Network Security. Security of Mobile Internet Communications. Chapter 17. Network Security (WS 2002): 17 Mobile Internet Security 1 Dr.-Ing G.
|
|
- Darcy Buck Summers
- 5 years ago
- Views:
Transcription
1 Network Security Chapter 17 Security of Mobile Internet Communications Network Security (WS 2002): 17 Mobile Internet Security 1
2 Motivation for Mobile IP Routing in the Internet: Based on IP destination address, network prefix determines subnet Change of physical subnet implies change of IP address to have a topological correct address (standard IP) or needs special entries in the routing tables Non-Solutions: Specific routes to end-systems: does not scale well with the number of mobile hosts and frequent changes in the location Changing the IP-address: almost impossible to find a mobile system, DNS updates take to long time, TCP connections break Basic Idea [RFC 2002, RFC 3220]: Forwarding of IP packets is based on temporary IP addresses Change of network requires additional functionality: new network entities: home agent, foreign agent Mechanisms are (mostly) transparent to end systems [Acknowledgement: Parts of these slides are based on material by Prof. Dr.-Ing. J. Schiller] Network Security (WS 2002): 17 Mobile Internet Security 2
3 Some Terminology for Mobile IP Mobile Node (MN) System (node) that can change the point of connection to the network without changing its IP address Typically a mobile end-system Home Agent (HA) System in the home network of the MN, typically a router Registers the location of the MN, tunnels IP datagrams to the COA Foreign Agent (FA) System in the current foreign network of the MN, typically a router Forwards the tunneled datagrams to the MN, typically also the default router for the MN, provides the COA Care-of Address (COA) Address of the current tunnel end-point for the MN Actual location of the MN from an IP point of view Can be chosen, e.g., via DHCP Network Security (WS 2002): 17 Mobile Internet Security 3
4 Route of IP Packets in Standard Mobile IP MN Home Network 1. Router HA Change of Network 2. Internet Router FA MN Foreign Network CN Router HA: Home Agent FA: Foreign Agent MN: Mobile Node CN: Corresponding Node 1. Sender sends to the IP address of MN, HA intercepts packet (proxy ARP) 2. HA tunnels packet to COA (here FA) by encapsulation 3. FA forwards the packet to the MN Network Security (WS 2002): 17 Mobile Internet Security 4
5 Encapsulation (1) original IP header original data new IP header new data outer header inner header original data Encapsulation of one packet into another as payload: e.g. IPv6 in IPv4 (6Bone), Multicast in Unicast (Mbone) here: e.g. IP-in-IP-encapsulation, minimal encapsulation or GRE (Generic Routing Encapsulation) Network Security (WS 2002): 17 Mobile Internet Security 5
6 Encapsulation (2) IP-in-IP-encapsulation (mandatory in RFC 2003) Tunnel between HA and COA ver. IHL TOS length IP identification flags fragment offset TTL IP-in-IP IP checksum IP address of HA Care-of address COA ver. IHL TOS length IP identification flags fragment offset TTL lay. 4 prot. IP checksum IP address of CN IP address of MN TCP/UDP/... payload Network Security (WS 2002): 17 Mobile Internet Security 6
7 Network Integration of a Mobile Node Agent Advertisement: HA and FA periodically send advertisement messages into their physical subnets MN listens to these messages and detects, if it is in the home or a foreign network (standard case for home network) MN reads a COA from the FA advertisement messages Registration (always limited lifetime!): MN signals COA to the HA via the FA, HA acknowledges via FA to MN This procedure have to be secured by authentication Advertisement: HA advertises the IP address of the MN (as for fixed systems), i.e. standard routing information Routers adjust their entries, these are stable for a longer time (HA responsible for a MN over a longer period of time) Packets to the MN are sent to the HA, Independent of changes in COA/FA Network Security (WS 2002): 17 Mobile Internet Security 7
8 Mobile IP Registration Registration in a Foreign Network Registration in the Home Network MN FA HA MN HA registration request registration request registration reply registration request t registration reply registration reply t Network Security (WS 2002): 17 Mobile Internet Security 8
9 Optimization of Packet Forwarding Triangular routing of standard Mobile IP: Sender sends all packets via HA to MN Higher latency and network load One proposed solution, route optimization for Mobile IP [Perkins00a]: Sender learns the current location of MN from HA (binding update) Direct tunneling to this location Change of FA: Packets on-the-fly during the change can be lost New FA informs old FA to avoid packet loss, old FA now forwards remaining packets to new FA This information also enables the old FA to release resources for the MN Security problems: Tunnel hijacking: binding updates to CNs are not authenticated Location privacy: route optimization reveals the MN s current location However, it can be configured to which CNs the COA is revealed Network Security (WS 2002): 17 Mobile Internet Security 9
10 Route Optimization: Change of Foreign Agent CN HA FA old FA new MN request update ACK data registration data registration MN changes location update data warning data ACK data update ACK data data t Network Security (WS 2002): 17 Mobile Internet Security 10
