Presentation is loading. Please wait.

Presentation is loading. Please wait.

Mobile IP 2006. 06. 07 순천향대학교 전산학과 문종식

Similar presentations


Presentation on theme: "Mobile IP 2006. 06. 07 순천향대학교 전산학과 문종식"— Presentation transcript:

1 Mobile IP 2006. 06. 07 순천향대학교 전산학과 문종식 comnik528@sch.ac.kr

2 정보보호 연구실 Information Security Lab. Mobile Communications 2 Contents  Introduction  The TCP/IP Protocol Suite  Brief Overview of IPv4  Motivation for the Mobile IP design  Overview of the Protocol  Security Considerations  Route Optimization  Minimal Encapsulation Scheme  Mobile IPv6  Conclusion

3 정보보호 연구실 Information Security Lab. Mobile Communications 3 1. Introduction  Mobile Computing is becoming increasingly important due to the rise in the number of portable computers  And the desire to have continuous network connectivity to the Internet irrespective of the physical location of the node

4 정보보호 연구실 Information Security Lab. Mobile Communications 4 1. Introduction

5 정보보호 연구실 Information Security Lab. Mobile Communications 5 1. Introduction  The Internet infrastructure is built on top of a collection of protocols, called the TCP/IP protocol suite  IP requires the location of any host connected to the Internet to be uniquely identified by an assigned IP address

6 정보보호 연구실 Information Security Lab. Mobile Communications 6 1. Introduction  When a host moves to another physical location, it has to change its IP address  It enables mobile computers to stay connected to the Internet regardless of their location and without changing their IP address

7 정보보호 연구실 Information Security Lab. Mobile Communications 7 2. The TCP/IP Protocol Suite  TCP/IP protocol suite, the cornerstone of Internet networking, is a four-layer system  The four layers, from top to bottom, are application layer, transport layer, network layer, and link layer  Support for mobility is likely to affect all the layers.

8 정보보호 연구실 Information Security Lab. Mobile Communications 8 3. Brief Overview of IPv4  IP is the mechanism that connects these networks together  Its basic function is to deliver data from a source to a destination independent of the physical location of the two  IP identifies each node uniquely, using an IP address that designates its physical attachment to the Internet

9 정보보호 연구실 Information Security Lab. Mobile Communications 9 3. Brief Overview of IPv4  IP addresses are 32-bit long integers and are represented in a dotted decimal format (e.g., 128.55.44.1), for ease of use  Every IP packet consists of an IP header and an IP payload  The header contains the IP addresses of the sending node and the receiving node along with some other information

10 정보보호 연구실 Information Security Lab. Mobile Communications 10 3. Brief Overview of IPv4  To correctly deliver these packets, IP executes two major steps: packet routing and packet forwarding Packet routing involves use of protocols like BGP, RIP, and OSPF to decide the route that each packet has to travel Packet forwarding involves use of protocols like ARP, proxy ARP etc. to deliver the packet to the end node once it has arrived at the destination network

11 정보보호 연구실 Information Security Lab. Mobile Communications 11 4. Motivation for the Mobile IP design  The IP address of a host consists of two parts The higher order bits of the address determine the network on which the host resides The remaining low-order bits determine the host number

12 정보보호 연구실 Information Security Lab. Mobile Communications 12 4. Motivation for the Mobile IP design  While trying to support mobility on the Internet under the existing protocol suite, we are faced with two mutually conflicting requirements A mobile node has to change its IP address whenever it changes its point of attachment, so that packets destined to the node are routed correctly To maintain existing TCP connections, the mobile node has to keep its IP address the same

13 정보보호 연구실 Information Security Lab. Mobile Communications 13 5. Overview of the Protocol  Mobile IP supports mobility by transparently binding the home address of the mobile node with its care-of address  The home agent, a designated router in the home network of the mobile node, maintains the mobility binding in a mobility binding table where each entry is identified by the tuple

14 정보보호 연구실 Information Security Lab. Mobile Communications 14 5. Overview of the Protocol  Mobility Binding Table  The purpose of this table is to map a mobile node's home address with its care-of address and forward packets accordingly Home AddressCare-of Address Lifetime (in sec) 131.193.171.4 131.193.171.2 128.172.23.78 119.123.56.78 200 150

15 정보보호 연구실 Information Security Lab. Mobile Communications 15 5. Overview of the Protocol  Foreign agents are specialized routers on the foreign network where the mobile node is currently visiting  The foreign agent maintains a visitor list which contains information about the mobile nodes currently visiting that network  Visitor List Home Address Home Agent Address Media Address Lifetime (in sec) 131.193.44.14 131.193.33.19 131.193.44.7 131.193.33.1 00-06-08-95-66-E1 00-60-08-68-A2-56 150 200

16 정보보호 연구실 Information Security Lab. Mobile Communications 16 5. Overview of the Protocol  The basic Mobile IP protocol has four distinct stages Agent Discovery  Mobility agents advertise their presence by periodically broadcasting Agent Advertisement messages  The mobile node receiving the Agent Advertisement message observes whether the message is from its own home agent and determines whether it is on the home network or a foreign network  If a mobile node does not wish to wait for the periodic advertisement, it can send out Agent Solicitation messages that will be responded by a mobility agent

