Mobility Management. Advanced Mobile Communication Networks. Integrated Communication Systems Group Ilmenau University of Technology

Similar documents
Mobility Management - Basics

Mobility Management. Advanced Mobile Communication Networks. Integrated Communication Systems Group Ilmenau University of Technology

Mobility Management Basics

Mobile Communications Chapter 9: Network Protocols/Mobile IP

Mobile Communications Mobility Support in Network Layer

Mobile Communications Chapter 8: Network Protocols/Mobile IP

Mobile & Wireless Networking. Lecture 9: Mobile IP. [Schiller, Section 8.1]

CSE 4215/5431: Mobile Communications Winter Suprakash Datta

Mobile IP. Mobile IP 1

SJTU 2018 Fall Computer Networking. Wireless Communication

Mohammad Hossein Manshaei 1393

Mobile Communications Chapter 8: Network Protocols/Mobile IP. Micro mobility support. Routing protocols. Ad-hoc networks. Problems DHCP.

Network Security. Security of Mobile Internet Communications. Chapter 17. Network Security (WS 2002): 17 Mobile Internet Security 1 Dr.-Ing G.

Chapter 8 LOCATION SERVICES

Fixed Internetworking Protocols and Networks. IP mobility. Rune Hylsberg Jacobsen Aarhus School of Engineering

Chapter 6 MOBILE IP AND TCP

LECTURE 8. Mobile IP

Mobile Computing. Chapter 8: Mobile Network Layer

ECS-087: Mobile Computing

Mobile IPv6 Overview

IPv6 Protocols and Networks Hadassah College Spring 2018 Wireless Dr. Martin Land

IPv6: An Introduction

Module 28 Mobile IP: Discovery, Registration and Tunneling

IPv6. IPv4 & IPv6 Header Comparison. Types of IPv6 Addresses. IPv6 Address Scope. IPv6 Header. IPv4 Header. Link-Local

Introduction Mobility Support Handover Management Conclutions. Mobility in IPv6. Thomas Liske. Dresden University of Technology

Mobile Communications Chapter 8: Network Protocols/Mobile IP

Introduction to IPv6. IPv6 addresses

PMIPv6 PROXY MOBILE IPV6 OVERVIEW OF PMIPV6, A PROXY-BASED MOBILITY PROTOCOL FOR IPV6 HOSTS. Proxy Mobile IPv6. Peter R. Egli INDIGOO.COM. indigoo.

Network Layer. Mobile IP. Slides adapted from Prof. Dr.-Ing. Jochen H. Schiller and W. Stallings

Mobile IP. Mobile Computing. Mobility versus Portability

This chapter introduces protocols and mechanisms developed for the network

Outline. CS5984 Mobile Computing. Host Mobility Problem 1/2. Host Mobility Problem 2/2. Host Mobility Problem Solutions. Network Layer Solutions Model

11. IP Mobility 최 양 희 서울대학교 컴퓨터공학부

Outline. CS6504 Mobile Computing. Host Mobility Problem 1/2. Host Mobility Problem 2/2. Dr. Ayman Abdel-Hamid. Mobile IPv4.

Mobile IP. rek. Petr Grygárek Petr Grygarek, Advanced Computer Networks Technologies 1

Charles Perkins Nokia Research Center 2 July Mobility Support in IPv6 <draft-ietf-mobileip-ipv6-14.txt> Status of This Memo

Mobile IP and Mobile Transport Protocols

Wireless Transmission and Mobility

Location Management Agent for SCTP Handover in Mobile Network

T Computer Networks II. Mobility Issues Contents. Mobility. Mobility. Classifying Mobility Protocols. Routing vs.

CSE 123A Computer Netwrking

Introduction to IPv6. IPv6 addresses

CMPE 257: Wireless and Mobile Networking

CSE 123b Communications Software

Quick announcements. CSE 123b Communications Software. Today s issues. Last class. The Mobility Problem. Problems. Spring 2004

Seamless Handover Scheme for Proxy Mobile IPv6

An Approach to Efficient and Reliable design in Hierarchical Mobile IPv6

Communications Software. CSE 123b. CSE 123b. Spring Lecture 10: Mobile Networking. Stefan Savage

Quick announcement. CSE 123b Communications Software. Last class. Today s issues. The Mobility Problem. Problems. Spring 2003

