Mobile Communications Chapter 8: Network Protocols/Mobile IP



Similar documents
IP and Mobility. Requirements to a Mobile IP. Terminology in Mobile IP

Wireless Networks: Network Protocols/Mobile IP

Tomás P. de Miguel DIT-UPM. dit UPM

Mobile Routing. When a host moves, its point of attachment in the network changes. This is called a handoff.

Mobility on IPv6 Networks

Efficient Addressing. Outline. Addressing Subnetting Supernetting CS 640 1

IPv6 mobility and ad hoc network mobility overview report

Mobile IP Part I: IPv4

ITTC Mobile Wireless Networking The University of Kansas EECS 882 Mobile Ad Hoc Networks Fall 2007

Mobile Communications Chapter 9: Mobile Transport Layer

Lecture 2.1 : The Distributed Bellman-Ford Algorithm. Lecture 2.2 : The Destination Sequenced Distance Vector (DSDV) protocol

Security for Ad Hoc Networks. Hang Zhao

6 Mobility Management

5.0 Network Architecture. 5.1 Internet vs. Intranet 5.2 NAT 5.3 Mobile Network

Security in Ad Hoc Network

Internet Protocol: IP packet headers. vendredi 18 octobre 13

Performance Evaluation of AODV, OLSR Routing Protocol in VOIP Over Ad Hoc

HOST AUTO CONFIGURATION (BOOTP, DHCP)

A Comparison Study of Qos Using Different Routing Algorithms In Mobile Ad Hoc Networks

Behavior Analysis of TCP Traffic in Mobile Ad Hoc Network using Reactive Routing Protocols

Mobile IP. Bheemarjuna Reddy Tamma IIT Hyderabad. Source: Slides of Charlie Perkins and Geert Heijenk on Mobile IP

TCP and Wireless Networks Classical Approaches Optimizations TCP for 2.5G/3G Systems. Lehrstuhl für Informatik 4 Kommunikation und verteilte Systeme

VXLAN: Scaling Data Center Capacity. White Paper

Definition. A Historical Example

6LoWPAN Technical Overview

Ad hoc and Sensor Networks Chapter 1: Motivation & Applications

Fast and Secure Data Transmission by Using Hybrid Protocols in Mobile Ad Hoc Network

MetroNet6 - Homeland Security IPv6 R&D over Wireless

A Study of Internet Connectivity for Mobile Ad Hoc Networks in NS 2

Course Overview: Learn the essential skills needed to set up, configure, support, and troubleshoot your TCP/IP-based network.

ISSUES AND CHALLENGES OF QUALITY OF SERVICE IN MOBILE ADHOC NETWORK

Lehrstuhl für Informatik 4 Kommunikation und verteilte Systeme. Auxiliary Protocols

Enterprise VoIP Services over Mobile Ad-Hoc Technologies

UNIT 8:- Mobile Ad-Hoc Networks, Wireless Sensor Networks

A Survey on Reduction in Energy Consumption by Improved AODV on Mobile Ad Hoc Network

Top-Down Network Design

Introducing Reliability and Load Balancing in Mobile IPv6 based Networks

TOPOLOGIES NETWORK SECURITY SERVICES

Customer Specific Wireless Network Solutions Based on Standard IEEE

MPLS VPN in Cellular Mobile IPv6 Architectures(04##017)

Route Discovery Protocols

SERVICE DISCOVERY AND MOBILITY MANAGEMENT

CROSS LAYER BASED MULTIPATH ROUTING FOR LOAD BALANCING

(Refer Slide Time: 01:38 01:37)

Application Protocols for TCP/IP Administration

Mobility (and philosophical questions about names and identity) David Andersen CMU CS The problem

Introduction to LAN/WAN. Network Layer (part II)

Static and Dynamic Network Configuration

Introduction to IP v6

Introduction to Mobile IPv6

DSR: The Dynamic Source Routing Protocol for Multi-Hop Wireless Ad Hoc Networks

Security and Scalability of MANET Routing Protocols in Homogeneous & Heterogeneous Networks

What communication protocols are used to discover Tesira servers on a network?

