Efficient End-to-End Mobility Support in IPv6



Similar documents
Early Binding Updates and Credit-Based Authorization A Status Update

TCP over Multi-hop Wireless Networks * Overview of Transmission Control Protocol / Internet Protocol (TCP/IP) Internet Protocol (IP)

Final for ECE374 05/06/13 Solution!!

First Midterm for ECE374 03/09/12 Solution!!

Lecture Objectives. Lecture 07 Mobile Networks: TCP in Wireless Networks. Agenda. TCP Flow Control. Flow Control Can Limit Throughput (1)

Lecture 15: Congestion Control. CSE 123: Computer Networks Stefan Savage

TCP over Wireless Networks

Transport Layer Protocols

TCP in Wireless Mobile Networks

High-Speed TCP Performance Characterization under Various Operating Systems

D. SamKnows Methodology 20 Each deployed Whitebox performs the following tests: Primary measure(s)

Network Friendliness of Mobility Management Protocols

Chapter 9. IP Secure

Application Level Congestion Control Enhancements in High BDP Networks. Anupama Sundaresan

CSE 473 Introduction to Computer Networks. Exam 2 Solutions. Your name: 10/31/2013

First Midterm for ECE374 03/24/11 Solution!!

A Network-Controlled Architecture for SCTP Hard Handover

Tomás P. de Miguel DIT-UPM. dit UPM

Question: 3 When using Application Intelligence, Server Time may be defined as.

Data Networks Summer 2007 Homework #3

Mobile Computing/ Mobile Networks

SJBIT, Bangalore, KARNATAKA

NAT and Firewall Traversal with STUN / TURN / ICE

TCP for Wireless Networks

TCP Adaptation for MPI on Long-and-Fat Networks

Congestions and Control Mechanisms n Wired and Wireless Networks

Strategies. Addressing and Routing

CS268 Exam Solutions. 1) End-to-End (20 pts)

Improving the Performance of TCP Using Window Adjustment Procedure and Bandwidth Estimation

A Survey on Congestion Control Mechanisms for Performance Improvement of TCP

Virtual Private Network Using Peer-to-Peer Techniques

Behavior Analysis of TCP Traffic in Mobile Ad Hoc Network using Reactive Routing Protocols

IP SLAs Overview. Finding Feature Information. Information About IP SLAs. IP SLAs Technology Overview

Internet, Part 2. 1) Session Initiating Protocol (SIP) 2) Quality of Service (QoS) support. 3) Mobility aspects (terminal vs. personal mobility)

Ad Hoc Distributed Servers. Michal Szymaniak Guillaume Pierre Mariana Simons Nikolova Maarten van Steen

How To Write A Transport Layer Protocol For Wireless Networks

TCP in Wireless Networks

Mobile IP. Bheemarjuna Reddy Tamma IIT Hyderabad. Source: Slides of Charlie Perkins and Geert Heijenk on Mobile IP

TCP Westwood for Wireless

GPRS and 3G Services: Connectivity Options

Performance Evaluation of AODV, OLSR Routing Protocol in VOIP Over Ad Hoc

TCP/IP In Cellular Networks

The Fundamentals of Intrusion Prevention System Testing

Research of TCP ssthresh Dynamical Adjustment Algorithm Based on Available Bandwidth in Mixed Networks

Security Engineering Part III Network Security. Security Protocols (II): IPsec

The Problem with TCP. Overcoming TCP s Drawbacks

Mobile Internet Protocol v6 MIPv6

Calculating Bandwidth Requirements

VoIP over P2P networks

Performance Measurement of Wireless LAN Using Open Source

Cisco IOS Flexible NetFlow Technology

NAT TCP SIP ALG Support

UPPER LAYER SWITCHING

EINDHOVEN UNIVERSITY OF TECHNOLOGY Department of Mathematics and Computer Science

VRT Testing What Makes BullsEye Better and Different from the rest (Our competitive Advantage)