CMPE 257: Wireless and Mobile Networking

Handover Management for Mobile Nodes in IPv6 Networks

Obsoletes: 2002 January 2002 Category: Standards Track

Performance Analysis of Hierarchical Mobile IPv6 in IP-based Cellular Networks

On using Mobile IP Protocols

Introduction to IPv6. IPv6 addresses

Fast Handover in Mobile IPv4 and IPv6

Planning for Information Network

Chapter 09 Network Protocols

Mobile SCTP for IP Mobility Support in All-IP Networks

Mobile IP Overview. Based on IP so any media that can support IP can also support Mobile IP

CS5984 Mobile Computing

Mobility Support in Internet and Mobile IP. Gianluca Reali

Mobility Chapter 5 Ad Hoc a Hoc nd S ensor Net r works rks Roger W r a W ttenhofer fe r 5/1

Virtual Hierarchical Architecture Integrating Mobile IPv6 and MANETs for Internet Connectivity

CMPE 257: Wireless and Mobile Networking

An Analysis of the Flow-Based Fast Handover Method for Mobile IPv6 Network. Jani Puttonen, Ari Viinikainen, Miska Sulander and Timo Hämäläinen

P A R T T W O MOBILE IPv6

A Global Mobility Scheme for Seamless Multicasting in Proxy Mobile IPv6 Networks

Mobile IPv6 performance in networks: handover optimizations on the link and network layer

Mobile IPv6. Raj Jain. Washington University in St. Louis

A Survey of IP micro-mobility protocols

MOBILE IP AND WIRELESS APPLICATION PROTOCOL

O-PMIPv6: Optimized Proxy Mobile IPv6. Ahmad Rasem, Bachelor of Communications Engineering

Optimized Paging Cache Mappings for efficient location management Hyun Jun Lee, Myoung Chul Jung, and Jai Yong Lee

Performance Comparison and Analysis on MIPv6, Fast MIPv6 Bi-casting and Eurecom IPv6 Soft Handover over IEEE802.11b WLANs

LOGICAL ADDRESSING. Faisal Karim Shaikh.

OPTIMIZING MOBILITY MANAGEMENT IN FUTURE IPv6 MOBILE NETWORKS

Foreword xxiii Preface xxvii IPv6 Rationale and Features

Analysis of Proxy Mobile IPv6: A Network-based Mobility Solution

Mobile Communications Chapter 8: Network Protocols/Mobile IP

Category: Standards Track June Mobile IPv6 Support for Dual Stack Hosts and Routers

CS 515 Mobile and Wireless Networking Final Exam Fall

Chapter 12 Network Protocols

Proxy Mobile IPv6 (PMIPv6)

Performance Analysis of Multicast Mobility in a H-MIP Proxy Environment

King Fahd University of Petroleum & Minerals Computer Engineering g Dept

Mobility Support in IPv6

Hierarchical Mobile IPv6 Implementation Experiences

CS 515 Mobile and Wireless Networking Final Exam Solutions Fall

Fast Location Opposite Update Scheme for Minimizing Handover Latency over Wireless/Mobile Networks

TCP/IP Networking. Training Details. About Training. About Training. What You'll Learn. Training Time : 9 Hours. Capacity : 12

A Design of Distributed Data Traffic Algorithm based on Hierarchical Wireless/Mobile Networks

This tutorial will help you in understanding IPv4 and its associated terminologies along with appropriate references and examples.

Extended Correspondent Registration Scheme for Reducing Handover Delay in Mobile IPv6

Wireless Networks III: advanced concepts. Hans-Peter Schwefel and Tatiana K. Madsen. Mm3 Wireless applications, SIP & IMS (HPS)

Handover Operation in Mobile IP-over-MPLS Networks

nsctp: A New Transport Layer Tunnelling Approach to Provide Seamless Handover for Moving Network

An Enhancement of Mobile IP by Home Agent Handover

IPv6 Next generation IP

Last time. Network layer. Introduction. Virtual circuit vs. datagram details. IP: the Internet Protocol. forwarding vs. routing

Transcription:

Mobility Management Advanced Mobile Communication Networks Integrated Communication Systems Group Ilmenau University of Technology

Motivation The Internet and mobile communication networks are experiencing an enormous growth Future networks will interconnect various heterogeneous networks by means of a common IP core, also referred to as All-IP Goals: always-on connectivity, higher bandwidth, reduced delay, lower cost, etc. Challenge: support mobility between cells connected through an IP core while satisfying real-time and QoS requirements 2

Mobility Management Approaches in the TCP/IP Reference Model 3

Which Layer Handles Mobility? Application layer Application layer mobility Presentation layer Application layer Session layer Session layer mobility Transport layer Transport Transport layer layer mobility Network layer Network Internet layer layer mobility Data link layer Link layer mobility Network Interface Hardware Physical layer ISO/OSI TCP/IP 4