11 Mobile IP with Reverse Tunneling Routers accept often only topological correct addresses (e.g. firewalls): Standard Mobile IP lets MNs send their packets with their home address Furthermore, there exist some multicast and TTL problems (TTL in the home network correct, but MN is to far away from the receiver) Reverse tunneling for Mobile IP [RFC3024] addresses these problems: 1. MN sends to FA 2. FA tunnels packets to HA by encapsulation 3. HA forwards the packet to the receiver (standard case) This extension can be implemented easily and co-operates with current implementations without reverse tunneling However, reverse tunneling does not solve: Further problems with firewalls: the reverse tunnel can be abused to circumvent security mechanisms (tunnel hijacking) Optimization of data paths: this gets even worse, i.e. packets will be forwarded through the tunnel via the HA to a sender (double triangular routing) Network Security (WS 2002): 17 Mobile Internet Security 11
12 Authentication for Mobile IP Access (1) Motivations for different authentication relations: Authentication between MN and home network: Basically serves to counter hijacking attacks Authentication between MN and visited network: Control access to network resources Secure accounting of resource usage Authentication between visited network and home network: Control which MN may use network resources Secure accounting of resource usage Control which networks may be accessed by an MN Standard Mobile IP does not include sufficient means to provide authentication and key management for truly mobile Internet access: IETF is currently defining interaction with an authentication, authorization & accounting (AAA) infrastructure [RFC2977] Network Security (WS 2002): 17 Mobile Internet Security 12
13 Authentication for Mobile IP Access (2) Which entities are involved in authentication? Visited network: Mobile node (MN) Foreign agent (FA) Local authentication, authorization & accounting server (AAAL) Home network: Home AAA server (AAAH) Home agent (HA) Intermediate Network: AAA brokers Network Security (WS 2002): 17 Mobile Internet Security 13
14 Authentication for Mobile IP Access (3) Broker Broker... Broker AAAL 1... AAAL n AAAH FA 1,1 FA 1,m1 Fa n,1 Fa n,mn HA Intra-Domain HO Inter-Domain HO Network Security (WS 2002): 17 Mobile Internet Security 14
15 Authentication for Mobile IP Access (4) Two aspects have to be separated: Mobile IP registration: Main issue: securely configuring re-routing of IP packets AAA authentication: Main issue: authenticate user for accounting purposes May additionally facilitate authentication with HA / FA Remark: Location privacy is currently not considered sufficiently in design of the authentication procedure Current plans are even worse than GSM location privacy! Network Security (WS 2002): 17 Mobile Internet Security 15
16 Authentication for Mobile IP Access (5) Mobile IP registration authentication protocol: Authentication is performed by piggy-packing MACs on to exchanged registration messages: 1.) MN FA: (RegReq, Flags, Lifetime, Addr MN, Addr HA, CoA, Id Req, NAI MN, Sig MN,HA, [Sig MN,FA ]) 2.) FA HA: (RegReq, Flags, Lifetime, Addr MN, Addr HA, CoA, Id Req, NAI MN, Sig MN,HA, [Sig MN,FA ], [Sig FA,HA ]) 3.) HA FA: (RegRep, Code, Lifetime, Addr MN, Addr HA, Id Rep, NAI MN, Sig HA,MN, [Sig HA,FA ]) 4.) FA MN: (RegRep, Code, Lifetime, Addr MN, Addr HA, Id Rep, NAI MN, Sig HA,MN, [Sig HA,FA ], [Sig FA,MN ]) Network Security (WS 2002): 17 Mobile Internet Security 16
17 Authentication for Mobile IP Access (6) There remains one important issue to be resolved: How to establish the security associations: FA HA? MN FA? While the relationship FA HA could be established with a standard IPSec internet key exchange (IKE), this is not possible for MN FA, as the MN has not yet obtained a valid IP address. Furthermore, IKE is a (very) general purpose protocol, which requires more effort than a dedicated protocol might need. This (among other things) motivates integration with AAA infrastructure Network Security (WS 2002): 17 Mobile Internet Security 17
18 AAA Static and Dynamic Trust Relationships Dynamic Trust Relationship Broker Static Trust Relationship Broker... Broker AAAL 1... AAAL n AAAH FA 1,1 FA 1,m1 Fa n,1 Fa n,mn HA AAAH generates keys for dynamic relationships Network Security (WS 2002): 17 Mobile Internet Security 18
19 Authentication with AAA Infrastructure (1) Challenge Signing MN FA AAAL Broker AAAH HA Adv. RegReq. AMR AMR AMR Authenticity Check HAR RegRep. AMA AMA AMA HAA Network Security (WS 2002): 17 Mobile Internet Security 19
20 Authentication with AAA Infrastructure (2) In roaming scenarios, the AAA infrastructure is planned to serve as a trusted third party (TTP) for mobile IP: Foreign agents include challenges in their advertisements (via challenge-response extension) The MN includes an NAI-extension and an MN-AAA-extension in his Mobile IP registration request The FA creates an AAA mobile node request (AMR) and sends it to the local AAA server (AAAL) The message is send to the AAA server of the MN s home domain (AAAH), eventually using AAA brokers AAAH checks the authenticity of the MN-AAA extension Network Security (WS 2002): 17 Mobile Internet Security 20
21 Authentication with AAA Infrastructure (3) AAA serving as TTP for Mobile IP (cont.): AAAH creates session keys for use between: MN HA (encrypted with K AAAH,MN / K AAAH,HA ) MN FA (encrypted with K AAAH,MN / K AAAH,AAAL / K AAAH,AAAB ) HA FA (encrypted with K AAAH,HA / K AAAH,AAAL / K AAAH,AAAB ) For key distribution purposes these session keys are encrypted with the keys indicated above AAAH sends a home agent mobile IP request (HAR) to the HA HA processes the request and answers with a home agent mobile IP answer (HAA) This message is forwarded as an AMA message to AAAL and then to FA FA sends an appropriate RegRep message to MN Network Security (WS 2002): 17 Mobile Internet Security 21
