SlideShare a Scribd company logo
1 of 10
Download to read offline
BIBLIOGRAFIA
[1] Diego Darío Orjuela, Edwin León Martínez, Héctor Mauricio Sánchez, Análisis de la Migración de las Redes
Móviles Actuales Hacia las Redes Móviles de Siguiente Generación, 2010, pp 19-29. Fuente:
www.uniandes.edu.co.
[2] Camilo Bolaños Guerrero-CINTEL, Evolución de la Arquitectura UMTS. Fuente: www.interactic.org.co.
[3] Overview of 3GPP Release 10, 2012. Fuente: www.3gpp.org.
[4] Introduction to Evolved Packet Core. Fuente: http://lte.alcatellucent.com/locale/en_us/downloads/wp_evolved
_packet_core.pdf.
[5] www.ngmn.org, Consultada en junio 2011.
[6] Hemant Mathur, Study and Analysis of LTE Advanced Technology For 4G and Wireless Communication, 2012.
Fuente:
[7] Vamsi Krishna Gondi, Nazim Agoulmine, User and Network Management for Secure Interworking and Roaming
in WiMAX, 3G and WiFi Networks Using RII Architecture, UPGRADE Vol IX,2008. Fuente:
[8] Dilshad Mahjabeen, Anis Ahmed, Shahida Rafique, Use of LTE for the Interoperability between Different
Generations of Wireless Communication, 2011
[9] Saad Biaz, Nitin H. Vaidya, Is the Roundtrip Time Correlated with the Number of Packets in Flight?, 2003.
Fuente:
[10] Report ITU-R M.2134, Requirements Related to Technical performance for IMT-Advanced Radio Interfaces,
2008. Fuente: www.itu.com.
[11] Report ITU-R M.2135, Guidelines for Evaluation of Radio Interface Technologies for IMT-Advanced, 2008.
Fuente: www.itu.com.
[12] What is LTE eNB?, 2012. Fuente: http://www.artizanetworks.com/lte_tut_cpl_pro .html.
[13] Juho Lee, Jin-Kyu Han, Jianzhong, Zhang, MIMO technologies in 3GPP LTE and LTE-Advanced, 2009, Article
ID 302092. Fuente: http://www.ece.gatech.edu/ research/labs/bwn/ltea/papers/mimo-tech-lte.pdf.
[14] Farooq Khan, LTE for 4G Broadband Air Interface Technologies and Performance, Cambridge University,
ISBN-13 978-0-511-51666-5, 2009, pp 20 – 87.
[15] Bilal Sadiq, Ritesh Madan, Ashwin Sampath, Downlink Scheduling for Multiclass Traffic in LTE, 2009, Article
ID 510617. Fuente: http://junction.stanford.edu/~rkmadan/ eurasip_lte.pdf.
[16] Francesco Davide Calabrese, Scheduling and Link Adaptation for Uplink SC-FDMA Systems A LTE Case
Study, Science and Medicine of Aalborg University, 2009, pp. 119-121. Fuente:
http://vbn.aau.dk/files/19156393/PhD_Thesis_FrancescoDavide Calabrese_final_print.pdf.
[17] Jose Fernando Restrepo, Acceso Multiple por Division de Frecuencia Ortogonal, Cap. 1, pp. 17 -19. Fuente:
http://www.bdigital.unal.edu.co/4836/8/josefernandores trepopiedrahita.2011.parte4.pdf.
[18] Juan Jesús Sánchez Sánchez, Analysis of SC-FDMA and OFDMA Performance over Fading Channels,
Universidad de Malaga, 2011, pp. 5 -14. Fuente:
http://riuma.uma.es/xmlui/bitstream/handle/10630/4689/ANALYSIS%20OF%20SC%20FDMA.pdf?sequence=1
[19] Jonas Hansryd, Per-Erik Eriksson, High Speed Mobile Backhaul Demonstrators, Ericsson, 2009. Fuente:
http://www.ericsson.com/ericsson/corpinfo/publications/review /2009_02/files/Backhaul.pdf.
[20] Ra Jesh Chundury, Mobile Broadband Backhaul: Addressing the Challenge, Ericsson, 2008. Fuente:
http://www.ericsson.com/ericsson/corpinfo/publications/review/ 2008_03/files/Backhaul.pdf.
[21] Xixia, Evolved Packet Core Testing, White Paper, 2010. Fuente:
http://www.ixiacom.com/pdfs/library/white_papers/epc_testing_wp.pdf. Recuperado el
[22] Alcatel-Lucent, The LTE Network Architecture, 2009. Fuente: www.alcatel-lucent.com/.
[23] 3GPP, ETSI 136 410 V 10.0.1, Technical Specification, 2011, pp 9-12. Fuente:
http://www.etsi.org/deliver/etsi_ts/136400_136499/136410/10.00.01_60/ts_136410v100001p.pdf.
[24] 3GPP TS 36.300 V 8.3.0, Technical Specification, 2007, pp 17-25. Fuente:
http://www.quintillion.co.jp/3GPP/Specs/36300-830.pdf.
[25] 3GPP TS 36.413 V 8.9.0, Technical Spesification, 2010, pp 48-58. Fuente:
http://www.quintillion.co.jp/3GPP/Specs/36413-890.pdf.
[26] Irfan Ali, Alessio Casati, kuntal Chowdhury, Networks-Based Mobility Management in the Evolved 3GPP Core
Network, IEEE Communications Magazine, 2009. Fuente:
http://ants.iis.sinica.edu.tw/3BkMJ9lTeWXTSrrvNoKNFDxRm3zFwRR/ 19/09MCOM-
Networkbased%20mobility%20management%20in%20the%20evolved% 203GPP%20core.pdf.
[27] Keith Stoulfer, Joe Falco, Karen Kent, Guide to Supervisory Control and Data Acquisition (SCADA) and
Industrial Control Systems Security, NIST, 2006, pp 2-1 a 2-13. Fuente:
http://www.cyber.st.dhs.gov/docs/NIST%20Guide%20to%20Supervisory%20and%20Data%20Acquisition-
SCADA%20and%20Industrial%20Control%20Systems%20Security%20(2007).pdf.
[28] Gregory M. Coates, Kenneth M. Hopkinson, Scott R. Graham, ATrust System Architecture for SCADA Network
Security, IEEE, 2010. Fuente:
http://ieeexplore.ieee.org/xpl/login.jsp?tp=&arnumber=5350402&url=http%3A%2F%2Fieeexplore.ieee.org%2Fxp
ls%2Fabs_all.jsp%3Farnumber%3D5350402.
[29] Cristina Alcaraz, Rodrigo Román, Pablo Najera, Javier Lopez, Acceso Seguro a Redes de Sensores en
SCADA a través de Internet, Universidad de Málaga, 2010. Fuente:
http://www.nics.uma.es/sites/default/files/AlcarazRomanNajeraLopez2010.pdf.
[30] Sungjin Lee, Donghyun Choi, Choonsik Park, and Seungjoo Kim, An Efficient Key Management Scheme for
Secure SCADA Communication, World Academy of Science, Engineering and Technology, 2008. Fuente:
http://www.psu.edu/.
[31] Gregory M. Coates, Kenneth M. Hopkinson, Scott R. Graham, Collaborative, Trust-Based Security
Mechanisms for a Regional Utility Intranet, IEEE Transactions of Power Systems, Vol. 23, 2008. Fuente:
[32] Samuel East, Jonathan Butts, Mauricio Papa and Sujeet Shenoi, A Taxonomy of Attacks on the DNP3
Protocol, Critical Infrastructure Protection III, IFIP AICT 311, IFIP, 2009. Fuente: https://scada-
dnp3.googlecode.com/files/East2009.pdf.
[33] Sugwon Hong, Il Hyung Lim, Myeon-Song Choi, Seung-Jae Lee, Chang Hoon Shin, Sung Woo Lee, Bok Nam
Ha, Evolution of Communications Networks for Distribution Automation System in Korea, 2006. Fuente:
http://ants.mju.ac.kr/public ation/APAP2007.pdf.
[34] Paulo Sérgio Motta Pires, Luiz Affonso H. Guedes de Oliveira, Diogo Nascimento Barros, Aspectos de
Segurança em Sistemas SCADA uma Visão Geral, Universidade Federal do Rio Grande do Norte, 2004. Fuente:
http://www.dca.ufrn.br/~affonso/FTP/artigos/2004/isa_scada_2004.pdf
[35] Kenneth C Wilberg, Identifying Supervisory Control and Data Acquisition (SCADA) Systems on a Network Via
Remote Reconnaissance, Naval Postgraduate School, 2006, pp. 22. Fuente:
http://calhoun.nps.edu/public/bitstream/handle /10945/2527/06Sep_Wiberg.pdf?sequence=1.
[36] Bonnie Zhu, Shankar Sastry, SCADA-Specific Intrusion Detection/Prevention Systems: A Survey and
Taxonomy, 2010 Fuente: http://www.cse.psu.edu/~smclaugh/ cse598e-f11/papers/zhu.pdf.
[37] Raúl Siles Peláez, Analisis de Seguridad de la Familia de Protocolos TCP/IP y sus Servicios Asociados, 2002.
Fuente: http://es.tldp.org/Manuales-LuCAS/doc-seguridad-tcpip/Seguridad_en_TCP-IP_Ed1.pdf.
[38] Garrett Leischner and David Whitehead, A View Through the Hacker’s Looking Glass, Schweitzer Engineering
Laboratories Inc, 2006. Fuente: www.selinc.com.
[39] Sugwon Hong, Myongho Lee, Challenges and Direction Toward Secure Communication in the SCADA
