Mobile IP-discussed in the first section of the lecture,

Network Layer Mobility Rajan Shankaran ITEC851 Mobile Data Networks 1Lecture Organization This Lecture introduces protocols and mechanisms developed for the network layer to support mobility. The most prominent example is Mobile IP-discussed in the first section of the lecture, which adds mobility support to the internet. Under Mobile IP we discuss: The operation of the protocol, Examine underlying tunneling schemes Examine Multicast techniques. We then examine Micro mobility protocol-Cellular IP. Finally the lecture discusses Mobile IP-802.11 interoperability models. Rajan Shankaran ITEC851 Mobile Data Networks 2Mobility Considerations in Network-Layer Design From the network layer’s standpoint, how mobile is a user? User movement: Different challenges at the network layer. Case 1: User has a laptop with a wireless interface card User roams within a building. Same wireless link used regardless of mobility. User not mobile form network layer perspective. Case 2: User zooms along on a highway at 150km/h: wants an uninterrupted connection btoremote application. Passes through multiple access points. Definitely mobile from the network layer perspective. Case 3: MobileUser: No ongoing connection needed between different points of attachment. Rajan Shankaran ITEC851 Mobile Data Networks 3Mobility Considerations in Network-Layer Design How important is the mobile node’s address? With mobile telephony, your phone number—essentially the network-layer address of your phone Remains static despite mobility Must a laptop similarly maintain the same IP address while moving between IP networks?-Consider the BMW passenger from case 2: previous slide Transparency from application’s perspective needed. Rajan Shankaran ITEC851 Mobile Data Networks 5Mobility versus Portability There are two similar terms: Mobility and portability Portability: Computers can be operated at any set of points of attachment, but not during the time that the computer changes its point of attachment. Mobility: Involves continuous contact with network resources maintained: There is an uninterrupted connectivity between the application and the source. Rajan Shankaran ITEC851 Mobile Data Networks 6Mobility Problem: Internet View Need arises due to IP addressing scheme. Addressing: Routing based on IP hierarchical addressing structure. Address valid when host attaches itself to network. Routers use this association to route the packet to host. Prefix used for packet delivery. IP address; endpoint identifier Routing directive IP address –endpoint Identifier: Indicates Point of attachment.: Example –160.80.40.20/16 Rajan Shankaran ITEC851 Mobile Data Networks 8Internet Protocol (IP) Address An Internet Protocol address (IP address) is a numerical label assigned to each device (e.g., computer, printer) participating in a computer network that uses the Internet Protocol for communication. It serves two principal functions: Host or network interface identification Location addressing. A name indicates what we seek. An address indicates where it is. A route indicates how to get there. Internet Protocol Version 4 (IPv4)‐32 –bits for addressing still in use. A new addressing system : Internet Protocol Version 46 (IPv6) , using 128 bits for the address being deployed world‐wide. Rajan Shankaran ITEC851 Mobile Data Networks 9Mobility Problem: Internet View Change in network, address no longer valid. Change the address in mobile device Breaks some applications: TCP related Problems: Examine TCP tuple Loss of packets Retain the same address: Routing system limitation One other option: Create a route more specific to the prefix Exception Route: Scalability problems Let mobilitybe handled at a lower layer: Link layer 802.11 wireless networks Degree of mobility is limited. Rajan Shankaran ITEC851 Mobile Data Networks 10Requirements of Mobility Efficient Handoff: Soft and hard Location Management: Location detection, privacy Efficient Routing: Shortest path routing, low latency Security: security critical, overheads to be avoided Scalability: Performance vs number of mobile nodes Fault Tolerance Simultaneous Mobility: Both ends move Link Layer Independence: movement over heterogeneous networks Compatibility with IP Routing: Always acquiring/using topologically correct addresses. Transparency: Transparent to applications Quality of Service: Just as in fixed networks. Rajan Shankaran ITEC851 Mobile Data Networks 11Mobility of IP-based Wireless Networks Categories of Mobility Host Mobility and Network Mobility. Macro-mobility and Micro-mobility Macro: Inter-domain Low rate packet loss Efficient handoff and efficient routing High overheads: Cannot be used in micro mobility scenarios. Micro Localized mobility within a domain Reduced handoff latency IP Mobile Multicasting Rajan Shankaran ITEC851 Mobile Data Networks 12Mobility of IP-based Wireless Networks We will discuss the following protocols: Mobile IP with IP v4. With IPv6 is left