22 Authentication with AAA Infrastructure (4) Remarks: Mobile IP registration and AAA authentication are realized with one Internet traversal Subsequent re-registration is performed with standard Mobile IP means The distributed session keys have a limited lifetime Inter-domain handover requires AAA authentication Network Security (WS 2002): 17 Mobile Internet Security 22
23 Authentication with AAA Infrastructure (5) Some security remarks: The MN authentication procedure involves quite a few entities which makes security analysis difficult The challenge-response verification is distributed: FA provides challenge, but he can not verify the response FA has to trust an AAAH he does not know via a chain of trust created by AAAL and AAA brokers AAAH can verify the response, but does not provide the challenge AAAH may not deduce that the RegReq is fresh The brokers can read the session keys for FA / AAAL NAI extension is send in clear no location privacy, not even on the air interface! Network Security (WS 2002): 17 Mobile Internet Security 23
24 Additional References [Perkins00a] C. Perkins, D. B. Johnson. Route Optimization in Mobile IP. Internet Draft draft-ietf-mobileip-optim-10.txt (work in progress), [RFC2002] C. Perkins. IP Mobility Support. Internet RFC 2002, obsoleted by RFC 3220, [RFC2977] S. Glass, T. Hiller, S. Jacobs, C. Perkins. Mobile IP Authentication, Authorization, and Accounting Requirements. Internet RFC 2977, [RFC3024] G. Montenegro. Reverse Tunneling for Mobile IP, revised. RFC 3024, [RFC3220] C. Perkins. IP Mobility Support, revised. Internet RFC 3220, Network Security (WS 2002): 17 Mobile Internet Security 24
CSE 4215/5431: Mobile Communications Winter Suprakash Datta
CSE 4215/5431: Mobile Communications Winter 2013 Suprakash Datta datta@cse.yorku.ca Office: CSEB 3043 Phone: 416-736-2100 ext 77875 Course page: http://www.cse.yorku.ca/course/4215 Some slides are adapted
More informationMobile IP. Mobile IP 1
Mobile IP Mobile IP 1 Motivation for Mobile IP Routing based on IP destination address, network prefix (e.g. 129.13.42) determines physical subnet change of physical subnet implies change of IP address
More informationMobile Communications Chapter 8: Network Protocols/Mobile IP
Mobile Communications Chapter 8: Network Protocols/Mobile IP Motivation Data transfer, Encapsulation Security, IPv6, Problems Micro mobility support DHCP Ad-hoc networks, Routing protocols Prof. Jó Ueyama
More informationMobile Communications Chapter 9: Network Protocols/Mobile IP
Mobile Communications Chapter 9: Network Protocols/Mobile IP Motivation Data transfer Encapsulation Security IPv6 Problems DHCP Ad-hoc s Routing protocols 9.0.1 Motivation for Mobile IP Routing based on
More informationMobile Communications Mobility Support in Network Layer
Motivation Mobility support needed to be able to use mobile devices in the Mobile devices need IP address for their communication Applications would like to communicate while being on the move Mobile Communications
More informationMobile & Wireless Networking. Lecture 9: Mobile IP. [Schiller, Section 8.1]
192620010 Mobile & Wireless Networking Lecture 9: Mobile IP [Schiller, Section 8.1] Geert Heijenk Outline of Lecture 11 q Mobile IP Basics q 3 parts of Mobile IP: q Advertising Care-of Addresses q Registration
More informationMohammad Hossein Manshaei 1393
Mohammad Hossein Manshaei manshaei@gmail.com 1393 Mobile IP 2 Mobile Network Layer: Problems and Concerns Entities and Terminology in Mobile IP Mobile Indirect Routing Mobile IP Agent Advertisement Registration
More informationSJTU 2018 Fall Computer Networking. Wireless Communication
SJTU 2018 Fall Computer Networking 1 Wireless Communication Internet Protocol Stack 2 Application: supporting network applications - FTP, SMTP, HTTP Transport: data transfer between processes - TCP, UDP
More informationMobility Management Basics
Mobility Management Basics Summer Semester 2011 Integrated Communication Systems Group Ilmenau University of Technology Content Motivation Problem and possible solutions IP-based mobility management Conclusions
More informationECS-087: Mobile Computing
ECS-087: Mobile Computing Mobile IP Most of the slides borrowed from Prof. Sridhar Iyer Diwakar Yagyasen.1 Effect of Mobility on Protocol Stack Application: new applications and adaptations Transport:
More informationMobility Management - Basics
Mobility Management - Basics Summer Semester 2012 Integrated Communication Systems Group Ilmenau University of Technology Content Motivation Problem and possible solutions IP-based mobility management
More informationChapter 8 LOCATION SERVICES
Chapter 8 LOCATION SERVICES Distributed Computing Group Mobile Computing Winter 2005 / 2006 Overview Mobile IP Motivation Data transfer Encapsulation Location Services & Routing Classification of location
More informationFixed Internetworking Protocols and Networks. IP mobility. Rune Hylsberg Jacobsen Aarhus School of Engineering
Fixed Internetworking Protocols and Networks IP mobility Rune Hylsberg Jacobsen Aarhus School of Engineering rhj@iha.dk 1 2011 ITIFN Mobile computing Vision Seamless, ubiquitous network access for mobile
More informationMobility Management. Advanced Mobile Communication Networks. Integrated Communication Systems Group Ilmenau University of Technology
Mobility Management Advanced Mobile Communication Networks Integrated Communication Systems Group Ilmenau University of Technology Motivation The Internet and mobile communication networks are experiencing
More informationMobile Communications Chapter 8: Network Protocols/Mobile IP. Micro mobility support. Routing protocols. Ad-hoc networks. Problems DHCP.