System, Dept. of Computer Science and Engineering, Myongji University, Yongin Korea, 978-0-7695-4041-2/10,
2010. Fuente: http://yenol.net/publication/4041a381.pdf.
[40] ABB, IEC 61850 Communication Protocol Manual, Version 1.1, 2011. pp – 19. Fuente:
http://www05.abb.com/global/scot/scot354.nsf/veritydisplay/fe4d2c659c6ccad2c125783a00454ae3/$file/1MRK5
11242-UEN_-_en_Communication_protocol_manual__IEC_61850__650_series__IEC.pdf.
[41] Samuel East, Jonathan Butts, Mauricio Papa y Sujeet Shenoi, Critical Infrastructure Protection III, Cap 5 A
Taxonomy of Attacks on the DNP3 Protocol, IFIP AICT 311, 2009 pp 68-73. Disponible en:
http://link.springer.com/chapter/10.1007%2F978-3-642-04798-5_5?LI=true.
[42] Cisco CGS 2520 Software Configuration Guide, Chapter 5 Configuring MODBUS TCP. Disponible en:
http://www.cisco.com/en/US/docs/switches/connectedgrid/cgs2520/software/release/12_2_53_ex/configuration/g
uide/swmodbus.pdf.
[43] Gordon Clarke, Deon Reynders, Practical Modern SCADA Protocols: DNP3, 60870.5 and Related Systems,
Editorial Elsevier, 2004, Cap 3 y 4. pp- 63 – 72.
[44] Andrew K. Wright, Paul Kalv, Rodrick Sibery, Interoperability and Security for Converged Smart Grid Network,
Grid-Interop Forum, 2010. Fuente: http://www.gridwiseac.org/pdfs/forum_papers10/wrigth_gi10.pdf.
[45] Ivan Pepelnjak, Jim Guichard, MPLS and VPN Architectures, Cisco press, 2001.
[46] Octavio Salcedo, Luis F. Pedraza, Monica Espinosa, Evaluacion de las Redes MPLS/VPN/BGP con Rutas
Reflejadas, Revista Tecnura, Vol 16, No. 32, 2012, pp. 107-116.
[47] Ernesto Ariganello, Enrrique Barrientos Sevilla, Redes Cisco CCNP a Fondo, ISBN: 978-607-7854-79-1,
Alfaomega, 2010.
[48] Martha Odilia Tapasco Garcia, MPLS, El presente de las Redes IP, Universidad Tecnológica de Pereira, 2008.
Fuente: http://repositorio.utp.edu.co/dspace/bitstream/11059/1311/1/0046T172.pdf.
[49] Ana Maria Hospina Bolaños, Jackson Reina Alzate, BGP: Problemas y Perspectivas Locales, Ingenium,
Universidad de San Buenaventura, 2009.
[50] Yu Chen, Ajoy K. Datta, Sebastien Tixeuil, Stabilizing Inter-Domain Routing in the Internet, School of Computer
Science, Unversity of Nevada USA, LRI-CNRS UMR8626 and INRIA large, Université Paris France, 0926-
6801/05, 2005.
[51] Stefania Sesia, Issam Toufik, Matthew Baker, The UMTS Long Term Evolution from Theory to Practice,
Second Edition, Editorial Wiley, ISBN 978-0-470-66025-6, 2011. Disponible en:
http://www.aldraji.com/download/The_UMTS_Long_Term_EvolutionB.pdf.
[52] Ian F. Akyildiz, David M. Gutierrez-Estevez, Elias Chavarria Reyes, The Evolution to 4G Cellular Systems:
LTE-Advanced, Broadband Wireless Networking Laboratory, School of Electrical and Computer Engienieering,
Georgia Instutute of Technology, Atlanta, GA30332, USA, 2010.
[53] R. Ferrús, A. Gelonch, O. Sallent, J. Pérez Romero, Vertical Handover Support in Coordinated Heterogeneous
Radio Access Networks, Signal Theory and Communications Department, UPC Barcelona, 2005. Disponible en
http://grcm.tsc.upc.edu/sites/default/files/430.pdf.
[54] J. Korhonen, J. Soininen, K. Lisakkila, G. Bajko, IPv6 in 3rd Generation Partnership Project (3GPP) Evolved
Packet System, IETF 6459, ISSN: 2070-1721, 2012. Fuente: http://tools.ietf.org/html/rfc6459.
[55] Diego Fernando Rueda Pepinosa, Zoila Inés Ramos Rodríguez, Arquitectura Funcional para la
Implementación de Mobile IPTV sobre redes LTE y LTE-Advanced, Iteckne Vol.9 Número 2, ISSN 1692-1798,
2012. Disponible en http://revistas.ustabuca.edu.co/index.php/ITECKNE/article/view/81.
[56] Katsutshi Nishida, Itsuma Tanaka, Takashi Koshimizu, Basic SAE Management Technology for Realizing All-
IP Networks, NTT Docomo Technical Journal, Vol. 11, No. 3, 2009. Disponible en
http://www.nttdocomo.co.jp/english/binary/pdf/corporate/technology/rd/technical_journal/bn/vol11_3/vol11_3_004
en.pdf.
[57] Ishad Ahmad, 3GPP Long Term Evolution, School of Engineering , Design and Technology, University of
Bradford, 2011. Disponible en http://scholar.google.com/scholar?hl=es&q=3GPP+Long+Term+Evolution
&btnG=&lr=.
ANEXOS
ANEXO A
Anexo A1: Diseño de la VRF con sesiones BGP.
Figura A1. Diseño de la MPLS/VPN. Basado en [45] y [46].
Configuración del Router-PE Inicio:
Router PE INICIO
!
ip vrf SCADA CE
rd 1:27
route-target export 100:27
route-target mport 100:27
!
interface loopback0
ip address 10.2.1.2 255.255.255.0
!
interface serial 1/0
description **interface to SCADA CE**
ip vrf forwarding SCADA
ip address 195.12.2.5 255.255.255.255
!
router rip
version 2
!
address-family ipv4 vrf SCADA
version 2
redistribute bgp 1 metric 1
network 195.12.2.0
no auto-summary
exit-address-family
!
router bgp 1
no bgp default ipv4-unicast
neighbor 10.2.2.1 remote-as1
neighbor 10.2.2.1 update-source loopback0
neighbor 10.2.2.1 activate
!
address-family ipv4 vrf SCADA
redistribute rip metric 1
no auto-summary
no synchronization
exit-address-family
!
address-family vpnv4
neighbor 10.2.2.1 activate
neighbor 10.2.2.1 send-community extended
exit-address-family
Configuración del Router PE Final
Router PE INICIO
!
ip vrf LTE PGW
rd 1:26
route-target export 100:26
route-target mport 100:26
!
interface loopback1
ip address 10.2.2.2 255.255.255.0
!
interface serial 1/0
description **interface to LTE**
ip vrf forwarding LTE
ip address 196.7.25.5 255.255.255.255
!
router rip
version 2
!
address-family ipv4 vrf LTE
version 2
redistribute bgp 1 metric 1
network 196.7.25.0
no auto-summary
exit-address-family
!
router bgp 1
no bgp default ipv4-unicast
neighbor 10.2.1.1 remote-as1
neighbor 10.2.1.1 update-source loopback0
neighbor 10.2.1.1 activate
!
address-family ipv4 vrf SCADA
redistribute rip metric 1
no auto-summary
no synchronization
exit-address-family
!
address-family vpnv4
neighbor 10.2.1.1 activate
neighbor 10.2.1.1 send-community extended
exit-address-family
La configuración de los puertos MPLS y del Router P son mostrados con mayor detalle en los
capítulos de 2 al 5 del libro MPLS and VPN Architectures. En la siguiente tabla se muestra el
conjunto de instrucciones para configurar un router-P así como las interfaces de los router-PE
para la asignación de etiquetas, de igual manera en este libro se ilustran múltiples ejemplos
con el uso de las instrucciones relacionadas en la tabla, en un recorrido por los capítulos del
libro se muestra las instrucciones que permiten ver la asignación de etiquetas, los puntos
vecinos, los parámetros LDP, etc. Por tal motivo, la tabla A1 se ajunta como anexo con el fin
de mostrar este conjunto de instrucciones e incentivar la consulta del libro antes mencionado
a los lectores de este documento, con el fin de apoyar futuras investigacones y trabajos de
grado sobre redes MPLS, BGP y VPN.
Anexo A2: Conjunto de instrucciones usadas en la configuración de los router MPLS.
Tabla A2. Conjunto de instrucciones MPLS. Tomado de [45], Apéndice A, pp -336.
Anexo B1: Gestion y control de acceso de la red LTE.
Figura B1. Secuencia de enlace de radio para LTE. Tomado de [56]
Anexo B2: Los 15 procedimientos del plano de control para el diseño de toda la red.
Figura B2. Relación entre los 15 pasos de la Fig. B1 y las interfaces en CP. Elaborada por el Autor. Con base
en [55] y [56]

