Introduction | |
Data in Wireless Cellular Systems | |
Data in Wireless Local Area Networks | |
Internet Protocols | |
TCP over Wireless Link | |
Ad-Hoc Networks, Sensor Networks | |
Services and Service Discovery | |
System Support for Mobile Applications |
TCP/IP is a collection of protocols that facilitates communications among servers and terminals that are hooked to different networks |
The TCP and IP are only two of several protocols, but the name stuck !! | |
They are the most important ones |
IETF: Internet Engineering Task Force
Who develops protocols such as TCP/IP, Mobile IP, ...? | |||
“standardized” by action of IETF | |||
IETF has over 70 working groups considering a broad range of protocol proposals for the Internet, tries to identify protocol needs in advance (?) | |||
IETF works with Internet Assigned Number Authority (IANA) to keep track of protocol number assignments and address allocations as required by various Internet protocols | |||
each protocol specified by a “Request for Comments” | |||
working groups develop new RFCs by publishing Internet Drafts, building prototypes, and encouraging public debate | |||
operational model: rough consensus and running code |
IP Addresses and Physical Addresses
Map IP addresses into physical addresses | ||
destination host | ||
next hop router | ||
Techniques | ||
encode physical address in host part of IP address | ||
table-based | ||
ARP | ||
table of IP to physical address bindings | ||
broadcast request if IP address not in table | ||
target machine responds with its physical address | ||
table entries are discarded if not refreshed |
Extended addressing capabilities: 128-bit address field and other improvements. | |
Simplified header format: Some fields of IPv4 are dropped or turned into options | |
Improved support for extensions and options: flexibility and ability to introduce new options | |
Flow labeling | |
Authentication and privacy |
mobile computing is on the rise | ||||
wireless communications technologies widely available | ||||
IEEE 802.11 finally standardized | ||||
MAC layer protocol with lots of features: power saving, ad-hoc networking support, maybe even isochronous communication | ||||
cellular telephony everywhere | ||||
AMPS and CDPD | ||||
GSM | ||||
wireless indoor equipment (IR and RF) | ||||
people expect the same from both desktop and laptop | ||||
high-resolution color display | ||||
200 MHz processor | ||||
multi-gigabyte disk | ||||
with a docking station, the laptop is the desktop |
wireless communication and powerful portable devices lead to new computing paradigms: | ||
mobile computing | ||
ubiquitous computing | ||
nomadic computing | ||
at the same time, the Internet and in particular the Web, are growing exponentially | ||
timely news (and lots of it), user-friendly(?), lots of pretty pictures (70%-80% of Internet traffic is WWW traffic) | ||
the “Information Superhighway” is where people want to be | ||
certainly strong support by national governments to build and maintain this infrastructure | ||
mobile computing seen as “on-ramp” to this infrastructure |
Where to Solve Mobility Problem
What model of mobility | ||
“nomadic clients”: DHCP or similar solutions enough | ||
Truly mobile: need to keep connections alive WHILE moving | ||
Where in the protocol stack | ||
IP is common glue, solve it once and for all at IP layer | ||
BUT: may be in contradiction to end-to-end argument | ||
Other solutions/proposals exits, such as TCP connection migration |
Routing | ||
based on IP destination address, network prefix (e.g. 129.13.42) determines physical subnet | ||
change of physical subnet implies change of IP address to have a topological correct address (standard IP) or needs special entries in the routing tables | ||
Specific routes to end-systems? | ||
change of all routing table entries to forward packets to the right destination | ||
does not scale with the number of mobile hosts and frequent changes in the location, security problems | ||
Changing the IP-address? | ||
adjust the host IP address depending on the current location | ||
almost impossible to find a mobile system, DNS updates take to long time | ||
TCP connections break, security problems |
Requirements to Mobile IP
(RFC 3344, was: 3220, was: 2002)
Transparency | ||
mobile end-systems keep their IP address | ||
continuation of communication after interruption of link possible | ||
point of connection to the fixed network can be changed | ||
Compatibility | ||
support of the same layer 2 protocols as IP | ||
no changes to current end-systems and routers required | ||
mobile end-systems can communicate with fixed systems | ||
Security | ||
authentication of all registration messages | ||
Efficiency and scalability | ||
only little additional messages to the mobile system required (connection typically via a low bandwidth radio link) | ||
world-wide support of a large number of mobile systems in the whole Internet |
Mobile Node (MN) | ||
system (node) that can change the point
of connection to the network without changing its IP address |
||
Home Agent (HA) | ||
system in the home network of the MN, typically a router | ||
registers the location of the MN, tunnels IP datagrams to the COA | ||
Foreign Agent (FA) | ||
system in the current foreign network of the MN, typically a router | ||
forwards the tunneled datagrams to the MN, typically also the default router for the MN | ||
Care-of Address (COA) | ||
address of the current tunnel end-point for the MN (at FA or MN) | ||
actual location of the MN from an IP point of view | ||
can be chosen, e.g., via DHCP | ||
Correspondent Node (CN) | ||
communication partner |
Data Transfer to the Mobile System
Data Transfer from the Mobile System
Agent Advertisement | ||
HA and FA periodically send advertisement messages into their physical subnets | ||
MN listens to these messages and detects, if it is in the home or a foreign network (standard case for home network) | ||
MN reads a COA from the FA advertisement messages | ||
Registration (always limited lifetime!) | ||
MN signals COA to the HA via the FA, HA acknowledges via FA to MN | ||
these actions have to be secured by authentication | ||
Advertisement | ||