as a reading exercise. Cellular IP Note: Session Initiation Protocol (SIP) is a signaling protocol that can used to provide mobility related services. Application layer protocol Not discussed Rajan Shankaran ITEC851 Mobile Data Networks 13Introduction to Mobile IP Mobile IP: an Internet Engineering Task Force (IETF) standard protocol which allows users to keep their own IP addresses even though they move from one network to the other. (RFC 2002): Charles Perkins Nodes to continue to receive datagrams no matter where they happen to be attached to the Internet. Goals: Host to stay connected to the Internet regardless of its location. Track a host without needing to change the mobile host’s long-term IP address. Additional control messages for managing routing tables. 16 Rajan Shankaran ITEC851 Mobile Data NetworksMobile IP -Characteristics Mobile Host communicates with other nodes after changing its link-layer point of attachment yet without changing its IP address. Mobile host communicates with other nodes that do not implement mobile IP. All messages exchanged in this framework are authenticated. Number of administrative messages minimized. Low Bandwidth factor. No geographical limitation: A user can take a palmtop or laptop computer anywhere without losing connection to home network. Rajan Shankaran ITEC851 Mobile Data Networks 17Mobile IP -Characteristics Impact Network access is assured at all times and from all locations. Home and local resources would be accessed continuously. There would no longer be an excuse for lack of productivity due to lack of connectivity. Rajan Shankaran ITEC851 Mobile Data Networks 18IETF Mobile IP: Terminology Mobile host/node Correspondent Node Mobility Agent(MA) Home agent(HA) Foreign agent(FA) Care-of Address(COA) Foreign agent-based COA(FCOA) Co-located COA(CCOA) Home Address Mobility Binding Rajan Shankaran ITEC851 Mobile Data Networks 20HA/FA Placement HA attracts and intercepts datagrams for MN using proxy ARP. MN uses gratuitous ARP to update the binding upon return What does this tell you about the location of HA? HA location options Included in router at Home Network As a separate system on the home network A virtual home network. Rajan Shankaran ITEC851 Mobile Data Networks 23HA/FA Placement MH –FA: bypass normal routing mechanisms and send datagrams to each other using link layer addresses. What does this tell you about the location of FA? Rajan Shankaran ITEC85
1 Mobile Data Networks 24More on Mobile IP Mobile IP protocol defines the following: an authenticated registration procedure by which a mobile node informs its home agent of its care-of-address an extension to ICMP Router Discovery (agent advertisement), which allows mobile nodes to discover prospective home agents and foreign agents the rules for routing packets to and from mobile nodes, including the specification of one mandatory tunneling mechanism and several optional tunneling mechanisms. Rajan Shankaran ITEC851 Mobile Data Networks 26Mobile IP Operation: Overview Mobile IP is a way of doing three relatively separate functions Location Discovery/Registration In service (Tunneling) Deregistration Rajan Shankaran ITEC851 Mobile Data Networks 28Location Discovery The MH is responsible for discovering whether the MH is in a home or foreign network.(Agent Discovery) Agent Advertisement: Internet Router Discovery Protocol (IRDP) message (RFC 1991) Agent Solicitation Time to Live (TTL) set to 1, multicast address, 224.0.0.1, broadcast address, 255.255.255.255 In the absence of advertisement and solicitation failure, DHCP can be used. Rajan Shankaran ITEC851 Mobile Data Networks 30Agent Advertisement An extension to ICMP router advertisement. Mobility agents transmits advertisements to advertise its services on the link. Includes a list of CoAs Helps MN locate their current point of attachment. Advertisements are sent out one third of the lifetime given in the header. MN can miss 3 consecutive advertisements before deleting the agent Foreign networks can enforce visiting policy. Detect returning to home network Rajan Shankaran ITEC851 Mobile Data Networks 31Agent Solicitation Agent solicitations should only be sent in the absence of agent advertisements and when the care-of address can not be determined through a link-layer protocol or other means MN should limit the rate at which its sends solicitations. Limiting Signalling Overhead Rajan Shankaran ITEC851 Mobile Data Networks 33Registration It is a method by which a MN: Request forwarding services when visiting a foreign network Inform the HA of their current COA. Renewal Deregistering Creates/modifies mobility binding at HA Registration Lifetime Other services HA discovery Selection of tunneling protocols request for compression Maintain simultaneous registration: Datagram sent to each active CoA. Deregistration: Of a specific or all CoAs Rajan Shankaran ITEC851 Mobile Data Networks 35Registration Process Registration:Registration consists of the following steps: If a