1. BIBLIOGRAFIA
[1] Diego Darío Orjuela, Edwin León Martínez, Héctor Mauricio Sánchez, Análisis de la Migración de las Redes
Móviles Actuales Hacia las Redes Móviles de Siguiente Generación, 2010, pp 19-29. Fuente:
www.uniandes.edu.co.
[2] Camilo Bolaños Guerrero-CINTEL, Evolución de la Arquitectura UMTS. Fuente: www.interactic.org.co.
[3] Overview of 3GPP Release 10, 2012. Fuente: www.3gpp.org.
[4] Introduction to Evolved Packet Core. Fuente: http://lte.alcatellucent.com/locale/en_us/downloads/wp_evolved
_packet_core.pdf.
[5] www.ngmn.org, Consultada en junio 2011.
[6] Hemant Mathur, Study and Analysis of LTE Advanced Technology For 4G and Wireless Communication, 2012.
Fuente:
[7] Vamsi Krishna Gondi, Nazim Agoulmine, User and Network Management for Secure Interworking and Roaming
in WiMAX, 3G and WiFi Networks Using RII Architecture, UPGRADE Vol IX,2008. Fuente:
[8] Dilshad Mahjabeen, Anis Ahmed, Shahida Rafique, Use of LTE for the Interoperability between Different
Generations of Wireless Communication, 2011
[9] Saad Biaz, Nitin H. Vaidya, Is the Roundtrip Time Correlated with the Number of Packets in Flight?, 2003.
Fuente:
[10] Report ITU-R M.2134, Requirements Related to Technical performance for IMT-Advanced Radio Interfaces,
2008. Fuente: www.itu.com.
[11] Report ITU-R M.2135, Guidelines for Evaluation of Radio Interface Technologies for IMT-Advanced, 2008.
Fuente: www.itu.com.
[12] What is LTE eNB?, 2012. Fuente: http://www.artizanetworks.com/lte_tut_cpl_pro .html.
[13] Juho Lee, Jin-Kyu Han, Jianzhong, Zhang, MIMO technologies in 3GPP LTE and LTE-Advanced, 2009, Article
ID 302092. Fuente: http://www.ece.gatech.edu/ research/labs/bwn/ltea/papers/mimo-tech-lte.pdf.
[14] Farooq Khan, LTE for 4G Broadband Air Interface Technologies and Performance, Cambridge University,
ISBN-13 978-0-511-51666-5, 2009, pp 20 – 87.
[15] Bilal Sadiq, Ritesh Madan, Ashwin Sampath, Downlink Scheduling for Multiclass Traffic in LTE, 2009, Article
ID 510617. Fuente: http://junction.stanford.edu/~rkmadan/ eurasip_lte.pdf.
[16] Francesco Davide Calabrese, Scheduling and Link Adaptation for Uplink SC-FDMA Systems A LTE Case
Study, Science and Medicine of Aalborg University, 2009, pp. 119-121. Fuente:
http://vbn.aau.dk/files/19156393/PhD_Thesis_FrancescoDavide Calabrese_final_print.pdf.
[17] Jose Fernando Restrepo, Acceso Multiple por Division de Frecuencia Ortogonal, Cap. 1, pp. 17 -19. Fuente:
http://www.bdigital.unal.edu.co/4836/8/josefernandores trepopiedrahita.2011.parte4.pdf.
[18] Juan Jesús Sánchez Sánchez, Analysis of SC-FDMA and OFDMA Performance over Fading Channels,
2. Universidad de Malaga, 2011, pp. 5 -14. Fuente:
http://riuma.uma.es/xmlui/bitstream/handle/10630/4689/ANALYSIS%20OF%20SC%20FDMA.pdf?sequence=1
[19] Jonas Hansryd, Per-Erik Eriksson, High Speed Mobile Backhaul Demonstrators, Ericsson, 2009. Fuente:
http://www.ericsson.com/ericsson/corpinfo/publications/review /2009_02/files/Backhaul.pdf.
[20] Ra Jesh Chundury, Mobile Broadband Backhaul: Addressing the Challenge, Ericsson, 2008. Fuente:
http://www.ericsson.com/ericsson/corpinfo/publications/review/ 2008_03/files/Backhaul.pdf.
[21] Xixia, Evolved Packet Core Testing, White Paper, 2010. Fuente:
http://www.ixiacom.com/pdfs/library/white_papers/epc_testing_wp.pdf. Recuperado el
[22] Alcatel-Lucent, The LTE Network Architecture, 2009. Fuente: www.alcatel-lucent.com/.
[23] 3GPP, ETSI 136 410 V 10.0.1, Technical Specification, 2011, pp 9-12. Fuente:
http://www.etsi.org/deliver/etsi_ts/136400_136499/136410/10.00.01_60/ts_136410v100001p.pdf.