Which Layer Handles Mobility? Link layer mobility management is responsible for the establishment of a radio link between the Mobile Node (MN) and the new Access Point (AP) No more procedures are required if the old as well as the new AP belong to the same subnet If the new AP belongs to a new subnet, we need mobility support either in the network layer, i.e. the Internet layer of the TCP/IP reference model, in the transport layer or in the application layer 5

Mobility Management in Different Layers, Why? Link layer mobility Required when changing the point of attachment Responsible for establishment of a wireless link Network layer mobility Transparency to higher layer protocols, e.g. TCP and UDP Applications on mobiles can further communicate with existing applications without any modifications Change of network architecture is allowed Transport layer mobility End-to-end mobility management while keeping the Internet infrastructure unchanged End hosts take care of mobility, i.e. TCP and UDP are updated to support mobility 6

Mobility Management in Different Layers, Why? Session layer mobility Migration of sessions between devices Application layer mobility No changes to current networks Example: extending IP telephony infrastructure to fulfill mobility requirements Usage of SIP protocol and support for mobility by change of the mapping between a name of a user (e.g. mail address) and the IP address Hybrid layer mobility Optimization of the performance of a certain layer mobility management approach using information from other layers or the integration of solutions from several layers Synchronization between layers is essential 7

Tasks and criteria of mobility management Important tasks of mobility management Find and address a mobile away from home Support continuous communication after change of location Security: avoid misuse of mechanism Privacy: hide location from others Important criteria to compare mobility protocols Handover (HO) performance Delay to update the route Packet loss due to handover Protocol overhead: consumption of network resources Scalability: protocol overhead in large networks with large numbers of mobile nodes Robustness: adaptability to different network conditions and failures Ease of deployment: simplicity, suitability to different network scenarios 8

Link Layer Mobility Management 9

Link Layer Handoff This scenario considers handoffs between WLAN access points (APs) as an example! Other communication systems use more sophisticated handoff mechanisms! Responsible for the establishment of a radio link between the MN and the AP The handoff comprises 4 phases Recognizing the loss of the wireless connection Search for and detection of a new adequate AP Re-/Authentication with the new discovered AP Re-/Association with the new discovered AP 10

Recognizing the Loss of the Wireless Connection Connection loss is detected based on Weakness of the received signal or Failed frame transmissions Weakness of the received signal Most frequently used approach A layer 2 handoff is prompted, if the received signal strength goes below a certain threshold Failed frame transmissions Slower than received-signal-strength-based approach The MN first assumes a collision as a reason for failed frame transmissions; if not, radio signal fading is assumed; if not, an out of range is declared 11

Search and Detection of a New Adequate AP Passive scanning Change to frequency A Change to frequency B Change to frequency C t AP operating in frequency A Beacon 100 msec Beacon t AP operating in frequency B Beacon Beacon t 12

Search and Detection of a New Adequate AP Active scanning No activities on this channel Change to frequency A Probe request Change to frequency B Probe request t Probe delay MinChannelTime Probe delay MinChannelTime AP operating in frequency B MaxChannelTime Probe response t t AP operating in frequency C 13

Re-/Authentication with the New Discovered AP The MN authenticates itself to the new AP Two authentication methods are defined for the IEEE 802.11 standard Open system: null-authentication (default method) Shared key authentication: none null-authentication Exchange of authentication request & authentication response messages More messages can be exchanged between the authentication request & response; details depend on the authentication method 14

Re-/Association With the New Discovered AP Exchange of association request & association response messages After this phase, the wireless link is established 15

Link Layer Handoff MN APs Large variation for the same hardware with same configuration mainly due to stochastic behavior of radio interface Scanning is the main factor for handoff latency, it accounts for about 90 % of the overall handoff delay New AP 16

Research Issues Speeding up the layer 2 handoff requires accelerating the scanning phase Periodic scanning Scanning the medium while the MN is still connected to the old AP When the signal strength of the current AP is decreasing, the MN switches to another frequency for a short time and scans for other available APs Information about neighbors Utilizing information about neighbor APs to reduce the number of channels that must be scanned 17

Network Layer Mobility Management - Basics 18

What is the problem and how to solve? TCP UDP Internet 153. 12. 0. 0 165. 115. 0. 0 153. 12. 24. 118 19

