* Your assessment is very important for improving the workof artificial intelligence, which forms the content of this project
Download EE579S Computer Security
Survey
Document related concepts
Transcript
ECE537 Advanced and High Performance Networks 3: Mobile Networking Professor Richard A. Stanley, P.E. Spring 2009 © 2000-2009, Richard A. Stanley ECE537/3 #1 Overview of Tonight’s Class • What do we mean by mobile networking? • How does the cellular telephone network deal with mobility? • What about mobile data users? • Are there protocols to facilitate mobile networking under IP? • What is ad hoc networking? • How can we implement ad hoc networking? ECE537/3 #2 What Do We Mean by Mobile Networking? • Telephone network designed to route calls to fixed sockets, always at the same location • Mobile refers to the ability of users to join or leave a network more or less at will, whether it is their “home” or not • Mobile does not necessarily refer to physical movement of the user while communicating ECE537/3 #3 The Way it Was ECE537/3 #4 Cellular Architecture (GSM) ECE537/3 #5 GSM Nomenclature • • • • • • • • Home Location Register (HLR) Visitor Location Register (VLR) Equipment Identity Register (EIR) Authentication Center (AuC) SMS Serving Center (SMS SC) Gateway MSC (GMSC) Chargeback Center (CBC) Transcoder and Adaptation Unit (TRAU) ECE537/3 #6 What is Going On Here? • Many steps to set up, conduct, and break down a call • More steps to locate the handset and connect to it, without user input • Driving force? ECE537/3 #7 Mobile Networking • How does the cellular model relate to data networking? – – – – Addressing Authentication Host location Billing • Could we use a similar model to achieve mobile data networking? ECE537/3 #8 Mobile IP • Why? – Increasing numbers of mobile (i.e. peripatetic) computers seeking network access – Manual network updates to accommodate this are not feasible • How? – What about the cellular approach? – Could we do this with IP? ECE537/3 #9 The Problem • A mobile node must change its IP address whenever it changes its point of attachment, so that packets destined for the node are routed correctly • But to maintain existing TCP/UDP connections, the mobile node has to keep the same IP address – Changing the IP address will cause the connection to be disrupted and lost ECE537/3 #10 Mobile IP: A Solution • Each mobile node has two IP addresses: – One IP address is the permanent home address that is assigned at the home network and is used to identify communication endpoints – The other IP address is a temporary care-of address that represents the current location of the host • Objective of Mobile IP is to make mobility transparent to higher level protocols and to make minimum changes to the existing network infrastructure ECE537/3 #11 Mobile IP Architecture ECE537/3 #12 Concepts • Home network – The network within which the device receives its identifying IP address (home address). • Home address – The IP address assigned to the device within its home network. • Foreign network – Network in which a mobile node ECE537/3 is #13 operating when away from its home Mobility Agents • Two sorts: – Home agents – Foreign agents ECE537/3 #14 Home Agent • Designated router in the home network of the mobile node • Maintains the mobility binding in a mobility binding table – each entry is identified by the tuple <permanent home address, temporary care-of address, association lifetime> ECE537/3 #15 Mobility Binding Table ECE537/3 #16 Foreign Agent • Specialized routers on the foreign network where the mobile node is currently visiting – Maintains a visitor list which contains information about the mobile nodes currently visiting that network – Each entry in the visitor list is identified by the tuple: < permanent home address, home agent address, media address of the mobile node, association lifetime> ECE537/3 #17 Visitor List ECE537/3 #18 Stages in Mobile IP • • • • Agent discovery Registration In-service Deregistration ECE537/3 #19 Agent Discovery • Mobility agents advertise their presence by periodically broadcasting Agent Advertisement messages – Agent Advertisement message lists one or more care-of addresses and a flag indicating whether it is a home agent or a foreign agent. • The mobile node receiving the Agent Advertisement message observes whether the message is from its own home agent and determines whether it