[24] 3GPP TS 36.300 V 8.3.0, Technical Specification, 2007, pp 17-25. Fuente:
http://www.quintillion.co.jp/3GPP/Specs/36300-830.pdf.
[25] 3GPP TS 36.413 V 8.9.0, Technical Spesification, 2010, pp 48-58. Fuente:
http://www.quintillion.co.jp/3GPP/Specs/36413-890.pdf.
[26] Irfan Ali, Alessio Casati, kuntal Chowdhury, Networks-Based Mobility Management in the Evolved 3GPP Core
Network, IEEE Communications Magazine, 2009. Fuente:
http://ants.iis.sinica.edu.tw/3BkMJ9lTeWXTSrrvNoKNFDxRm3zFwRR/ 19/09MCOM-
Networkbased%20mobility%20management%20in%20the%20evolved% 203GPP%20core.pdf.
[27] Keith Stoulfer, Joe Falco, Karen Kent, Guide to Supervisory Control and Data Acquisition (SCADA) and
Industrial Control Systems Security, NIST, 2006, pp 2-1 a 2-13. Fuente:
http://www.cyber.st.dhs.gov/docs/NIST%20Guide%20to%20Supervisory%20and%20Data%20Acquisition-
SCADA%20and%20Industrial%20Control%20Systems%20Security%20(2007).pdf.
[28] Gregory M. Coates, Kenneth M. Hopkinson, Scott R. Graham, ATrust System Architecture for SCADA Network
Security, IEEE, 2010. Fuente:
http://ieeexplore.ieee.org/xpl/login.jsp?tp=&arnumber=5350402&url=http%3A%2F%2Fieeexplore.ieee.org%2Fxp
ls%2Fabs_all.jsp%3Farnumber%3D5350402.
[29] Cristina Alcaraz, Rodrigo Román, Pablo Najera, Javier Lopez, Acceso Seguro a Redes de Sensores en
SCADA a través de Internet, Universidad de Málaga, 2010. Fuente:
http://www.nics.uma.es/sites/default/files/AlcarazRomanNajeraLopez2010.pdf.
[30] Sungjin Lee, Donghyun Choi, Choonsik Park, and Seungjoo Kim, An Efficient Key Management Scheme for
Secure SCADA Communication, World Academy of Science, Engineering and Technology, 2008. Fuente:
http://www.psu.edu/.
[31] Gregory M. Coates, Kenneth M. Hopkinson, Scott R. Graham, Collaborative, Trust-Based Security
Mechanisms for a Regional Utility Intranet, IEEE Transactions of Power Systems, Vol. 23, 2008. Fuente:
[32] Samuel East, Jonathan Butts, Mauricio Papa and Sujeet Shenoi, A Taxonomy of Attacks on the DNP3
Protocol, Critical Infrastructure Protection III, IFIP AICT 311, IFIP, 2009. Fuente: https://scada-
dnp3.googlecode.com/files/East2009.pdf.
[33] Sugwon Hong, Il Hyung Lim, Myeon-Song Choi, Seung-Jae Lee, Chang Hoon Shin, Sung Woo Lee, Bok Nam
3. Ha, Evolution of Communications Networks for Distribution Automation System in Korea, 2006. Fuente:
http://ants.mju.ac.kr/public ation/APAP2007.pdf.
[34] Paulo Sérgio Motta Pires, Luiz Affonso H. Guedes de Oliveira, Diogo Nascimento Barros, Aspectos de
Segurança em Sistemas SCADA uma Visão Geral, Universidade Federal do Rio Grande do Norte, 2004. Fuente:
http://www.dca.ufrn.br/~affonso/FTP/artigos/2004/isa_scada_2004.pdf
[35] Kenneth C Wilberg, Identifying Supervisory Control and Data Acquisition (SCADA) Systems on a Network Via
Remote Reconnaissance, Naval Postgraduate School, 2006, pp. 22. Fuente:
http://calhoun.nps.edu/public/bitstream/handle /10945/2527/06Sep_Wiberg.pdf?sequence=1.
[36] Bonnie Zhu, Shankar Sastry, SCADA-Specific Intrusion Detection/Prevention Systems: A Survey and
Taxonomy, 2010 Fuente: http://www.cse.psu.edu/~smclaugh/ cse598e-f11/papers/zhu.pdf.
[37] Raúl Siles Peláez, Analisis de Seguridad de la Familia de Protocolos TCP/IP y sus Servicios Asociados, 2002.
Fuente: http://es.tldp.org/Manuales-LuCAS/doc-seguridad-tcpip/Seguridad_en_TCP-IP_Ed1.pdf.
