mainly because they are usually based on information manual... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Automatic IPSec Security Association Negotiation in Mobile-Oriented IPv6 Networks

    Publication Year: 2005, Page(s):14 - 17
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (240 KB) | HTML iconHTML

    Integrated mobility and security support is one of the most desirable feature for a network. Although IPv6 offers protocol which satisfies both these requirements, practical issues still exist which do not allow for a really integrated environment. Our contribution towards such integration is the development of a solution to automate the task of setting up the appropriate IPSec Security Associatio... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • IPv6 Distributed Security: Problem Statement

    Publication Year: 2005, Page(s):18 - 21
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (296 KB) | HTML iconHTML

    The deployment of IPv6 enabled devices and networks brings some issues, which must be addressed by security administrators in order to guarantee at least the same level of security obtained nowadays with IPv4 and network-based security schemes, allowing at the same time all the IPv6 advantages and possibilities. The most important issues are the rediscovery of end-to-end communication, the availab... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Dynamic Network Separation for IPv6 Network Security Enhancement

    Publication Year: 2005, Page(s):22 - 25
    Cited by:  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (88 KB) | HTML iconHTML

    Currently on the Internet, a network site is often secured by a firewall, filtering bogus traffic from outside at the border of the network site. This ’Border Defence Model’, however, obstructs the deployment of IPv6 applications and services, because the firewall negates the benefits of IPv6, such as end-to-end communication and IPsec. To solve this problem, the ’Quarantine Model&#... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Deployment of AAA Infrastructures in IPv6 Networks

    Publication Year: 2005, Page(s):26 - 29
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (128 KB) | HTML iconHTML

    AAA infrastructures based on RADIUS protocol are being widely used in current IPv4 networks in order to control and manage end-users belonging to one administrative domain. In this way, these infrastructures will be a key component to control future IPv6 end users. Furthermore, each end user could belong to different domains, so in order to give services to this user from a different domain, roami... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Experiences from Development and Operation of the UK6x Internet Exchange

    Publication Year: 2005, Page(s):30 - 33
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1856 KB) | HTML iconHTML

    The theme of this paper centres on the experiences that have been gained from developing and operating an IPv6 Internet Exchange (IX). The UK6x has been in operation since 2001 and has become a well-respected connection point into the emerging IPv6 Internet. As will be illustrated, architecturally and operationally an IPv6 IX may be very different from a traditional IPv4 IX. Since 2002, the UK6x h... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • JGN II (Japan Gigabit Network II): A Research and Development System for Advanced Broadband Networks

    Publication Year: 2005, Page(s):34 - 37
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (960 KB) | HTML iconHTML

    JGN2 Japan Gigabit Network 2, has been established at the end of March 2004. JGN2 is a successor of JGNI, which has been established by Telecommunication Advancement Organization (TAO) in 1999. JGNI was desgined for the nation-wide R&D network for high speed network infrastructure. JGN2 has the same objective as JGN, however uses different layer 2 technologies. JGNI have developped a nation-wi... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Deploying 5.000 IPv6 Sites: A Real Example

    Publication Year: 2005, Page(s):38 - 41
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (328 KB) | HTML iconHTML

    The deployment of IPv6 has been a very slow process. However in the last months, very important signs of the progress are appearing, demonstrating that is no longer an utopia, but a fact, which just follows a natural process, equivalent to the take-off of any other new technology. One of the main issues has been the "chicken and egg" paradigm. The lack of ISPs offering IPv6 services doesn’t h... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • IPv6 over the Silk Satellite Network

    Publication Year: 2005, Page(s):42 - 45
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (2080 KB) | HTML iconHTML

    The Silk network is a VSAT-based network connecting a number of NRENs in Central Asia and the Caucasus into the Internet. While most of the network uses IPv4, this paper discusses how it was possible to provide native IPv6 facilities onto the Network. Our initial experiences with that system are described. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • IPv6 Campus Transition Experiences

    Publication Year: 2005, Page(s):46 - 49
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (72 KB) | HTML iconHTML

    IPv6 is now a mature standard, with the core protocols defined by the Internet Engineering Task Force (IETF). Over the past two years a number of national research networks and academic network backbone providers have deployed IPv6 in production, using dual-stack networking. The challenge ahead now is to push IPv6 deployment into the universities and end sites in the academic networks. This paper ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An IPv6 Internet Exchange Model: Lessons from Euro6IX Project

    Publication Year: 2005, Page(s):50 - 53
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (71 KB) | HTML iconHTML

    This paper aims to describe the main outputs of the work carried out inside the IST Euro6IX project with particular reference to a new possible architectural Internet Exchange model. This model is based on the IPv6 hierarchical and aggregatable routing and addressing model permitting to enhance the IX functionalities by proposing to directly assign addresses to IX customer’s networks. In addi... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Status of IPv6 (Information and Workshop)

    Publication Year: 2005, Page(s):54 - 57
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (72 KB) | HTML iconHTML

    IPv6, the successor of IPv4, is already in production state since some time. Standardization process has mostly finished. Now its the part of vendors and developers to make their operating systems and network related applications IPv6-ready for use with the new Internet protocol. An overview about the status will be given in the workshop and also in practical lessons several operating systems clie... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Review of IPv6 in DNS. Protocol and Implementations

    Publication Year: 2005, Page(s):58 - 61
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (65 KB) | HTML iconHTML

    We describe the support the DNS provides for IPv6 related lookups. Current status of deployment, from the root servers, through the TLD servers to ISP resolvers and end users will be presented. Finally, we will present the support available from the currently available implementations and issues involved in the operation of an IPv6 capable DNS. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Source Specific Multicast (SSM) with IPv6

    Publication Year: 2005, Page(s):64 - 67
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (76 KB) | HTML iconHTML

    Source-Specific Multicast (SSM) is a more recent form of IP Multicast compared to the traditional Any Source Multicast (ASM) model. In making a fundamental assumption that there is only a single source in a specific Multicast group, simplifications can be made that lead to a new form of multicast that should be easier to deploy than ASM. The 6NET and Euro6IX projects have been at the forefront of ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Easing the Transition to IPv6

    Publication Year: 2005, Page(s):68 - 71
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (280 KB) | HTML iconHTML

    This paper presents the "auto-transition" concept which tries to ensure that any network device can obtain IPv6 connectivity at any time and whatever network is attached to, even if such network is connected to Internet only with IPv4. The algorithm looks for the best possible transition mechanism according to performance criteria as well as the scenario where the device is located. By implementin... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Design and Implementation of Mobility Mechanisms for Mobile IPv6-Based Link Aggregation System

    Publication Year: 2005, Page(s):72 - 75
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (112 KB) | HTML iconHTML

    This paper describes the implementation and evaluation of a link aggregation system with Mobile IPv6. The link aggregation system, SHAKE, is a system intended to the speed and reliability of wireless communication by using multiple Internet-linked mobile hosts simultaneously and dispersing the traffic between mobile hosts and a correspondent host. Because this architecture increases the number of ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.