Session: 14S. K. Nayak14.1 Mobile Computing Session 14 Mobile IP S. K. Nayak Synergy, Dhenkanal.

Slides:



Advertisements
Similar presentations
Mobile IP Outline Intro to mobile IP Operation Problems with mobility.
Advertisements

Lecture 10: Network Protocols/Mobile IP. Introduction to TCP/IP networking.
Mobile Communications-Network Protocols/Mobile IP
1 Introduction to Mobile IPv6 IIS5711: Mobile Computing Mobile Computing and Broadband Networking Laboratory CIS, NCTU.
MIP Extensions: FMIP & HMIP
IP Mobility Support Basic idea of IP mobility management
MOBILE NETWORK LAYER Mobile IP.
資 管 Lee Lesson 12 IPv6 Mobility. 資 管 Lee Lesson Objectives Components of IPv6 mobility IPv6 mobility messages and options IPv6 mobility data structures.
1 Mobile IP Myungchul Kim Tel:
Mobile IP Overview: Standard IP Standard IP Evolution of Mobile IP Evolution of Mobile IP How it works How it works Problems Assoc. with it Problems Assoc.
MOBILITY SUPPORT IN IPv6
Chapter 13 Mobile IP. Outline  ADDRESSING  AGENTS  THREE PHASES  AGENT DISCOVERY  REGISTRATION  DATA TRANSFER  INEFFICIENCY IN MOBILE IP.
A Study of Mobile IP Kunal Ganguly Wichita State University CS843 – Distributed Computing.
IPv6 Mobility David Bush. Correspondent Node Operation DEF: Correspondent node is any node that is trying to communicate with a mobile node. This node.
Internet Networking Spring 2003
CMPE Wireless and Mobile Networking 1 CMPE 257 Spring 2006 Wireless Internetworking 2 Wireless and Mobile Networks.
Mobile IP.
IP Mobility Support Basic idea of IP mobility management o understand the issues of network-layer mobility support in IP network o understand the basic.
Internet Command Message Protocol (ICMP) CS-431 Dick Steflik.
Mobile IP Polytechnic University Anthony Scalera Heine Nzumafo Duminda Wickramasinghe Edited by: Malathi Veeraraghavan 12/05/01.
Wireless & Mobile Communications Chapter 6: Network Protocols/Mobile IP  Motivation  Data transfer  Encapsulation  Security  IPv6  Problems  DHCP.
Guide to TCP/IP, Third Edition
ICMP (Internet Control Message Protocol) Computer Networks By: Saeedeh Zahmatkesh spring.
Slide 1, Dr. Wolfgang Böhm, Mobile Internet, © Siemens AG 2001 Dr. Wolfgang Böhm Siemens AG, Mobile Internet Dr. Wolfgang.
Mobile IP Seamless connectivity for mobile computers.
1 Chapter06 Mobile IP. 2 Outline What is the problem at the routing layer when Internet hosts move?! Can the problem be solved? What is the standard solution?
Hamid Sheikhghanbari Sukesh Moolya
IPv6 Mobility Milo Liu SW2 R&D ZyXEL Communications, Inc.
National Institute Of Science & Technology Mobile IP Jiten Mishra (EC ) [1] MOBILE IP Under the guidance of Mr. N. Srinivasu By Jiten Mishra EC
Mobile IP Most of the slides borrowed from Prof. Sridhar Iyer
Mobile IP Chapter 19. Introduction Mobile IP is designed to allow portable computers to move from one network to another Associated with wireless technologies.
1 Sideseadmed (IRT0040) loeng 5/2010 Avo
IT351: Mobile & Wireless Computing
Mobile IP Miae Woo. By Miae Woo2 Motivation for Mobile IP Routing  based on IP destination address, network prefix (e.g ) determines physical.
Fall 2005Computer Networks20-1 Chapter 20. Network Layer Protocols: ARP, IPv4, ICMPv4, IPv6, and ICMPv ARP 20.2 IP 20.3 ICMP 20.4 IPv6.
Mobile Communications: Network Protocols/Mobile IP Mobile Communications Chapter 9: Network Protocols/Mobile IP  Motivation  Data transfer  Encapsulation.
1 Internet Control Message Protocol (ICMP) Used to send error and control messages. It is a necessary part of the TCP/IP suite. It is above the IP module.
Mobile IP Outline Intro to mobile IP Operation Problems with mobility.
1 Mobility Support in IPv6 (MIPv6) Chun-Chuan Yang Dept. Computer Science & Info. Eng. National Chi Nan University.
1 Chapter 23 Internetworking Part 3 (Control Messages, Error Handling, ICMP)
Understanding IPv6 Slide: 1 Lesson 12 IPv6 Mobility.
Introduction to Mobile IPv6
Mobile IP Lec#9. Lecture Objectives ● Present the basic principles of addressing in IP networks ● Describe the problem of mobility with IP and consider.
Mobile IP 순천향대학교 정보기술공학부 이 상 정 VoIP 특론 순천향대학교 정보기술공학부 이 상 정 2 References  Tutorial: Mobile IP
Ασύρματες και Κινητές Επικοινωνίες Ενότητα # 10: Mobile Network Layer: Mobile IP Διδάσκων: Βασίλειος Σύρης Τμήμα: Πληροφορικής.
Mobile IP Definition: Mobile IP is a standard communication protocol, defined to allow mobile device users to move from one IP network to another while.
An Introduction to Mobile IPv4
Mobile IP 순천향대학교 전산학과 문종식
DMET 602: Networks and Media Lab Amr El Mougy Yasmeen EssamAlaa Tarek.
Mobility support in IP v4. Internet Computing (CS-413) 2.
Mobile IP THE 12 TH MEETING. Mobile IP  Incorporation of mobile users in the network.  Cellular system (e.g., GSM) started with mobility in mind. 
1 Chapter 23 Internetworking Part 3 (Control Messages, Error Handling, ICMP)
ROUTING MOBILE IP  Motivation  Data transfer  Encapsulation.
1 OverviewOverview A device on a network is reachable through normal IP routing by the IP address it is assigned on the network. The problem occurs when.
DMET 602: Networks and Media Lab
RFC 3775 IPv6 Mobility Support
Networking Applications
Mobile IP.
EA C451 Vishal Gupta.
Introduction to Wireless Networking
© Model Engineering College
Unit 3 Mobile IP Network Layer
DMET 602: Networks and Media Lab
Unit 3- Mobile Network layer  Motivation  Data transfer  Encapsulation  Security  IPv6  Problems  DHCP  Ad-hoc networks  Routing protocols.
CSE 4215/5431: Mobile Communications Winter 2010
CSE 4215/5431: Mobile Communications Winter 2011
Mobile IP Outline Homework #4 Solutions Intro to mobile IP Operation
Mobile IP Outline Intro to mobile IP Operation Problems with mobility.
Mobile IP Outline Intro to mobile IP Operation Problems with mobility.
Mobile IP-2 CS441 – Mobile & Wireless Computing
Presentation transcript:

Session: 14S. K. Nayak14.1 Mobile Computing Session 14 Mobile IP S. K. Nayak Synergy, Dhenkanal

Session: 14S. K. Nayak14.2 Effect of Mobility on Protocol Stack Application: new applications and adaptations Transport: congestion and flow control Network: addressing and routing Link: media access and handoff Physical: transmission errors and interference

Session: 14S. K. Nayak14.3 Routing and Mobility Finding a path from a source to a destination Issues –Frequent route changes –Route changes may be related to host movement –Low bandwidth links

Session: 14S. K. Nayak14.4 Routing and Mobility (contd) Goal of routing protocols –decrease routing-related overhead –find short routes –find “stable” routes (despite mobility)

Session: 14S. K. Nayak14.5 Mobile IP (RFC 3344): Motivation Traditional routing –based on IP address; network prefix determines the subnet –change of physical subnet implies change of IP address (conform to new subnet), or special routing table entries to forward packets to new subnet

Session: 14S. K. Nayak14.6 Mobile IP motivation Changing of IP address –DNS updates take to long time –TCP connections break –security problems Changing entries in routing tables –does not scale with the number of mobile hosts and frequent changes in the location –security problems

Session: 14S. K. Nayak14.7 Mobile IP requirements Solution requirements –retain same IP address –use same layer 2 protocols –authentication of registration messages, …

Session: 14S. K. Nayak14.8 Mobile IP: Basic Idea Router 1 Router 3 Router 2 S MN Home agent Source: Vaidya

Session: 14S. K. Nayak14.9 Mobile IP: Basic Idea Router 1 Router 3 Router 2 SMN Home agent Foreign agent move Packets are tunneled using IP in IP Source: Vaidya