mobile node discovers that it is on the home network, it operates without any mobility services. If the mobile node is on a new network: sends a Registration Request message (which includes the permanent IP address of the mobile host and the IP address of its home agent) The foreign agent sends a Registration Request (containing the permanent IP address of the mobile node and the IP address of the foreign agent to the home agent). Home Agent updates the mobility binding by associating the care-of address of the mobile node with its home address. The home agent then sends an acknowledgement to the foreign agent. The foreign agent in turn updates its visitor list by inserting the entry for the mobile node and relays the reply to the mobile node. Rajan Shankaran ITEC851 Mobile Data Networks 36Two Types of Registration HA can deny registration Mobile IP defines two different registration procedures Via Foreign Agent (FA) –FA CoA Directly with Home Agent (HA) –Co-located CoA Using a co-located CoA on a link where FA advertisement was not heard from Deregistration at home network. Registration Request/Reply messages Rajan Shankaran ITEC851 Mobile Data Networks 37Mobile Node Move Detection Lifetime based The mobile node records the Lifetime of advertisement message. If it fails to receive another advertisement from the same agent until the Lifetime expires, it considers to find a new agent. Network prefixes based The Prefix-length extension is used to determine if the newly received advertisement is in the same subnet as the mobile node’s current care-of-address. Rajan Shankaran ITEC851 Mobile Data Networks 42In-Service In Service:This stage can be subdivided into the following steps: When a correspondent node wants to communicate with the mobile node, it sends an IP packet addressed to the permanent IP address of the mobile node. The home agent intercepts this packet, consults the mobility binding table to find out if the mobile node is currently visiting any other network. Determine CoA Performs encapsulation, tunnels the datagram to MN’s current location. The home agent will iterate the procedure until the service time expires for the mobile node. Proxy ARP: For HA to intercept packets destined to a mobile host. Rajan Shankaran ITEC851 Mobile Data Networks 44In-Service Foreignagentdecapsulatesthepacketandfindsoutthemobilenode’shomeaddress.Itthenconsultsthevisitorlisttoseeifithasanentryforthatmobilenode. Ifthereisanentryforthemobilenodeonthevisitorlist,theforeignagentretrievesthecorrespondinglinkaddressandrelaysittothemobilenode. Mobilenodewantstosendamessagetoacorrespondentnode PacketsforwardedtoFA FAusesnormalroutingtodeliverpacketstotheCN_FAactsasanormalrouter. TheFAcontinuesservingthemobilenodeuntilthegrantedlifetimeexpires.Ifthemobilenodewantstocontinuetheservice,ithastoreissuetheregistrationRequest. Rajan Shankaran ITEC851 Mobile Data Networks 45In-Service Delivering Datagrams Several methods of encapsulation (tunneling) are available IP-in-IP encapsulation. Minimal Encapsulation. Generic record Encapsulation Rajan Shankaran ITEC851 Mobile Data Networks 46IP in IP Encapsulation Simply encapsulates the original IP packet within the new IP header Decrements TTL by 1, and Sets the outer protocol field to 4 (IP-in-IP) No support for IP fragmentation (path MTU discovery) Doubles IP packet sizes Rajan Shankaran ITEC851 Mobile Data Networks 47Generic Routing Encapsulation Tunneling protocol designed to encapsulate a wide variety of network layer packets inside IP tunneling packets. Designed to be stateless: The tunnel end-points do not monitor the state or availability of other tunnel end-points. Rajan Shankaran ITEC851 Mobile Data Networks 50Tunnel Management ICMP used to to send error messages indicating, for example, that a requested service is not available or that a host or router could not be reached. Returns 8 octets of original datagram beyond the header. May not cover inner (original) header of the tunneled packet. Encapsulatercannot relay ICMP from interior of the tunnel to the original sender. Solution: Tunnel Management. Rajan Shankaran ITEC851 Mobile Data Networks 55Tunnel Management Tunnel management involves maintaining Tunnel Soft StateInformationabout a tunnel to enable more timely use of the tunnel, especially, including management of transient tunnel error conditions. Idea: To return accurate ICMP messages to the sender. ICMP messages: Datagram too big. Time exceeded. Destination Unreachable. Source Quench. Rajan Shankaran ITEC851 Mobile Data Networks 56Tunnel Soft State Soft state information: MTU of tunnel TTL (path length) of tunnel. Ability to reach end of tunnel. ICMP messages received from the interior of tunnel updates the soft state of the tunnel at the encapsulator. Encapsulatormight send ICMP for subsequent datagrams. Example: MTU case. Rajan Shankaran ITEC851 Mobile Data Networks 57Tunnel Soft State Path MTU Discovery. Tunnel MTU Discovery: ICMP datagram too big message. Don’t Fragment (DF) option.