is on the home network or a foreign network • If a mobile node does not wish to wait for the periodic advertisement, it can send out Agent Solicitation messages that will be responded by a mobility agent ECE537/3 #20 Registration • If a mobile node discovers that it is on the home network, it operates without any mobility services • If the mobile node is on a new network, it registers with the foreign agent by sending a Registration Request message which includes the permanent IP address of the mobile host and the IP address of its home ECE537/3 #21 Registration Process ECE537/3 #22 In-service • When a correspondent node wants to communicate with the mobile node, it sends an IP packet addressed to the permanent IP address of the mobile node • The home agent intercepts this packet and consults the mobility binding table to find out if the mobile node is currently visiting ECE537/3 #23 In-service Tunneling ECE537/3 #24 Deregistration • If a mobile node wants to drop its care-of address, it has to deregister with its home agent • This is done by sending a Registration Request with the lifetime set to zero • No need for deregistering with the foreign agent as registration automatically expires when lifetime becomes zero • However if the mobile node visits a new network while the old care-of address is still valid, the old foreign network does not know the new care-of address of the mobile node. Thus datagrams already forwarded by the home agent to the old foreign agent of the mobile node are lost. ECE537/3 #25 Security Issues • During registration, home agent should be convinced that it is getting a Registration Request from authentic mobile node and not receiving information from a bogus node • Mobile IP deals with this problem by specifying a security association between the home agent and the ECE537/3 #26 Basic Mobile IP: Triangle Routing ECE537/3 #27 Route Optimization • Extension to the basic Mobile IP protocol • Messages from the correspondent node are routed directly to the mobile node's care-of address without having to go through the home agent • Route Optimization provides four main operations: – – – – Updating binding caches Managing smooth handoffs between foreign agents Acquiring registration keys for smooth handoffs Using special tunnels ECE537/3 #28 Updating binding caches • Binding caches are maintained by correspondent nodes for associating the home address of a mobile node with its care-of address. A binding cache entry also has an associated lifetime after which the entry has to be deleted from the cache. If the correspondent node has no binding cache entry for a mobile node, it sends the message addressed to the mobile node's home address. When the home agent intercepts this message, it encapsulates it and sends it to the mobile node's care-of address. It then sends a Binding Update message to the correspondent node informing it of the current mobility binding. ECE537/3 #29 Managing smooth handoffs between foreign agents • When a mobile node registers with a new foreign agent, basic Mobile IP does not specify a method to inform the previous foreign agent. Thus the datagrams in flight which had already tunneled to the old care-of address of the mobile node are lost. • Problem is solved in Route Optimization by introducing smooth handoffs. Smooth handoff provides a way to notify the previous foreign agent of the mobile node's new mobility binding ECE537/3 #30 Smooth Handoffs • If a foreign agent supports smooth handoffs, it indicates this in its Agent Advertisement message • When the mobile node moves to a new location, it requests the new foreign agent to inform its previous foreign agent about the new location as part of the registration procedure ECE537/3 #31 Acquiring registration keys for smooth handoffs • For managing smooth handoffs, mobile nodes need to communicate with the previous foreign agent. This communication needs to be done securely as any careful foreign agent should require assurance that it is getting authentic handoff information and ECE537/3 #32 Using special tunnels • When a foreign agent receives a tunneled datagram for which it has no visitor list entry, it concludes that the node sending the tunneled datagram has an out-of-date binding cache entry for the mobile node • If the foreign agent has a binding cache entry for the mobile node, it re-tunnels ECE537/3 #33 Minimal Encapsulaton • Encapsulation in Mobile IP is done by putting the original datagram (=IP header+payload) inside another IP envelope • Fields in the outer IP header add overhead to the final datagram -several fields are duplicated from the inner IP header ECE537/3 #34 Minimal Encapsulaton ECE537/3 #35 Mobile IP in IPv6 • Exploits the larger address space • Route Optimization is a fundamental part of Mobile IPv6 unlike Mobile IPv4 where it is an optional set of extensions that may not be supported by all nodes. • Foreign Agents are not needed in ECE537/3 #36 Goals of IPv6 Mobility • Always on IP connectivity • Roaming between different L2 technologies WLAN, WiMAX, UMTS, fixed • Roaming between different (sub)networks – huge WLAN deployments mostly use different L3 subnets • Application continuity (Session persistence) • Static IP Adresses for mobile nodes • Mobile devices may act as servers ECE537/3 #37 Bidirectional Tunnel Mode (1) ECE537/3 #38 Bidirectional Tunnel Mode (2) ECE537/3 #39 Triangle Routing? ECE537/3 #40 Route Optimization (1) ECE537/3 #41 Route Optimization (2) ECE537/3 #42 Secure Binding ECE537/3 #43 Return Routeability Procedure (1) ECE537/3 #44 Return Routeability Procedure (2) ECE537/3 #45 Coming Up • Bootstrapping MIPv6 – No static configuration of HA address and HoA on mobile nodes • Network mobility (NEMO) (Instead of node mobility) – IETF working group with focus on mobile networks (e.g. prefix delegation) • Mobile ad hoc networks (MANET) – Interworking of Mobile Ad-hoc networks and Mobile IPv6 Networks – Mobile node roaming in between MIPv6 and MANET – MANET roaming as a MIPv6 client • Signaling and Handoff Optimization – Fast Handovers for Mobile IPv6 (FMIPv6, RFC4068) – Hierarchical MIPv6 mobility management (HMIPv6, RFC4140) • Cryptographically generated (IPv6) addresses (RFC 3972) – MN can prove that it owns its HoA by including its public key in the binding update and by signing the resulting message (No PKI needed) ECE537/3 #46 Mobile IP Standards • Mobile IPv4: RFC3344 • Mobile IPv6: RFC3775 • Mobile IPv4 Challenge/Response Extensions: RFC 4721 • Reverse Tunneling for Mobile IP: RFC 3024 • Using IPsec to Protect Mobile IPv6 Signaling between Mobile Nodes and Home Agents: RFC3776 ECE537/3 #47 Mobile Ad Hoc Networking • MANET • Allows self-configuration of network – Wireless links – Handles arrival/departure of nodes • Topology generally a mesh • Traffic passed by multiple relay ECE537/3 #48 Formal Definition • “An ad hoc network is a collection of wireless mobile hosts forming a temporary network without the aid of any centralized administration or standard support services regularly available on the wide-area network to which the host may normally be connected.” » David B. Johnson, “Routing in Ad Hoc Networks of Mobile Hosts,” Proceedings of the IEEE Workshop on Mobile Computing Systems and Applications, pages 158-163, December 1994 ECE537/3 #49 Simple MANET ECE537/3 #50 Airport Scenario ECE537/3 #51 Characteristics of MANETs • Dynamic Network Topology • Bandwidth-Limited and Fluctuating Capacity Links • Low-Power and Resource-Limited Operation • Constrained Physical Security • Decentralized Network Control ECE537/3 #52 MANET Challenges • • • • • Route discovery from source to target Minimizing network management overhead Dealing with constantly changing topology Assured packet delivery Security ECE537/3 #53 Summary • Mobile networking needs are growing • Two basic networking needs: – Mobile nodes in established networks – Ad hoc networking • Coexistence of IPv4 and IPv6 complicates sharing of data across different mobile protocols ECE506/4 #54 Homework • Research mobile ad hoc networking. How is the network organized? How is a path for datagrams discovered and established? What challenges exist if one network is on IPv6 and wishes to communicate with one on IPv4? Other issues? • Be prepared to discuss your findings with the class for 5-10 minutes next week. You may use slides if you desire. Spring 2009 © 2000-2009, Richard A. Stanley ECE506/4 #55 Disclaimer Parts of the lecture slides contain original work of Tarmo Anttalainen, Wikipedia, Debalina Ghosh, Holger Zuleger, and JinHee Cho and remain copyrighted materials by the original owner(s). The slides are intended for the sole purpose of instruction of computer networks at Worcester Polytechnic Institute. Spring 2009 © 2000-2009, Richard A. Stanley ECE506/4 #56