[38] Garrett Leischner and David Whitehead, A View Through the Hacker’s Looking Glass, Schweitzer Engineering
Laboratories Inc, 2006. Fuente: www.selinc.com.
[39] Sugwon Hong, Myongho Lee, Challenges and Direction Toward Secure Communication in the SCADA
System, Dept. of Computer Science and Engineering, Myongji University, Yongin Korea, 978-0-7695-4041-2/10,
2010. Fuente: http://yenol.net/publication/4041a381.pdf.
[40] ABB, IEC 61850 Communication Protocol Manual, Version 1.1, 2011. pp – 19. Fuente:
http://www05.abb.com/global/scot/scot354.nsf/veritydisplay/fe4d2c659c6ccad2c125783a00454ae3/$file/1MRK5
11242-UEN_-_en_Communication_protocol_manual__IEC_61850__650_series__IEC.pdf.
[41] Samuel East, Jonathan Butts, Mauricio Papa y Sujeet Shenoi, Critical Infrastructure Protection III, Cap 5 A
Taxonomy of Attacks on the DNP3 Protocol, IFIP AICT 311, 2009 pp 68-73. Disponible en:
http://link.springer.com/chapter/10.1007%2F978-3-642-04798-5_5?LI=true.
[42] Cisco CGS 2520 Software Configuration Guide, Chapter 5 Configuring MODBUS TCP. Disponible en:
http://www.cisco.com/en/US/docs/switches/connectedgrid/cgs2520/software/release/12_2_53_ex/configuration/g
uide/swmodbus.pdf.
[43] Gordon Clarke, Deon Reynders, Practical Modern SCADA Protocols: DNP3, 60870.5 and Related Systems,
Editorial Elsevier, 2004, Cap 3 y 4. pp- 63 – 72.
[44] Andrew K. Wright, Paul Kalv, Rodrick Sibery, Interoperability and Security for Converged Smart Grid Network,
Grid-Interop Forum, 2010. Fuente: http://www.gridwiseac.org/pdfs/forum_papers10/wrigth_gi10.pdf.
[45] Ivan Pepelnjak, Jim Guichard, MPLS and VPN Architectures, Cisco press, 2001.
[46] Octavio Salcedo, Luis F. Pedraza, Monica Espinosa, Evaluacion de las Redes MPLS/VPN/BGP con Rutas
Reflejadas, Revista Tecnura, Vol 16, No. 32, 2012, pp. 107-116.
[47] Ernesto Ariganello, Enrrique Barrientos Sevilla, Redes Cisco CCNP a Fondo, ISBN: 978-607-7854-79-1,
Alfaomega, 2010.
[48] Martha Odilia Tapasco Garcia, MPLS, El presente de las Redes IP, Universidad Tecnológica de Pereira, 2008.
Fuente: http://repositorio.utp.edu.co/dspace/bitstream/11059/1311/1/0046T172.pdf.
4. [49] Ana Maria Hospina Bolaños, Jackson Reina Alzate, BGP: Problemas y Perspectivas Locales, Ingenium,
Universidad de San Buenaventura, 2009.
[50] Yu Chen, Ajoy K. Datta, Sebastien Tixeuil, Stabilizing Inter-Domain Routing in the Internet, School of Computer
Science, Unversity of Nevada USA, LRI-CNRS UMR8626 and INRIA large, Université Paris France, 0926-
6801/05, 2005.
[51] Stefania Sesia, Issam Toufik, Matthew Baker, The UMTS Long Term Evolution from Theory to Practice,
Second Edition, Editorial Wiley, ISBN 978-0-470-66025-6, 2011. Disponible en:
http://www.aldraji.com/download/The_UMTS_Long_Term_EvolutionB.pdf.
[52] Ian F. Akyildiz, David M. Gutierrez-Estevez, Elias Chavarria Reyes, The Evolution to 4G Cellular Systems:
LTE-Advanced, Broadband Wireless Networking Laboratory, School of Electrical and Computer Engienieering,
Georgia Instutute of Technology, Atlanta, GA30332, USA, 2010.
[53] R. Ferrús, A. Gelonch, O. Sallent, J. Pérez Romero, Vertical Handover Support in Coordinated Heterogeneous
Radio Access Networks, Signal Theory and Communications Department, UPC Barcelona, 2005. Disponible en
http://grcm.tsc.upc.edu/sites/default/files/430.pdf.
[54] J. Korhonen, J. Soininen, K. Lisakkila, G. Bajko, IPv6 in 3rd Generation Partnership Project (3GPP) Evolved
Packet System, IETF 6459, ISSN: 2070-1721, 2012. Fuente: http://tools.ietf.org/html/rfc6459.
