Mobile IP and Wireless Application Protocol



Similar documents
Mobile Routing. When a host moves, its point of attachment in the network changes. This is called a handoff.

Networking Test 4 Study Guide

Course Overview: Learn the essential skills needed to set up, configure, support, and troubleshoot your TCP/IP-based network.

6 Mobility Management

Lehrstuhl für Informatik 4 Kommunikation und verteilte Systeme

VALLIAMMAI ENGNIEERING COLLEGE SRM Nagar, Kattankulathur

Security issues with Mobile IP

Wireless Application Protocol (WAP)

Mobile IP. Bheemarjuna Reddy Tamma IIT Hyderabad. Source: Slides of Charlie Perkins and Geert Heijenk on Mobile IP

Tomás P. de Miguel DIT-UPM. dit UPM

Internet Control Protocols Reading: Chapter 3

IP and Mobility. Requirements to a Mobile IP. Terminology in Mobile IP

Guide to Network Defense and Countermeasures Third Edition. Chapter 2 TCP/IP

Protocols and Architecture. Protocol Architecture.

Static and Dynamic Network Configuration

Internet, Part 2. 1) Session Initiating Protocol (SIP) 2) Quality of Service (QoS) support. 3) Mobility aspects (terminal vs. personal mobility)

IP - The Internet Protocol

Guide to TCP/IP, Third Edition. Chapter 3: Data Link and Network Layer TCP/IP Protocols

CS335 Sample Questions for Exam #2

Mobile IP Part I: IPv4

5.0 Network Architecture. 5.1 Internet vs. Intranet 5.2 NAT 5.3 Mobile Network

RARP: Reverse Address Resolution Protocol

A Comparison of Secure Mechanisms for Mobile Commerce

Mobility on IPv6 Networks

Computer Networks. Wireless and Mobile Networks. László Böszörményi Computer Networks Mobile - 1

CEB620MOBILE COMPUTING

Linux Network Security

Ethernet. Ethernet. Network Devices

BASIC ANALYSIS OF TCP/IP NETWORKS

Wireless Networks: Network Protocols/Mobile IP

Mobility Management 嚴 力 行 高 雄 大 學 資 工 系

21.4 Network Address Translation (NAT) NAT concept

Outline. CSc 466/566. Computer Security. 18 : Network Security Introduction. Network Topology. Network Topology. Christian Collberg

Outline. Wireless System Integration WLAN. WAN Technologies ดร. อน นต ผลเพ ม LAN. WAN Server LAN. Wireless System Architecture Protocols

How To Write A Transport Layer Protocol For Wireless Networks

IPsec Details 1 / 43. IPsec Details

Overview. Securing TCP/IP. Introduction to TCP/IP (cont d) Introduction to TCP/IP

Packet Capture. Document Scope. SonicOS Enhanced Packet Capture

Transport Layer Protocols

CS 294-7: Cellular Digital Packet Data (CDPD) Prof. Randy H. Katz CS Division University of California, Berkeley Berkeley, CA

EITF25 Internet Techniques and Applications L5: Wide Area Networks (WAN) Stefan Höst

Interconnection of Heterogeneous Networks. Internetworking. Service model. Addressing Address mapping Automatic host configuration

Network Security Part II: Standards

Objectives of Lecture. Network Architecture. Protocols. Contents

This chapter covers the following topics: Characteristics of roaming Layer 2 roaming Layer 3 roaming and an introduction to Mobile IP

Security (II) ISO : Security Architecture of OSI Reference Model. Outline. Course Outline: Fundamental Topics. EE5723/EE4723 Spring 2012

The OSI and TCP/IP Models. Lesson 2

his document discusses implementation of dynamic mobile network routing (DMNR) in the EN-4000.

Lab Exercise SSL/TLS. Objective. Step 1: Open a Trace. Step 2: Inspect the Trace

G.Vijaya kumar et al, Int. J. Comp. Tech. Appl., Vol 2 (5),

Final exam review, Fall 2005 FSU (CIS-5357) Network Security

Computer Networks - CS132/EECS148 - Spring

Bluetooth Protocol Architecture

Network Security [2] Plain text Encryption algorithm Public and private key pair Cipher text Decryption algorithm. See next slide

MPLS VPN in Cellular Mobile IPv6 Architectures(04##017)

Internetworking. Problem: There is more than one network (heterogeneity & scale)

Introduction to Mobile IPv6

Internet Packets. Forwarding Datagrams

Final for ECE374 05/06/13 Solution!!