More Related Content

Similar to Tercera parte

March 2023: Top 10 Read Articles in Network Security and Its Applications
March 2023: Top 10 Read Articles in Network Security and Its ApplicationsMarch 2023: Top 10 Read Articles in Network Security and Its Applications
March 2023: Top 10 Read Articles in Network Security and Its ApplicationsIJNSA Journal
 
December 2023 - Top 10 Read Articles in Network Security & Its Applications
December 2023 - Top 10 Read Articles in Network Security & Its ApplicationsDecember 2023 - Top 10 Read Articles in Network Security & Its Applications
December 2023 - Top 10 Read Articles in Network Security & Its ApplicationsIJNSA Journal
 
June 2023: Top 10 Read Articles in Network Security and Its Applications
June 2023: Top 10 Read Articles in Network Security and Its ApplicationsJune 2023: Top 10 Read Articles in Network Security and Its Applications
June 2023: Top 10 Read Articles in Network Security and Its ApplicationsIJNSA Journal
 
June 2022: Top 10 Read Articles in Network Security and Its Applications
June 2022: Top 10 Read Articles in Network Security and Its ApplicationsJune 2022: Top 10 Read Articles in Network Security and Its Applications
June 2022: Top 10 Read Articles in Network Security and Its ApplicationsIJNSA Journal
 