[55] Diego Fernando Rueda Pepinosa, Zoila Inés Ramos Rodríguez, Arquitectura Funcional para la
Implementación de Mobile IPTV sobre redes LTE y LTE-Advanced, Iteckne Vol.9 Número 2, ISSN 1692-1798,
2012. Disponible en http://revistas.ustabuca.edu.co/index.php/ITECKNE/article/view/81.
[56] Katsutshi Nishida, Itsuma Tanaka, Takashi Koshimizu, Basic SAE Management Technology for Realizing All-
IP Networks, NTT Docomo Technical Journal, Vol. 11, No. 3, 2009. Disponible en
http://www.nttdocomo.co.jp/english/binary/pdf/corporate/technology/rd/technical_journal/bn/vol11_3/vol11_3_004
en.pdf.
[57] Ishad Ahmad, 3GPP Long Term Evolution, School of Engineering , Design and Technology, University of
Bradford, 2011. Disponible en http://scholar.google.com/scholar?hl=es&q=3GPP+Long+Term+Evolution
&btnG=&lr=.
5. ANEXOS
ANEXO A
Anexo A1: Diseño de la VRF con sesiones BGP.
Figura A1. Diseño de la MPLS/VPN. Basado en [45] y [46].
Configuración del Router-PE Inicio:
Router PE INICIO
!
ip vrf SCADA CE
rd 1:27
route-target export 100:27
route-target mport 100:27
!
interface loopback0
ip address 10.2.1.2 255.255.255.0
!
interface serial 1/0
description **interface to SCADA CE**
ip vrf forwarding SCADA
ip address 195.12.2.5 255.255.255.255
!
router rip
version 2
!
address-family ipv4 vrf SCADA
version 2
redistribute bgp 1 metric 1
network 195.12.2.0
6. no auto-summary
exit-address-family
!
router bgp 1
no bgp default ipv4-unicast
neighbor 10.2.2.1 remote-as1
neighbor 10.2.2.1 update-source loopback0
neighbor 10.2.2.1 activate
!
address-family ipv4 vrf SCADA
redistribute rip metric 1
no auto-summary
no synchronization
exit-address-family
!
address-family vpnv4
neighbor 10.2.2.1 activate
neighbor 10.2.2.1 send-community extended
exit-address-family
Configuración del Router PE Final
Router PE INICIO
!
ip vrf LTE PGW
rd 1:26
route-target export 100:26
route-target mport 100:26
!
interface loopback1
ip address 10.2.2.2 255.255.255.0
!
interface serial 1/0
description **interface to LTE**
ip vrf forwarding LTE
ip address 196.7.25.5 255.255.255.255
!
router rip
version 2
!
address-family ipv4 vrf LTE
version 2
redistribute bgp 1 metric 1
network 196.7.25.0
no auto-summary
exit-address-family
!
router bgp 1
no bgp default ipv4-unicast
neighbor 10.2.1.1 remote-as1
7. neighbor 10.2.1.1 update-source loopback0
neighbor 10.2.1.1 activate
!
address-family ipv4 vrf SCADA
redistribute rip metric 1
no auto-summary
no synchronization
exit-address-family
!
address-family vpnv4
neighbor 10.2.1.1 activate
neighbor 10.2.1.1 send-community extended
exit-address-family
La configuración de los puertos MPLS y del Router P son mostrados con mayor detalle en los
capítulos de 2 al 5 del libro MPLS and VPN Architectures. En la siguiente tabla se muestra el
conjunto de instrucciones para configurar un router-P así como las interfaces de los router-PE
para la asignación de etiquetas, de igual manera en este libro se ilustran múltiples ejemplos
con el uso de las instrucciones relacionadas en la tabla, en un recorrido por los capítulos del
libro se muestra las instrucciones que permiten ver la asignación de etiquetas, los puntos
vecinos, los parámetros LDP, etc. Por tal motivo, la tabla A1 se ajunta como anexo con el fin
de mostrar este conjunto de instrucciones e incentivar la consulta del libro antes mencionado
a los lectores de este documento, con el fin de apoyar futuras investigacones y trabajos de
grado sobre redes MPLS, BGP y VPN.
8. Anexo A2: Conjunto de instrucciones usadas en la configuración de los router MPLS.
Tabla A2. Conjunto de instrucciones MPLS. Tomado de [45], Apéndice A, pp -336.
9. Anexo B1: Gestion y control de acceso de la red LTE.
Figura B1. Secuencia de enlace de radio para LTE. Tomado de [56]
10. Anexo B2: Los 15 procedimientos del plano de control para el diseño de toda la red.
Figura B2. Relación entre los 15 pasos de la Fig. B1 y las interfaces en CP. Elaborada por el Autor. Con base
en [55] y [56]