Case 1: Source of the un-encapsulated datagram is doing MTU discovery. MTU: MTU of tunnel -size of outer header Case 2: Source of the un-encapsulated datagram is not doing MTU discovery. Fragmentation and Encapsulation Rajan Shankaran ITEC851 Mobile Data Networks 58Deregistration Deregistration involves MN dropping its COA after returning back to its home network. Request sent to HA. Use of gratuitous ARP There is no need to deregister with the foreign agent because the service expires automatically when the service time expires. Movement from one Foreign network to another Foreign network: Lost datagrams Rajan Shankaran ITEC851 Mobile Data Networks 61Problems with Mobile IP 1. Routing Inefficiencies: Triangle Routing Fix: Route Optimization Provides Binding Cache keeping track of MN Supports Previous FA’s Notification of MN’s New Location 2. Handoff Delay: Higher layer protocols may drop the packets. Rajan Shankaran ITEC851 Mobile Data Networks 63Problems with Mobile IP 3.Problem of Intra-Domain Movement 4.Single Home Agent Model:The dependence in Mobile IP on a fixed HA reduces fault tolerance. III.Even though Simple and Easy, it is fragile IV.Fix: Supports Multiple Home Agents Rajan Shankaran ITEC851 Mobile Data Networks 64Route Optimization Problem: Triangular Routing sender sends all packets via HA to MN: Longer path than optimal. Significant delay in delivery and unnecessary burden on networks Route Optimization: Solves the above mentioned problem. Rajan Shankaran ITEC851 Mobile Data Networks 66Route Optimization Route Optimization has 4 parts: Updating Binding caches Managing Smooth handoffs between FAs Acquiring registration keys for smooth handoffs Using Special Tunnels Rajan Shankaran ITEC851 Mobile Data Networks 67Binding Caches Provides a means for any node to maintain a binding cache containing CoA of one or more mobile nodes. The home agent maintains a binding cache containing all the bindings for all those mobile nodes that are using its services while they are away from the home network. Enables a CN to discover MN’s current CoA, maintain the binding for tunneling packets. Binding Update message A CN tunnels the packet directly to the COA of the mobile node if it has an entry in the binding cache Binding Update: Lifetime, authentication Rajan Shankaran ITEC851 Mobile Data Networks 68Location Management To identify the current location of a mobile node and keep track of its changes as it moves on. For call setup process. Key Questions How does network know where intended recipient of a message is currently located? Where should information about current location of a mobile node be stored? Who should be responsible for determining mobile node’s location? Rajan Shankaran ITEC851 Mobile Data Networks 70Location Management Solutions based on Push or Pull based strategies. In Mobile IPv4, Home Agent (HA) and Foreign Agent (FA) are employed for location management. HA address. FA address. The HA maintains the Mobility binding. It’s a push based strategy. Rajan Shankaran ITEC851 Mobile Data Networks 71Location Management Location management involves Handoff Management. Handoff Management: To provide mobile nodes for seamless handover, whenever they move into different IP network regions during a session. Service disruption issues Was not supported in the initial base Mobile IP specification. Rajan Shankaran ITEC851 Mobile Data Networks 72Location Management After a fresh registration event, datagram tunnelled to the new location. But in flight datagrams destined to MH at old location are lost. Retransmission initiated by higher layer protocols. Rajan Shankaran ITEC851 Mobile Data Networks 73Smooth FA Handoff Rajan Shankaran ITEC851 Mobile Data Networks 74 Route optimization: Provides a means for MN’s previous FA to be reliably notified of MN’s new mobility binding Inflight datagrams forwarded to new CoA Registration with new FA: MN requests for old FA notification. New FA-Old FA: Binding Update message. OLD FA maintains a forwarding pointer. Old FA forwards packets to new FA. This notification mechanism will be much more effective than a method involving the home agent: Proximity of Foreign networks. Security: Registration keySmooth FA Handoff Smooth FA Handoff needs four additional messages (Refer to next slide) Binding request Binding update Binding acknowledgement Binding warning Rajan Shankaran ITEC851 Mobile Data Networks 75Acquiring registration keys for smooth handoffs Registration Key: Provides the means to create the needed authentication and replay protection so that the recipient of a binding update message can believe it. Allowing the mobile node and foreign agent to create a