Presentation is loading. Please wait.

Presentation is loading. Please wait.

Session: 14S. K. Nayak14.1 Mobile Computing Session 14 Mobile IP S. K. Nayak Synergy, Dhenkanal.

Similar presentations


Presentation on theme: "Session: 14S. K. Nayak14.1 Mobile Computing Session 14 Mobile IP S. K. Nayak Synergy, Dhenkanal."— Presentation transcript:

1 Session: 14S. K. Nayak14.1 Mobile Computing Session 14 Mobile IP S. K. Nayak Synergy, Dhenkanal

2 Session: 14S. K. Nayak14.2 Effect of Mobility on Protocol Stack Application: new applications and adaptations Transport: congestion and flow control Network: addressing and routing Link: media access and handoff Physical: transmission errors and interference

3 Session: 14S. K. Nayak14.3 Routing and Mobility Finding a path from a source to a destination Issues –Frequent route changes –Route changes may be related to host movement –Low bandwidth links

4 Session: 14S. K. Nayak14.4 Routing and Mobility (contd) Goal of routing protocols –decrease routing-related overhead –find short routes –find “stable” routes (despite mobility)

5 Session: 14S. K. Nayak14.5 Mobile IP (RFC 3344): Motivation Traditional routing –based on IP address; network prefix determines the subnet –change of physical subnet implies change of IP address (conform to new subnet), or special routing table entries to forward packets to new subnet

6 Session: 14S. K. Nayak14.6 Mobile IP motivation Changing of IP address –DNS updates take to long time –TCP connections break –security problems Changing entries in routing tables –does not scale with the number of mobile hosts and frequent changes in the location –security problems

7 Session: 14S. K. Nayak14.7 Mobile IP requirements Solution requirements –retain same IP address –use same layer 2 protocols –authentication of registration messages, …

8 Session: 14S. K. Nayak14.8 Mobile IP: Basic Idea Router 1 Router 3 Router 2 S MN Home agent Source: Vaidya

9 Session: 14S. K. Nayak14.9 Mobile IP: Basic Idea Router 1 Router 3 Router 2 SMN Home agent Foreign agent move Packets are tunneled using IP in IP Source: Vaidya

10 Session: 14S. K. Nayak14.10 Mobile IP: Terminology Mobile Node (MN) –node that moves across networks without changing its IP address Correspondent Node (CN) –host with which MN is “corresponding” (TCP) Home Agent (HA) –host in the home network of the MN, typically a router –registers the location of the MN, tunnels IP packets to the COA

11 Session: 14S. K. Nayak14.11 Terminology (contd.) Foreign Agent (FA) –host in the current foreign network of the MN, typically a router –forwards tunneled packets to the MN, typically the default router for MN Care-of Address (COA) –address of the current tunnel end-point for the MN (at FA or MN) –actual location of the MN from an IP point of view

12 Session: 14S. K. Nayak14.12 Data transfer to the mobile system Internet sender FA HA MN home network foreign network receiver 1 2 3 1. Sender sends to the IP addr of MN, HA intercepts packet (proxy ARP) 2. HA tunnels packet to COA, here FA, by encapsulation 3. FA forwards the packet to the MN Source: Schiller CN

13 Session: 14S. K. Nayak14.13 Data transfer from the mobile system Internet receiver FA HA MN home network foreign network sender 1 1. Sender sends to the IP address of the receiver as usual, FA works as default router Source: Schiller CN

14 Session: 14S. K. Nayak14.14 Mobile IP: Basic Operation Agent Advertisement MN Registration HA Proxy Packet Tunneling

15 Session: 14S. K. Nayak14.15 Agent Advertisement HA/FA periodically send advertisement messages into their physical subnets MN listens to these messages and detects, if it is in home/foreign network MN reads a COA from the FA advertisement messages

16 Session: 14S. K. Nayak14.16 Agent advertisement preference level 1 router address 1 #addresses type addr. sizelifetime checksum COA 1 COA 2 typesequence numberlength 0 781516312423 code preference level 2 router address 2... registration lifetime... RBHFMGV reserved

17 Session: 14S. K. Nayak14.17 MN Registration MN signals COA to the HA via the FA HA acknowledges via FA to MN limited lifetime, need to be secured by authentication

18 Session: 14S. K. Nayak14.18 Registration t MN HA registration request registration reply t MN FAHA registration request registration request registration reply registration reply

19 Session: 14S. K. Nayak14.19 Registration request home agent home address typelifetime 0 781516312423 rsv identification COA extensions... SBDMGV

20 Session: 14S. K. Nayak14.20 HA Proxy and Tunneling HA Proxy –HA advertises the IP address of the MN (as for fixed systems) –packets to the MN are sent to the HA –independent of changes in COA/FA Packet Tunneling –HA to MN via FA

21 Session: 14S. K. Nayak14.21 Encapsulation original IP headeroriginal data new datanew IP header outer headerinner headeroriginal data

22 Session: 14S. K. Nayak14.22 IP-in-IP encapsulation IP-in-IP-encapsulation (mandatory in RFC 2003) –tunnel between HA and COA Care-of address COA IP address of HA TTL IP identification IP-in-IPIP checksum flagsfragment offset lengthTOSver.IHL IP address of MN IP address of CN TTL IP identification lay. 4 prot.IP checksum flagsfragment offset lengthTOSver.IHL TCP/UDP/... payload

23 Session: 14S. K. Nayak14.23 IP header fields Source and Destination addresses are those of the tunnel end points Internet header length : –Length of outer header in 32 bit words Total length : –Measures length of entire encapsulated IP datagram Don’t fragment bit : –Copied from inner header if set Time to live TTL: –Appr time to deliver to tunnel exit

