COS 420 Day 20. Agenda Group Project Discussion Protocol Definition Due April 12 Paperwork Due April 29 Assignment 3 Due Assignment 4 is posted Last Assignment.

Slides:



Advertisements
Similar presentations
Mobile Networking through Mobile IP
Advertisements

CST Computer Networks NAT CST 415 4/10/2017 CST Computer Networks.
CPSC Network Layer4-1 IP addresses: how to get one? Q: How does a host get IP address? r hard-coded by system admin in a file m Windows: control-panel->network->configuration-
Transitioning to IPv6 April 15,2005 Presented By: Richard Moore PBS Enterprise Technology.
PRIVATE NETWORK INTERCONNECTION (NAT AND VPN) & IPv6
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Addressing the Network – IPv4 Network Fundamentals – Chapter 6.
CS 457 – Lecture 16 Global Internet - BGP Spring 2012.
資 管 Lee Lesson 12 IPv6 Mobility. 資 管 Lee Lesson Objectives Components of IPv6 mobility IPv6 mobility messages and options IPv6 mobility data structures.
Routing: Cores, Peers and Algorithms
1 Internet Networking Spring 2004 Tutorial 13 LSNAT - Load Sharing NAT (RFC 2391)
© 2007 Pearson Education Inc., Upper Saddle River, NJ. All rights reserved.1 Computer Networks and Internets with Internet Applications, 4e By Douglas.
K. Salah 1 Chapter 31 Security in the Internet. K. Salah 2 Figure 31.5 Position of TLS Transport Layer Security (TLS) was designed to provide security.
COS 420 Day 18. Agenda Assignment 4 Posted Chap Due April 6 Group project program requirements Submitted but Needs lots of work Individual Project.
Mobile IP Overview: Standard IP Standard IP Evolution of Mobile IP Evolution of Mobile IP How it works How it works Problems Assoc. with it Problems Assoc.
What we will cover… Home Networking: Network Address Translation (NAT) Mobile Routing.
Chapter 5 The Network Layer.
MOBILITY SUPPORT IN IPv6
Chapter 13 Mobile IP. Outline  ADDRESSING  AGENTS  THREE PHASES  AGENT DISCOVERY  REGISTRATION  DATA TRANSFER  INEFFICIENCY IN MOBILE IP.
TCP/IP Protocol Suite 1 Upon completion you will be able to: Mobile IP Understand the addressing scheme for mobile hosts. To define home, care-of, and.
A Study of Mobile IP Kunal Ganguly Wichita State University CS843 – Distributed Computing.
COS 420 Day 17. Agenda Assignment 4 Posted Chap Due April 6 Group project program requirements due Individual Project Graded 2 A’s and 1 B Today.
Subnetting.
Chapter 19 Binding Protocol Addresses (ARP) Chapter 20 IP Datagrams and Datagram Forwarding.
Mobile IP.
Chapter 9 Classification And Forwarding. Outline.
1 Spring Semester 2007, Dept. of Computer Science, Technion Internet Networking recitation #12 LSNAT - Load Sharing NAT (RFC 2391)
What Is TCP/IP? The large collection of networking protocols and services called TCP/IP denotes far more than the combination of the two key protocols.
Support Protocols and Technologies. Topics Filling in the gaps we need to make for IP forwarding work in practice – Getting IP addresses (DHCP) – Mapping.
1 CMPT 471 Networking II ICMP © Janice Regan, 2012.
Mobile IP Traversal Of NAT Devices By, Vivek Nemarugommula.
Mobile IP Add it into TCP/IP implementation Wireless communication techniques Wireless technique DistanceTransfer rate Frequency Bluetooth (WPAN)
CECS 474 Computer Network Interoperability Notes for Douglas E. Comer, Computer Networks and Internets (5 th Edition) Tracy Bradley Maples, Ph.D. Computer.
Jose Alcid David Chapman Aaron Trank