April 2023: Top 10 Read Articles in Network Security and Its Applications
 April 2023: Top 10 Read Articles in Network Security and Its Applications April 2023: Top 10 Read Articles in Network Security and Its Applications
April 2023: Top 10 Read Articles in Network Security and Its ApplicationsIJNSA Journal
 
May 2023: Top 10 Read Articles in Network Security and Its Applications
May 2023: Top 10 Read Articles in Network Security and Its ApplicationsMay 2023: Top 10 Read Articles in Network Security and Its Applications
May 2023: Top 10 Read Articles in Network Security and Its ApplicationsIJNSA Journal
 
March 2022 - Top 10 Read Articles in Network Security and Its Applications
March 2022 - Top 10 Read Articles in Network Security and Its ApplicationsMarch 2022 - Top 10 Read Articles in Network Security and Its Applications
March 2022 - Top 10 Read Articles in Network Security and Its ApplicationsIJNSA Journal
 
January 2023: Top 10 Read Articles in Network Security and Its Applications
January 2023: Top 10 Read Articles in Network Security and Its ApplicationsJanuary 2023: Top 10 Read Articles in Network Security and Its Applications
January 2023: Top 10 Read Articles in Network Security and Its ApplicationsIJNSA Journal
 
November 2023 - Top 10 Read Articles in Network Security & Its Applications
November 2023 - Top 10 Read Articles in Network Security & Its ApplicationsNovember 2023 - Top 10 Read Articles in Network Security & Its Applications
November 2023 - Top 10 Read Articles in Network Security & Its ApplicationsIJNSA Journal
 
May 2022: Top 10 Read Articles in Network Security and Its Applications
May 2022: Top 10 Read Articles in Network Security and Its ApplicationsMay 2022: Top 10 Read Articles in Network Security and Its Applications
May 2022: Top 10 Read Articles in Network Security and Its ApplicationsIJNSA Journal
 
October 2023 - Top 10 Read Articles in Network Security & Its Applications.pdf
October 2023 - Top 10 Read Articles in Network Security & Its Applications.pdfOctober 2023 - Top 10 Read Articles in Network Security & Its Applications.pdf
October 2023 - Top 10 Read Articles in Network Security & Its Applications.pdfIJNSA Journal
 
September 2022: Top 10 Read Articles in Network Security & Its Applications
September 2022: Top 10 Read Articles in Network Security & Its ApplicationsSeptember 2022: Top 10 Read Articles in Network Security & Its Applications
September 2022: Top 10 Read Articles in Network Security & Its ApplicationsIJNSA Journal
 
February 2024 - Top 10 Read Articles in Network Security & Its Applications
February 2024 - Top 10 Read Articles in Network Security & Its ApplicationsFebruary 2024 - Top 10 Read Articles in Network Security & Its Applications
February 2024 - Top 10 Read Articles in Network Security & Its ApplicationsIJNSA Journal
 
March 2024 - Top 10 Read Articles in Network Security & Its Applications
March 2024 - Top 10 Read Articles in Network Security & Its ApplicationsMarch 2024 - Top 10 Read Articles in Network Security & Its Applications
March 2024 - Top 10 Read Articles in Network Security & Its ApplicationsIJNSA Journal
 
February 2023: Top 10 Read Articles in Network Security and Its Applications
February 2023: Top 10 Read Articles in Network Security and Its ApplicationsFebruary 2023: Top 10 Read Articles in Network Security and Its Applications
February 2023: Top 10 Read Articles in Network Security and Its ApplicationsIJNSA Journal
 
January 2024 - Top 10 Read Articles in Network Security & Its Applications
January 2024 - Top 10 Read Articles in Network Security & Its ApplicationsJanuary 2024 - Top 10 Read Articles in Network Security & Its Applications
January 2024 - Top 10 Read Articles in Network Security & Its ApplicationsIJNSA Journal
 
October 2022: Top 10 Read Articles in Network Security & Its Applications
October 2022: Top 10 Read Articles in Network Security & Its ApplicationsOctober 2022: Top 10 Read Articles in Network Security & Its Applications
October 2022: Top 10 Read Articles in Network Security & Its ApplicationsIJNSA Journal
 
November 2022: Top 10 Read Articles in Network Security and Its Applications
November 2022: Top 10 Read Articles in Network Security and Its ApplicationsNovember 2022: Top 10 Read Articles in Network Security and Its Applications
November 2022: Top 10 Read Articles in Network Security and Its ApplicationsIJNSA Journal
 
July 2022 - Top 10 Read Articles in Network Security & Its Applications
July 2022 - Top 10 Read Articles in Network Security & Its ApplicationsJuly 2022 - Top 10 Read Articles in Network Security & Its Applications
July 2022 - Top 10 Read Articles in Network Security & Its ApplicationsIJNSA Journal
 
December 2022: Top 10 Read Articles in Network Security and Its Applications
December 2022: Top 10 Read Articles in Network Security and Its ApplicationsDecember 2022: Top 10 Read Articles in Network Security and Its Applications
December 2022: Top 10 Read Articles in Network Security and Its ApplicationsIJNSA Journal
 

Similar to Tercera parte (20)

March 2023: Top 10 Read Articles in Network Security and Its Applications
March 2023: Top 10 Read Articles in Network Security and Its ApplicationsMarch 2023: Top 10 Read Articles in Network Security and Its Applications
March 2023: Top 10 Read Articles in Network Security and Its Applications
 
December 2023 - Top 10 Read Articles in Network Security & Its Applications
December 2023 - Top 10 Read Articles in Network Security & Its ApplicationsDecember 2023 - Top 10 Read Articles in Network Security & Its Applications
December 2023 - Top 10 Read Articles in Network Security & Its Applications
 
June 2023: Top 10 Read Articles in Network Security and Its Applications
June 2023: Top 10 Read Articles in Network Security and Its ApplicationsJune 2023: Top 10 Read Articles in Network Security and Its Applications
June 2023: Top 10 Read Articles in Network Security and Its Applications
 
June 2022: Top 10 Read Articles in Network Security and Its Applications
June 2022: Top 10 Read Articles in Network Security and Its ApplicationsJune 2022: Top 10 Read Articles in Network Security and Its Applications
June 2022: Top 10 Read Articles in Network Security and Its Applications
 
April 2023: Top 10 Read Articles in Network Security and Its Applications
 April 2023: Top 10 Read Articles in Network Security and Its Applications April 2023: Top 10 Read Articles in Network Security and Its Applications
April 2023: Top 10 Read Articles in Network Security and Its Applications
 
May 2023: Top 10 Read Articles in Network Security and Its Applications
May 2023: Top 10 Read Articles in Network Security and Its ApplicationsMay 2023: Top 10 Read Articles in Network Security and Its Applications
May 2023: Top 10 Read Articles in Network Security and Its Applications
 