IAB CONCERNS ABOUT CONGESTION CONTROL. Iffat Hasnian

2 TCP-like Design. Answer

Mobile Communications Chapter 9: Mobile Transport Layer

COMP 361 Computer Communications Networks. Fall Semester Midterm Examination

REDUCING PACKET OVERHEAD IN MOBILE IPV6

Networks: IP and TCP. Internet Protocol

TCP and Wireless Networks Classical Approaches Optimizations TCP for 2.5G/3G Systems. Lehrstuhl für Informatik 4 Kommunikation und verteilte Systeme

Requirements of Voice in an IP Internetwork

Multimedia Transport Protocols for WebRTC

Linux MDS Firewall Supplement

TCP PACKET CONTROL FOR WIRELESS NETWORKS

VegaStream Information Note Considerations for a VoIP installation

IP Telephony v1.0 Scope and Sequence. Cisco Networking Academy Program

Security of IPv6 and DNSSEC for penetration testers

Low-rate TCP-targeted Denial of Service Attack Defense

2. What is the maximum value of each octet in an IP address? A. 128 B. 255 C. 256 D. None of the above

RTT 60.5 msec receiver window size: 32 KB

An Active Network Based Hierarchical Mobile Internet Protocol Version 6 Framework

MINIMUM NETWORK REQUIREMENTS 1. REQUIREMENTS SUMMARY... 1

Introduction to Packet Voice Technologies and VoIP

TCP based Denial-of-Service Attacks to Edge Network: Analysis and Detection

TCP, Active Queue Management and QoS

TFTP TRIVIAL FILE TRANSFER PROTOCOL OVERVIEW OF TFTP, A VERY SIMPLE FILE TRANSFER PROTOCOL FOR SIMPLE AND CONSTRAINED DEVICES

MOBILITY AND MOBILE NETWORK OPTIMIZATION

Overview : Computer Networking. Components of Integrated Services. Service Interfaces RSVP. Differentiated services

Analysis of TCP Performance Over Asymmetric Wireless Links

Requirements for Simulation and Modeling Tools. Sally Floyd NSF Workshop August 2005

Network Security Part II: Standards

Using IPM to Measure Network Performance

Visualizations and Correlations in Troubleshooting

Measuring Wireless Network Performance: Data Rates vs. Signal Strength

1. The Web: HTTP; file transfer: FTP; remote login: Telnet; Network News: NNTP; SMTP.

High Speed Internet Access Using Satellite-Based DVB Networks

Lecture 2: Protocols and Layering. CSE 123: Computer Networks Stefan Savage

Applications. Network Application Performance Analysis. Laboratory. Objective. Overview

BCS THE CHARTERED INSTITUTE FOR IT. BCS HIGHER EDUCATION QUALIFICATIONS BCS Level 5 Diploma in IT COMPUTER NETWORKS

Mobility on IPv6 Networks

TamoSoft Throughput Test

10 Key Things Your VoIP Firewall Should Do. When voice joins applications and data on your network

Iperf Tutorial. Jon Dugan Summer JointTechs 2010, Columbus, OH

Transcription:

Efficient End-to-End Mobility Support in IPv6, Mark Doll, doll@tm.uka.de,

Communicating Anywhere, Anytime 1

Mobile IPv6 Basics mobile node @ home address Internet visited network home network correspondent node 2

Mobile IPv6 Basics (2) binding home address c/o address home agent @ home address Internet @ c/o address visited network home network correspondent node bidirectional tunneling 3

Mobile IPv6 Basics (3) home agent @ home address Internet @ c/o address visited network home network correspondent node route optimization 4 binding home address c/o address

Caution! Issue 1: Connection hi-jacking Attacker pretends to own victim's (home) address attacker victim's peer victim 5 Solution: Verify reachability at home address