Session: 14S. K. Nayak14.10 Mobile IP: Terminology Mobile Node (MN) –node that moves across networks without changing its IP address Correspondent Node (CN) –host with which MN is “corresponding” (TCP) Home Agent (HA) –host in the home network of the MN, typically a router –registers the location of the MN, tunnels IP packets to the COA

Session: 14S. K. Nayak14.11 Terminology (contd.) Foreign Agent (FA) –host in the current foreign network of the MN, typically a router –forwards tunneled packets to the MN, typically the default router for MN Care-of Address (COA) –address of the current tunnel end-point for the MN (at FA or MN) –actual location of the MN from an IP point of view

Session: 14S. K. Nayak14.12 Data transfer to the mobile system Internet sender FA HA MN home network foreign network receiver Sender sends to the IP addr of MN, HA intercepts packet (proxy ARP) 2. HA tunnels packet to COA, here FA, by encapsulation 3. FA forwards the packet to the MN Source: Schiller CN

Session: 14S. K. Nayak14.13 Data transfer from the mobile system Internet receiver FA HA MN home network foreign network sender 1 1. Sender sends to the IP address of the receiver as usual, FA works as default router Source: Schiller CN

Session: 14S. K. Nayak14.14 Mobile IP: Basic Operation Agent Advertisement MN Registration HA Proxy Packet Tunneling

Session: 14S. K. Nayak14.15 Agent Advertisement HA/FA periodically send advertisement messages into their physical subnets MN listens to these messages and detects, if it is in home/foreign network MN reads a COA from the FA advertisement messages

Session: 14S. K. Nayak14.16 Agent advertisement preference level 1 router address 1 #addresses type addr. sizelifetime checksum COA 1 COA 2 typesequence numberlength code preference level 2 router address 2... registration lifetime... RBHFMGV reserved

Session: 14S. K. Nayak14.17 MN Registration MN signals COA to the HA via the FA HA acknowledges via FA to MN limited lifetime, need to be secured by authentication

Session: 14S. K. Nayak14.18 Registration t MN HA registration request registration reply t MN FAHA registration request registration request registration reply registration reply

Session: 14S. K. Nayak14.19 Registration request home agent home address typelifetime rsv identification COA extensions... SBDMGV

Session: 14S. K. Nayak14.20 HA Proxy and Tunneling HA Proxy –HA advertises the IP address of the MN (as for fixed systems) –packets to the MN are sent to the HA –independent of changes in COA/FA Packet Tunneling –HA to MN via FA

Session: 14S. K. Nayak14.21 Encapsulation original IP headeroriginal data new datanew IP header outer headerinner headeroriginal data

Session: 14S. K. Nayak14.22 IP-in-IP encapsulation IP-in-IP-encapsulation (mandatory in RFC 2003) –tunnel between HA and COA Care-of address COA IP address of HA TTL IP identification IP-in-IPIP checksum flagsfragment offset lengthTOSver.IHL IP address of MN IP address of CN TTL IP identification lay. 4 prot.IP checksum flagsfragment offset lengthTOSver.IHL TCP/UDP/... payload

Session: 14S. K. Nayak14.23 IP header fields Source and Destination addresses are those of the tunnel end points Internet header length : –Length of outer header in 32 bit words Total length : –Measures length of entire encapsulated IP datagram Don’t fragment bit : –Copied from inner header if set Time to live TTL: –Appr time to deliver to tunnel exit

Session: 14S. K. Nayak14.24 Routing failures If IP source addr of datagram matches that of the receiving router itself, then discard packet If IP source addr matches that of the tunnel exit point, then discard packet

Session: 14S. K. Nayak14.25 ICMP messages from the tunnel Encapsulator may receive ICMP messages from any intermediate router in the tunnel other than exit Network unreachable: –Return dest unreachable message to org sender Host unreachable: –Return host unreachable message Datagram too big: –Relay ICMP datagram too big to org sender

Session: 14S. K. Nayak14.26 ICMP error messages (contd.) Source route failed: –Handled by encapsulator itself and MUST NOT relay message to orginal sender Source quench: –SHOULD NOT relay message to original sender, SHOULD activate congestion control mechanism Time exceeded: –MUST be reported to original sender as host unreachable message

Session: 14S. K. Nayak14.27 Tunnel management ICMP requires routers to return 8 bytes of datagram beyond IP header –This may not contain the original datagram So not always possible for encapsulator to relay ICMP messages from interior of tunnel to original sender