WDP and WCMP Wireless Data Gateway Adaptation

Security Protocols HTTPS/ DNSSEC TLS. Internet (IPSEC) Network (802.1x) Application (HTTP,DNS) Transport (TCP/UDP) Transport (TCP/UDP) Internet (IP)

Wireless Encryption Protection

Internet Protocol: IP packet headers. vendredi 18 octobre 13

Chapter 3: Review of Important Networking Concepts. Magda El Zarki Dept. of CS UC Irvine

Security vulnerabilities in the Internet and possible solutions

Network layer" 1DT066! Distributed Information Systems!! Chapter 4" Network Layer!! goals: "

Networks: IP and TCP. Internet Protocol

Protocol Rollback and Network Security

ICTTEN8195B Evaluate and apply network security

Procedure: You can find the problem sheet on Drive D: of the lab PCs. 1. IP address for this host computer 2. Subnet mask 3. Default gateway address

Network layer: Overview. Network layer functions IP Routing and forwarding

8.2 The Internet Protocol

Virtual Private Networks

I. What is VPN? II. Types of VPN connection. There are two types of VPN connection:

Understanding TCP/IP. Introduction. What is an Architectural Model? APPENDIX

Lecture Objectives. Lecture 6 Mobile Networks: Nomadic Services, DHCP, NAT, and VPNs. Agenda. Nomadic Services. Agenda. Nomadic Services Functions

CSCI 454/554 Computer and Network Security. Topic 8.1 IPsec

Internet Firewall CSIS Internet Firewall. Spring 2012 CSIS net13 1. Firewalls. Stateless Packet Filtering

Firewalls and VPNs. Principles of Information Security, 5th Edition 1

Computer Networks. Chapter 5 Transport Protocols

Laboratory Exercises V: IP Security Protocol (IPSec)

EE4607 Session Initiation Protocol

Introduction to IP v6

Indian Institute of Technology Kharagpur. TCP/IP Part I. Prof Indranil Sengupta Computer Science and Engineering Indian Institute of Technology

IP Security. Ola Flygt Växjö University, Sweden

Lab Exercise SSL/TLS. Objective. Requirements. Step 1: Capture a Trace

Chapter 32 Internet Security

Internet Firewall CSIS Packet Filtering. Internet Firewall. Examples. Spring 2011 CSIS net15 1. Routers can implement packet filtering

Questions for Mobile Communications 2 nd ed.

Chapter 3. TCP/IP Networks. 3.1 Internet Protocol version 4 (IPv4)

IP Routing Features. Contents

13 Virtual Private Networks 13.1 Point-to-Point Protocol (PPP) 13.2 Layer 2/3/4 VPNs 13.3 Multi-Protocol Label Switching 13.4 IPsec Transport Mode

NETWORK LAYER/INTERNET PROTOCOLS

Transcription:

Mobile IP and Wireless Application Protocol

Mobile IP Uses Enable computers to maintain Internet connectivity while moving from one Internet attachment point to another Mobile user's point of attachment changes dynamically and all connections are automatically maintained despite the change Nomadic - user's Internet connection is terminated each time the user moves and a new connection is initiated when the user dials back in New, temporary IP address is assigned

Operation of Mobile IP Mobil node is assigned to a particular network home network IP address on home network is static home address Mobile node can move to another network foreign network Mobile node registers with network node on foreign network foreign agent Mobile node gives care-of address to agent on home network home agent

Capabilities of Mobile IP Discovery mobile node uses discovery procedure to identify prospective home and foreign agents Registration mobile node uses an authenticated registration procedure to inform home agent of its care-of address Tunneling used to forward IP datagrams from a home address to a care-of address

Discovery Mobile node is responsible for ongoing discovery process Must determine if it is attached to its home network or a foreign network Transition from home network to foreign network can occur at any time without notification to the network layer Mobile node listens for agent advertisement messages Compares network portion of the router's IP address with the network portion of home address

Agent Solicitation Foreign agents are expected to issue agent advertisement messages periodically If a mobile node needs agent information immediately, it can issue ICMP router solicitation message Any agent receiving this message will then issue an agent advertisement

Move Detection Mobile node may move from one network to another due to some handoff mechanism without IP level being aware Agent discovery process is intended to enable the agent to detect such a move Algorithms to detect move: Use of lifetime field mobile node uses lifetime field as a timer for agent advertisements Use of network prefix mobile node checks if any newly received agent advertisement messages are on the same network as the node's current care-of address

Co-Located Addresses If mobile node moves to a network that has no foreign agents, or all foreign agents are busy, it can act as its own foreign agent Mobile agent uses co-located care-of address IP address obtained by mobile node associated with mobile node's current network interface Means to acquire co-located address: Temporary IP address through an Internet service, such as DHCP May be owned by the mobile node as a long-term address for use while visiting a given foreign network

Registration Process Mobile node sends registration request to foreign agent requesting forwarding service Foreign agent relays request to home agent Home agent accepts or denies request and sends registration reply to foreign agent Foreign agent relays reply to mobile node

Registration Operation Messages Registration request message Fields = type, S, B, D, M, V, G, lifetime, home address, home agent, care-of-address, identification, extensions Registration reply message Fields = type, code, lifetime, home address, home agent, identification, extensions

Registration Procedure Security Mobile IP designed to resist attacks Node pretending to be a foreign agent sends registration request to a home agent to divert mobile node traffic to itself Agent replays old registration messages to cut mobile node from network For message authentication, registration request and reply contain authentication extension Fields = type, length, security parameter index (SPI), authenticator

Types of Authentication Extensions Mobile-home provides for authentication of registration messages between mobile node and home agent; must be present Mobile-foreign may be present when a security association exists between mobile node and foreign agent Foreign-home may be present when a security association exists between foreign agent and home agent