Caution! (2) Issue 2: Redirection-based flooding Attacker pretends to be at victim's (c/o) address attacker attacker's peer victim 6 Solution: Verify reachability at c/o address

Conservative Mobile IPv6 include tokens authenticated w/both tokens 7

Conservative Mobile IPv6 (2) 3 RTT 4 RTT 8 switch to new c/o address switch to new c/o address

Optimistic Mobile IPv6 2 3 RTT in parallel Return-routability procedure and home registration simultaneously 4 RTT 3 switch to new c/o address switch to new c/o address 9

Reduce handoff latency Early Binding Updates for Mobile IPv6 Credit-Based Authorization 10

Mobile IPv6 + Optimizations Home Test (Init) exchange prior to handoff home and correspondent registration simultaneously Test of c/o address in parallel with data exchange tentative registration without test of new c/o address standard registration with test of new c/o address 11

Mobile IPv6 + Optimizations (2) switch to new c/o address ~ 0 RTT switch to new c/o address 1 RTT 12

Mobile IPv6 + Optimizations (3) Correspondent node may send to incorrect c/o address 13

While C/O Address is Unverified Without protection amplified redirection-based flooding Amplification attacker attacker's peer victim investment << ROI 14

While C/O Address is Unverified (2) Credit-Based Authorization precludes amplification redirection-based flooding unattractive No amplification attacker attacker's peer victim investment >= ROI 15

While C/O Address is Unverified (3) Credit-Based Authorization precludes amplification redirection-based flooding unattractive No amplification attacker attacker's peer victim Correspondent node counts bytes recently received from mobile node 16 Sends no more bytes to unverified c/o address

Experimental Evaluation MAC filter FreeBSD Kame-Shisa Mobile IPv6 17 extended to support optimistic Mobile IPv6, Early Binding Updates, Credit-Based Auth.

IP Telephony: Parameters 18 Application bidirectional 64 kbps payload 10ms chunks 164B per packet (IPv6, IPv6 extensions, UDP, RTP) Round-trip times 200ms btw. home agent, routers, correspondent node Mobile IPv6 versions conservative optimistic Early Binding Updates, Credit-Based Authorization Confidence 500 handoffs per Mobile IPv6 version

Handoff Delay w/ip Telephony RTT = 200ms 1 RTT+ε 3 RTT+ε 4 RTT+ε 19

TCP File Downloads: Parameters 20 Application unidirectional download: correspondent node to mobile node 60s duration 1024 kbps bandwidth TCP Reno Round-trip times 40ms to 200ms btw. home agent, routers, correspondent node Mobile IPv6 versions conservative optimistic Early Binding Updates, Credit-Based Authorization Confidence 20 experiments per round-trip time per Mobile IPv6 version 5 handoffs per experiment

Handoff Delay w/tcp File Transfers 21

Throughput w/tcp File Transfers Why does TCP benefit so much? 22

Why TCP Benefits So Much 1st timeout new c/o address ebu/cba 1st timeout old c/o address 2nd timeout new c/o address conserv 23

Why TCP Benefits So Much (2) After 1st timeout set cwnd = 1 set ssthresh = flightsize do Slow Start until cwnd > ssthresh After 2nd timeout set cwnd = 1 set ssthresh = 2 (minimum) skip Slow Start, do Congestion Avoidance 24

Conclusions, Future Perspectives 25 Handoff latencies are high in standard Mobile IPv6 4 RTT in conservative Mobile IPv6 3 RTT in optimistic Mobile IPv6 Early Binding Updates, Credit-Based Authorization 1 RTT disadvantage: some additional signaling UDP, TCP applications benefit significantly Handoff latencies down by 75% in UDP 1 TCP retransmission timeout instead of 2 Faster throughput ramp-up after handoff Efforts within IETF and IRTF Adopted by Mobopts research group Credit-Based Authorization adopted by Mipshop, HIP working groups Current work: Proactive registration before handoff Eliminate/reduce remaining 1 RTT handoff latency