COM555: Mobile Technologies Location-Identifier Separation.

Slides:



Advertisements
Similar presentations
© Antônio M. Alberti 2011 Host Identification and Location Decoupling: A Comparison of Approaches Bruno Magalhães Martins Antônio Marcos Alberti.
Advertisements

LISP Mobile Node LISP Mobile Node draft-meyer-lisp-mn-00.txt Dino Farinacci, Vince Fuller, Darrel Lewis and David Meyer IETF StockholmHiroshima LISP Working.
Why do current IP semantics cause scaling issues? −Today, “addressing follows topology,” which limits route aggregation compactness −Overloaded IP address.
IPv4 - IPv6 Integration and Coexistence Strategies Warakorn Sae-Tang Network Specialist Professional Service Department A Subsidiary.
Mobile IP: enable mobility for IP-based networks CS457 presentation Xiangchuan Chen Nov 6, 2001.
IP Mobility Support Basic idea of IP mobility management
20.1 Chapter 20 Network Layer: Internet Protocol Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
Media Access Control (MAC) addresses in the network access layer ▫ Associated w/ network interface card (NIC) ▫ 48 bits or 64 bits IP addresses for the.
A Study of Mobile IP Kunal Ganguly Wichita State University CS843 – Distributed Computing.
COS 420 Day 20. Agenda Group Project Discussion Protocol Definition Due April 12 Paperwork Due April 29 Assignment 3 Due Assignment 4 is posted Last Assignment.
1 Review of Important Networking Concepts Introductory material. This module uses the example from the previous module to review important networking concepts:
Mobile IP.
Chapter 2 Network Models.
Networking DSC340 Mike Pangburn. Networking: Computers on the Internet  1969 – 4  1971 – 15  1984 – 1000  1987 – 10,000  1989 – 100,000  1992 –
 The Open Systems Interconnection model (OSI model) is a product of the Open Systems Interconnection effort at the International Organization for Standardization.
IP/ICMP Translation Algorithm (IIT) Xing Li, Congxiao Bao, Fred Baker
Understanding Networks Charles Zangla. Network Models Before I can explain how connections are made from across the country, I would like to provide you.
1 Review of Important Networking Concepts Introductory material. This slide uses the example from the previous module to review important networking concepts:
CS 356 Systems Security Spring Dr. Indrajit Ray
The OSI Model and the TCP/IP Protocol Suite
Host Identity Protocol
資 管 Lee Lesson 11 Coexistence and Migration. 資 管 Lee Lesson Objectives Coexistence and migration overview Coexistence mechanisms ◦ Dual Stack ◦ Tunneling.
1Group 07 IPv6 2 1.ET/06/ ET/06/ ET/06/ EE/06/ EE/06/ EE/06/6473 Group 07 IPv6.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Addressing the Network – IPv4 Network Fundamentals – Chapter 6.
CECS 5460 – Assignment 3 Stacey VanderHeiden Güney.
Mobile IP Performance Issues in Practice. Introduction What is Mobile IP? –Mobile IP is a technology that allows a "mobile node" (MN) to change its point.
Mobile IP: Introduction Reference: “Mobile networking through Mobile IP”; Perkins, C.E.; IEEE Internet Computing, Volume: 2 Issue: 1, Jan.- Feb. 1998;
Host Mobility for IP Networks CSCI 6704 Group Presentation presented by Ye Liang, ChongZhi Wang, XueHai Wang March 13, 2004.
Presentation on Osi & TCP/IP MODEL
Lecture 2 TCP/IP Protocol Suite Reference: TCP/IP Protocol Suite, 4 th Edition (chapter 2) 1.
Networks – Network Architecture Network architecture is specification of design principles (including data formats and procedures) for creating a network.
Networks QUME 185 Introduction to Computer Applications.
Computer Networks (CS 132/EECS148) General Networking Example Karim El Defrawy Donald Bren School of Information and Computer Science University of California.
Basic Transition Mechanisms for IPv6 Hosts and Routers -RFC 4213 Kai-Po Yang
CMPT 471 Networking II Address Resolution IPv4 ARP RARP 1© Janice Regan, 2012.
Practical Considerations for Securely Deploying Mobility Will Ivancic NASA Glenn Research Center (216)
EID: RLOC: IRTF MobOpts – Quebec City July
RIPE Berlin – May, 2008 Vince Fuller (for Dino, Dave, Darrel, et al) LISP: Intro and Update
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 OSI Network Layer Network Fundamentals – Chapter 5.
CSE 6590 Department of Computer Science & Engineering York University 111/9/ :26 AM.
Mobile IP Outline Intro to mobile IP Operation Problems with mobility.
LISP Deployment Scenarios Darrel Lewis and Margaret Wasserman IETF 76, Hiroshima, Japan.
S305 – Network Infrastructure Chapter 5 Network and Transport Layers.
IP addresses IPv4 and IPv6. IP addresses (IP=Internet Protocol) Each computer connected to the Internet must have a unique IP address.
Ασύρματες και Κινητές Επικοινωνίες Ενότητα # 10: Mobile Network Layer: Mobile IP Διδάσκων: Βασίλειος Σύρης Τμήμα: Πληροφορικής.
What is an IP address? Each and every computer that you use that connects to the internet or a network uses a specific range of numbers separated by periods.
Mobile IP Definition: Mobile IP is a standard communication protocol, defined to allow mobile device users to move from one IP network to another while.
Mobile IP 순천향대학교 전산학과 문종식
J. Liebeher (modified by M. Veeraraghavan) 1 Introduction Complexity of networking: An example Layered communications The TCP/IP protocol suite.
: MobileIP. : r Goal: Allow machines to roam around and maintain IP connectivity r Problem: IP addresses => location m This is important for efficient.
- 1 - DPNM Review of Important Networking Concepts J. Won-Ki Hong Dept. of Computer Science and Engineering POSTECH Tel:
COM594: Mobile Technologies Location-Identifier Separation.
Lecture 14 Mobile IP. Mobile IP (or MIP) is an Internet Engineering Task Force (IETF) standard communications protocol that is designed to allow mobile.
Mobile IP THE 12 TH MEETING. Mobile IP  Incorporation of mobile users in the network.  Cellular system (e.g., GSM) started with mobility in mind. 
Chapter 9 Introduction To Data-Link Layer 9.# 1
Introduction Wireless devices offering IP connectivity
Lecture 3 By Miss Irum Matloob.
Network Architecture Introductory material
Lec 5 Layers Computer Networks Al-Mustansiryah University
Net 323: NETWORK Protocols
NAT/ARP/RARP (Ch 5 & 8) Dr. Clincy Lecture.
Review of Important Networking Concepts
Net 431: ADVANCED COMPUTER NETWORKS
8PM – Quickly Overview Final Project
Data Communication Networks
Chapter 11: Network Address Translation for IPv4
Mobile IP Outline Homework #4 Solutions Intro to mobile IP Operation
Mobile IP Outline Intro to mobile IP Operation Problems with mobility.
Review of Important Networking Concepts
Lecture 4a Mobile IP 1.
Presentation transcript:

COM555: Mobile Technologies Location-Identifier Separation

Application Layer Transport Layer Internet Layer Data Link Layer Physical Layer IP-address,, port (Endpoint Identifier) IP-address (Routing Locator) In the current Internet TCP/IP Protocol Stack, the IP address functions simultaneously as: A Routing Locator (an identifier with a topological meaning) and An Endpoint Identifier

Location-Identifier Separation When a host changes its point of attachment to the Internet, its IP address must change as well Therefore all transport sessions will break There have been various ‘workarounds’ to implement mobility on the Internet

Location-Identifier Separation More fundamental approaches aim to separate Routing Locators and Endpoint Identifiers to remove all identification related functionality from topology related information such as IP addresses. Current implementations adopt IP as the communications endpoint. New approaches have become known as Location-Identifier (L.I.) Separation.

Location-Identifier Separation These more fundamental approaches require the redesign of the Internet protocol stack: Such proposals are, by definition radical, and will be difficult to implement. (Recall IPv4 vs Ipv6) The ideas have emerged from the Routing Research Group (RRG) of the Internet Research Task Force (IRTF)

L.I Separation The lack of L.I. Separation causes problems beyond simply mobility: A key issue is user location privacy When –Identifiers are long lived, and –A publicly available mapping exists between identifiers and locators, it is possible to determine the location of a host and thus, the user using it Without the user’s permission, or knowledge

Privacy Invasion of privacy is increasingly becoming a criminal offence! It is important that new mechanisms, by default, do not reveal the location of a particular host to unknown observers.