March 2022 - Top 10 Read Articles in Network Security and Its Applications
March 2022 - Top 10 Read Articles in Network Security and Its ApplicationsMarch 2022 - Top 10 Read Articles in Network Security and Its Applications
March 2022 - Top 10 Read Articles in Network Security and Its Applications
 
January 2023: Top 10 Read Articles in Network Security and Its Applications
January 2023: Top 10 Read Articles in Network Security and Its ApplicationsJanuary 2023: Top 10 Read Articles in Network Security and Its Applications
January 2023: Top 10 Read Articles in Network Security and Its Applications
 
November 2023 - Top 10 Read Articles in Network Security & Its Applications
November 2023 - Top 10 Read Articles in Network Security & Its ApplicationsNovember 2023 - Top 10 Read Articles in Network Security & Its Applications
November 2023 - Top 10 Read Articles in Network Security & Its Applications
 
May 2022: Top 10 Read Articles in Network Security and Its Applications
May 2022: Top 10 Read Articles in Network Security and Its ApplicationsMay 2022: Top 10 Read Articles in Network Security and Its Applications
May 2022: Top 10 Read Articles in Network Security and Its Applications
 
October 2023 - Top 10 Read Articles in Network Security & Its Applications.pdf
October 2023 - Top 10 Read Articles in Network Security & Its Applications.pdfOctober 2023 - Top 10 Read Articles in Network Security & Its Applications.pdf
October 2023 - Top 10 Read Articles in Network Security & Its Applications.pdf
 
September 2022: Top 10 Read Articles in Network Security & Its Applications
September 2022: Top 10 Read Articles in Network Security & Its ApplicationsSeptember 2022: Top 10 Read Articles in Network Security & Its Applications
September 2022: Top 10 Read Articles in Network Security & Its Applications
 
February 2024 - Top 10 Read Articles in Network Security & Its Applications
February 2024 - Top 10 Read Articles in Network Security & Its ApplicationsFebruary 2024 - Top 10 Read Articles in Network Security & Its Applications
February 2024 - Top 10 Read Articles in Network Security & Its Applications
 
March 2024 - Top 10 Read Articles in Network Security & Its Applications
March 2024 - Top 10 Read Articles in Network Security & Its ApplicationsMarch 2024 - Top 10 Read Articles in Network Security & Its Applications
March 2024 - Top 10 Read Articles in Network Security & Its Applications
 
February 2023: Top 10 Read Articles in Network Security and Its Applications
February 2023: Top 10 Read Articles in Network Security and Its ApplicationsFebruary 2023: Top 10 Read Articles in Network Security and Its Applications
February 2023: Top 10 Read Articles in Network Security and Its Applications
 
January 2024 - Top 10 Read Articles in Network Security & Its Applications
January 2024 - Top 10 Read Articles in Network Security & Its ApplicationsJanuary 2024 - Top 10 Read Articles in Network Security & Its Applications
January 2024 - Top 10 Read Articles in Network Security & Its Applications
 
October 2022: Top 10 Read Articles in Network Security & Its Applications
October 2022: Top 10 Read Articles in Network Security & Its ApplicationsOctober 2022: Top 10 Read Articles in Network Security & Its Applications
October 2022: Top 10 Read Articles in Network Security & Its Applications
 
November 2022: Top 10 Read Articles in Network Security and Its Applications
November 2022: Top 10 Read Articles in Network Security and Its ApplicationsNovember 2022: Top 10 Read Articles in Network Security and Its Applications
November 2022: Top 10 Read Articles in Network Security and Its Applications
 
July 2022 - Top 10 Read Articles in Network Security & Its Applications
July 2022 - Top 10 Read Articles in Network Security & Its ApplicationsJuly 2022 - Top 10 Read Articles in Network Security & Its Applications
July 2022 - Top 10 Read Articles in Network Security & Its Applications
 
December 2022: Top 10 Read Articles in Network Security and Its Applications
December 2022: Top 10 Read Articles in Network Security and Its ApplicationsDecember 2022: Top 10 Read Articles in Network Security and Its Applications
December 2022: Top 10 Read Articles in Network Security and Its Applications
 

More from Camilo Andrés Ortiz Daza

More from Camilo Andrés Ortiz Daza (7)

Estimación de los equilibrios
Estimación de los equilibriosEstimación de los equilibrios
Estimación de los equilibrios
 
Segunda parte
Segunda parteSegunda parte
Segunda parte
 
Derivadas de funciones trigonométricas inversas
Derivadas de funciones trigonométricas inversasDerivadas de funciones trigonométricas inversas
Derivadas de funciones trigonométricas inversas
 
Forma alternativa de la derivada y notación de
Forma alternativa de la derivada y notación deForma alternativa de la derivada y notación de
Forma alternativa de la derivada y notación de
 
Notas sobre derivadas
Notas sobre derivadasNotas sobre derivadas
Notas sobre derivadas
 
Números complejos y formula de euler
Números complejos y formula de eulerNúmeros complejos y formula de euler
Números complejos y formula de euler
 
Software Educativo para Enseñar a Derivar SEED
Software Educativo para Enseñar a Derivar SEEDSoftware Educativo para Enseñar a Derivar SEED
Software Educativo para Enseñar a Derivar SEED
 

Recently uploaded

College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCollege Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCall Girls in Nagpur High Profile
 
What are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxWhat are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxwendy cai
 
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube ExchangerStudy on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube ExchangerAnamika Sarkar
 
power system scada applications and uses
power system scada applications and usespower system scada applications and uses
power system scada applications and usesDevarapalliHaritha
 
Heart Disease Prediction using machine learning.pptx
Heart Disease Prediction using machine learning.pptxHeart Disease Prediction using machine learning.pptx
Heart Disease Prediction using machine learning.pptxPoojaBan
 
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...srsj9000
 
Microscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxMicroscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxpurnimasatapathy1234
 
Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...VICTOR MAESTRE RAMIREZ
 
Introduction to Microprocesso programming and interfacing.pptx
Introduction to Microprocesso programming and interfacing.pptxIntroduction to Microprocesso programming and interfacing.pptx
Introduction to Microprocesso programming and interfacing.pptxvipinkmenon1
 
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSAPPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSKurinjimalarL3
 
Application of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptxApplication of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptx959SahilShah
 
Artificial-Intelligence-in-Electronics (K).pptx
Artificial-Intelligence-in-Electronics (K).pptxArtificial-Intelligence-in-Electronics (K).pptx
Artificial-Intelligence-in-Electronics (K).pptxbritheesh05
 
Sachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective IntroductionSachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective IntroductionDr.Costas Sachpazis
 
Past, Present and Future of Generative AI
Past, Present and Future of Generative AIPast, Present and Future of Generative AI
Past, Present and Future of Generative AIabhishek36461
 
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escortsranjana rawat
 
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxDecoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxJoão Esperancinha
 
Call Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile serviceCall Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile servicerehmti665
 
Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024hassan khalil
 
Call Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call GirlsCall Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call Girlsssuser7cb4ff
 

Recently uploaded (20)

College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCollege Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
 
What are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxWhat are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptx
 
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube ExchangerStudy on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
 
power system scada applications and uses
power system scada applications and usespower system scada applications and uses
power system scada applications and uses
 
Heart Disease Prediction using machine learning.pptx
Heart Disease Prediction using machine learning.pptxHeart Disease Prediction using machine learning.pptx
Heart Disease Prediction using machine learning.pptx
 
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
 
Microscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxMicroscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptx
 
Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...
 