24 Session: 14S. K. Nayak14.24 Routing failures If IP source addr of datagram matches that of the receiving router itself, then discard packet If IP source addr matches that of the tunnel exit point, then discard packet

25 Session: 14S. K. Nayak14.25 ICMP messages from the tunnel Encapsulator may receive ICMP messages from any intermediate router in the tunnel other than exit Network unreachable: –Return dest unreachable message to org sender Host unreachable: –Return host unreachable message Datagram too big: –Relay ICMP datagram too big to org sender

26 Session: 14S. K. Nayak14.26 ICMP error messages (contd.) Source route failed: –Handled by encapsulator itself and MUST NOT relay message to orginal sender Source quench: –SHOULD NOT relay message to original sender, SHOULD activate congestion control mechanism Time exceeded: –MUST be reported to original sender as host unreachable message

27 Session: 14S. K. Nayak14.27 Tunnel management ICMP requires routers to return 8 bytes of datagram beyond IP header –This may not contain the original datagram So not always possible for encapsulator to relay ICMP messages from interior of tunnel to original sender

28 Session: 14S. K. Nayak14.28 Tunnel soft state Encapsulator maintains “soft state” about tunnel –MTU of the tunnel –TTL (path length) of tunnel –Reachability of the tunnel Encapsulator updates soft state based on ICMP messages received

29 Session: 14S. K. Nayak14.29 Tunnel management (example) If TTL of received packet is less than the TTL value in soft state, then return error message to sender If size of received datagram is bigger than MTU of tunnel and if “don’t fragment” bit set, then return datagram too big message to sender

30 Session: 14S. K. Nayak14.30 Mobile IP: Other Issues Reverse Tunneling –firewalls permit only “topological correct“ addresses Optimizations –Triangular Routing: HA informs sender the current location of MN –Change of FA: new FA informs old FA to avoid packet loss

31 Session: 14S. K. Nayak14.31 Reverse tunneling (RFC 3024) Internet receiver FA HA MN home network foreign network sender 3 2 1 1. MN sends to FA 2. FA tunnels packets to HA by encapsulation 3. HA forwards the packet to the receiver (standard case) CN

32 Session: 14S. K. Nayak14.32 Mobile IP: Reverse tunneling Router accept often only “topological correct“ addresses (firewall!) –a packet from the MN encapsulated by the FA is now topological correct –furthermore multicast and TTL problems solved (TTL in the home network correct, but MN is too far away from the receiver)

33 Session: 14S. K. Nayak14.33 Reverse tunneling Reverse tunneling does not solve –problems with firewalls, the reverse tunnel can be abused to circumvent security mechanisms (tunnel hijacking) –optimization of data paths, i.e. packets will be forwarded through the tunnel via the HA to a sender (double triangular routing)

34 Session: 14S. K. Nayak14.34 Optimization of forwarding Triangular Routing –sender sends all packets via HA to MN –higher latency and network load “Solutions” –sender learns the current location of MN –direct tunneling to this location –HA informs a sender about the location of MN

35 Session: 14S. K. Nayak14.35 Binding Registration: When node acquires a new care-of address Intimation: Node must intimate to –HA –Correspondent node Binding Ack: Node may expect an Ack Life-time: Node should know its likely time of association.

36 Session: 14S. K. Nayak14.36 Binding Update Option Type AHLRESUMELIFE TIME IDENTIFICATION CARE-OF ADDRESS Node maintains a counter and increments it as and when it acquires a c/o addr Binding update is identified by this field. Care of address acquired by node is reflected in this field Binding update survives for the time specified as Life Time Distinguishing Link-Local address H=1 : Request to serve as Home Agent L=1 : Link-Local Address included A=1 : Ack reqd. HOME LINK LEVEL ADDRESS Option Length

37 Session: 14S. K. Nayak14.37 Binding Ack Option Type Option Length IDENTIFICATION Refrsh Life Time Field copied from received Binding-update Life -time for which Binding will be cached

38 Session: 14S. K. Nayak14.38 Mobile Node Operation IP decapsulation Send Binding updates Receive Binding Ack Keep track of Nodes (because of Life-time) Send Binding Updates using Routing Header

39 Session: 14S. K. Nayak14.39 Correspondent Node Operations Process received Binding Updates Send Binding-Ack Maintain Binding-Cache Maintain Security Association

40 Session: 14S. K. Nayak14.40 Packet Delivery at CN Entries in Binding- Cache Yes No Send to HA Using Normal Procedure Send Directly to Care-of Addr ICMP Error Message Recd Yes Delete entry in Binding -Cache Wait for fresh Binding

41 Session: 14S. K. Nayak14.41 Home Agent Operations Send Binding-Ack to Binding Updates Encapsulate Packets for tunneling Neighbour Advertisement Proxy Neighbour Advertisement Home Agent Discovery Handle returned ICMP errors

42 Session: 14S. K. Nayak14.42 Change of FA packets on-the-fly during the change can be lost new FA informs old FA to avoid packet loss, old FA now forwards remaining packets to new FA this information also enables the old FA to release resources for the MN

43 Session: 14S. K. Nayak14.43 Change of foreign agent CNHAFA old FA new MN t request update ACK data MN changes location registration update ACK data warning update ACK data registration

44 Session: 14S. K. Nayak14.44 Mobile IP Summary Mobile node moves to new location Agent Advertisement by foreign agent Registration of mobile node with home agent Proxying by home agent for mobile node Encapsulation of packets Tunneling by home agent to mobile node via foreign agent


Download ppt "Session: 14S. K. Nayak14.1 Mobile Computing Session 14 Mobile IP S. K. Nayak Synergy, Dhenkanal."

Similar presentations


Ads by Google