A Study of Dynamic Addressing Techniques in Mobile Ad hoc Networks

Mobility Management 嚴 力 行 高 雄 大 學 資 工 系

Protocols and Architectures for Wireless Sensor Netwoks. by Holger Karl and Andreas Willig

Self-Organization in Autonomous Sensor/Actuator Networks [SelfOrg]

Telecommunication Services Engineering (TSE) Lab. Chapter III 4G Long Term Evolution (LTE) and Evolved Packet Core (EPC)

Transport and Network Layer

Dynamic Host Configuration Protocol (DHCP) 02 NAT and DHCP Tópicos Avançados de Redes

Dynamic Source Routing in Ad Hoc Wireless Networks

Datagram-based network layer: forwarding; routing. Additional function of VCbased network layer: call setup.

Mobility Management Advanced

RT-QoS for Wireless ad-hoc Networks of Embedded Systems

Internet Firewall CSIS Packet Filtering. Internet Firewall. Examples. Spring 2011 CSIS net15 1. Routers can implement packet filtering

International Journal of Advanced Research in Computer Science and Software Engineering

15 th TF-Mobility Meeting Sensor Networks. Torsten Braun Universität Bern

Dedication Preface 1. The Age of IPv6 1.1 INTRODUCTION 1.2 PROTOCOL STACK 1.3 CONCLUSIONS 2. Protocol Architecture 2.1 INTRODUCTION 2.

Unit 3 - Advanced Internet Architectures

INTERNATIONAL JOURNAL OF PURE AND APPLIED RESEARCH IN ENGINEERING AND TECHNOLOGY

SSVVP SIP School VVoIP Professional Certification

This chapter covers the following topics: Characteristics of roaming Layer 2 roaming Layer 3 roaming and an introduction to Mobile IP

Analysis of Mobile IP in Wireless LANs

Introduction to LAN/WAN. Network Layer

Performance Analysis of Load Balancing in MANET using On-demand Multipath Routing Protocol

A Mobile Ad-hoc Satellite and Wireless Mesh Networking Approach for Public Safety Communications

Design and Implementation of Ad-hoc Communication and Application on Mobile Phone Terminals

Implementing DHCPv6 on an IPv6 network

TCP for Wireless Networks

Internet Firewall CSIS Internet Firewall. Spring 2012 CSIS net13 1. Firewalls. Stateless Packet Filtering

LECTURE 4 NETWORK INFRASTRUCTURE

Networking 4 Voice and Video over IP (VVoIP)

Architectural Framework for Large- Scale Multicast in Mobile Ad Hoc Networks

Performance Evaluation of a QoS-Aware Handover Mechanism

More Internet Support Protocols

OSBRiDGE 5XLi. Configuration Manual. Firmware 3.10R

Computer Networks. Wireless and Mobile Networks. László Böszörményi Computer Networks Mobile - 1

CS 356 Lecture 19 and 20 Firewalls and Intrusion Prevention. Spring 2013

LAN Switching Computer Networking. Switched Network Advantages. Hubs (more) Hubs. Bridges/Switches, , PPP. Interconnecting LANs

THE UNIVERSITY OF AUCKLAND

Review: Lecture 1 - Internet History

Introduction to TCP/IP

3GPP TS V6.3.0 ( )

Data Networking and Architecture. Delegates should have some basic knowledge of Internet Protocol and Data Networking principles.

UIP1868P User Interface Guide

Personal Firewall Default Rules and Components

Scalable Routing Protocols for Mobile Ad Hoc Networks

IPv6 Fundamentals: A Straightforward Approach

10CS64: COMPUTER NETWORKS - II

Transcription:

Mobile Communications Chapter 8: Network Protocols/Mobile IP Motivation Data transfer Encapsulation Security IPv6 Problems Micro mobility support DHCP Ad-hoc networks Routing protocols Prof. Dr.-Ing. Jochen Schiller, http://www.jochenschiller.de/ MC SS05 8.1

Motivation for Mobile IP Routing based on IP destination address, network prefix (e.g. 129.13.42) determines physical subnet change of physical subnet => change of IP address to have a topological correct address (standard IP) Solution: Temporarily change routing table entries for mobile host Problem: does not scale if many mobile hosts or frequent location changes Solution: Change mobile host IP-address adjust the host IP address depending on the current location DNS updates take to long time Old TCP connections break Prof. Dr.-Ing. Jochen Schiller, http://www.jochenschiller.de/ MC SS05 8.2

