Introduction Wireless devices offering IP connectivity

Slides:



Advertisements
Similar presentations
Security Issues In Mobile IP
Advertisements

Secure Mobile IP Communication
Mobile IPv6. Why study Mobility in IPv6? What is so different about Mobile IPv6 ?
Mobile Networking through Mobile IP
Mobile IP Outline Intro to mobile IP Operation Problems with mobility.
Mobile and Wireless Computing Institute for Computer Science, University of Freiburg Western Australian Interactive Virtual Environments Centre (IVEC)
INTRODUCTION WIRELESS TECHNOLOGY BECOMING HOTTER WIRELESS TECHNOLOGY BECOMING HOTTER TRANSITION TOWARDS MOBILITY OVER PAST 20 YEARS TRANSITION TOWARDS.
Mobile Communications-Network Protocols/Mobile IP
1 Introduction to Mobile IPv6 IIS5711: Mobile Computing Mobile Computing and Broadband Networking Laboratory CIS, NCTU.
Mobile IP: enable mobility for IP-based networks CS457 presentation Xiangchuan Chen Nov 6, 2001.
IP Mobility Support Basic idea of IP mobility management
1 Mobile IP Why mobile IP? How mobile IP works –Introduction –Agent discovery/Advertisement –Registration –Routing considerations –Security Mobility management.
1 Mobile IP Myungchul Kim Tel:
Mobile IP Overview: Standard IP Standard IP Evolution of Mobile IP Evolution of Mobile IP How it works How it works Problems Assoc. with it Problems Assoc.
MOBILITY SUPPORT IN IPv6
Chapter 13 Mobile IP. Outline  ADDRESSING  AGENTS  THREE PHASES  AGENT DISCOVERY  REGISTRATION  DATA TRANSFER  INEFFICIENCY IN MOBILE IP.
CMPE Wireless and Mobile Networking 1 CMPE 257 Spring 2006 Wireless Internetworking Wireless and Mobile Networks.
A Study of Mobile IP Kunal Ganguly Wichita State University CS843 – Distributed Computing.
IPv6 Mobility David Bush. Correspondent Node Operation DEF: Correspondent node is any node that is trying to communicate with a mobile node. This node.
Mobile IP.
Mobile IP Polytechnic University Anthony Scalera Heine Nzumafo Duminda Wickramasinghe Edited by: Malathi Veeraraghavan 12/05/01.
Mobile IP: Introduction Reference: “Mobile networking through Mobile IP”; Perkins, C.E.; IEEE Internet Computing, Volume: 2 Issue: 1, Jan.- Feb. 1998;
Mobile IP Seamless connectivity for mobile computers.
1 Chapter06 Mobile IP. 2 Outline What is the problem at the routing layer when Internet hosts move?! Can the problem be solved? What is the standard solution?
Lecture 3a Mobile IP 1. Outline How to support Internet mobility? – by Mobile IP. Our discussion will be based on IPv4 (the current version). 2.
1 References –Mobile Computing by T. Imielinski and H. F. Korth, Kluwer, –Andrew T. Campbell, Javier Gomez, and et al., Design, Implementation, and.
Lectured By: Vivek Dimri Asst Professor CSE Deptt. Sharda University, Gr. Noida.
National Institute Of Science & Technology Mobile IP Jiten Mishra (EC ) [1] MOBILE IP Under the guidance of Mr. N. Srinivasu By Jiten Mishra EC
Mobile IP Most of the slides borrowed from Prof. Sridhar Iyer
Mobile IP Chapter 19. Introduction Mobile IP is designed to allow portable computers to move from one network to another Associated with wireless technologies.
MOBILE IP GROUP NAME: CLUSTER SEMINAR PRESENTED BY : SEMINAR PRESENTED BY : SANTOSH THOMAS SANTOSH THOMAS STUDENT NO: STUDENT NO:
Mobile IP Outline Intro to mobile IP Operation Problems with mobility.
Introduction to Mobile IPv6
MOBILITY Beyond Third Generation Cellular Feb
Spring 2004 Mobile IP School of Electronics and Information Kyung Hee University Choong Seon HONG
Mobile IP 순천향대학교 정보기술공학부 이 상 정 VoIP 특론 순천향대학교 정보기술공학부 이 상 정 2 References  Tutorial: Mobile IP
Ασύρματες και Κινητές Επικοινωνίες Ενότητα # 10: Mobile Network Layer: Mobile IP Διδάσκων: Βασίλειος Σύρης Τμήμα: Πληροφορικής.
An Introduction to Mobile IPv4
Mobile IP 순천향대학교 전산학과 문종식
IPv6 Security Issues Georgios Koutepas, NTUA IPv6 Technology and Advanced Services Oct.19, 2004.
Mobility support in IP v4. Internet Computing (CS-413) 2.
Mobility With IP, implicit assumption that there is no mobility. Addresses -- network part, host part -- so routers determine how to get to correct network.
Mobile IP Aamir Sohail NGN MS(TN) IQRA UNIVERSITY ISLAMABAD.
Mobile IP THE 12 TH MEETING. Mobile IP  Incorporation of mobile users in the network.  Cellular system (e.g., GSM) started with mobility in mind. 
1 OverviewOverview A device on a network is reachable through normal IP routing by the IP address it is assigned on the network. The problem occurs when.
Mobile IP Lecture 5.
DMET 602: Networks and Media Lab
RFC 3775 IPv6 Mobility Support
Mobile Networking (I) CS 395T - Mobile Computing and Wireless Networks
Networking Applications
Mobile IP.
Mobility Support in IPv6 (MIPv6)
EA C451 Vishal Gupta.
Introduction to Wireless Networking
Mobility And IP Addressing
Byungchul Park ICMP & ICMPv DPNM Lab. Byungchul Park
2002 IPv6 技術巡迴研討會 IPv6 Mobility
Net 431: ADVANCED COMPUTER NETWORKS
Network Virtualization
Unit 3 Mobile IP Network Layer
Introduction to Wireless Networking
DMET 602: Networks and Media Lab
Mobile IP Presented by Team : Pegasus Kishore Reddy Yerramreddy Jagannatha Pochimireddy Sampath k Bavipati Spandana Nalluri Vandana Goyal.
Mobile IP Outline Homework #4 Solutions Intro to mobile IP Operation
Mobile IP Outline Intro to mobile IP Operation Problems with mobility.
Lecture 4a Mobile IP 1.
Mobile IP Neil Tang 11/12/2008 CS440 Computer Networks.
Mobile IP Outline Intro to mobile IP Operation Problems with mobility.
Mobile Networking Through Mobile IP
Mobile IP-2 CS441 – Mobile & Wireless Computing
Presentation transcript:

Introduction Wireless devices offering IP connectivity PDA, handhelds, digital cellular phones, etc. Mobile networking Computing activities are not disrupted when the user changes the computer’s point of attachment to the Internet All the needed reconnection occurs automatically and non-interactively Technical obstacles Internet Protocol (IP) routing scheme Security concerns

Nomadicity How mobility will affect the protocol stack

Layer 2 (data link layer) Nomadicity (cont) Layer 2 (data link layer) Collision detection  collision avoidance Dynamic range of the signals is very large, so that a transmitting station cannot effectively distinguish incoming weak signals from noise and the effects of its own transmissions Cell size (frequency reuse) Layer 3 (network layer) Changing the routing of datagrams destined for the mobile nodes

Layer 4 (transport layer) Nomadicity (cont) Layer 4 (transport layer) Congestion control is based on packet loss However, packet loss  congestion? Other reasons for packet loss Noisy wireless channel, During handoff process Top layer (application layer) Automatic configuration Service discovery Link awareness  adaptability Environment awareness

Mobile IP Tunneling

Two IP addresses for mobile node Mobile IP (cont) Idea New IP address associated with the new point of attachment is required Two IP addresses for mobile node Home address: static Care-of address: topologically significant address Home network, home agent Foreign network, foreign agent

Three Mobile IP mechanisms Mobile IP (cont) Three Mobile IP mechanisms 1. Discovering the care-of address 2. Registering the care-of address 3. Tunneling to the care-of address

Mobile IP (cont) 1. Discovery Extension of ICMP Router Advertisement Home agents and foreign agents broadcast agent advertisements at regular intervals Agent advertisement Allows for the detection of mobility agents Lists one or more available care-of addresses Informs the mobile node about special features Mobile node selects its care-of address Mobile node checks whether the agent is a home agent or foreign agent Mobile node issues an ICMP router solicitation message

Mobile IP Agent Advertisement Message

Mobile IP (cont) 2. Registration Once a mobile node has a care-of address, its home agent must find out about it

Registration request Message Registration reply Message

Secure the Registration Procedure Mobile IP (cont) Secure the Registration Procedure The home agent must be certain registration was originated by the mobile node and not by some malicious node Security association: Message Digest 5 (MD5) Replay attacks A malicious node could record valid registrations for later replay, effectively disrupting the ability of the home agent to tunnel to the current care-of address of the mobile node at that later time Identification field that changes with every new registration Use of timestamp or random numbers

Mobile IP (cont) Foreign agents do not have to authenticate themselves to the mobile node or home agent What about a bogus foreign agent? Impersonates a real foreign agent by following protocol and offering agent advertisements to the mobile node The bogus agent could refuse to forward de-capsulated packets to the mobile node when they were received. The result is no worse than if any node were tricked into using the wrong default router, which is possible using unauthenticated router advertisements

Message Digest 5 (MD5) One-Way Hash Function Example With some good properties, … Produces a 128-bit message digest Example Two communicating parties A and B A and B share a common secret value SAB When A has a message (M) to send to B, it calculate MDM = H(SAB || M) It then sends [ M || MDM ] to B Because B possesses SAB, it can re-compute H(SAB || M) and verify MDM.

Mobile IP (cont) 3. Tunneling to the care-of address

Two Tunneling Methods IP-within-IP Encapsulation Minimal Encapsulation

Mobility support in IPv6 Mobile IPv6 Mobility support in IPv6 Follows the design for Mobile IPv4, using encapsulation to deliver packets from the home network to the mobile point of attachment Route Optimization Similar to IPv4 Delivering binding updates directly to correspondent nodes (home address, care-of address, registration lifetime) Security IPv6 nodes are expected to implement strong authentication and encryption features

Problems facing Mobile IP Routing inefficiencies Asymmetry in routing: Triangle routing Route optimization requires changes in the correspondent nodes that will take a long time to deploy Security issues Firewalls Blocks all classes of incoming packets that do not meet specified criteria It presents difficulties for mobile nodes wishing to communicate with other nodes within their home enterprise networks

Problems facing Mobile IP (cont) Security issues Ingress filtering Many border router discard packets coming from within the enterprise if the packets do not contain a source IP address configured for one of the enterprise’s internal network Mobile node would otherwise use their home address as the source IP address of the packets they transmit Possible solution: tunneling outgoing packets from the care-of address (Q: where is the target for the tunneled packets from the mobile node? Home agent?)