Beruflich Dokumente
Kultur Dokumente
Routing
q based on IP destination address, network prefix (e.g. 129.13.42)
determines physical subnet
q change of physical subnet implies change of IP address to have a
topological correct address (standard IP) or needs special entries in
the routing tables
Specific routes to end-systems?
q change of all routing table entries to forward packets to the right
destination
q does not scale with the number of mobile hosts and frequent
changes in the location, security problems
Changing the IP-address?
q adjust the host IP address depending on the current location
q almost impossible to find a mobile system, DNS updates take to
long time
q TCP connections break, security problems
Jochen H. Schiller
1999 9.1
University of Karlsruhe Mobile Communications
Institute of Telematics Chapter 9: Network Protocols
Transparency
q mobile end-systems keep their IP address
q continuation of communication after interruption of link possible
q point of connection to the fixed network can be changed
Compatibility
q support of the same layer 2 protocols as IP
q no changes to current end-systems and routers required
q mobile end-systems can communicate with fixed systems
Security
q authentication of all registration messages
Efficiency and scalability
q only little additional messages to the mobile system required
(connection typically via a low bandwidth radio link)
q world-wide support of a large number of mobile systems in the
whole Internet
Terminology
Mobile Node (MN)
q system (node) that can change the point of connection
to the network without changing its IP address
Home Agent (HA)
q system in the home network of the MN, typically a router
q registers the location of the MN, tunnels IP datagrams to the COA
Foreign Agent (FA)
q system in the current foreign network of the MN, typically a router
q forwards the tunneled datagrams to the MN, typically also the
default router for the MN
Care-of Address (COA)
q address of the current tunnel end-point for the MN (at FA or MN)
q actual location of the MN from an IP point of view
q can be chosen, e.g., via DHCP
Correspondent Node (CN)
q communication partner
Mobile Communications: Network Protocols/Mobile IP 9.3.1
Jochen H. Schiller
1999 9.2
University of Karlsruhe Mobile Communications
Institute of Telematics Chapter 9: Network Protocols
Example network
HA
MN
router
end-system router
HA
2
MN
FA foreign
network
Jochen H. Schiller
1999 9.3
University of Karlsruhe Mobile Communications
Institute of Telematics Chapter 9: Network Protocols
HA
1 MN
FA foreign
network
receiver
Overview
COA
foreign
Internet network
CN router
3.
router
home router MN
2. FA
network HA
4.
foreign
Internet network
1.
CN router
Jochen H. Schiller
1999 9.4
University of Karlsruhe Mobile Communications
Institute of Telematics Chapter 9: Network Protocols
Network integration
Agent Advertisement
q HA and FA periodically send advertisement messages into their
physical subnets
q MN listens to these messages and detects, if it is in the home or a
foreign network (standard case for home network)
q MN reads a COA from the FA advertisement messages
Registration (always limited lifetime!)
q MN signals COA to the HA via the FA, HA acknowledges via FA to MN
q these actions have to be secured by authentication
Advertisement
q HA advertises the IP address of the MN (as for fixed systems), i.e.
standard routing information
q routers adjust their entries, these are stable for a longer time (HA
responsible for a MN over a longer period of time)
q packets to the MN are sent to the HA,
q independent of changes in COA/FA
Mobile Communications: Network Protocols/Mobile IP 9.8.1
Agent advertisement
0 7 8 15 16 23 24 31
type code checksum
#addresses addr. size lifetime
router address 1
preference level 1
router address 2
preference level 2
...
Jochen H. Schiller
1999 9.5
University of Karlsruhe Mobile Communications
Institute of Telematics Chapter 9: Network Protocols
Registration
MN r FA HA MN re HA
egis gis
tr
requ atio
est n r e q u tration
est
regi
s
r e q u tration
est
tio n
stra
regi
e p l y
n r
tio
stra
regi
p l y t
re
tio n
stra
regi
p l y
re
0 7 8 15 16 23 24 31
type S B DMG V rsv lifetime
home address
home agent
COA
identification
extensions . . .
Jochen H. Schiller
1999 9.6
University of Karlsruhe Mobile Communications
Institute of Telematics Chapter 9: Network Protocols
Encapsulation
Encapsulation I
Jochen H. Schiller
1999 9.7
University of Karlsruhe Mobile Communications
Institute of Telematics Chapter 9: Network Protocols
Encapsulation II
original
original data
header
GRE original
outer header original data
header header
Jochen H. Schiller
1999 9.8
University of Karlsruhe Mobile Communications
Institute of Telematics Chapter 9: Network Protocols
Triangular Routing
q sender sends all packets via HA to MN
q higher latency and network load
Solutions
q sender learns the current location of MN
q direct tunneling to this location
q HA informs a sender about the location of MN
q big security problems!