What is the problem and how to solve? TCP UDP Internet 153. 12. 0. 0 165. 115. 0. 0 165. 115. 215. 9 Communication disruption should be minimized or even eliminated 20

What is the problem and how to solve it? Routing Forwarding is based on some destination address (a locator) Change of location (due to mobility) requires change of destination address or needs an update of routing tables Ideas Specific routes to end systems (per-host forwarding) Multicast Modification of the destination address Tunneling 21

Specific routes to end systems Change of routing table entries to forward packets to the right destination Distribution of routing information for every mobile everywhere Internet Source BS BS BS BS 22

Specific routes to end systems Change of routing table entries to forward packets to the right destination Internet Source Distribution of routing information for every mobile (rather than subnets) everywhere Does not scale to a large network BS Security problems (routing table updates) BS BS BS Distribution of routing information 23

Multicast Building of a multicast tree Security problem Home Agent (HA) Internet Source Overhead Sending data packets to old and new locations BS BS BS BS 24

Modification of the destination address Adjust the host address depending on the current location Problems to find a mobile host without a constant address Changing the destination address of IP packets HA Internet Source Problems with application due to change of address Security problem BS BS BS BS 25

Tunneling Separation of a terminal/user identificator from a topological locator Security problem Tunnel data packets to the new location HA Internet Source Location update at HA BS BS BS BS 26

Mobile IP Requirements for Mobile IP Transparency Mobile end-systems keep their IP address Continuation of communication after interruption of link Point of connection to the fixed network can be changed Compatibility Support of the same layer 2 protocols as IP No changes to current end-systems and routers required Mobile end-systems can communicate with fixed systems Security Authentication of all registration messages Efficiency and scalability Only little additional messages to the mobile system required (connection typically via a low bandwidth radio link) World-wide support of a large number of mobile systems in the whole Internet 27

Mobile IP terminology Mobile Node (MN) System (node) that can change the point of connection to the network without changing its IP address Home Agent (HA) System in the home network of the MN, typically a router Registers the location of the MN, tunnels IP datagrams to the CoA Foreign Agent (FA) System in the current foreign network of the MN, typically a router Forwards the tunneled datagrams to the MN, typically also the default router for the MN Care-of Address (CoA) Address of the current tunnel end-point for the MN (at FA or MN) Current location of the MN from an IP point of view Can be chosen, e.g., via DHCP Correspondent Node (CN) Communication partner 28

Mobile IP basics: example network HA MN Router Internet Mobile end-system Home network: physical network for the MN Router FA CN Foreign network: current physical network for the MN End-system Router 29

Mobile IP basics: data transfer to the mobile node HA 2 MN Internet 3 Receiver FA CN Sender 1 1. Sender sends to the IP address of MN, HA intercepts packet (proxy ARP) 2. HA tunnels packet to CoA, here FA, by encapsulation 3. FA forwards the packet to the MN 30

Mobile IP basics: data transfer from the mobile node HA MN Internet Sender FA CN 1. Sender sends to the IP address of the receiver as usual, FA works as default route Receiver 31

Mobile IP basics: agent discovery (IPv4) Agent discovery: How does the MN discover that it has moved? Agent advertisement: FAs and HAs advertise their presence periodically using special agent advertisement messages For these advertisements Internet control message protocol (ICMP) messages are used with some mobility extensions The TTL field of the IP packet is set to 1 for all advertisements to avoid forwarding them Agent solicitation: If no agent advertisements are present or the inter-arrival time is too high, and an MN has not received a CoA by other means The mobile node must send agent solicitations A mobile node can send out three solicitations, one per second, as soon as it enters a new network If a node does not receive an answer to its solicitations it must decrease the rate of solicitations exponentially to avoid flooding the network until it reaches a maximum interval between solicitations (typically one minute) 32

Mobile IP basics: agent discovery and registration (IPv4) Foreign network 1. Advertisement (CoA) 2. MN sends Registration Request FA advertises services 3. FA relays Binding Update to HA Home network IPv4 MN 6. FA relays reply to MN 5. HA accepts binding or denies (registration reply) HA 4. HA maintains the association between home address and current CoA and registration lifetime (binding) Here the CoA denotes the address of the FA The MN could also get it directly via DHCP (co-located care-off address) The binding update is a remote redirect and therefore needs authentication After the registration, the HA tunnels data for the MN to the CoA 33