G64INC Introduction to Network Communications Ho Sooi Hock Internet Protocol.
Mobile IP Overview and Discussion. 2 Spectrum of Mobility – from network perspective no mobility high mobility mobile user, using same access point mobile.
© MMII JW RyderCS 428 Computer Networking1 Private Network Interconnection  VPN - Virtual Private Networks  NAT - Network Address Translation  Describe.
1 NAT Network Address Translation Motivation for NAT To solve the insufficient problem of IP addresses IPv6 –All software and hardware need to be updated.
Mobile IP Chapter 19. Introduction Mobile IP is designed to allow portable computers to move from one network to another Associated with wireless technologies.
Objectives: Chapter 5: Network/Internet Layer  How Networks are connected Network/Internet Layer Routed Protocols Routing Protocols Autonomous Systems.
Chapter 4, slide: 1 Chapter 4: Network Layer r Introduction r IP: Internet Protocol  IPv4 addressing  NAT  IPv6 r Routing algorithms  Link state 
UNIT IP Datagram Fragmentation Figure 20.7 IP datagram.
Private Network Interconnection Chapter 20. Introduction Privacy in an internet is a major concern –Contents of datagrams that travel across the Internet.
User Datagram Protocol (UDP) Chapter 11. Know TCP/IP transfers datagrams around Forwarded based on destination’s IP address Forwarded based on destination’s.
TCP/IP Protocols Contains Five Layers
Internetworking Internet: A network among networks, or a network of networks Allows accommodation of multiple network technologies Universal Service Routers.
Internetworking Internet: A network among networks, or a network of networks Allows accommodation of multiple network technologies Universal Service Routers.
Private Network Addresses IP addresses in a private network can be assigned arbitrarily. – Not registered and not guaranteed to be globally unique Generally,
Mobile IP Outline Intro to mobile IP Operation Problems with mobility.
Transport Layer3-1 Chapter 4: Network Layer r 4. 1 Introduction r 4.2 Virtual circuit and datagram networks r 4.3 What’s inside a router r 4.4 IP: Internet.
Internet Protocol: Routing IP Datagrams Chapter 8.
Understanding IPv6 Slide: 1 Lesson 12 IPv6 Mobility.
1 12-Jan-16 OSI network layer CCNA Exploration Semester 1 Chapter 5.
Protocol Layering Chapter 11.
An Introduction to Mobile IPv4
Data Communications and Computer Networks Chapter 4 CS 3830 Lecture 19 Omar Meqdadi Department of Computer Science and Software Engineering University.
1 Network Address Translation. 2 Network Address Translation (NAT) Extension of original addressing scheme Motivated by exhaustion of IP address space.
K. Salah1 Security Protocols in the Internet IPSec.
Virtual Private Network (VPN) 1. A corporation with multiple geographic sites can use one of two approaches to building a corporate intranet. – Private.
Mobility support in IP v4. Internet Computing (CS-413) 2.
Mobile IP THE 12 TH MEETING. Mobile IP  Incorporation of mobile users in the network.  Cellular system (e.g., GSM) started with mobility in mind. 
Chapter 19 Network Layer Protocols
Network Address Translation
EA C451 Vishal Gupta.
Mobility And IP Addressing
Network Virtualization
COMPUTER NETWORKS CS610 Lecture-37 Hammad Khalid Khan.
Mobile IP Outline Homework #4 Solutions Intro to mobile IP Operation
Chapter 24 Mobile IP.
Mobile IP Outline Intro to mobile IP Operation Problems with mobility.
16EC Computer networks unit II Mr.M.Jagadesh
Presentation transcript:

COS 420 Day 20

Agenda Group Project Discussion Protocol Definition Due April 12 Paperwork Due April 29 Assignment 3 Due Assignment 4 is posted Last Assignment Due April 29 Chaps 20, 21, 22, 23, 24, 26,27, 28, 30 & 31 Today we will discuss Mobile IP, NAT and VPN’s

PART XIX MOBILE IP

Mobility And IP Addressing Recall: prefix of IP address identifies network to which host is attached Consequence: when moving to a new network either Host must change its IP address All routers install host-specific routes

Mobile IP Technology to support mobility Allows host to retain original IP address Does not require routers to install host- specific routes

Characteristics Of Mobile IP Transparent to applications and transport protocols Interoperates with standard IPv4 Scales to large Internet Secure Macro mobility (intended for working away from home rather than moving at high speed)

General Approach Host visiting a foreign network obtains second IP address that is local to the site Host informs router on home network Router at home uses second address to forward datagrams for the host to the foreign network Datagrams sent in a tunnel Uses IP-in-IP encapsulation

Two Broad Approaches Foreign network runs system known as foreign agent Visiting host registers with foreign agent Foreign agent assigns host a temporary address Foreign agent registers host with home agent Foreign network does not run a foreign agent Host uses DHCP to obtain temporary address Host registers directly with home agent

Foreign Agent Advertisement Extension Sent by router that runs foreign agent Added to ICMP router advertisement Format:

CODE Field In Advertisement Message

Host Registration Request

FLAGS Field In Host Registration Request

Consequence Of Mobile IP Because a mobile uses its home address as a source address when communicating with an arbitrary destination, each reply is forwarded to the mobile’s home network, where an agent intercepts the datagram, encapsulates it in another datagram, and forwards it either directly to the mobile or to the foreign agent the mobile is using.

Illustration Of The Two- Crossing Problem

A Severe Problem Mobile IP introduces a routing inefficiency known as the 2- crossing problem that occurs when a mobile visits a foreign network far from its home and then communicates with a computer near the foreign site. Each datagram sent to the mobile travels across the Internet to the mobile’s home agent which then forwards the datagram back to the foreign site. Eliminating the problem requires propagating host- specific routes; the problem remains for any destination that does not receive the host-specific route.

Summary Mobile IP allows a host to visit a foreign site without changing its IP address A visiting host obtains a second, temporary address which is used for communication while at the site The chief advantage of mobile IP arises from transparency to applications The chief disadvantage of mobile IP arises from inefficient routing known as a 2-crossing problem

PART XX PRIVATE NETWORK INTERCONNECTION (NAT AND VPN)

Definitions An internet is private to one group (sometimes called isolated) if none of the facilities or traffic is accessible to other groups Typical implementation involves using leased lines to interconnect routers at various sites of the group The global Internet is public because facilities are shared among all subscribers

Hybrid Architecture Permits some traffic to go over private connections Allows contact with global Internet

Example Of Hybrid Architecture

The Cost Of Private And Public Networks Private network extremely expensive Public Internet access inexpensive Goal: combine safety of private network with low cost of global Internet

Question How can an organization that uses the global Internet to connect its sites keep its data private? Answer: Virtual Private Network (VPN)

Virtual Private Network Connect all sites to global Internet Protect data as it passes from one site to another Encryption IP-in-IP tunneling

Illustration Of Encapsulation Used With VPN

The Point A Virtual Private Network sends data across the Internet, but encrypts intersite transmissions to guarantee privacy.

Example Of VPN Addressing And Routing

Example VPN With Private Addresses

General Access With Private Addresses Question: how can a site provide multiple computers at the site access to Internet services without assigning each computer a globally-valid IP address? Two answers Application gateway (one needed for each service) Network Address Translation (NAT)

Extension to IP addressing IP-level access to the Internet through a single IP address Transparent to both ends Implementation Typically software Usually installed in IP router Special-purpose hardware for highest speed

Network Address Translation (NAT) Pioneered in Unix program slirp Also known as Masquerade (Linux) Internet Connection Sharing (Microsoft) Inexpensive implementations available for home use

NAT Details Organization Obtains one globally valid address per Internet connection Assigns non-routable addresses internally (net 10) Runs NAT software in router connecting to Internet NAT Replaces source address in outgoing datagram Replaces destination address in incoming datagram Also handles higher layer protocols (e.g., pseudo header for TCP or UDP)

NAT Translation Table NAT uses translation table Entry in table specifies local (private) endpoint and global destination. Typical paradigm Entry in table created as side-effect of datagram leaving site Entry in table used to reverse address mapping for incoming datagram

Example NAT Translation Table

Higher Layer Protocols And NAT NAT must Change IP headers Possibly change TCP or UDP source ports Recompute TCP or UDP checksums Translate ICMP messages Translate port numbers in an FTP session

Applications And NAT NAT affects ICMP, TCP, UDP, and other higher layer protocols; except for a few standard applications like FTP, an application protocol that passes IP addresses or protocol port numbers as data will not operate correctly across NAT.

Summary Virtual Private Networks (VPNs) combine the advantages low cost Internet connections with the safety of private networks VPNs use encryption and tunneling Network Address Translation allows a site to multiplex communication with multiple computers through a single, globally valid IP address. NAT uses a table to translate addresses in outgoing and incoming datagrams