IPv6 Multihoming Support in the Mobile Internet Presented by Paul Swenson CMSC 681, Fall 2007 Article by M. Bagnulo et. al. and published in the October.

Slides:



Advertisements
Similar presentations
SHIM6 Update Geoff Huston Kurtis Lindqvist SHIM6 co-chairs.
Advertisements

1 An Update on Multihoming in IPv6 Report on IETF Activity IPv6 Technical SIG 1 Sept 2004 APNIC18, Nadi, Fiji Geoff Huston.
Giảng viên : Ts. Lê Anh Ngọc Học viên: Trịnh Hồng Điệp Nguyễn Minh H ư ớng 1.
Multihoming in IPV6 Habib Naderi Department of Computer Science University of Auckland.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Addressing the Network – IPv4 Network Fundamentals – Chapter 6.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Addressing the Network – IPv4 Network Fundamentals – Chapter 6.
Dynamic Tunnel Management Protocol for IPv4 Traversal of IPv6 Mobile Network Jaehoon Jeong Protocol Engineering Center, ETRI
Jaringan Komputer Lanjut Packet Switching Network.
CCNA – Network Fundamentals
1 Semester 2 Module 4 Learning about Other Devices Yuda college of business James Chen
1 Mobile IP Myungchul Kim Tel:
1 Network Architecture and Design Advanced Issues in Internet Protocol (IP) IPv4 Network Address Translation (NAT) IPV6 IP Security (IPsec) Mobile IP IP.
1/32 Internet Architecture Lukas Banach Tutors: Holger Karl Christian Dannewitz Monday C. Today I³SI³HIPHI³.
COM555: Mobile Technologies Location-Identifier Separation.
Autonomous Mobile Mesh Networks and their Design Changes.
1 © 2005 Nokia mobike-transport.ppt/ MOBIKE Transport mode usage and issues Mohan Parthasarathy.
MOBILITY SUPPORT IN IPv6
TCP over ad hoc networks Ad Hoc Networks will have to be interfaced with the Internet. As such backward compatibility is a big issue. One might expect.
Lesson 11-Virtual Private Networks. Overview Define Virtual Private Networks (VPNs). Deploy User VPNs. Deploy Site VPNs. Understand standard VPN techniques.
COS 461: Computer Networks
NEtwork MObility By: Kristin Belanger. Contents Introduction Introduction Mobile Devices Mobile Devices Objectives Objectives Security Security Solution.
(part 3).  Switches, also known as switching hubs, have become an increasingly important part of our networking today, because when working with hubs,
Lecture slides prepared for “Business Data Communications”, 7/e, by William Stallings and Tom Case, Chapter 8 “TCP/IP”.
Host Identity Protocol
Protocols and the TCP/IP Suite Chapter 4. Multilayer communication. A series of layers, each built upon the one below it. The purpose of each layer is.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Addressing the Network – IPv4 Network Fundamentals – Chapter 6.
CECS 5460 – Assignment 3 Stacey VanderHeiden Güney.
Mobile IP: Introduction Reference: “Mobile networking through Mobile IP”; Perkins, C.E.; IEEE Internet Computing, Volume: 2 Issue: 1, Jan.- Feb. 1998;
2002 년 2 학기이동인터넷프로토콜 1 Mobile IP:Overview 년 2 학기이동인터넷프로토콜 2 Mobile IP overview Is Mobile IP an official standard? What problems does Mobile IP solve?
23-Support Protocols and Technologies Dr. John P. Abraham Professor UTPA.
Overview of SHIM6 Multihoming Protocol Fuad Bin Naser Std. No A presentation for CSE6806: Wireless & Mobile Communication Networks.
Introducing Reliability and Load Balancing in Home Link of Mobile IPv6 based Networks Jahanzeb Faizan, Mohamed Khalil, and Hesham El-Rewini Parallel, Distributed,