Mobile Communications Chapter 8: Network Protocols/Mobile IP Motivation Problems Data transfer Micro mobility support Encapsulation DHCP Security Ad-hoc networks IPv6 Routing protocols Prof. Dr.-Ing. Jochen
More informationLECTURE 8. Mobile IP
1 LECTURE 8 Mobile IP What is Mobile IP? The Internet protocol as it exists does not support mobility Mobile IP tries to address this issue by creating an anchor for a mobile host that takes care of packet
More informationChapter 6 MOBILE IP AND TCP
Chapter 6 MOBILE IP AND TCP Distributed Computing Group Mobile Computing Summer 2004 Overview Network Protocols / Mobile IP Motivation Data transfer Encapsulation Problems DHCP Mobile Transport Layer /
More informationMobility Management. Advanced Mobile Communication Networks. Integrated Communication Systems Group Ilmenau University of Technology
Mobility Management Advanced Mobile Communication Networks Integrated Communication Systems Group Ilmenau University of Technology Motivation The Internet and mobile communication networks are experiencing
More informationIPv6 Protocols and Networks Hadassah College Spring 2018 Wireless Dr. Martin Land
IPv6 1 IPv4 & IPv6 Header Comparison IPv4 Header IPv6 Header Ver IHL Type of Service Total Length Ver Traffic Class Flow Label Identification Flags Fragment Offset Payload Length Next Header Hop Limit
More informationModule 28 Mobile IP: Discovery, Registration and Tunneling
Module 28 Mobile IP: Discovery, and Tunneling Learning Objectives Introduction to different phases of Mobile IP Understanding how a mobile node search the agents using Discovery process Understand how
More informationThis chapter introduces protocols and mechanisms developed for the network
Mobile network layer 8 This chapter introduces protocols and mechanisms developed for the network layer to support mobility. The most prominent example is Mobile IP, discussed in the first section, which
More informationIPv6. IPv4 & IPv6 Header Comparison. Types of IPv6 Addresses. IPv6 Address Scope. IPv6 Header. IPv4 Header. Link-Local
1 v4 & v6 Header Comparison v6 Ver Time to Live v4 Header IHL Type of Service Identification Protocol Flags Source Address Destination Address Total Length Fragment Offset Header Checksum Ver Traffic Class
More informationMobile IP. rek. Petr Grygárek Petr Grygarek, Advanced Computer Networks Technologies 1
Mobile IP Petr Grygárek rek 1 Basic principle Picture from IOS IP and IP Routing Configuration Guide Mobile node maintains the same IP address even while roaming in foreign networks even if it s address
More informationOutline. CS5984 Mobile Computing. Host Mobility Problem 1/2. Host Mobility Problem 2/2. Host Mobility Problem Solutions. Network Layer Solutions Model
CS5984 Mobile Computing Outline Host Mobility problem and solutions IETF Mobile IPv4 Dr. Ayman Abdel-Hamid Computer Science Department Virginia Tech Mobile IPv4 1 2 Host Mobility Problem 1/2 Host Mobility
More informationOutline. CS6504 Mobile Computing. Host Mobility Problem 1/2. Host Mobility Problem 2/2. Dr. Ayman Abdel-Hamid. Mobile IPv4.