Session: 14S. K. Nayak14.28 Tunnel soft state Encapsulator maintains “soft state” about tunnel –MTU of the tunnel –TTL (path length) of tunnel –Reachability of the tunnel Encapsulator updates soft state based on ICMP messages received

Session: 14S. K. Nayak14.29 Tunnel management (example) If TTL of received packet is less than the TTL value in soft state, then return error message to sender If size of received datagram is bigger than MTU of tunnel and if “don’t fragment” bit set, then return datagram too big message to sender

Session: 14S. K. Nayak14.30 Mobile IP: Other Issues Reverse Tunneling –firewalls permit only “topological correct“ addresses Optimizations –Triangular Routing: HA informs sender the current location of MN –Change of FA: new FA informs old FA to avoid packet loss

Session: 14S. K. Nayak14.31 Reverse tunneling (RFC 3024) Internet receiver FA HA MN home network foreign network sender MN sends to FA 2. FA tunnels packets to HA by encapsulation 3. HA forwards the packet to the receiver (standard case) CN

Session: 14S. K. Nayak14.32 Mobile IP: Reverse tunneling Router accept often only “topological correct“ addresses (firewall!) –a packet from the MN encapsulated by the FA is now topological correct –furthermore multicast and TTL problems solved (TTL in the home network correct, but MN is too far away from the receiver)

Session: 14S. K. Nayak14.33 Reverse tunneling Reverse tunneling does not solve –problems with firewalls, the reverse tunnel can be abused to circumvent security mechanisms (tunnel hijacking) –optimization of data paths, i.e. packets will be forwarded through the tunnel via the HA to a sender (double triangular routing)

Session: 14S. K. Nayak14.34 Optimization of forwarding Triangular Routing –sender sends all packets via HA to MN –higher latency and network load “Solutions” –sender learns the current location of MN –direct tunneling to this location –HA informs a sender about the location of MN

Session: 14S. K. Nayak14.35 Binding Registration: When node acquires a new care-of address Intimation: Node must intimate to –HA –Correspondent node Binding Ack: Node may expect an Ack Life-time: Node should know its likely time of association.

Session: 14S. K. Nayak14.36 Binding Update Option Type AHLRESUMELIFE TIME IDENTIFICATION CARE-OF ADDRESS Node maintains a counter and increments it as and when it acquires a c/o addr Binding update is identified by this field. Care of address acquired by node is reflected in this field Binding update survives for the time specified as Life Time Distinguishing Link-Local address H=1 : Request to serve as Home Agent L=1 : Link-Local Address included A=1 : Ack reqd. HOME LINK LEVEL ADDRESS Option Length

Session: 14S. K. Nayak14.37 Binding Ack Option Type Option Length IDENTIFICATION Refrsh Life Time Field copied from received Binding-update Life -time for which Binding will be cached

Session: 14S. K. Nayak14.38 Mobile Node Operation IP decapsulation Send Binding updates Receive Binding Ack Keep track of Nodes (because of Life-time) Send Binding Updates using Routing Header

Session: 14S. K. Nayak14.39 Correspondent Node Operations Process received Binding Updates Send Binding-Ack Maintain Binding-Cache Maintain Security Association

Session: 14S. K. Nayak14.40 Packet Delivery at CN Entries in Binding- Cache Yes No Send to HA Using Normal Procedure Send Directly to Care-of Addr ICMP Error Message Recd Yes Delete entry in Binding -Cache Wait for fresh Binding

Session: 14S. K. Nayak14.41 Home Agent Operations Send Binding-Ack to Binding Updates Encapsulate Packets for tunneling Neighbour Advertisement Proxy Neighbour Advertisement Home Agent Discovery Handle returned ICMP errors

Session: 14S. K. Nayak14.42 Change of FA packets on-the-fly during the change can be lost new FA informs old FA to avoid packet loss, old FA now forwards remaining packets to new FA this information also enables the old FA to release resources for the MN

Session: 14S. K. Nayak14.43 Change of foreign agent CNHAFA old FA new MN t request update ACK data MN changes location registration update ACK data warning update ACK data registration

Session: 14S. K. Nayak14.44 Mobile IP Summary Mobile node moves to new location Agent Advertisement by foreign agent Registration of mobile node with home agent Proxying by home agent for mobile node Encapsulation of packets Tunneling by home agent to mobile node via foreign agent