Requirements to Mobile IP (RFC 3344, was: 3220, was: 2002) Transparency mobile end-systems keep IP address Continuous service after link interruption point of connection to the fixed network can be changed Compatibility No changes to current hosts, OS, routers mobile end-systems can communicate with fixed systems Security authentication of all registration messages Efficiency and scalability only few additional messages to mobile system (low bandwidth) Global support for large number of mobile systems Prof. Dr.-Ing. Jochen Schiller, http://www.jochenschiller.de/ MC SS05 8.3

Terminology Mobile Node (MN) Laptop, PDA, etc.. that may move about Home Agent (HA) Router in home network of the MN, helps in forwarding registers current MN location, tunnels IP datagrams to COA Foreign Agent (FA) Router in current foreign network of MN forwards tunneled datagrams to the MN Care-of Address (COA) address of the current tunnel end-point for the MN (at FA or MN) can be chosen, e.g., via DHCP Correspondent Node (CN) Node that wants to communicate with MN Prof. Dr.-Ing. Jochen Schiller, http://www.jochenschiller.de/ MC SS05 8.4

Example network HA MN router home network Internet mobile end-system (physical home network for the MN) router FA foreign network CN (current physical network for the MN) end-system router Prof. Dr.-Ing. Jochen Schiller, http://www.jochenschiller.de/ MC SS05 8.5

Overview COA home network router HA router FA MN Internet foreign network CN router home network router HA 2. router FA 3. 4. MN Internet foreign network CN 1. router 1. Sender sends to the IP address of MN, HA intercepts packet 2. HA tunnels packet to COA by encapsulation 3. FA forwards the packet to MN 4. Reverse: Sender sends to IP address of receiver, FA is default router Prof. Dr.-Ing. Jochen Schiller, http://www.jochenschiller.de/ MC SS05 8.6

Network integration Agent Advertisement HA and FA periodically send advertisement messages into their subnets MN reads a COA from the FA advertisement messages Registration (always limited lifetime!) MN signals COA to the HA via the FA, HA acknowledges Messeges need to be secured by authentication Advertisement HA advertises the MN IP address (as for fixed systems) routers adjust their entries, (HA responsible for a long time) All packets to MN are sent to HA Prof. Dr.-Ing. Jochen Schiller, http://www.jochenschiller.de/ MC SS05 8.7

Registration MN FA HA registration MN HA registration request registration reply request registration request registration reply t registration reply t Prof. Dr.-Ing. Jochen Schiller, http://www.jochenschiller.de/ MC SS05 8.8

Encapsulation Encapsulation of one packet into another as payload e.g. IP-in-IP-encapsulation (mandatory, RFC 2003) tunnel between HA and COA original IP header original data new IP header new data outer header inner header original data Prof. Dr.-Ing. Jochen Schiller, http://www.jochenschiller.de/ MC SS05 8.9

Optimization of packet forwarding Triangular Routing sender sends all packets via HA to MN Triangular routes longer, higher latency and network load Solutions HA informs a sender about the location of MN sender learns current location of MN direct tunneling to this location big security problems! Change of FA packets on-the-fly during the change can be lost new FA informs old FA to avoid packet loss old FA forwards remaining packets to new FA Update also enables old FA to release resources for MN Prof. Dr.-Ing. Jochen Schiller, http://www.jochenschiller.de/ MC SS05 8.10

Mobile IP and IPv6 Mobile IP was developed for IPv4, but IPv6 simplifies the protocols security is integrated, not add-on, authentication of registration included COA can be assigned via auto-configuration (DHCPv6 is one candidate) every node has address autoconfiguration no need for a separate FA, all routers perform router advertisement MN can signal a sender directly the COA, without HA soft hand-over, i.e. without packet loss supported MN sends the new COA to its old router old router encapsulates all packets for MN, forwards them to new COA authentication is always granted Prof. Dr.-Ing. Jochen Schiller, http://www.jochenschiller.de/ MC SS05 8.11