CS6504 Mobile Computing Outline Host Mobility problem and solutions IETF Mobile IPv4 Dr. Ayman Abdel-Hamid Computer Science Department Virginia Tech Mobile IPv4 1 2 Host Mobility Problem 1/2 Host Mobility
More informationWireless Transmission and Mobility
Mobile and Ubiquitous Computing Wireless Transmission and Mobility Modulation, MAC and IPv6" George Roussos! g.roussos@dcs.bbk.ac.uk! Modulation" Digital modulation! digital data is translated into an
More information11. IP Mobility 최 양 희 서울대학교 컴퓨터공학부
11. IP Mobility Introduction Terminal Mobility Person Mobility Network Mobility Internet 2002 Yanghee Choi 2 Mobile IP : Why IP addressing scheme optimized for stationary environment point of attachment
More informationMobile IPv6 Overview
Sungkyunkwan University Prepared by H. Choo Copyright 2000-2018 Networking Laboratory Lecture Outline Network Layer Mobile IPv6 Proxy Mobile IPv6 Networking Laboratory 2/87 Sungkyunkwan University Network
More informationMobile IP. Mobile Computing. Mobility versus Portability
Mobile IP Mobile Computing Introduction Amount of mobile/nomadic computing expected to increase dramatically in near future. By looking at the great acceptance of mobile telephony, one can foresee a similar
More informationKing Fahd University of Petroleum & Minerals Computer Engineering g Dept
King Fahd University of Petroleum & Minerals Computer Engineering g Dept COE 543 Mobile and Wireless Networks Term 082 Dr. Ashraf S. Hasan Mahmoud Rm 22-148-3 Ext. 1724 Email: ashraf@kfupm.edu.sa 6/1/2009
More informationMobility Chapter 5 Ad Hoc a Hoc nd S ensor Net r works rks Roger W r a W ttenhofer fe r 5/1
Mobility Chapter 5 Ad Hoc and Sensor Networks Roger Wattenhofer 5/1 Rating Area maturity First steps Text book Practical importance No apps Mission critical Theoretical importance Not really Must have
More informationNetwork Layer. Mobile IP. Slides adapted from Prof. Dr.-Ing. Jochen H. Schiller and W. Stallings
Network Layer Mobile IP Slides adapted from Prof. Dr.-Ing. Jochen H. Schiller and W. Stallings 1 Mobile IP - Definition Mobile IP (MIP) is a modification to IP that allows nodes to continue to receive
More informationIntroduction to IPv6. IPv6 addresses
Introduction to IPv6 (Chapter 4 in Huitema) IPv6,Mobility-1 IPv6 addresses 128 bits long Written as eight 16-bit integers separated with colons E.g. 1080:0000:0000:0000:0000:0008:200C:417A = 1080::8:800:200C:417A
More informationMobile Computing. Chapter 8: Mobile Network Layer
Mobile Computing Chapter 8: Mobile Network Layer Prof. Sang-Jo Yoo Contents Mobile IP overview Agent discovery Registration Tunneling DHCP Mobile IP multicasting 2 Motivation for Mobile IP Routing based
More informationMobile Communications Chapter 8: Network Protocols/Mobile IP
Mobile Communications Chapter 8: Network Protocols/Mobile IP Motivation Data transfer, Encapsulation Security, IPv6, Problems Micro mobility support DHCP Ad-hoc networks, Routing protocols 8.1 Motivation
More informationAdvanced Computer Networks. IP Mobility
Advanced Computer Networks 263 3501 00 IP Mobility Patrick Stuedi Spring Semester 2014 1 Oriana Riva, Department of Computer Science ETH Zürich Tuesday 1 April 2014 Outline Last week: Today: Cellular Networks
More informationCharles Perkins Nokia Research Center 2 July Mobility Support in IPv6 <draft-ietf-mobileip-ipv6-14.txt> Status of This Memo
IETF Mobile IP Working Group INTERNET-DRAFT David B. Johnson Rice University Charles Perkins Nokia Research Center 2 July 2000 Mobility Support in IPv6 Status of This
More informationIntroduction Mobility Support Handover Management Conclutions. Mobility in IPv6. Thomas Liske. Dresden University of Technology
2005 / High Speed Networks II Outline Introduction Mobility Support Overview of IPv6 Mobility Support Handover Management Mobility Support What means Mobility Support? allow transparent routing of IPv6
More informationIntroduction to IPv6. IPv6 addresses
Introduction to IPv6 (Chapter 4 in Huitema) IPv6,Mobility-1 IPv6 addresses 128 bits long Written as eight 16-bit integers separated with colons E.g. 1080:0000:0000:0000:0000:0008:200C:417A = 1080::8:800:200C:417A
More informationOn using Mobile IP Protocols
Journal of Computer Science 2 (2): 211-217, 2006 ISSN 1549-3636 2006 Science Publications On using Mobile IP Protocols Fayza A. Nada Faculty of Computers and Information, Suez Canal University, Ismailia,
More informationMobile IP. Page 1. 10/5/98 Mohamed Khalil IP10 MKIPM001
Introduction In the last few years the number of notebook users has been increased tremendously, due to the great improvement in this technology with respect to size, speed, and weight. In addition, most
More informationMobile Communications Chapter 8: Network Protocols/Mobile IP
Prof. Dr.-Ing Jochen H. Schiller Inst. of Computer Science Freie Universität Berlin Germany Mobile Communications Chapter 8: Network Protocols/Mobile IP Motivation Data transfer, Encapsulation Security,
More informationLecture Computer Networks