Mobile IP basics: registration (IPv4) Registration (always limited lifetime!) Having received a CoA, the MN has to register with the HA The main purpose of the registration is to inform the HA of the current location for correct forwarding of packets. There are two ways of registration: CoA is at the FA: The MN sends its registration request containing the CoA to the FA FA forwards the request to the HA HA now sets up a mobility binding containing the mobile node s home IP address and the current CoA After setting up the mobility binding, the HA sends a reply message back to the FA which forwards it to the MN CoA is co-located: MN sends the request directly to the HA and vice versa 34

Mobile IP basics: registration (IPv4) CoA is at the FA CoA is co-located 35

Mobile IP basics: tunnel end points (IPv4) 10.10.0.0 HA Internet CN 9.9.0.0 FA Destination is: 10.10.0.10 FA FA FA Home address:10.10.0.10 CoA: 1- FA-CoA: 9.9.0.0 or 2- Co-located CoA: 9.9.x.x 36

Mobile IP basics: tunnel end points (IPv4) 10.10.0.0 HA Internet CN 9.9.0.0 FA De-tunneling by MN FA FA FA Home address:10.10.0.10 CoA: 1- FA-CoA: 9.9.0.0 or 2- Co-located CoA: 9.9.0.2 37

Mobile IP basics: agent discovery and registration (IPv4) Agent Advertisement HA and FA periodically send advertisement messages into their physical subnets MN listens to these messages and detects, if it is in the home or a foreign network MN reads a CoA from the FA advertisement messages Note: agent advertisement may be solicited by MN (agent solicitation msg) Registration (always limited lifetime!) MN signals CoA to the HA via the FA, HA acknowledges via FA to MN These actions have to be secured by authentication Advertisement (ICMP extensions to RFC 1256) HA advertises the IP address of the MN (as for fixed systems), i.e. standard routing information Routers adjust their entries; these are stable for a longer time (HA responsible for a MN over a longer period of time) Packets to the MN are sent to the HA, independent of changes in CoA/FA 38

Tunneling Tunneling sending a packet through a tunnel, is achieved by using encapsulation Encapsulation is the mechanism of taking a packet consisting of packet header and data and putting it into the data part of a new packet. Decapsulation is the reverse operation, taking a packet out of the data part of another packet. Original IP header Original data new IP header New data Outer header Inner header Original data 39

Tunneling Encapsulation of one packet into another as payload E.g. IPv6 in IPv4 (6Bone), Multicast in Unicast (Mbone) Here: e.g. IP-in-IP-encapsulation, minimal encapsulation or GRE (Generic Record Encapsulation) IP-in-IP encapsulation (mandatory, RFC 2003) Tunnel between HA and CoA ver. IHL TOS length IP identification flags fragment offset TTL IP-in-IP IP checksum IP address of HA Care-of address COA ver. IHL TOS length IP identification flags fragment offset TTL lay. 4 prot. IP checksum IP address of CN IP address of MN MIP header IP packet TCP/UDP/... payload 40

Tunneling Minimal encapsulation (optional) Avoids repetition of identical fields E.g. TTL, IHL, version, TOS Only applicable for unfragmented packets, no space left for fragment identification ver. IHL TOS length IP identification flags fragment offset TTL min. encap. IP checksum IP address of HA care-of address COA lay. 4 protoc. S reserved IP checksum IP address of MN original sender IP address (if S=1) TCP/UDP/... payload MIP header Minimized IP packet 41

Optimization of packet forwarding Triangular Routing CN sends all packets via HA to MN Higher latency and network load Ideas for Solutions CN learns the current location of MN Direct tunneling to this location HA informs a sender about the location of MN Security problems with binding updates Change of FA Packets on-the-fly during the change can be lost New FA informs old FA to avoid packet loss, old FA now forwards remaining packets to new FA This information also enables the old FA to release resources for the MN 42

Tunneling and route optimization (IPv4) Foreign network MN 3. FA strips off the tunnel header and relays the rest to the MN FA 5. The CN can tunnel IP packets directly to the FA 4. HA can send a binding update to CN 2. HA encapsulates the IP packet into a new IP packet by adding a tunneling header with the care-of address as destination. Tunnel source IP address is the HA address HA CN 1. CN sends IP packet to home address of MN. Initially the CN only knows the home address of the MN Home network The home agent can either use IP-within-IP or minimal encapsulation to reduce the header overhead Route optimization can be done if the HA sends a Binding Update to the CN Subsequent packets can be tunneled directly from the CN to the FA In the reverse direction normal standard IP routing mechanisms are used to deliver IP datagrams from the MN Problems if the MN moves to another FA! 43