Introduction to Microprocesso programming and interfacing.pptx
Introduction to Microprocesso programming and interfacing.pptxIntroduction to Microprocesso programming and interfacing.pptx
Introduction to Microprocesso programming and interfacing.pptx
 
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSAPPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
 
Application of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptxApplication of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptx
 
Artificial-Intelligence-in-Electronics (K).pptx
Artificial-Intelligence-in-Electronics (K).pptxArtificial-Intelligence-in-Electronics (K).pptx
Artificial-Intelligence-in-Electronics (K).pptx
 
Sachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective IntroductionSachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
 
Past, Present and Future of Generative AI
Past, Present and Future of Generative AIPast, Present and Future of Generative AI
Past, Present and Future of Generative AI
 
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
 
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxDecoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
 
Call Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile serviceCall Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile service
 
young call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Service
young call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Serviceyoung call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Service
young call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Service
 
Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024
 
Call Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call GirlsCall Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call Girls
 

Tercera parte

  • 1. BIBLIOGRAFIA [1] Diego Darío Orjuela, Edwin León Martínez, Héctor Mauricio Sánchez, Análisis de la Migración de las Redes Móviles Actuales Hacia las Redes Móviles de Siguiente Generación, 2010, pp 19-29. Fuente: www.uniandes.edu.co. [2] Camilo Bolaños Guerrero-CINTEL, Evolución de la Arquitectura UMTS. Fuente: www.interactic.org.co. [3] Overview of 3GPP Release 10, 2012. Fuente: www.3gpp.org. [4] Introduction to Evolved Packet Core. Fuente: http://lte.alcatellucent.com/locale/en_us/downloads/wp_evolved _packet_core.pdf. [5] www.ngmn.org, Consultada en junio 2011. [6] Hemant Mathur, Study and Analysis of LTE Advanced Technology For 4G and Wireless Communication, 2012. Fuente: [7] Vamsi Krishna Gondi, Nazim Agoulmine, User and Network Management for Secure Interworking and Roaming in WiMAX, 3G and WiFi Networks Using RII Architecture, UPGRADE Vol IX,2008. Fuente: [8] Dilshad Mahjabeen, Anis Ahmed, Shahida Rafique, Use of LTE for the Interoperability between Different Generations of Wireless Communication, 2011 [9] Saad Biaz, Nitin H. Vaidya, Is the Roundtrip Time Correlated with the Number of Packets in Flight?, 2003. Fuente: [10] Report ITU-R M.2134, Requirements Related to Technical performance for IMT-Advanced Radio Interfaces, 2008. Fuente: www.itu.com. [11] Report ITU-R M.2135, Guidelines for Evaluation of Radio Interface Technologies for IMT-Advanced, 2008. Fuente: www.itu.com. [12] What is LTE eNB?, 2012. Fuente: http://www.artizanetworks.com/lte_tut_cpl_pro .html. [13] Juho Lee, Jin-Kyu Han, Jianzhong, Zhang, MIMO technologies in 3GPP LTE and LTE-Advanced, 2009, Article ID 302092. Fuente: http://www.ece.gatech.edu/ research/labs/bwn/ltea/papers/mimo-tech-lte.pdf. [14] Farooq Khan, LTE for 4G Broadband Air Interface Technologies and Performance, Cambridge University, ISBN-13 978-0-511-51666-5, 2009, pp 20 – 87. [15] Bilal Sadiq, Ritesh Madan, Ashwin Sampath, Downlink Scheduling for Multiclass Traffic in LTE, 2009, Article ID 510617. Fuente: http://junction.stanford.edu/~rkmadan/ eurasip_lte.pdf. [16] Francesco Davide Calabrese, Scheduling and Link Adaptation for Uplink SC-FDMA Systems A LTE Case Study, Science and Medicine of Aalborg University, 2009, pp. 119-121. Fuente: http://vbn.aau.dk/files/19156393/PhD_Thesis_FrancescoDavide Calabrese_final_print.pdf. [17] Jose Fernando Restrepo, Acceso Multiple por Division de Frecuencia Ortogonal, Cap. 1, pp. 17 -19. Fuente: http://www.bdigital.unal.edu.co/4836/8/josefernandores trepopiedrahita.2011.parte4.pdf. [18] Juan Jesús Sánchez Sánchez, Analysis of SC-FDMA and OFDMA Performance over Fading Channels,
  • 2. Universidad de Malaga, 2011, pp. 5 -14. Fuente: http://riuma.uma.es/xmlui/bitstream/handle/10630/4689/ANALYSIS%20OF%20SC%20FDMA.pdf?sequence=1 [19] Jonas Hansryd, Per-Erik Eriksson, High Speed Mobile Backhaul Demonstrators, Ericsson, 2009. Fuente: http://www.ericsson.com/ericsson/corpinfo/publications/review /2009_02/files/Backhaul.pdf. [20] Ra Jesh Chundury, Mobile Broadband Backhaul: Addressing the Challenge, Ericsson, 2008. Fuente: http://www.ericsson.com/ericsson/corpinfo/publications/review/ 2008_03/files/Backhaul.pdf. [21] Xixia, Evolved Packet Core Testing, White Paper, 2010. Fuente: http://www.ixiacom.com/pdfs/library/white_papers/epc_testing_wp.pdf. Recuperado el [22] Alcatel-Lucent, The LTE Network Architecture, 2009. Fuente: www.alcatel-lucent.com/. [23] 3GPP, ETSI 136 410 V 10.0.1, Technical Specification, 2011, pp 9-12. Fuente: http://www.etsi.org/deliver/etsi_ts/136400_136499/136410/10.00.01_60/ts_136410v100001p.pdf. [24] 3GPP