Prof. Dr. Hans Peter Großmann mit M. Rabel sowie H. Hutschenreiter und T. Nau Sommersemester 2012 Institut für Organisation und Management von Informationssystemen Lecture Computer Networks Internet Protocol
More informationHow Mobile IP Works? Presenter: Ajoy Singh
How Mobile IP Works? Presenter: Ajoy Singh Agenda Required background What problems does Mobile IP solve? Mobile IP: protocol overview Scope Requirements Design goals Functional entities 5/2/2002 How Mobile
More informationMobile IP Overview. Based on IP so any media that can support IP can also support Mobile IP
Introduction: Mobile IP Overview An Internet Protocol address (IP address) is a numerical label assigned to each device (e.g., computer, printer) participating in a computer network that uses the Internet
More informationIntroduction to IPv6. IPv6 addresses
Introduction to IPv6 (Chapter4inHuitema) IPv6,Mobility-1 IPv6 addresses 128 bits long Written as eight 16-bit hexadecimal integers separated with colons E.g. 1080:0000:0000:0000:0000:0008:200C:417A = 1080::8:800:200C:417A
More informationMobile IP and Mobile Transport Protocols
Mobile IP and Mobile Transport Protocols 1 IP routing Preliminaries Works on a hop-by-hop basis using a routing table 32 bits: 129.97.92.42 Address = subnet + host (Mobility No packet for you) Two parts»
More informationMobility Support in Internet and Mobile IP. Gianluca Reali
Mobility Support in Internet and Mobile IP Gianluca Reali 1 Problem We have seen that mobile users can change point of attachment In a WLAN, a mobile may change access point. In a cellular network, a mobile
More informationIntroduction to Communication Networks Spring Unit 15 Internetworking (cont) Routing
Introduction to Communication Networks Spring 007 Unit 5 Internetworking (cont) Routing EECS SPRING 007 Acknowledgements slides coming from: The book by Peterson/Davie The book by Wiliam Stallings Several
More informationUse of IPSec in Mobile IP
Department of Electrical and Computer Engineering ELEG 777 Internet Engineering ( TERM PAPER ) Use of IPSec in Mobile IP DONE BY: SALEM ITANI ID #: 20011003 SUBMITTED TO: Dr. AYMAN KAYSSI DATE: MAY 21,
More informationCSE 123b Communications Software
CSE 123b Communications Software Spring 2004 Lecture 9: Mobile Networking Stefan Savage Quick announcements Typo in problem #1 of HW #2 (fixed as of 1pm yesterday) Please consider chapter 4.3-4.3.3 to
More informationQuick announcements. CSE 123b Communications Software. Today s issues. Last class. The Mobility Problem. Problems. Spring 2004
CSE 123b Communications Software Spring 2004 Lecture 9: Mobile Networking Quick announcements Typo in problem #1 of HW #2 (fixed as of 1pm yesterday) Please consider chapter 4.3-4.3.3 to be part of the
More informationBi-directional Route Optimization in Mobile IP Over Wireless LAN
Bi-directional Route Optimization in Mobile IP Over Wireless LAN Chun-Hsin Wu*, Ann-Tzung Cheng, Shao-Ting Lee, Jan-Ming Ho and D.T. Lee Institute of Information Science, Academia Sinica, Taiwan {wuch,
More informationCSE 123A Computer Netwrking
CSE 123A Computer Netwrking Winter 2005 Mobile Networking Alex Snoeren presenting in lieu of Stefan Savage Today s s issues What are implications of hosts that move? Remember routing? It doesn t work anymore
More informationT Computer Networks II. Mobility Issues Contents. Mobility. Mobility. Classifying Mobility Protocols. Routing vs.
T-0.50 Computer Networks II Mobility Issues 6.0.008 Overview Mobile IP NEMO Transport layer solutions i SIP mobility Contents Prof. Sasu Tarkoma Mobility What happens when network endpoints start to move?
More informationWhat is mobility? Mobile IP. Mobility Impact on Protocol Stack (cont.) Advanced Topics in Computer Networks
Advanced Topics in Computer Networks What is mobility? spectrum of mobility, from the perspective: Mobile IP no mobility high mobility Chalermek Intanagonwiwat Slides courtesy of James F. Kurose, Keith
More informationIPv6: An Introduction
Outline IPv6: An Introduction Dheeraj Sanghi Department of Computer Science and Engineering Indian Institute of Technology Kanpur dheeraj@iitk.ac.in http://www.cse.iitk.ac.in/users/dheeraj Problems with
More informationInternet. 1) Internet basic technology (overview) 3) Quality of Service (QoS) aspects
Internet 1) Internet basic technology (overview) 2) Mobility aspects 3) Quality of Service (QoS) aspects Relevant information: these slides (overview) course textbook (Part H) www.ietf.org (details) IP
More informationLecture 7: Mobile IP (Part 1) Dr. Reynold Cheng
Lecture 7: Mobile IP (Part 1) Dr. Reynold Cheng This lecture is based on the textbook W. Stallings, Wireless Communications and Networks, Prentice Hall, 2005, the slides (prepared by Tom Fronckowiak) and
More informationCommunications Software. CSE 123b. CSE 123b. Spring Lecture 10: Mobile Networking. Stefan Savage
CSE 123b CSE 123b Communications Software Spring 2003 Lecture 10: Mobile Networking Stefan Savage Quick announcement My office hours tomorrow are moved to 12pm May 6, 2003 CSE 123b -- Lecture 10 Mobile