Adaptive Failover Mechanism Motivation End-to-end connectivity can suffer during net failures Internet path outage detection and recovery is slow (shown.
Remote Access Chapter 4. Learning Objectives Understand implications of IEEE 802.1x and how it is used Understand VPN technology and its uses for securing.
Jaringan Komputer Dasar OSI Transport Layer Aurelio Rahmadian.
ACM 511 Chapter 2. Communication Communicating the Messages The best approach is to divide the data into smaller, more manageable pieces to send over.
1.1 What is the Internet What is the Internet? The Internet is a shared media (coaxial cable, copper wire, fiber optics, and radio spectrum) communication.
Fault-Tolerant Design for Mobile IPv6 Networks Jenn-Wei Lin and Ming-Feng Yang Graduate Institute of Applied Science and Engineering Fu Jen Catholic University.
Req1 - Separability Old: –An RO scheme MUST have the ability to be bypassed by traffic types that desire to use bidirectional tunnels through an HA. New:
An Integrated QoS, Security and Mobility Framework for Delivering Ubiquitous Services Across All IP-based Networks Haitham Cruickshank University of Surrey.
Simple Multihoming Experiment draft-huitema-multi6-experiment-00.txt Christian Huitema, Microsoft David Kessens, Nokia.
1 November 2006 in Dagstuhl, Germany
ﺑﺴﻢﺍﷲﺍﻠﺭﺣﻣﻥﺍﻠﺭﺣﻳﻡ. Group Members Nadia Malik01 Malik Fawad03.
MOBILE IP GROUP NAME: CLUSTER SEMINAR PRESENTED BY : SEMINAR PRESENTED BY : SANTOSH THOMAS SANTOSH THOMAS STUDENT NO: STUDENT NO:
SHIM6 Protocol Drafts Overview Geoff Huston, Marcelo Bagnulo, Erik Nordmark.
William Stallings Data and Computer Communications
Prepared by: Azara Prakash L.. Contents:-  Data Transmission  Introduction  Socket Description  Data Flow Diagram  Module Design Specification.
4.1.4 multi-homing.
1 © 2003, Cisco Systems, Inc. All rights reserved. CCNA 3 v3.0 Module 9 Virtual Trunking Protocol.
Introduction to Mobile IPv6
An Update on Multihoming in IPv6 Report on IETF Activity RIPE IPv6 Working Group 22 Sept 2004 RIPE 49 Geoff Huston, APNIC.
Approaches to Multi6 An Architectural View of Multi6 proposals Geoff Huston March 2004.
Networks. Ethernet  Invented by Dr. Robert Metcalfe in 1970 at Xerox Palo Alto Research Center  Allows group of computers to communicate in a Local.
Santhosh Rajathayalan ( ) Senthil Kumar Sevugan ( )
Ασύρματες και Κινητές Επικοινωνίες Ενότητα # 10: Mobile Network Layer: Mobile IP Διδάσκων: Βασίλειος Σύρης Τμήμα: Πληροφορικής.
Net 221D:Computer Networks Fundamentals
IT 210: Web-based IT Fall 2012 Lecture: Network Basics, OSI, & Internet Architecture.
IPSec is a suite of protocols defined by the Internet Engineering Task Force (IETF) to provide security services at the network layer. standard protocol.
for SDN-based flow handover in wireless environments Daniel Corujo Carlos Guimarães Rui L. Aguiar
: MobileIP. : r Goal: Allow machines to roam around and maintain IP connectivity r Problem: IP addresses => location m This is important for efficient.
Ch. 23, 25 Q and A (NAT and UDP) Victor Norman IS333 Spring 2015.
 Abbreviation of fourth generation wireless technology  It will provide a comprehensive IP solution where voice, data and multimedia can be given to.
COM594: Mobile Technologies Location-Identifier Separation.
HIP-Based NAT Traversal in P2P-Environments
Introduction Wireless devices offering IP connectivity
4.1.5 multi-homing.
SCTP: Stream Control Transport Protocol
Network Virtualization
An Update on Multihoming in IPv6 Report on IETF Activity
Presentation transcript:

IPv6 Multihoming Support in the Mobile Internet Presented by Paul Swenson CMSC 681, Fall 2007 Article by M. Bagnulo et. al. and published in the October 2007 issue of IEEE Wireless Communications

Mobile Device Networking Support Modern “fourth-generation” (or 4G) mobile devices support multiple network interfaces Modern “fourth-generation” (or 4G) mobile devices support multiple network interfaces –Today, in the US, can buy advanced PDA phones that can speak both g (Wi-fi) and 1xRTT/EV-DO for data service. –Carriers will soon be rolling out WiMAX networks in the 2.5GHz and 700MHz bands (pending FCC auctioning of the new wireless spectrum). –Mobile phones of tomorrow will support these technologies and more for accessing Internet resources.

Benefits of Multiple Physical Interfaces By providing multiple redundant data interfaces, roaming capabilities are greatly enhanced By providing multiple redundant data interfaces, roaming capabilities are greatly enhanced Multiple path technology would allow for fault tolerance in data connections Multiple path technology would allow for fault tolerance in data connections –Preservation of established communications through outages of service or requisite roaming from one service to another Ability to route flow of data based on predefined quantifiers such as cost of access or quality of the connection Ability to route flow of data based on predefined quantifiers such as cost of access or quality of the connection

Problems with Current Implementations None of the currently-available mobility protocols support those advanced features None of the currently-available mobility protocols support those advanced features Current mobile devices support different interfaces, but switching is far from seamless, mostly a manual process right now Current mobile devices support different interfaces, but switching is far from seamless, mostly a manual process right now In order to fully realize the possibilities of modern mobile networks, a mechanism to provide mobile host multihoming support is required In order to fully realize the possibilities of modern mobile networks, a mechanism to provide mobile host multihoming support is required

Mobile IPv6 and SHIM6 The paper’s proposed solution to this problem is a combined Mobile IPv6 (MIPv6) and SHIM6-based approach The paper’s proposed solution to this problem is a combined Mobile IPv6 (MIPv6) and SHIM6-based approach –Backwards-compatible with existing transport protocols/applications –Any existing TCP or UDP-based protocols will benefit from the enhanced fault tolerance provided –Works around limitations inherent to MIPv6

Mobile IPv6 Multihoming Support Mobile IPv6 supports multihoming natively without any extra help Mobile IPv6 supports multihoming natively without any extra help Requires the client to send a special “Binding Update” MIPv6 message that it is going to be changing its active interface from the home address Requires the client to send a special “Binding Update” MIPv6 message that it is going to be changing its active interface from the home address Packets then are redirected to the “Mobile Node” until another “Binding Update” redirects them back to the home address Packets then are redirected to the “Mobile Node” until another “Binding Update” redirects them back to the home address

Disadvantages to this Approach If the connection between the handset and the home network is broken, there is no automatic failover to the mobile node If the connection between the handset and the home network is broken, there is no automatic failover to the mobile node Connections established while connected to the home network or one of the mobile nodes must be re-established, no automatic failover Connections established while connected to the home network or one of the mobile nodes must be re-established, no automatic failover Requires the home agent (a server running on the home network) to be available even when roaming as a mobile node for traffic to get through Requires the home agent (a server running on the home network) to be available even when roaming as a mobile node for traffic to get through

Why IPv6? IPv6 provides any-to-any route optimization support allowing packets to flow across whichever route is best suited (or available) to carry the flow of information IPv6 provides any-to-any route optimization support allowing packets to flow across whichever route is best suited (or available) to carry the flow of information Allow direct communication between the mobile node and the remote server w/out depending on the home agent Allow direct communication between the mobile node and the remote server w/out depending on the home agent

SHIM6 and Multihoming SHIM6 handles the case where you have a host A with n distinct addresses wanting to communicate with a host B with m distinct addresses. SHIM6 handles the case where you have a host A with n distinct addresses wanting to communicate with a host B with m distinct addresses. –A and B should be able to communicate across any of the addresses to any of the other addresses and all packets should make it to their destination w/out any input from the protocol layer