Change of FA
q packets on-the-fly during the change can be lost
q new FA informs old FA to avoid packet loss, old FA now forwards
remaining packets to new FA
q this information also enables the old FA to release resources for the
MN
data data
MN changes
location
registration registration
update
ACK
data
data data
warning
update
ACK
data
data
t
Jochen H. Schiller
1999 9.9
University of Karlsruhe Mobile Communications
Institute of Telematics Chapter 9: Network Protocols
HA
2
MN
FA foreign
network
1. MN sends to FA
3 2. FA tunnels packets to HA
CN by encapsulation
3. HA forwards the packet to the
receiver (standard case)
receiver
Jochen H. Schiller
1999 9.10
University of Karlsruhe Mobile Communications
Institute of Telematics Chapter 9: Network Protocols
Mobile IP was developed for IPv4, but IPv6 simplifies the protocols
q security is integrated and not an add-on, authentication of
registration is included
q COA can be assigned via auto-configuration (DHCPv6 is one
candidate), every node has address autoconfiguration
q no need for a separate FA, all routers perform router advertisement
which can be used instead of the special agent advertisement
q MN can signal a sender directly the COA, sending via HA not
needed in this case (automatic path optimization)
q soft hand-over, i.e. without packet loss, between two subnets is
supported
l MN sends the new COA to its old router
l the old router encapsulates all incoming packets for the MN and
forwards them to the new COA
l authentication is always granted
Security
q authentication with FA problematic, for the FA typically belongs to
another organization
q no protocol for key management and key distribution has been
standardized in the Internet
q patent and export restrictions
Firewalls
q typically mobile IP cannot be used together with firewalls, special
set-ups are needed (such as reverse tunneling)
QoS
q many new reservations in case of RSVP
q tunneling makes it hard to give a flow of packets a special
treatment needed for the QoS
Security, firewalls, QoS etc. are topics of current research and
discussions!
Jochen H. Schiller
1999 9.11
University of Karlsruhe Mobile Communications
Institute of Telematics Chapter 9: Network Protocols
Security in Mobile IP
IP security architecture I
IP-Header
IP header Authentification-Header
authentication header UDP/TCP-Paket
UDP/TCP data
Jochen H. Schiller
1999 9.12
University of Karlsruhe Mobile Communications
Institute of Telematics Chapter 9: Network Protocols
IP security architecture II
Key distribution
FA MH
response:
EHA-FA {session key}
EHA-MH {session key}
HA
Jochen H. Schiller
1999 9.13
University of Karlsruhe Mobile Communications
Institute of Telematics Chapter 9: Network Protocols
Application
q simplification of installation and maintenance of networked
computers
q supplies systems with all necessary information, such as IP
address, DNS server address, domain name, subnet mask, default
router etc.
q enables automatic integration of systems into an Intranet or the
Internet, can be used to acquire a COA for Mobile IP
Client/Server-Model
q the client sends via a MAC broadcast a request to the DHCP server
(might be via a DHCP relay) DHCPDISCOVER
DHCPDISCOVER
server client
client relay
selection of configuration
DHCPREQUEST DHCPREQUEST
(reject) (options) confirmation of
configuration
DHCPACK
initialization completed
release
DHCPRELEASE delete context
Jochen H. Schiller
1999 9.14
University of Karlsruhe Mobile Communications
Institute of Telematics Chapter 9: Network Protocols
DHCP characteristics
Server
q several servers can be configured for DHCP, coordination not yet
standardized (i.e., manual configuration)
Renewal of configurations
q IP addresses have to be requested periodically, simplified protocol
Options
q available for routers, subnet mask, NTP (network time protocol)
timeserver, SLP (service location protocol) directory,
DNS (domain name system)
Ad hoc networks
A B C
Jochen H. Schiller
1999 9.15
University of Karlsruhe Mobile Communications
Institute of Telematics Chapter 9: Network Protocols
N1 N1
N2 N3
N3 N2
N4 N4
N5 N5
Distance Vector
q periodic exchange of messages with all physical neighbors that
contain information about who can be reached at what distance
q selection of the shortest path if several paths available
Link State
q periodic notification of all routers about the current state of all
physical links
q router get a complete picture of the network
Example
q ARPA packet radio network (1973), DV-Routing
q every 7.5s exchange of routing tables including link quality
q updating of tables also by reception of packets
q routing problems solved with limited flooding
Jochen H. Schiller
1999 9.16
University of Karlsruhe Mobile Communications
Institute of Telematics Chapter 9: Network Protocols
Problem
q protocols have been designed for fixed networks with infrequent
changes and typically assume symmetric links
Jochen H. Schiller
1999 9.17
University of Karlsruhe Mobile Communications
Institute of Telematics Chapter 9: Network Protocols
Path discovery
q broadcast a packet with destination address and unique ID
q if a station receives a broadcast packet
l if the station is the receiver (i.e., has the correct destination address)
then return the packet to the sender (path was collected in the packet)
l if the packet has already been received earlier (identified via ID) then
discard the packet
l otherwise, append own address and broadcast packet
q sender receives packet with the current path (address list)
Optimizations
q limit broadcasting if maximum diameter of the network is known
q caching of address lists (i.e. paths) with help of passing packets
l stations can use the cached information for path discovery (own paths
or paths for other hosts)
Jochen H. Schiller
1999 9.18
University of Karlsruhe Mobile Communications
Institute of Telematics Chapter 9: Network Protocols
Maintaining paths
q after sending a packet
l wait for a layer 2 acknowledgement (if applicable)
l listen into the medium to detect if other stations forward the packet (if
possible)
l request an explicit acknowledgement
q if a station encounters problems it can inform the sender of a
packet or look-up a new path locally
Internet
cluster
super cluster
Jochen H. Schiller
1999 9.19
University of Karlsruhe Mobile Communications
Institute of Telematics Chapter 9: Network Protocols
Interference-based routing
N1
N2
R1
S1 N3
N4
N5 N6 R2
S2
N8 N9
N7
neighbors
(i.e. within radio range)
Jochen H. Schiller
1999 9.20