registration key for later use in making smooth transition to a new point of attachment. Registration Key: Between FA and MN Obtaining Registration Keys Using MN’s Public key-FA supplies Registration key. Using FA’s public key: HA supplies the registration key. Using a existing security association between HA-FA: HA supplies the registration key. Diffe-Hellman Key exchange between FA-MN. Rajan Shankaran ITEC851 Mobile Data Networks 77Out of Date Binding Entry FA receives a tunnelled datagram no visitor list entry No binding cache entry Conclusion: Node sending the tunneleddatagram has an out-of-date binding cache entry for the mobile node. What to do with this datagram? Rajan Shankaran ITEC851 Mobile Data Networks 7880 Some Security Issues and possible Solutions Firewalls and Ingress filtering: Firewalls:Basic mechanism used by firewalls is filtering out any datagrams that do not meet specified criteria. For example, Enterprise firewalls are typically configured to block packets that appear to be emanating from local computers. This would prevent mobile nodes from communicating with nodes in their home network while they are away because the mobile nodes always use their home address. Ingress filtering: (Ingress filtering was proposed to combat denial of service attacks) Many boarder routers discard packets that seem to emanate from an address that is external to the administrative domain. This will prevent a mobile node from sending packets from a foreign network.Reverse Tunneling (Bi-directional Tunneling) Used to address the firewall traversal problem. Typically, a firewall does not allow an outgoing packet whose source address is different from its network addresses. It is unusual to have outgoing and incoming packets in different paths. Solution is reverse tunneling: Instead of sending the packets directly to the CN, the MN sends the packets back to the HA, and then the HA forwards them to the CN Advantage: Packets emanate from home network Issue: Triangle routing reduced to quadrilateral routing Other routing inefficiency Rajan Shankaran ITEC851 Mobile Data Networks 81Reverse Tunneling: TTL Problem Consider an MN sending packets with a certain TTL while still in its home network. TTL kept low: To avoid packets spilling over. MN now moves to a foreign network: This TTL still low as before: Packets may get dropped Reverse tunnel is needed that represents only one hop: FA-HA Rajan Shankaran ITEC851 Mobile Data Networks 83Mobile IP –Multicast Support Necessity What is multicasting? sender sends a single datagram to the multicast address, and the routers take care of making copies and sending them to all receivers that have registered their interest in data from that sender. One way streaming media Mobile IP!!!! Rajan Shankaran ITEC851 Mobile Data Networks 85Mobile IP -Multicast Datagram Routing When it is at home, a mobile node functions identically
to other multicast senders and receivers. In foreign network: mobile node MUST join the multicast group in one of two ways. Rajan Shankaran ITEC851 Mobile Data Networks 86Mobile IP -Multicast Datagram Routing Two types of multicasting Remote Subscription Bidirectional Tunneling Rajan Shankaran ITEC851 Mobile Data Networks 87Remote Subscription MH moves to a foreign network, it subscribes to the multicast group on the foreign network. Rajan Shankaran ITEC851 Mobile Data Networks 88Remote Subscription Advantages:- option is simple and provides optimal routing efficiency Disadvantages:- Will overload the multicast routers for multicast tree management Suffer from packet losses at roaming, owing to the set-up time associated with multicast subscription (later it was rectified) Rajan Shankaran ITEC851 Mobile Data Networks 89Reverse Tunneling (Bi directional Tunneling) When MH is away from its home network, a bi-directional tunnel between its HA and FA is set up. Rajan Shankaran ITEC851 Mobile Data Networks 90Bi directional Tunneling Advantages:- Guarantees multicast packet delivery against roaming Handles the mobility of both the source and recipients Disadvantages:- The routing path for packet delivery may be far from optimality Tunnel convergence problem can occur Rajan Shankaran ITEC851 Mobile Data Networks 91Mobile IPv6 Some advantages of Mobile IPv6 over Mobile IPv4 are: Unlike Mobile IPv4 -Route Optimization is built as a fundamental part of Mobile IPv6. Foreign Agents are not needed in Mobile IPv6. Enhanced features address auto-configuration and neighbour discovery may the node independent of any router. Solves Ingress Filtering Router based problems. Rajan Shankaran ITEC851 Mobile Data Networks 92

Leave a Reply

Your email address will not be published.