17 정보보호 연구실 Information Security Lab. Mobile Communications 17 5. Overview of the Protocol Registration  If a mobile node discovers that it is on the home network, it operates without any mobility services  If the mobile node is on a new network, it registers with the foreign agent by sending a Registration Request message which includes the permanent IP address of the mobile host and the IP address of its home agent  The foreign agent in turn performs the registration process on behalf of the mobile host by sending a Registration Request containing the permanent IP address of the mobile node and the IP address of the foreign agent to the home agent  When the home agent receives the Registration Request, it updates the mobility binding by associating the care-of address of the mobile node with its home address  The home agent then sends an acknowledgement to the foreign agent  The foreign agent in turn updates its visitor list by inserting the entry for the mobile node and relays the reply to the mobile node

18 정보보호 연구실 Information Security Lab. Mobile Communications 18 5. Overview of the Protocol  Registration process in Mobile IP

19 정보보호 연구실 Information Security Lab. Mobile Communications 19 5. Overview of the Protocol In Service  When a correspondent node wants to communicate with the mobile node, it sends an IP packet addressed to the permanent IP address of the mobile node  The home agent intercepts this packet and consults the mobility binding table to find out if the mobile node is currently visiting any other network  The home agent finds out the mobile node's care-of address and constructs a new IP header that contains the mobile node's care- of address as the destination IP address  When the encapsulated packet reaches the mobile node's current network, the foreign agent decapsulates the packet and finds out the mobile node's home address

20 정보보호 연구실 Information Security Lab. Mobile Communications 20 5. Overview of the Protocol  If there is an entry for the mobile node on the visitor list, the foreign agent retrieves the corresponding media address and relays it to the mobile node  When the mobile node wants to send a message to a correspondent node, it forwards the packet to the foreign agent, which in turn relays the packet to the correspondent node using normal IP routing  The foreign agent continues serving the mobile node until the granted lifetime expires

21 정보보호 연구실 Information Security Lab. Mobile Communications 21 5. Overview of the Protocol  Tunneling operation in Mobile IP

22 정보보호 연구실 Information Security Lab. Mobile Communications 22 5. Overview of the Protocol Deregistration  If a mobile node wants to drop its care-of address, it has to deregister with its home agent

23 정보보호 연구실 Information Security Lab. Mobile Communications 23 6. Security Considerations  Security is very important in Mobile IP as mobile nodes are often connected to the Internet via wireless links which are very vulnerable to security attacks Timestamps - The node generating the message inserts the time-of-day, and the node receiving the message checks whether it is sufficiently close to its time-of-day. Nonces - Node A generates a new random number in every message to node B, and checks whether node B returns the same number in its next message to node A. Both messages use an authentication code to protect against alteration by an outsider. Node B can also generate random numbers and use them in its messages.

24 정보보호 연구실 Information Security Lab. Mobile Communications 24 7. Route Optimization  In the basic Mobile IP protocol, IP packets destined to a mobile node that is outside its home network are routed through the home agent  However packets from the mobile node to the correspondent nodes are routed directly  This is known as triangle routing

25 정보보호 연구실 Information Security Lab. Mobile Communications 25 7. Route Optimization  Triangle Routing

26 정보보호 연구실 Information Security Lab. Mobile Communications 26 7. Route Optimization  Route Optimization provides four main operations Updating binding caches Managing smooth handoffs between foreign agents Acquiring registration keys for smooth handoffs Using special tunnels

27 정보보호 연구실 Information Security Lab. Mobile Communications 27 7. Route Optimization  Binding Caches

28 정보보호 연구실 Information Security Lab. Mobile Communications 28 7. Route Optimization  Smooth Handoff

29 정보보호 연구실 Information Security Lab. Mobile Communications 29 8. Minimal Encapsulation Scheme  Encapsulation in Mobile IP is carried out by putting the original datagram (=IP header + payload) inside another IP envelope  The care-of address of the mobile node becomes the destination address of the IP packet and the home agent's address becomes the source address

30 정보보호 연구실 Information Security Lab. Mobile Communications 30 8. Minimal Encapsulation Scheme  Minimal Encapsulation

31 정보보호 연구실 Information Security Lab. Mobile Communications 31 9. Mobile IPv6  The next version of IP, IPv6 is designed to be an evolutionary step from IPv4 IPv6 addresses are 128 bits long Mobility support in IPv6 solves many of the problems of basic Mobile IP

32 정보보호 연구실 Information Security Lab. Mobile Communications 32 9. Mobile IPv6  Some advantages of Mobile IPv6 over Mobile IPv4 Route Optimization is built as a fundamental part of Mobile IPv6 Foreign Agents are not needed in Mobile IPv6

33 정보보호 연구실 Information Security Lab. Mobile Communications 33 10. Conclusion  Evident that Mobile IP has great potential  Mobile IP is being studied in a number of research projects like Stanford University's Mosquitonet project and the CMU Monarch project  Extensions have also been proposed to allow mobility management for the interface between a radio network and a packet data network in the third generation cdma2000 network

34 정보보호 연구실 Information Security Lab. Mobile Communications 34 Q & A


Download ppt "Mobile IP 2006. 06. 07 순천향대학교 전산학과 문종식"

Similar presentations


Ads by Google