HA advertises the IP address of the MN (as for fixed systems), i.e. standard routing information | ||
routers adjust their entries, these are stable for a longer time (HA responsible for a MN over a longer period of time) | ||
packets to the MN are sent to the HA, | ||
independent of changes in COA/FA | ||
Mobile IP Registration Request
Encapsulation of one packet into another as payload | ||
e.g. IPv6 in IPv4 (6Bone), Multicast in Unicast (Mbone) | ||
here: e.g. IP-in-IP-encapsulation, minimal encapsulation or GRE (Generic Record Encapsulation) | ||
IP-in-IP-encapsulation (mandatory, RFC 2003) | ||
tunnel between HA and COA |
Minimal encapsulation (optional) | ||
avoids repetition of identical fields | ||
e.g. TTL, IHL, version, DS (RFC 2474, old: TOS) | ||
only applicable for unfragmented packets, no space left for fragment identification |
Optimization of Packet Forwarding
Triangular Routing | ||
sender sends all packets via HA to MN | ||
higher latency and network load | ||
“Solutions” | ||
sender learns the current location of MN | ||
direct tunneling to this location | ||
HA informs a sender about the location of MN | ||
big security problems! | ||
Change of FA | ||
packets on-the-fly during the change can be lost | ||
new FA informs old FA to avoid packet loss, old FA now forwards remaining packets to new FA | ||
this information also enables the old FA to release resources for the MN |
Reverse Tunneling
(RFC 3024, was: 2344)
Mobile IP with Reverse Tunneling
Router accept often only “topological correct“ addresses (firewall!) | ||
a packet from the MN encapsulated by the FA is now topological correct | ||
furthermore multicast and TTL problems solved (TTL in the home network correct, but MN is too far away from the receiver) | ||
Reverse tunneling does not solve | ||
problems with firewalls, the reverse tunnel can be abused to circumvent security mechanisms (tunnel hijacking) | ||
optimization of data paths, i.e. packets will be forwarded through the tunnel via the HA to a sender (double triangular routing) | ||
The standard is backwards compatible | ||
the extensions can be implemented easily and cooperate with current implementations without these extensions | ||
Agent Advertisements can carry requests for reverse tunneling |
Mobile IP was developed for IPv4, but IPv6 simplifies the protocols | |||
security is integrated and not an add-on, authentication of registration is included | |||
COA can be assigned via auto-configuration (DHCPv6 is one candidate), every node has address autoconfiguration | |||
no need for a separate FA, all routers perform router advertisement which can be used instead of the special agent advertisement; addresses are always co-located | |||
MN can signal a sender directly the COA, sending via HA not needed in this case (automatic path optimization) | |||
„soft“ hand-over, i.e. without packet loss, between two subnets is supported | |||
MN sends the new COA to its old router | |||
the old router encapsulates all incoming packets for the MN and forwards them to the new COA | |||
authentication is always granted |
Security | ||
authentication with FA problematic, for the FA typically belongs to another organization | ||
no protocol for key management and key distribution has been standardized in the Internet | ||
patent and export restrictions | ||
Firewalls | ||
typically mobile IP cannot be used together with firewalls, special set-ups are needed (such as reverse tunneling) | ||
QoS | ||
many new reservations in case of RSVP | ||
tunneling makes it hard to give a flow of packets a special treatment needed for the QoS | ||
Security, firewalls, QoS etc. are topics of current research and discussions! |
Micro-mobility support: | ||
Efficient local handover inside a
foreign domain without involving a home agent |
||
Reduces control traffic on backbone | ||
Especially needed in case of route optimization | ||
Example approaches: | ||
Cellular IP | ||
HAWAII | ||
Hierarchical Mobile IP (HMIP) | ||
Important criteria: Security Efficiency, Scalability, Transparency, Manageability |
Operation: | ||
„CIP Nodes“ maintain routing entries (soft state) for MNs | ||
Multiple entries possible | ||
Routing entries updated based on packets sent by MN | ||
CIP Gateway: | ||
Mobile IP tunnel endpoint | ||
Initial registration processing | ||
Security provisions: | ||
all CIP Nodes share „network key“ |
||
MN key: MD5(net key, IP addr) | ||
MN gets key upon registration | ||
Advantages: | ||
Simple and elegant architecture | ||
Mostly self-configuring (little management needed) | ||
Integration with firewalls / private address support possible | ||
Potential problems: | ||
Not transparent to MNs (additional control messages) | ||
Public-key encryption of MN keys may be
a problem for resource-constrained MNs |
||
Multiple-path forwarding may cause inefficient use of available bandwidth |
Operation: | ||
MN obtains co-located COA and registers with HA |
||
Handover: MN keeps COA, new BS answers Reg. Request and updates routers |
||
MN views BS as foreign agent | ||
Security provisions: | ||
MN-FA authentication mandatory | ||
Challenge/Response Extensions mandatory |
Advantages: | ||
Mostly transparent to MNs (MN sends/receives standard Mobile IP messages) |
||
Explicit support for dynamically assigned home addresses | ||
Potential problems: | ||
Mixture of co-located COA and FA
concepts may not be supported by some MN implementations |
||
No private address support
possible because of co-located COA |
Hierarchical Mobile IPv6 (HMIPv6)
Operation: | |||
Network contains mobility anchor point (MAP) | |||
mapping of regional COA (RCOA) to link COA (LCOA) | |||
Upon handover, MN informs MAP only |
|||
gets new LCOA, keeps RCOA | |||
HA is only contacted if MAP changes |
|||
Security provisions: | |||
no HMIP-specific security provisions |
|||
binding updates should be authenticated |
Hierarchical Mobile IP: Evaluation
Advantages: | |||
Handover requires minimum number of overall changes to routing tables |
|||
Integration with firewalls / private address support possible | |||
Potential problems: | |||
Not transparent to MNs | |||
Handover efficiency in wireless mobile scenarios: | |||
Complex MN operations | |||
All routing reconfiguration
messages sent over wireless link |