TS 36.300 V 8.3.0, Technical Specification, 2007, pp 17-25. Fuente: http://www.quintillion.co.jp/3GPP/Specs/36300-830.pdf. [25] 3GPP TS 36.413 V 8.9.0, Technical Spesification, 2010, pp 48-58. Fuente: http://www.quintillion.co.jp/3GPP/Specs/36413-890.pdf. [26] Irfan Ali, Alessio Casati, kuntal Chowdhury, Networks-Based Mobility Management in the Evolved 3GPP Core Network, IEEE Communications Magazine, 2009. Fuente: http://ants.iis.sinica.edu.tw/3BkMJ9lTeWXTSrrvNoKNFDxRm3zFwRR/ 19/09MCOM- Networkbased%20mobility%20management%20in%20the%20evolved% 203GPP%20core.pdf. [27] Keith Stoulfer, Joe Falco, Karen Kent, Guide to Supervisory Control and Data Acquisition (SCADA) and Industrial Control Systems Security, NIST, 2006, pp 2-1 a 2-13. Fuente: http://www.cyber.st.dhs.gov/docs/NIST%20Guide%20to%20Supervisory%20and%20Data%20Acquisition- SCADA%20and%20Industrial%20Control%20Systems%20Security%20(2007).pdf. [28] Gregory M. Coates, Kenneth M. Hopkinson, Scott R. Graham, ATrust System Architecture for SCADA Network Security, IEEE, 2010. Fuente: http://ieeexplore.ieee.org/xpl/login.jsp?tp=&arnumber=5350402&url=http%3A%2F%2Fieeexplore.ieee.org%2Fxp ls%2Fabs_all.jsp%3Farnumber%3D5350402. [29] Cristina Alcaraz, Rodrigo Román, Pablo Najera, Javier Lopez, Acceso Seguro a Redes de Sensores en SCADA a través de Internet, Universidad de Málaga, 2010. Fuente: http://www.nics.uma.es/sites/default/files/AlcarazRomanNajeraLopez2010.pdf. [30] Sungjin Lee, Donghyun Choi, Choonsik Park, and Seungjoo Kim, An Efficient Key Management Scheme for Secure SCADA Communication, World Academy of Science, Engineering and Technology, 2008. Fuente: http://www.psu.edu/. [31] Gregory M. Coates, Kenneth M. Hopkinson, Scott R. Graham, Collaborative, Trust-Based Security Mechanisms for a Regional Utility Intranet, IEEE Transactions of Power Systems, Vol. 23, 2008. Fuente: [32] Samuel East, Jonathan Butts, Mauricio Papa and Sujeet Shenoi, A Taxonomy of Attacks on the DNP3 Protocol, Critical Infrastructure Protection III, IFIP AICT 311, IFIP, 2009. Fuente: https://scada- dnp3.googlecode.com/files/East2009.pdf. [33] Sugwon Hong, Il Hyung Lim, Myeon-Song Choi, Seung-Jae Lee, Chang Hoon Shin, Sung Woo Lee, Bok Nam
  • 3. Ha, Evolution of Communications Networks for Distribution Automation System in Korea, 2006. Fuente: http://ants.mju.ac.kr/public ation/APAP2007.pdf. [34] Paulo Sérgio Motta Pires, Luiz Affonso H. Guedes de Oliveira, Diogo Nascimento Barros, Aspectos de Segurança em Sistemas SCADA uma Visão Geral, Universidade Federal do Rio Grande do Norte, 2004. Fuente: http://www.dca.ufrn.br/~affonso/FTP/artigos/2004/isa_scada_2004.pdf [35] Kenneth C Wilberg, Identifying Supervisory Control and Data Acquisition (SCADA) Systems on a Network Via Remote Reconnaissance, Naval Postgraduate School, 2006, pp. 22. Fuente: http://calhoun.nps.edu/public/bitstream/handle /10945/2527/06Sep_Wiberg.pdf?sequence=1. [36] Bonnie Zhu, Shankar Sastry, SCADA-Specific Intrusion Detection/Prevention Systems: A Survey and Taxonomy, 2010 Fuente: http://www.cse.psu.edu/~smclaugh/ cse598e-f11/papers/zhu.pdf. [37] Raúl Siles Peláez, Analisis de Seguridad de la Familia de Protocolos TCP/IP y sus Servicios Asociados, 2002. Fuente: http://es.tldp.org/Manuales-LuCAS/doc-seguridad-tcpip/Seguridad_en_TCP-IP_Ed1.pdf. [38] Garrett Leischner and David Whitehead, A View Through the Hacker’s Looking Glass, Schweitzer Engineering Laboratories Inc, 2006. Fuente: www.selinc.com. [39] Sugwon Hong, Myongho Lee, Challenges and Direction Toward Secure Communication in the SCADA System, Dept. of Computer Science and Engineering, Myongji University, Yongin Korea, 978-0-7695-4041-2/10, 2010. Fuente: http://yenol.net/publication/4041a381.pdf. [40] ABB, IEC 61850 Communication Protocol Manual, Version 1.1, 2011. pp – 19. Fuente: http://www05.abb.com/global/scot/scot354.nsf/veritydisplay/fe4d2c659c6ccad2c125783a00454ae3/$file/1MRK5 11242-UEN_-_en_Communication_protocol_manual__IEC_61850__650_series__IEC.pdf. [41] Samuel East, Jonathan Butts, Mauricio Papa y Sujeet Shenoi, Critical Infrastructure Protection III, Cap 5 A Taxonomy of Attacks on the DNP3 Protocol, IFIP AICT 311, 2009 pp 68-73. Disponible en: http://link.springer.com/chapter/10.1007%2F978-3-642-04798-5_5?LI=true. [42] Cisco CGS 2520 Software Configuration Guide, Chapter 5 Configuring MODBUS TCP. Disponible en: http://www.cisco.com/en/US/docs/switches/connectedgrid/cgs2520/software/release/12_2_53_ex/configuration/g uide/swmodbus.pdf. [43] Gordon Clarke, Deon Reynders, Practical Modern SCADA Protocols: DNP3, 60870.5 and Related Systems, Editorial Elsevier, 2004, Cap 3 y 4. pp- 63 – 72. [44] Andrew K. Wright, Paul Kalv, Rodrick Sibery, Interoperability and Security for Converged Smart Grid Network, Grid-Interop Forum, 2010. Fuente: http://www.gridwiseac.org/pdfs/forum_papers10/wrigth_gi10.pdf. [45] Ivan Pepelnjak, Jim Guichard, MPLS and VPN Architectures, Cisco press, 2001. [46] Octavio Salcedo, Luis F. Pedraza, Monica Espinosa, Evaluacion de las Redes MPLS/VPN/BGP con Rutas Reflejadas, Revista Tecnura, Vol 16, No. 32, 2012, pp. 107-116. [47] Ernesto Ariganello, Enrrique Barrientos Sevilla, Redes Cisco CCNP a Fondo, ISBN: 978-607-7854-79-1, Alfaomega, 2010. [48] Martha Odilia Tapasco Garcia, MPLS, El presente de las Redes IP, Universidad Tecnológica de Pereira, 2008. Fuente: http://repositorio.utp.edu.co/dspace/bitstream/11059/1311/1/0046T172.pdf.
