Cooperation in Wireless Networks Andrea G. Forte Henning Schulzrinne November 14, 2005.

Slides:



Advertisements
Similar presentations
IEEE P802 Handoff ECSG Submission July 2003 Bernard Aboba, Microsoft Detection of Network Attachment (DNA) and Handoff ECSG Bernard Aboba Microsoft July.
Advertisements

Doc.:IEEE /1523r4 Submission November 2011 Access Delay Reduction for FILS: Network Discovery & Access congestion Improvements Slide 1 Authors:
Extended Service Set (ESS) Mesh Network Daniela Maniezzo.
IDMP-based Fast Handoffs and Paging in IP-based Cellular Networks IEEE 3G Wireless Conference, 2001 李威廷 11/22/2001 Telcordia.
Fast L3 Handoff in Wireless LANs Andrea G. Forte Sangho Shin Henning Schulzrinne.
Internet Control Protocols Savera Tanwir. Internet Control Protocols ICMP ARP RARP DHCP.
Submission doc.: IEEE 11-12/0420r2 March 2012 Fei Tong, CSRSlide 1 Providing extended range with limited transmission power in ah network Date: 14-March-2012.
Network Layer Routing Issues (I). Infrastructure vs. multi-hop Infrastructure networks: Infrastructure networks: ◦ One or several Access-Points (AP) connected.
Inter-Subnet Mobile IP Handoffs in b Wireless LANs Albert Hasson.
Wireless vs. mobile S Wireless Personal, Local, Metropolitan, and Wide Area Networks1 Contents WLAN vs. 2G/3G Performance, roaming, mobility, security...
Cooperation Between Stations in Wireless Networks Andrea G. Forte and Henning Schulzrinne Department of Computer Science Columbia University, New York.
Dynamic Host Configuration Protocol (DHCP)
DIMACS Nov 3 - 4, 2004 WIRELESS SECURITY AND ROAMING OVERVIEW DIMACS November 3-4, 2004 Workshop: Mobile and Wireless Security Workshop: Mobile and Wireless.
January 2008 VoIP in Wireless Networks Henning Schulzrinne Andrea G. Forte, Sangho Shin Department of Computer Science Columbia University.
Fast Wireless Handoff in Networks Sangho Shin Andrea G. Forte Anshuman S. Rawat Henning Schulzrinne.
November 2008 VoIP in Wireless Networks Henning Schulzrinne Andrea G. Forte, Sangho Shin Department of Computer Science Columbia University.
VoIP over Wireless Networks Router Access Point (AP) AP INTERNET.
Cellular IP: Proxy Service Reference: “Incorporating proxy services into wide area cellular IP networks”; Zhimei Jiang; Li Fung Chang; Kim, B.J.J.; Leung,
DHCP for Multi-hop Wireless Ad-Hoc Networks Presented by William List.
1 Dynamic Host Configuration Protocol (DHCP) Relates to Lab 7. Module about dynamic assignment of IP addresses with DHCP.
Network Design. Our assumption Primary target: Mobile Router Scenarios NEMO Basic Support only NEMO Basic Support and PMIPv6 support on WiMAX MR uses.
Unwanted Link Layer Traffic in Large IEEE Wireless Network By Naga V K Akkineni.
Network Admin Course Plan Accede Institute Of Science & Technology.
Towards Programmable Enterprise WLANs With Odin
Submission doc.: IEEE /1015r1 September 2015 Guido R. Hiertz et al., EricssonSlide 1 Proxy ARP in ax Date: Authors:
Implementation and Evaluation of Mobility Management for Public Land Mobile Networks deploying the Session Initiation Protocol Thesis for the degree Master.
Handoff in IEEE Andrea G. Forte Sangho Shin Prof. Henning Schulzrinne.
NUS.SOC.CS2105 Ooi Wei Tsang Application Transport Network Link Physical you are here.
Fast Handoff for Seamless wireless mesh Networks Yair Amir, Clauiu Danilov, Michael Hilsdale Mobisys’ Jeon, Seung-woo.
GEOPRIV Layer 7 Location Configuration Protocol; Problem Statement and Requirements draft-tschofenig-geopriv-l7-lcp-ps-00.txt Hannes Tschofenig, Henning.
Wireless LANs Prof. F. Tobagi MAC Management 1.