More informationQuick announcement. CSE 123b Communications Software. Last class. Today s issues. The Mobility Problem. Problems. Spring 2003
CSE 123b Communications Software Quick announcement My office hours tomorrow are moved to 12pm Spring 2003 Lecture 10: Mobile Networking Stefan Savage May 6, 2003 CSE 123b -- Lecture 10 Mobile IP 2 Last
More informationCategory: Standards Track June Mobile IPv6 Support for Dual Stack Hosts and Routers
Network Working Group H. Soliman, Ed. Request for Comments: 5555 Elevate Technologies Category: Standards Track June 2009 Status of This Memo Mobile IPv6 Support for Dual Stack Hosts and Routers This document
More informationLocation Management Agent for SCTP Handover in Mobile Network
Location Management Agent for SCTP Handover in Mobile Network Yong-Jin Lee Department of Technology Education, Korea National University of Education 250 Taesungtapyon-ro, Heungduk-ku, Cheongju, South
More informationHIP Host Identity Protocol. October 2007 Patrik Salmela Ericsson
HIP Host Identity Protocol October 2007 Patrik Salmela Ericsson Agenda What is the Host Identity Protocol (HIP) What does HIP try to solve HIP basics Architecture The HIP base exchange HIP basic features
More informationMIP4 Working Group. Generic Notification Message for Mobile IPv4 draft-ietf-mip4-generic-notification-message-16
MIP4 Working Group Internet-Draft Intended status: Standards Track Expires: April 28, 2011 H. Deng China Mobile H. Levkowetz Netnod V. Devarapalli WiChorus S. Gundavelli Cisco Systems B. Haley Hewlett-Packard
More informationMobile IP Support for RFC 3519 NAT Traversal
The Mobile IP: Support for RFC 3519 NAT Traversal feature introduces an alternative method for tunneling Mobile IP data traffic. New extensions in the Mobile IP registration request and reply messages
More informationObsoletes: 2002 January 2002 Category: Standards Track
Network Working Group C. Perkins, Ed. Request for Comments: 3220 Nokia Research Center Obsoletes: 2002 January 2002 Category: Standards Track Status of this Memo IP Mobility Support for IPv4 This document
More informationAalborg University Institute of Electronic Systems - Communication Networks - 6th Semester
Aalborg University Institute of Electronic Systems - Communication Networks - 6th Semester TITLE: Experimental Analysis of Mobility Support Schemes for Vertical Handover SUBJECT: Basic Wireless Communication
More informationRequest for Comments: Wichorus G. Tsirtsis Qualcomm T. Ernst INRIA K. Nagami INTEC NetCore October 2009
Network Working Group Request for Comments: 5648 Category: Standards Track R. Wakikawa, Ed. Toyota ITC V. Devarapalli Wichorus G. Tsirtsis Qualcomm T. Ernst INRIA K. Nagami INTEC NetCore October 2009 Multiple
More informationLOGICAL ADDRESSING. Faisal Karim Shaikh.
LOGICAL ADDRESSING Faisal Karim Shaikh faisal.shaikh@faculty.muet.edu.pk DEWSNet Group Dependable Embedded Wired/Wireless Networks www.fkshaikh.com/dewsnet IPv4 ADDRESSES An IPv4 address is a 32-bit address
More informationLast time. BGP policy. Broadcast / multicast routing. Link virtualization. Spanning trees. Reverse path forwarding, pruning Tunneling
Last time BGP policy Broadcast / multicast routing Spanning trees Source-based, group-shared, center-based Reverse path forwarding, pruning Tunneling Link virtualization Whole networks can act as an Internet
More informationPerformance Analysis of Hierarchical Mobile IPv6 in IP-based Cellular Networks
Performance Analysis of Hierarchical Mobile IPv6 in IP-based Cellular Networks Sangheon Pack and Yanghee Choi School of Computer Science & Engineering Seoul National University Seoul, Korea Abstract Next-generation
More informationInternet Engineering Task Force (IETF) Ericsson July 2011
Internet Engineering Task Force (IETF) Request for Comments: 6275 Obsoletes: 3775 Category: Standards Track ISSN: 2070-1721 C. Perkins, Ed. Tellabs, Inc. D. Johnson Rice University J. Arkko Ericsson July
More informationExtended Correspondent Registration Scheme for Reducing Handover Delay in Mobile IPv6
Extended Correspondent Registration Scheme for Reducing Handover Delay in Mobile IPv6 Ved P. Kafle Department of Informatics The Graduate University for Advanced Studies Tokyo, Japan Eiji Kamioka and Shigeki
More informationFast Handover in Mobile IPv4 and IPv6
Fast Handover in Mobile IPv4 and IPv6 Raoul Schmidiger & Gregor Zographos April 28, 2005 Seminar: Mobile Systems Talk No.4 Content IPv4 (Gregor) IPv6 (Raoul) Problems in IP mobility (Gregor) Standards
More informationFA Service Configuration Mode Commands
FA Service Configuration Mode Commands The Foreign Agent Service Configuration Mode is used to create and manage the Foreign Agent (FA) services associated with the current context. Important The commands
More informationMOBILE IP AND WIRELESS APPLICATION PROTOCOL
MOBILE IP AND WIRELESS APPLICATION PROTOCOL In this chapter, we look at two standards that provide application-level support for wireless networking: Mobile IP and Wireless Application Protocol (WAP).