Problems with mobile IP Security FA typically belongs to another organization authentication with FA problematic patent and export restrictions Firewalls Firewalls filter based on IP addresses FA encapsulates packets from MN Home firewalls rejects packet from MN (unless reverse tunneling) MN can no longer send packets back to home network QoS, etc.. Security, firewalls, QoS etc. are topics of current research and discussions! Prof. Dr.-Ing. Jochen Schiller, http://www.jochenschiller.de/ MC SS05 8.12

IP Micro-mobility support Micro-mobility support: Efficient local handover inside foreign domain without involving a home agent Reduces control traffic on backbone Especially needed for route optimization Example approaches: Cellular IP HAWAII Hierarchical Mobile IP (HMIP) Prof. Dr.-Ing. Jochen Schiller, http://www.jochenschiller.de/ MC SS05 8.13

Cellular IP Operation: CIP Nodes maintain routing entries (soft state) for MNs Multiple entries possible Routing entries updated based on update packets sent by MN CIP Gateway: Mobile IP tunnel endpoint Initial registration processing Other micromobility protocols HAWAII Hierarchical Mobile IPv6 (HMIPv6) data/control packets from MN 1 BS MN1 BS Internet CIP Gateway BS MN2 Mobile IP packets from MN2 to MN 1 Prof. Dr.-Ing. Jochen Schiller, http://www.jochenschiller.de/ MC SS05 8.14

DHCP: Dynamic Host Configuration Protocol Main idea: E.g WPI has pool of IP addresses it can lease to hosts for short term use, claim back when done Application simplification of installation and maintenance of networked computers supplies systems with all necessary information, such as IP address, DNS server address, domain name, subnet mask, default router etc. enables automatic integration of systems into an Intranet or the Internet, can be used to acquire a COA for Mobile IP Client/Server-Model the client sends via a MAC broadcast a request to the DHCP server (might be via a DHCP relay) DHCPDISCOVER DHCPDISCOVER server client client relay Prof. Dr.-Ing. Jochen Schiller, http://www.jochenschiller.de/ MC SS05 8.15

time DHCP - protocol mechanisms server (not selected) determine the configuration client initialization DHCPDISCOVER DHCPDISCOVER DHCPOFFER DHCPOFFER collection of replies selection of configuration server (selected) determine the configuration DHCPREQUEST (reject) DHCPREQUEST (options) DHCPACK confirmation of configuration initialization completed release DHCPRELEASE delete context Prof. Dr.-Ing. Jochen Schiller, http://www.jochenschiller.de/ MC SS05 8.16

DHCP characteristics Server several servers can be configured for DHCP, coordination not yet standardized (i.e., manual configuration) Renewal of configurations IP addresses have to be requested periodically, simplified protocol Big security problems! no authentication of DHCP information specified Prof. Dr.-Ing. Jochen Schiller, http://www.jochenschiller.de/ MC SS05 8.17

Mobile ad hoc networks Standard Mobile IP needs an infrastructure Home Agent/Foreign Agent in the fixed network DNS, routing etc. not designed for mobility Sometimes there is no infrastructure! remote areas, ad-hoc meetings, disaster areas cost can also be argument against infrastructure! Main topic: routing no default router available every node should be able to forward A B C Prof. Dr.-Ing. Jochen Schiller, http://www.jochenschiller.de/ MC SS05 8.18

Solution: Wireless ad-hoc networks Network without infrastructure Use components of participants for networking Examples Single-hop: All partners max. one hop apart Bluetooth piconet, PDAs in a room, gaming devices Multi-hop: Cover larger distances, circumvent obstacles Bluetooth scatternet, TETRA police network, car-to-car networks Internet: MANET (Mobile Ad-hoc Networking) group Prof. Dr.-Ing. Jochen Schiller, http://www.jochenschiller.de/ MC SS05 8.19

Manet: Mobile Ad-hoc Networking Mobile Router Manet Mobile Devices Mobile IP, DHCP Fixed Network Router End system Prof. Dr.-Ing. Jochen Schiller, http://www.jochenschiller.de/ MC SS05 8.20

Problem No. 1: Routing Highly dynamic network topology Device mobility and varying channel quality Asymmetric connections possible N 7 N 6 N 6 N 7 N 1 N 1 N 2 N 3 N 2 N 3 N 4 N 5 N 4 N 5 time = t 1 time = t 2 good link weak link Prof. Dr.-Ing. Jochen Schiller, http://www.jochenschiller.de/ MC SS05 8.21