Change of foreign agent (IPv4) 5. FA 2 relays to the MN FA2 8. Now the CN can again tunnel more directly to the MN CN 1. MN moves to a new subnet 4. The FA 1 tunnels the IP packets to the MN s new location (FA 2) 3. CN attempts to reach the MN using the obsolete care-of address 7. HA sends a Binding Update to the CN MN 2. MN communicates its new care-of address (of FA 2) to the previous FA FA1 6. FA 1 sends the HA a Binding Warning and asks the HA to send the CN a Binding Update HA After having moved to the new FA, the MN can also communicate its new care-of address to the previous FA Note that most of the Binding Update messages are not emitted by the MN, thus they are not going over the wireless link Problem if FA1 does not know the new care-of address of the MN FA1 must re-route the traffic to the HA, which again handles it via a new tunnel to FA2 44

Change of foreign agent (IPv4) CN HA FA old FA new MN Data Update Data Data ACK Data Data MN changes location Data Warning Update ACK Data Registration Data Update ACK Data Data t 45

Reverse tunneling (RFC 3024) HA 2 MN Internet 1 Sender FA CN Receiver 3 1. MN sends to FA 2. FA tunnels packets to HA by encapsulation 3. HA forwards the packet to the receiver (standard case) 46

Mobile IP with reverse tunneling Router accept often only topological correct addresses (firewall!) A packet from the MN encapsulated by the FA is now topological correct Furthermore multicast and TTL problems solved (TTL in the home network correct, but MN is to far away from the receiver) Reverse tunneling does not solve Problems with firewalls, the reverse tunnel can be abused to circumvent security mechanisms (tunnel hijacking) Optimization of data paths, i.e. packets will be forwarded through the tunnel via the HA to a sender (double triangular routing) MIP reverse tunneling is backwards compatible The extensions can be implemented easily and cooperate with current implementations of Mobile IP without these extensions Agent advertisements can carry requests for reverse tunneling 47

Mobile IP and IPv6 Huge address space with IPv6 address renumbering scheme Better mobility support Mobile IP was designed as add-on to IPv4 Majority of IPv4 nodes do not support Mobile IP MN can use Address Autoconfiguration which eliminates the need of a Foreign Agent Stateless: to configure its care-of address from a NW prefix of the foreign NW and a MN interface identifier. The needed information is published by neighboring routers through the Neighbor Discovery protocol in the foreign network (combined ARP/ICMP) Stateful: by using a centralized DHCP server Source Routing: Instead of tunneling packets using IP in IP, IPv6 Routing Headers are used IPv6 does work smoothly with ingress filtering In IPv4 a border router may discard IP packets not originating from its own subnet, and MN use their home address always as source address Every IPv6 node will have implemented IPv6 authentication headers to be used with binding updates 48

Mobile IPv6 (MIPv6) Home Agent (HA) CN Internet Corresponding Node (CN) No support for mobility (standard IPv6 router) AR Access Router (AR) AR AR Periodic broadcast of Router Advertisements (RA) Mobility support; use of two IP addresses (Home Address (HoA) & Care of Address (CoA)) 49

MIPv6 - Handoff HA CN Internet CN AR Binding Updates (BUs) AR AR AR 50

MIPv6 - Handoff HA CN Internet CN Binding Acknowledgements (BAs) AR AR AR AR 51

MIPv6 Data Communication HA CN Internet CN AR Uplink data packets are dealt with as standard IP packets AR AR AR 52

MIPv6 - Pros & Cons Pros End-to-end mobility Transparency to upper layer protocols Proper integration with IP Cons Handoff latencies (traffic interruption) due to contacting the HA and the CN each time the MN changes the point of attachment Overhead due to encapsulation Signaling load due to frequent BUs especially when MNs move at high speeds Sub-optimal routing and increased end-to-end delay due to triangular routing where CN is not MIPv6 enabled (binding updates) or due to lack of security 53

Dynamic Host Configuration Protocol (DHCP) Application Simplification of installation and maintenance of networked computers Supplies systems with all necessary information, such as IP address, DNS server address, domain name, subnet mask, default router etc. Enables automatic integration of systems into an Intranet or the Internet Can be used to acquire a CoA for Mobile IP (co-location of MN and FA) Client/Server-Model The client sends via a MAC broadcast a request to the DHCP server (might be via a DHCP relay) DHCPDISCOVER DHCPDISCOVER DHCP server client client relay 54

DHCP protocol mechanisms Server (not selected) Client Server (selected) Initialization Determine the configuration DHCPDISCOVER DHCPDISCOVER Determine the configuration DHCPOFFER DHCPOFFER Collection of replies Selection of configuration DHCPREQUEST (Reject) DHCPREQUEST (Options) DHCPACK Confirmation of configuration Initialization completed Release DHCPRELEASE Delete context 55