Proposed Solutions Four proposed solutions have exercised the RRG: The Host Identity Protocol (HIP) Network Address Translation for IPv6 to IPv6 (NAT66) Identifier-Locator Network Protocol (ILNP) Location-Identifier Separation Protocol- Mobile Node (LISP-MN)

Fundamental Approaches to Location- Identifier Separation Most approaches to LI Separation fall into two broad categories: –Those that introduce an extra layer to hold the original endpoint identifiers –Those that split the IPv6 address space into a part that has topological meaning, and a part that is used to identify the host.

Case Study All four approaches have their advocates and detractors. None of them are ‘perfect’. All are ‘work in progress’ We will briefly review LISP-MN as this has gained significant industrial support in recent years.

Location-Identifier Separation Protocol – Mobile Node (LISP-MN) The LISP-NM Protocol enables a mobile node to roam across network whilst retaining its IP address. During hand-off, sessions may ‘pause’, and some data loss is possible. The key issue however is that sessions are not dropped. So they do not have to be set up again

LISP-MN LISP-MN aims to make it possible for mobile devices to roam while keeping TCP sessions alive and to be simultaneously connected to two different networks. (Multihomed). LISP-MN is based on a LISP infrastructure:

LISP Lisp implements a Map-and-Encap scheme. Packets are encapsulated at the border router of the sender domain: The Ingress Tunnel Router. (ITR) Packets are decapsulated at the border router of the receiver domain: The Egress Tunnel Router (ETR)

Encapsulation By this mechanism, core routing (routing between domains) is independent of the encapsulated endpoint identifiers. LISP adds an extra Internet layer below the existing one.

15 Application Layer Transport Layer Internet Layer Data Link Layer Physical Layer Identifier Internet Layer Locator Identifier LISP Stack

LISP Transmission 1.The Host looks up the correspondent host in a DNS and gets an Endpoint Identifier; 2.Host makes a packet with it source Endpoint Identifier and the Destination Endpoint Identifier 3.Packet is sent to the ITR which encapsulates it with the Routing Locator of the ITR as the source, and the Routing Locator of an ETR as the target. (This requires a mapping mechanism) 4.The packet is transmitted over the Internet to the ETR 5.The ETR decapsulates the packet and sends it to the destination Endpoint Identifier

17 RLOC ITR1: /8 RLOC ITR1: /8 RLOC ITR2: /8 RLOC ITR2: /8 RLOC ETR2: /8 RLOC ETR2: /8 RLOC ETR1: /8 RLOC ETR1: /8 Internet Core EID: /8 EID: /8 EID: /8 EID: /8 EID: EID: EID: EID: > > Host EID wants To send to Host EID ITR2 does a DNS on and gets and : The latter has priority The packet Arrives at ITR2 ITR2 encapsulates The packet with source and Destination in a packet With source And destination ETR1 receives the packet And decapsulates it. ETR! Forwards the packet To EID Typical LISP Scenario

LISP-MN LISP-MN leverages the mapping infrastructure of LISP to support mobile devices This happens by turning the mobile device into a LISP ITR and ETR for itself The mobile device sends map requests All packets originating at the mobile device are LISP encapsulated

Map Servers The mobile device can answer directly to incoming Map requests, or it can designate its map server as a proxy Map Servers have similar behaviour to Home Agents in Mobile IP Unlike mobile IP, the actual data never flows through these servers. They just answer to the mapping requests. Also, home agents never provide mapping information because that is left to the mobile node

20 RLOC ITR1: /8 RLOC ITR1: /8 RLOC ITR2: /8 RLOC ITR2: /8 3G: /8 3G: /8 WiFi: /8 WiFi: /8 Internet Core Domain EID: /8 Domain EID: /8 Source EID: Source EID: Dest EID: Dest EID: > > G WiFi > Example: EID wants to send a packet to EID Mobile host has lost its Wi Fi connection but still has GSM 1.Mobile node updates the Mapping Server to indicate that it is accessible via , but not The packet arrives at ITR2 (Which has Routing Locator ) 3.ITR2 Looks up Routing Locators corresponding with EID and finds ITR2 encapsulates the packet and forwards as normal over the Internet core 5.The mobile host receives the packet and decapsulates it. RLOC Host Mapping Server

References CISCO Demo LISP_MN – – os-software/locator-id-separation-protocol- lisp/index.htmlhttp:// os-software/locator-id-separation-protocol- lisp/index.html – – LISP Mobile Project (this is just a link of interest) –