Traditional routing algorithms Distance Vector periodic exchange of cost to everyone else, with neighbors selection of shortest path if several paths available Link State periodic notification of all routers about the current cost to neighbors routers get a complete picture of the network, run Djikstra s algorithm Example ARPA packet radio network (1973), DV-Routing every 7.5s exchange of routing tables including link quality Receive packets, update tables Prof. Dr.-Ing. Jochen Schiller, http://www.jochenschiller.de/ MC SS05 8.22

Routing in ad-hoc networks THE big topic in many research projects Far > 50 different proposals exist The most simplest one: Flooding! Reasons Classical approaches from fixed networks fail Fast link quality changes, slow convergence, large overhead Highly dynamic, low bandwidth, low computing power Metrics for routing Minimize Number of hops, loss rate, delay, congestion, interference Maximal Stability of logical network, battery run-time, time of connectivity Prof. Dr.-Ing. Jochen Schiller, http://www.jochenschiller.de/ MC SS05 8.23

Problems of traditional routing algorithms Dynamic of the topology frequent changes of connections, connection quality, participants Limited performance of mobile systems Periodic routing table updates need energy, sleep modes difficult limited bandwidth further reduced due to routing info exchange links can be asymmetric, directional transmission quality Prof. Dr.-Ing. Jochen Schiller, http://www.jochenschiller.de/ MC SS05 8.24

DSDV (Destination Sequenced Distance Vector) Early work on demand version: AODV Expansion of distance vector routing Sequence numbers for all routing updates assures in-order execution of all updates avoids loops and inconsistencies Decrease of update frequency store time between first and best announcement of a path inhibit update if it seems to be unstable (based on the stored time values) Prof. Dr.-Ing. Jochen Schiller, http://www.jochenschiller.de/ MC SS05 8.25

Dynamic source routing I Split routing into discovering a path and maintaining a path Discover a path only if a path for sending packets to a certain destination is needed and no path is currently available Maintaining a path only while the path is in use one has to make sure that it can be used continuously No periodic updates needed! Prof. Dr.-Ing. Jochen Schiller, http://www.jochenschiller.de/ MC SS05 8.26

Dynamic source routing II Path discovery broadcast a packet with destination address and unique ID if a station receives a broadcast packet if receiver (i.e., has the correct destination address) then return packet to the sender (path was collected in the packet) if the packet already received earlier (identified via ID) then discard the packet otherwise, append own address and broadcast packet sender receives packet with the current path (address list) Optimizations limit broadcasting if maximum diameter of the network is known caching of address lists (i.e. paths) received stations can use the cached information for path discovery (own paths or paths for other hosts) Prof. Dr.-Ing. Jochen Schiller, http://www.jochenschiller.de/ MC SS05 8.27

Dynamic Source Routing III Maintaining paths after sending a packet wait for a layer 2 acknowledgement (if applicable) listen into the medium to detect if other stations forward the packet (if possible) request an explicit acknowledgement if a station encounters problems it can inform the sender of a packet or look-up a new path locally Prof. Dr.-Ing. Jochen Schiller, http://www.jochenschiller.de/ MC SS05 8.28

Examples for interference based routing Routing based on assumptions about interference between signals Examples Least Interference Routing (LIR) Max-Min Residual Capacity Routing (MMRCR) Least Resistance Routing (LRR) Prof. Dr.-Ing. Jochen Schiller, http://www.jochenschiller.de/ MC SS05 8.29

A plethora of ad hoc routing protocols Flat proactive FSLS Fuzzy Sighted Link State FSR Fisheye State Routing OLSR Optimised Link State Routing Protocol TBRPF Topology Broadcast Based on Reverse Path Forwarding reactive Hierarchical AODV Ad hoc On demand Distance Vector DSR Dynamic Source Routing CGSR Clusterhead-Gateway Switch Routing HSR Hierarchical State Routing LANMAR Landmark Ad Hoc Routing ZRP Zone Routing Protocol Geographic position assisted DREAM Distance Routing Effect Algorithm for Mobility GeoCast Geographic Addressing and Routing GPSR Greedy Perimeter Stateless Routing LAR Location-Aided Routing Prof. Dr.-Ing. Jochen Schiller, http://www.jochenschiller.de/ MC SS05 8.30