DHCP characteristics Server Several servers can be configured for DHCP, coordination not yet standardized (i.e. manual configuration) Renewal of configurations IP addresses have to be requested periodically, simplified protocol Options (RFC 2132) Available for routers, subnet mask, NTP (network time protocol) timeserver, SLP (service location protocol) directory, DNS (domain name system) Big security problems! No authentication of DHCP information specified 56

Network Layer Mobility Management - Advanced Solutions 57

Approaches for Network Layer Mobility Management Terminal-based mobility management Mobility support in the network and MNs MNs participate in mobility procedures Disadvantages SW update to MNs needed Network-based mobility management Mobility support in the network only (terminals with legacy IP stack can be mobile) No interaction between the network and MNs Disadvantages Many features are hard to realize, e.g. route optimization Focus is on support of global mobility 58

Macro and Micro Mobility Management HA is not aware of each change in the point of attachment Internet HA Movements inside the domain are controlled by the intermediate node, also called micro or intradomain mobility Intermediate node Administrative domain Administrative domain Movements between different domains are typically handled by MIP, also called macro or inter-domain mobility 59

Macro and Micro Mobility Management Macro mobility management approaches Aim at global mobility support Base protocols: Mobile IPv4 (RFC 3344) & Mobile IPv6 (RFC3775) Micro mobility management approaches Performance improvements through localizing the mobility processing inside administrative domains Introduction of new intermediate nodes to the network Hierarchical network topology is typically required 60

Proxy Agent Approaches (PAA) Extend the principle of MIP to provide micro mobility Introduce new intermediate nodes to the network to process the mobility inside an administrative domain locally Data packets destined to the MN are forwarded to the intermediate node, which tunnels them towards the MN s current point of attachment Examples Hierarchical MIPv6 (HMIPv6), Anchor Foreign Agent (AFA), Seamless MIP (S-MIP), etc. 61

Improved Micro Mobility: Hierarchical MIPv6 HA HA is not aware of the MN s mobility as long as the RCoA is not changed Internet CN RCoA Mobility Anchor Point (MAP) MAP AR1 AR2 AR3 AR4 AR5 AR6 LCoA MN registers a Regional CoA (RCoA), i.e. a CoA in the MAP s subnet, in its HA as the MN s CoA; the location of the MN inside the domain is defined by the local CoA (LCoA), which is a CoA in the current AR subnet 62

HMIPv6 Handoff HA Internet CN RCoA MAP MAP BA AR1 AR2 AR3 AR4 AR5 AR6 LCoA RA Local BU The MN configures a new LCoA 63

HMIPv6 Data Communication HA Internet CN MAP MAP AR1 AR2 AR3 AR4 AR5 AR6 64

HMIPv6 Pros & Cons Pros Localizing of mobility management inside administrative domains Improving the performance: reduced handoff latency compared to MIPv6, reduced packet loss, etc. Reducing the signaling load traveling towards the HA Cons Restrictions on the network topology Single point of failure (all traffic passes through the MAP) Increased signaling and packet forwarding overhead inside the domain Security issues: how to authenticate arriving MNs? 65

Localized Enhanced Routing Schemes (LERS) Similar principle as PAA approaches Typically introduce a new dynamic layer 3 routing protocol inside the domain (per-hop routing) Data packets destined for the MN are forwarded to the intermediate node controlling the domain, which forwards them hop per hop towards the MN All nodes in the domain should be mobility-aware Examples Cellular IP, HAWAII 66

Improved Micro Mobility: Cellular IP HA Internet CN The gateway controls the domain Gateway Beacon messages flooded periodically all BSs know how to route packets towards the gateway IP-based routing of data packets inside the domain is replaced by a special CIP routing and location management BS3 BS1 BS4 BS2 BS5 The MN registers the address of the gateway as its CoA; inside the domain, the MN uses its HoA 67

Cellular IP Hard Handoff CN HA Internet Gateway Update its routing cache and starts forwarding data packets towards the new location of the MN BS1 BS2 BS3 BS4 BS5 Beacon Route-update 68

Cellular IP Semi-Soft Handoff CN HA Internet Gateway Update its routing cache and starts forwarding data packets towards the MN via the old and new BS BS1 BS2 BS3 BS4 BS5 Semi-soft packet The MN detects a handoff in the near future it switches for a short time to the radio of the new BS 69