  • 4. [49] Ana Maria Hospina Bolaños, Jackson Reina Alzate, BGP: Problemas y Perspectivas Locales, Ingenium, Universidad de San Buenaventura, 2009. [50] Yu Chen, Ajoy K. Datta, Sebastien Tixeuil, Stabilizing Inter-Domain Routing in the Internet, School of Computer Science, Unversity of Nevada USA, LRI-CNRS UMR8626 and INRIA large, Université Paris France, 0926- 6801/05, 2005. [51] Stefania Sesia, Issam Toufik, Matthew Baker, The UMTS Long Term Evolution from Theory to Practice, Second Edition, Editorial Wiley, ISBN 978-0-470-66025-6, 2011. Disponible en: http://www.aldraji.com/download/The_UMTS_Long_Term_EvolutionB.pdf. [52] Ian F. Akyildiz, David M. Gutierrez-Estevez, Elias Chavarria Reyes, The Evolution to 4G Cellular Systems: LTE-Advanced, Broadband Wireless Networking Laboratory, School of Electrical and Computer Engienieering, Georgia Instutute of Technology, Atlanta, GA30332, USA, 2010. [53] R. Ferrús, A. Gelonch, O. Sallent, J. Pérez Romero, Vertical Handover Support in Coordinated Heterogeneous Radio Access Networks, Signal Theory and Communications Department, UPC Barcelona, 2005. Disponible en http://grcm.tsc.upc.edu/sites/default/files/430.pdf. [54] J. Korhonen, J. Soininen, K. Lisakkila, G. Bajko, IPv6 in 3rd Generation Partnership Project (3GPP) Evolved Packet System, IETF 6459, ISSN: 2070-1721, 2012. Fuente: http://tools.ietf.org/html/rfc6459. [55] Diego Fernando Rueda Pepinosa, Zoila Inés Ramos Rodríguez, Arquitectura Funcional para la Implementación de Mobile IPTV sobre redes LTE y LTE-Advanced, Iteckne Vol.9 Número 2, ISSN 1692-1798, 2012. Disponible en http://revistas.ustabuca.edu.co/index.php/ITECKNE/article/view/81. [56] Katsutshi Nishida, Itsuma Tanaka, Takashi Koshimizu, Basic SAE Management Technology for Realizing All- IP Networks, NTT Docomo Technical Journal, Vol. 11, No. 3, 2009. Disponible en http://www.nttdocomo.co.jp/english/binary/pdf/corporate/technology/rd/technical_journal/bn/vol11_3/vol11_3_004 en.pdf. [57] Ishad Ahmad, 3GPP Long Term Evolution, School of Engineering , Design and Technology, University of Bradford, 2011. Disponible en http://scholar.google.com/scholar?hl=es&q=3GPP+Long+Term+Evolution &btnG=&lr=.
  • 5. ANEXOS ANEXO A Anexo A1: Diseño de la VRF con sesiones BGP. Figura A1. Diseño de la MPLS/VPN. Basado en [45] y [46]. Configuración del Router-PE Inicio: Router PE INICIO ! ip vrf SCADA CE rd 1:27 route-target export 100:27 route-target mport 100:27 ! interface loopback0 ip address 10.2.1.2 255.255.255.0 ! interface serial 1/0 description **interface to SCADA CE** ip vrf forwarding SCADA ip address 195.12.2.5 255.255.255.255 ! router rip version 2 ! address-family ipv4 vrf SCADA version 2 redistribute bgp 1 metric 1 network 195.12.2.0
  • 6. no auto-summary exit-address-family ! router bgp 1 no bgp default ipv4-unicast neighbor 10.2.2.1 remote-as1 neighbor 10.2.2.1 update-source loopback0 neighbor 10.2.2.1 activate ! address-family ipv4 vrf SCADA redistribute rip metric 1 no auto-summary no synchronization exit-address-family ! address-family vpnv4 neighbor 10.2.2.1 activate neighbor 10.2.2.1 send-community extended exit-address-family Configuración del Router PE Final Router PE INICIO ! ip vrf LTE PGW rd 1:26 route-target export 100:26 route-target mport 100:26 ! interface loopback1 ip address 10.2.2.2 255.255.255.0 ! interface serial 1/0 description **interface to LTE** ip vrf forwarding LTE ip address 196.7.25.5 255.255.255.255 ! router rip version 2 ! address-family ipv4 vrf LTE version 2 redistribute bgp 1 metric 1 network 196.7.25.0 no auto-summary exit-address-family ! router bgp 1 no bgp default ipv4-unicast neighbor 10.2.1.1 remote-as1
  • 7. neighbor 10.2.1.1 update-source loopback0 neighbor 10.2.1.1 activate ! address-family ipv4 vrf SCADA redistribute rip metric 1 no auto-summary no synchronization exit-address-family ! address-family vpnv4 neighbor 10.2.1.1 activate neighbor 10.2.1.1 send-community extended exit-address-family La configuración de los puertos MPLS y del Router P son mostrados con mayor detalle en los capítulos de 2 al 5 del libro MPLS and VPN Architectures. En la siguiente tabla se muestra el conjunto de instrucciones para configurar un router-P así como las interfaces de los router-PE para la asignación de etiquetas, de igual manera en este libro se ilustran múltiples ejemplos con el uso de las instrucciones relacionadas en la tabla, en un recorrido por los capítulos del libro se muestra las instrucciones que permiten ver la asignación de etiquetas, los puntos vecinos, los parámetros LDP, etc. Por tal motivo, la tabla A1 se ajunta como anexo con el fin de mostrar este conjunto de instrucciones e incentivar la consulta del libro antes mencionado a los lectores de este documento, con el fin de apoyar futuras investigacones y trabajos de grado sobre redes MPLS, BGP y VPN.
  • 8. Anexo A2: Conjunto de instrucciones usadas en la configuración de los router MPLS. Tabla A2. Conjunto de instrucciones MPLS. Tomado de [45], Apéndice A, pp -336.
  • 9. Anexo B1: Gestion y control de acceso de la red LTE. Figura B1. Secuencia de enlace de radio para LTE. Tomado de [56]
  • 10. Anexo B2: Los 15 procedimientos del plano de control para el diseño de toda la red. Figura B2. Relación entre los 15 pasos de la Fig. B1 y las interfaces en CP. Elaborada por el Autor. Con base en [55] y [56]