SHIM6 and Multihoming (2) Within the SHIM6 scheme, host A will do a DNS lookup, obtaining a subset of the addresses for host B. Within the SHIM6 scheme, host A will do a DNS lookup, obtaining a subset of the addresses for host B. SHIM6 will then use the RFC 3484 address selection process for IPv6 to choose one of the addresses of B to contact it on. SHIM6 will then use the RFC 3484 address selection process for IPv6 to choose one of the addresses of B to contact it on. Now, as part of the SHIM6 negotiation, the two peers exchange alternate locators so that in the event that one of the links fails, each end of the communication will know all possible ways to reach the other host. Now, as part of the SHIM6 negotiation, the two peers exchange alternate locators so that in the event that one of the links fails, each end of the communication will know all possible ways to reach the other host.

SHIM6 and Multihoming (3) IPv6 Reachability Protocol (REAP) is then used to verify that the currently used path is functioning. IPv6 Reachability Protocol (REAP) is then used to verify that the currently used path is functioning. Special keepalive packets are sent when data has not been transmitted after a certain amount of time in order to allow REAP to detect an outage based on time since last packet received Special keepalive packets are sent when data has not been transmitted after a certain amount of time in order to allow REAP to detect an outage based on time since last packet received

SHIM6 and Failures When a failure is detected by one of the hosts, that host enters an “exploratory phase” in which special probe packets are sent to each of the known addresses on the other end of the link (and using multiple interfaces on that host’s side) When a failure is detected by one of the hosts, that host enters an “exploratory phase” in which special probe packets are sent to each of the known addresses on the other end of the link (and using multiple interfaces on that host’s side) Based upon the received responses the communications channel is redirected over links that were successful in reaching the other host, thus preserving the information flow (be it connection-oriented or connection-less). Based upon the received responses the communications channel is redirected over links that were successful in reaching the other host, thus preserving the information flow (be it connection-oriented or connection-less). Thanks to SHIM6 and MIPv6, packets end up going to the target system, not a specific IP address on that system. Thanks to SHIM6 and MIPv6, packets end up going to the target system, not a specific IP address on that system.

Security in SHIM6 SHIM6 protects against redirection attacks using Cryptographically Generated Addresses (CGA) SHIM6 protects against redirection attacks using Cryptographically Generated Addresses (CGA) –CGAs are regular unicast IPv6 addresses that are signed with the interface identifier, a public key and the prefix of the address This allows a host to claim ownership over a specific CGA since it owns the private key This allows a host to claim ownership over a specific CGA since it owns the private key

Architecture (MIPv6 and SHIM6) The SHIM6 layer is considered to be on top (it is what applications interact with) The SHIM6 layer is considered to be on top (it is what applications interact with) The Mobile IPv6 layer is then situated below that in a block diagram The Mobile IPv6 layer is then situated below that in a block diagram The IP forwarding sublayer is then below the MIPv6 layer The IP forwarding sublayer is then below the MIPv6 layer

Conclusions Article provides an architecture for providing multihoming + failover support to 4G wireless nodes that will be capable of multiple simultaneous network links Article provides an architecture for providing multihoming + failover support to 4G wireless nodes that will be capable of multiple simultaneous network links Makes use of standard Mobile IPv6 and overlays SHIM6 on top to provide advanced failure detection using REAP and recovery support thanks to SHIM6 Makes use of standard Mobile IPv6 and overlays SHIM6 on top to provide advanced failure detection using REAP and recovery support thanks to SHIM6 Works without any modifications to the Mobile IPv6 protocol, making use of a standards-compliant multihoming mechanism layered on top of it. Works without any modifications to the Mobile IPv6 protocol, making use of a standards-compliant multihoming mechanism layered on top of it. Minimizes changes required to existing protocols (they should be able to function with little or no change and without being aware of the SHIM6 layer at all). Minimizes changes required to existing protocols (they should be able to function with little or no change and without being aware of the SHIM6 layer at all).