Tunneling Home agent intercepts IP datagrams sent to mobile node's home address Home agent informs other nodes on home network that datagrams to mobile node should be delivered to home agent Datagrams forwarded to care-of address via tunneling Datagram encapsulated in outer IP datagram

Mobile IP Encapsulation Options IP-within-IP entire IP datagram becomes payload in new IP datagram Original, inner IP header unchanged except TTL decremented by 1 Outer header is a full IP header Minimal encapsulation new header is inserted between original IP header and original IP payload Original IP header modified to form new outer IP header Generic routing encapsulation (GRE) developed prior to development of Mobile IP

Wireless Application Protocol (WAP) Open standard providing mobile users of wireless terminals access to telephony and information services Wireless terminals include wireless phones, pagers and personal digital assistants (PDAs) Designed to work with all wireless network technologies such as GSM, CDMA, and TDMA Based on existing Internet standards such as IP, XML, HTML, and HTTP Includes security facilities

WAP Protocol Stack

WAP Programming Model

Wireless Markup Language (WML) Features Text and image support formatting and layout commands Deck/card organizational metaphor WML documents subdivided into cards, which specify one or more units of interaction Support for navigation among cards and decks includes provisions for event handling; used for navigation or executing scripts

WMLScript Scripting language for defining script-type programs in a user device with limited processing power and memory WMLScript capabilities: Check validity of user input before it s sent Access device facilities and peripherals Interact with user without introducing round trips to origin server

WMLScript WMLScript features: JavaScript-based scripting language Procedural logic Event-based Compiled implementation Integrated into WAE

Wireless Application Environment (WAE) WAE specifies an application framework for wireless devices WAE elements: WAE User agents software that executes in the wireless device Content generators applications that produce standard content formats in response to requests from user agents in the mobile terminal Standard content encoding defined to allow a WAE user agent to navigate Web content Wireless telephony applications (WTA) collection of telephony-specific extensions for call and feature control mechanisms

WAE Client Components

Wireless Session Protocol (WSP) Transaction-oriented protocol based on the concept of a request and a reply Provides applications with interface for two session services: Connection-oriented session service operates above reliable transport protocol WTP Connectionless session service operates above unreliable transport protocol WDP

Connection-mode WSP Services Establish reliable session from client to server and release Agree on common level of protocol functionality using capability negotiation Exchange content between client and server using compact encoding Suspend and resume a session Push content from server to client in an unsynchronized manner

WSP Transaction Types Session establishment client WSP user requests session with server WSP user Session termination client WSP user initiates termination Session suspend and resume initiated with suspend and resume requests Transaction exchange of data between a client and server Nonconfirmed data push used to send unsolicited information from server to client Confirmed data push server receives delivery confirmation from client

Wireless Transaction Protocol (WTP) Lightweight protocol suitable for "thin" clients and over low-bandwidth wireless links WTP features Three classes of transaction service Optional user-to-user reliability: WTP user triggers confirmation of each received message Optional out-of-band data on acknowledgments PDU concatenation and delayed acknowledgment to reduce the number of messages sent Asynchronous transactions

WTP Transaction Classes Class 0: Unreliable invoke message with no result message Class 1: Reliable invoke message with no result message Class 2: Unreliable invoke message with one reliable result message

WTP PDU Types Invoke PDU used to convey a request from an initiator to a responder ACK PDU used to acknowledge an Invoke or Result PDU Result PDU used to convey response of the server to the client Abort PDU used to abort a transaction Segmented invoke PDU and segmented result PDU used for segmentation and reassembly Negative acknowledgment PDU used to indicate that some packets did not arrive

Examples of WTP Operation

Wireless Transport Layer Security (WTLS) Features Data integrity ensures that data sent between client and gateway are not modified, using message authentication Privacy ensures that the data cannot be read by a third party, using encryption Authentication establishes authentication of the two parties, using digital certificates Denial-of-service protection detects and rejects messages that are replayed or not successfully verified

WTLS Protocol Stack WTLS consists of two layers of protocols WTLS Record Protocol provides basic security services to various higher-layer protocols Higher-layer protocols: The Handshake Protocol The Change Cipher Spec Protocol The Alert Protocol

WTLS Protocol Stack

WTLS Record Protocol Operation

Phases of the Handshake Protocol Exchange First phase used to initiate a logical connection and establish security capabilities Second phase used for server authentication and key exchange Third phase used for client authentication and key exchange Forth phase completes the setting up of a secure connection

Wireless Datagram Protocol (WDP) Used to adapt higher-layer WAP protocol to the communication mechanism used between mobile node and WAP gateway WDP hides details of the various bearer networks from the other layers of WAP Adaptation may include: Partitioning data into segments of appropriate size for the bearer Interfacing with the bearer network

Wireless Control Message Protocol (WCMP) Performs the same support function for WDP as ICMP does for IP Used in environments that don t provide IP bearer and don t lend themselves to the use of ICMP Used by wireless nodes and WAP gateways to report errors encountered in processing WDP datagrams Can also be used for informational and diagnostic purposes