Cellular IP Semi-Soft Handoff CN HA Internet Gateway Update its routing cache and stops forwarding to the old BS BS1 BS2 BS3 BS4 BS5 Route-update After the layer 2 handoff, the MN sends a route-update packet to stop the bicast 70

Cellular IP Data Communication CN HA Internet Gateway Routed using IP towards their destination Uplink packets are forwarded hop by hop towards the gateway; they are used to refresh the routing caches BS1 BS2 BS3 BS4 BS5 71

Cellular IP Pros & Cons Pros Localizing of mobility management inside administrative domains Improving the performance: reduced handoff latency, less lost packets, etc. Reducing the signaling towards the HA Mobile to mobile communication within the domain has to be routed via the gateway Cons Every node in the domain has to be mobility-aware Restrictions on the network topology Single point of failure (all traffic travels through the gateway) Signaling and packet forwarding overhead inside the domain Reduced TCP throughput due to new layer 3 dynamic routing protocol Security issues: authentication of arriving MNs, authentication of routeupdate messages, etc. 72

Network-based MM: Proxy MIPv6 Localized Mobility Anchor (LMA) Internet Corresponding Node (CN) Support of mobility is required in the MAGs; each MAG emulates the home network of each MN served by it MAG Mobile Access Gateway (MAG) MAG MAG RA MN does not have to understand mobility; from the MN s point of view, it is located in its home network and the whole domain represents a single point of attachment Unicast RA with the Home Network Prefix (HNP) of the MN 73

Proxy MIPv6 Handoff Start a timer to delete the mobility binding of the MN LMA Internet CN Proxy Binding Acknowledgement (PBAck) De-Registration Proxy Binding Update (DeReg PBU) MAG MAG MAG The MAG detects a detach event MAG 74

Proxy MIPv6 Handoff Accepts the binding, allocates MN-HNP and sets up a tunnel to the MAG LMA Internet CN PBAck PBU MAG The MAG detects an attach event & acquires the MN-ID and profile, from AAA server for example RA MAG MAG MAG A unicast RA with the MN-HNP the MN assumes that it is located in its home network and thus there is no need for a re-configuration of its IP address 75

Proxy MIPv6 Data Communication LMA Internet CN MAG MAG MAG MAG 76

Proxy MIPv6 Pros & Cons Pros Transparency to MNs (MNs with no mobility support can be mobile) Protocol is robust against control messages dropping (no control messages are sent on wireless links) Reduced signaling cost Terminating the tunnel in the MAG instead of MNs reduces the data traffic volume sent over the wireless link Cons Triangular routing increased end-to-end delay Overhead due to the encapsulation Handoff latency due to contacting the LMA each time the MN moves from one point of attachment to another communication disruption Route optimization is not possible 77

Conclusions Mobility management in future networks is IP-based Mobility can be implemented in different layers of the TCP/IP reference model; each layer has positive and negative impacts Network layer mobility approaches are the most deployed solutions Terminal-based approaches interact with MNs to support mobility Network-based approaches do not involve MNs in mobility support Both approaches are categorized into macro and micro mobility management approaches Macro mobility approaches aim at supporting global mobility Micro mobility approaches aim at accelerating the mobility management through processing of mobility locally 78

References E. Weiss, A. Otyakmaz, E. López, B. Xu, Design and Evaluation of a new Handoff Protocol in IEEE 802.11 Networks, Proceedings of the 11th European Wireless conference 2005, Nicosia, Cyprus 2005. IEEE Computer Society, Part 11: Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) Specifications, Standard IEEE 802.11, ISBN: 0-7381-5656-6 SS95708, June 2007. Jochen Schiller: Mobile Communications (German and English), Addison-Wesley, 2000 (chapter 9 provides an overview on Mobile IP) Charles Perkins: Mobile IP Design Principles and Practises. Addisson Wesley, 1998 Ramjee Prasad, Marina Ruggieri: Technology Trends in Wireless Communications, Artech House, 2003 Wisely, Eardley, Burness: IP for 3G: Networking Technologies for Mobile Communications, Wiley, 2002 (chapter 5 provides classification of mobility mechanisms and overview on protocols, including session-layer mobility) D. Johnson, C. Perkins, J. Arkko, Mobility Support in IPv6, RFC 3775, June 2004. Important standards: Mobile IP: RFC 3220, formerly: RFC 2002 Reverse tunneling: RFC 3024, formerly: 2344 DHCP: RFC 2131, RFC 2132 ICMP: RFC 1256 79