More informationRMIT University. Data Communication and Net-Centric Computing COSC 1111/2061. Lecture 2. Internetworking IPv4, IPv6
RMIT University Data Communication and Net-Centric Computing COSC 1111/2061 Internetworking IPv4, IPv6 Technology Slide 1 Lecture Overview During this lecture, we will understand The principles of Internetworking
More informationPacket Header Formats
A P P E N D I X C Packet Header Formats S nort rules use the protocol type field to distinguish among different protocols. Different header parts in packets are used to determine the type of protocol used
More informationMobility support in RADIUS and Diameter
Mobility support in RADIUS and Diameter Päivi Savola Helsinki University of Technology May 28, 2003 Abstract This paper focuses on describing some of the possible implementations of authentication, authorization
More informationAn IP-level Mobility Management Framework Based on Quasi-Registration in Wireless Technologies Convergence
An IP-level Mobility Management Framework Based on Quasi-Registration in Wireless Technologies Convergence Ted Taekyoung Kwon, Mario Gerla UCLA Computer Science Los Angeles, CA 90095 tedkwon,gerla @cs.ucla.edu
More informationOverview of the Cisco Mobile Wireless Home Agent
CHAPTER 1 Overview of the Cisco Mobile Wireless Home Agent This chapter illustrates the functional elements in a typical Mobile IP packet data system, the Cisco products that are currently available to
More informationRequest for Comments: 4433 Category: Standards Track Cisco Systems Inc. March 2006
Network Working Group Request for Comments: 4433 Category: Standards Track M. Kulkarni A. Patel K. Leung Cisco Systems Inc. March 2006 Status of This Memo Mobile IPv4 Dynamic Home Agent (HA) Assignment
More informationPlanning for Information Network
Planning for Information Network Lecture 7: Introduction to IPv6 Assistant Teacher Samraa Adnan Al-Asadi 1 IPv6 Features The ability to scale networks for future demands requires a limitless supply of
More informationNetwork Interconnection
Network Interconnection Covers different approaches for ensuring border or perimeter security Computer Networking: A Top Down Approach 6 th edition Jim Kurose, Keith Ross Addison-Wesley March 2012 Lecture
More informationMobility Support in Internet and Mobile IP
Mobility Support in Internet and Mobile IP CS 515 - Mobile and Wireless Networking İbrahim Körpeoğlu Computer Engineering Department Bilkent University Bilkent / ANKARA İbrahim Körpeoğlu 1 Problem We have
More informationMobile IPv6. Washington University in St. Louis
Mobile IPv6 Raj Jain Professor of Computer Science and Engineering Washington University in Saint Louis Saint Louis, MO 63130 Audio/Video recordings of this lecture are available at: http://www.cse.wustl.edu/~jain/cse574-08/
More informationIPv6 : Internet Protocol Version 6
IPv6 : Internet Protocol Version 6 History Internet growth was faster than anticipated In early 1990 s, it was realized that we may run out of IPv4 addresses somewhere between 2000 and 2010 Also, experiences
More informationHistory. IPv6 : Internet Protocol Version 6. IPv4 Year-Wise Allocation (/8s)
History IPv6 : Internet Protocol Version 6 Internet growth was faster than anticipated In early 1990 s, it was realized that we may run out of IPv4 addresses somewhere between 2000 and 2010 Also, experiences
More informationMobile SCTP for IP Mobility Support in All-IP Networks
Mobile SCTP for IP Mobility Support in All-IP Networks Seok Joo Koh sjkoh@cs.knu.ac.kr Abstract The Stream Control Transmission Protocol (SCTP) is a new transport protocol that is featured multi-streaming
More informationNetwork Address Translation. All you want to know about
Network Address Translation All you want to know about (C) Herbert Haas 2005/03/11 Reasons for NAT Mitigate Internet address depletion Save global addresses (and money) Conserve internal address plan TCP
More informationInternet Control Message Protocol (ICMP)
Internet Control Message Protocol (ICMP) 1 Overview The IP (Internet Protocol) relies on several other protocols to perform necessary control and routing functions: Control functions (ICMP) Multicast signaling
More informationOverview of the Cisco Mobile Wireless Home Agent
1 CHAPTER Overview of the Cisco Mobile Wireless Home Agent This chapter illustrates the functional elements in a typical Mobile IP packet data system, the Cisco products that are currently available to
More informationIPv6 Concepts. Improve router performance Simplify IP header Align to 64 bits Address hierarchy with more levels Simplify routing tables
IPv6 Concepts Tópicos Avançados de Redes 2016/2017 Why IPv6? 2 Lack of IPv4 addresses Imply NAT, or other solutions; Realm Specific IP (RFC3102) Improve router performance Simplify IP header Align to 64
More informationROUTE OPTIMIZATION EXTENSITON FOR THE MOBILE INTERNET PROTOCOL IN LINUX
ROUTE OPTIMIZATION EXTENSITON FOR THE MOBILE INTERNET PROTOCOL IN LINUX ABSTRACT The base Mobile Internet Protocol (Mobile IP) provides a means for portable computers to roam freely, changing its point
More informationIP - The Internet Protocol. Based on the slides of Dr. Jorg Liebeherr, University of Virginia
IP - The Internet Protocol Based on the slides of Dr. Jorg Liebeherr, University of Virginia Orientation IP (Internet Protocol) is a Network Layer Protocol. IP: The waist of the hourglass IP is the waist
More informationROUTE OPTIMIZATION EXTENSION FOR THE MOBILE INTERNET PROTOCOL IN LINUX
ROUTE OPTIMIZATION EXTENSION FOR THE MOBILE INTERNET PROTOCOL IN LINUX M. L. Jiang and Y. C. Tay ABSTRACT The base Mobile Internet Protocol (Mobile IP)[1] provides a means for portable computers to roam
More informationIPSec. Overview. Overview. Levente Buttyán
IPSec - brief overview - security associations (SAs) - Authentication Header (AH) protocol - Encapsulated Security Payload () protocol - combining SAs (examples) Overview Overview IPSec is an Internet
More informationHandover Management for Mobile Nodes in IPv6 Networks
TECHNOLOGY ADVANCES FOR 3G AND BEYOND Handover Management for Mobile Nodes in IPv6 Networks Nicolas Montavont and Thomas Noël LSIIT Louis Pasteur University CNRS, Strasbourg ABSTRACT In this article we
More informationAn Industry view of IPv6 Advantages
An Industry view of IPv6 Advantages March 2002 Yanick.Pouffary@Compaq.Com Imagine what IPv6 can do for you! 1 Where we are Today IPv4 a victim of its own success IPv4 addresses consumed at an alarming
More information