Further difficulties and research areas Auto-Configuration Assignment of addresses, Service discovery Discovery of services and service providers Multicast Transmission to a selected group of receivers Quality-of-Service Maintenance of a certain transmission quality Power control Minimizing interference, energy conservation mechanisms Security Data integrity, protection from attacks (e.g. Denial of Service) Scalability 10 nodes? 100 nodes? 1000 nodes? 10000 nodes? Integration with fixed networks Prof. Dr.-Ing. Jochen Schiller, http://www.jochenschiller.de/ MC SS05 8.31

Clustering of ad-hoc networks Base station Internet Cluster head Cluster Super cluster Prof. Dr.-Ing. Jochen Schiller, http://www.jochenschiller.de/ MC SS05 8.32

The next step: Wireless Sensor Networks (WSN) Main idea thousands of networked sensors thrown into phenomenon to be sensed Commonalities with MANETs Self-organization, multi-hop Typically wireless, should be energy efficient Differences from MANETs Applications: MANET more powerful, more general «WSN more specific Devices: MANET more powerful, higher data rates, more resources «WSN rather limited, embedded, interacting with environment Scale: MANET rather small (some dozen devices) «WSN can be large (thousands) Basic paradigms: MANET individual node important, ID centric «WSN network important, individual node may be dispensable, data centric Mobility patterns, Quality-of Service, Energy, Cost per node Example: www.scatterweb.net Prof. Dr.-Ing. Jochen Schiller, http://www.jochenschiller.de/ MC SS05 8.33

A typical WSN Integration of Sensor Nodes (SN) and Gateways (GW) SN SN GW Bluetooth SN GW SN SN SN SN SN SN SN GW GPRS GW WLAN SN SN Ethernet Prof. Dr.-Ing. Jochen Schiller, http://www.jochenschiller.de/ MC SS05 8.34

Example: ScatterWeb Sensor Nodes Embedded Sensor Board Sensors Luminosity, noise detection, gas, vibration, PIR movement detection, pressure Microphone/speaker, camera, display, IR sender/receiver, precise timing Communication using 868 MHz radio transceiver Range up to 2 km LOS, 500 m indoor Software Simple programming (C interface) Optional: operating systems TinyOS, Contiki Optional: TCP/IP, web server Routing, management, flashing Embedded Sensor Board Further information: www.scatterweb.net Modular Sensor Node Prof. Dr.-Ing. Jochen Schiller, http://www.jochenschiller.de/ MC SS05 8.35

Sensor Networks: Challenges and Research Areas Long-lived, autonomous networks Use environmental energy sources Embed and forget Self-healing Self-configuring networks Routing Data aggregation Localization Managing wireless sensor networks Tools for access and programming Update distribution Scalability, Quality of Service Prof. Dr.-Ing. Jochen Schiller, http://www.jochenschiller.de/ MC SS05 8.36

Routing in WSNs is different No IP addressing, but simple, locally valid IDs Example: directed diffusion Interest Messages Interest in sensor data: Attribute/Value pair Gradient: remember direction of interested node Data Messages Send back data using gradients Hop count guarantees shortest path Sink Prof. Dr.-Ing. Jochen Schiller, http://www.jochenschiller.de/ MC SS05 8.37

Energy-aware routing Only sensors with sufficient energy forward data for other nodes Example: Routing via nodes with enough solar power is considered for free Prof. Dr.-Ing. Jochen Schiller, http://www.jochenschiller.de/ MC SS05 8.38

Today s WSNs First generation of WSNs is available Diverse sensor nodes, several gateways Even with special sensors: cameras, body temperature Basic software Routing, energy conservation, management Several prototypes for different applications Environmental monitoring, industrial automation, wildlife monitoring Many see new possibilities for monitoring, surveillance, protection Sensor networks: cheap and flexible for surveillance Monitoring and protection of goods Chemicals, food, vehicles, machines, containers, Large application area besides military Law enforcement, disaster recovery, industry, private homes, Prof. Dr.-Ing. Jochen Schiller, http://www.jochenschiller.de/ MC SS05 8.39