Protecting Privacy in WLAN with DoS Resistance using Client Puzzle Team 7 Yanisa Akkarawichai Rohan Shah CSC 774 – Advanced Network Security Prof. Peng.
WIRELESS FORUM IX CONFIDENTIAL A Multicast-based Protocol for IP Mobility Support Ahmed Helmy, Assist. Prof. Electrical Engineering Dept Univ. of Southern.
VoIP in Wireless Networks Henning Schulzrinne with Andrea G. Forte, Sangho Shin Department of Computer Science Columbia University ComSoc DLT June.
DHCP/BOOTP Dynamic Host Configuration Protocol Dynamic Host Configuration Protocol (DHCP) is a network protocol that enables a server to automatically.
Doc.: IEEE /0977r2 Submission NameAffiliationsAddressPhone Hitoshi MORIOKA ROOT INC Tenjin, Chuo-ku, Fukuoka JAPAN
An Empirical Analysis of the IEEE MAC Layer Handoff Process Arunesh Mishra Minho Shin William Arbaugh University of Maryland,College Park,MD.
Mobile IP Outline Intro to mobile IP Operation Problems with mobility.
Link-Layer Protection in i WLANs With Dummy Authentication Will Mooney, Robin Jha.
Doc.: IEEE /0897r0 SubmissionJae Seung Lee, ETRISlide 1 Active Scanning considering Operating Status of APs Date: July 2012.
Doc.: IEEE r Submission November 2004 Bob Beach, Symbol TechnologiesSlide 1 Fast Roaming Using Multiple Concurrent Associations Bob.
Doc.: IEEE /1019r0 Submission September 2004 Soohong Daniel Park & Jaehwan Lee Access Router Identifier (ARID) for supporting L3 mobility Soohong.
Introduction to Mobile IPv6
Allocating IP Addressing by Using Dynamic Host Configuration Protocol.
Cooperation between stations in wireless networks Andrea G. Forte, Henning Schulzrinne Department of Computer Science, Columbia University Presented by:
Ασύρματες και Κινητές Επικοινωνίες Ενότητα # 10: Mobile Network Layer: Mobile IP Διδάσκων: Βασίλειος Σύρης Τμήμα: Πληροφορικής.
Muhammad Mahmudul Islam Ronald Pose Carlo Kopp School of Computer Science & Software Engineering Monash University Australia.
Doc.: IEEE /345r0 Submission May 2002 Albert Young, Ralink TechnologySlide 1 Enabling Seamless Hand-Off Across Wireless Networks Albert Young.
(ITI310) By Eng. BASSEM ALSAID SESSIONS 9: Dynamic Host Configuration Protocol (DHCP)
October 17, 2007 Cooperation Between Stations in Wireless Networks Andrea G. Forte Henning Schulzrinne Department of Computer Science Columbia University.
Passive Duplicate Address Detection (DAD) Sangho Shin Andrea Forte Henning Schulzrinne Columbia University.
Doc.:IEEE /1523r1 Submission November 2011 Access Delay Reduction for FILS: Network Discovery & Access congestion Improvements Slide 1 Authors:
Doc.: IEEE /0098r0 Submission May 2016 Hyunduk Kang et al, ETRISlide 1 A Coexistence Discovery Mechanism Date: Authors:
SHIP: Performance Reference: “SHIP mobility management hybrid SIP-HIP scheme” So, J.Y.H.; Jidong Wang; Jones, D.; Sixth International Conference on
Mobile IP THE 12 TH MEETING. Mobile IP  Incorporation of mobile users in the network.  Cellular system (e.g., GSM) started with mobility in mind. 
Introduction to “Tap – Dance ”. Company Proprietary Presentation Topics  Introduction  Handover scenarios  Inter-Network Handover consequences  Common.
Andrea G. Forte Sangho Shin Henning Schulzrinne
Fast MAC Layer Handoff in Networks
Wireless Mesh Networks
CSE 4905 Network Security Overview
VoIP in IEEE Networks Henning Schulzrinne
Month Year doc.: IEEE yy/xxxxr0
Prioritized Active Scanning in TGai
Cooperation Between Stations in Wireless Networks
Mobility Support in Wireless LAN
Prioritized MAC Access Mechanism of Routing-related Frame for ESS Mesh
Cooperative AP Discovery
Month Year doc.: IEEE yy/xxxxr0
Chapter 5: Link Layer 5.1 Introduction and services
Presentation transcript:

Cooperation in Wireless Networks Andrea G. Forte Henning Schulzrinne November 14, 2005

Why Cooperation ? (1/3) Same tasks Layer 2 Handoff Layer 3 Handoff Authentication Multimedia Session Update

Why Cooperation ? (2/3) Same Information Topology (failover) DNS Geo-Location Services (Other networks)

Why Cooperation ? (3/3) Same goals Low Latency QoS Load Balancing Admission/Congestion Control Service Discovery

Support for real-time multimedia Fast L2 Handoff Scanning delay Authentication i, WPA, 802.1x Fast L3 Handoff Subnet change detection IP address acquisition time Fast Session Update SIP re-INVITE Problems

Cooperative Roaming Multicast Security Reachability TTL (scopes in IPv6) Multicast Group

Layer 2 Handoff - Overview Mobile station All APs Probe request (broadcast) Probe response New AP Authentication request Authentication response Association request Association response Scanning delay Authentication delay Association delay

Layer 2 Handoff - Delays Scanning Introduces more than 90% of the total handoff delay (open system). It is the most power consuming part of the handoff process. Authentication WEP (broken) i, WPA

Mobile Node’s Cache Current AP (KEY)Best APSecond best AP MAC AMAC BMAC C Channel 1Channel 11Channel 6 Gateway DGateway EGateway F + LEASE FILE L2 + L3 information

Random waiting time The information exchanged in the NET_INFO multicast frames is: APs {BSSID, Channel} SUBNET IDs Layer 2 Cooperation (1/3) R-MNStations NET_INFO_REQ NET_INFO_RESP

Layer 2 Cooperation (2/3) A MN sends a NET_INFO_RESP frame if it has at least one AP in common with the R-MN’s cache. If the MN does not have at least one AP in common, it can: Discard the INFO_REQ frame without any further action Send an INFO_RESP frame but only if no one else has already sent the same information Send an INFO_RESP frame but with a lower priority than the one sent by a MN which follows the “one AP in common” rule.

Layer 2 Cooperation (3/3) When a MN either than R-MN receives a NET_INFO_RESP it will perform two tasks: Check if someone is lying (fix it!) Populate a temporary cache structure (cache “chunks” – Bit Torrent)

Layer 3 Handoff Subnet detection Information exchanged in NET_INFO frames IP address acquisition time Other STAs can cooperate with us and acquire a new IP address for the new subnet on our behalf while we are still in the OLD subnet. (Not delay sensitive!)

Cooperative IP Acquisition (1/2) R-MN has to discover the STAs that can help in this task (A-STA) R-MNStations ASTA_DISCOV (m) ASTA_RESP (u) m: multicast u: unicast R-MN builds a list of A-STAs for each possible next subnet

Cooperative IP Acquisition (2/2) R-MN can cooperate with A-STAs to acquire the L3 information it needs R-MNA-STA IP_REQ (Client ID).... DHCP Server DHCP_OFFER (client ID) DHCP_ACK IP_RESP (New IP) R-MN builds a list of {Gateway, IP address} pairs, one per each possible subnet it might move to next

Cooperative Authentication (1/4) Cooperation in the authentication process itself is not possible as sensitive information such as certificates and keys are exchanged. STAs can still cooperate in a mid-call mobility scenario to achieve a seamless L2 and L3 handoff regardless of the authentication model used.

Cooperative Authentication (2/4) In IEEE networks the medium is “shared”. Each STA can hear the traffic of other STAs if on the same channel. Packets sent by the non-authenticated STA will be dropped by the infrastructure but will be heard by the other STAs on the same channel/AP.

Cooperative Authentication (3/4) One selected STA (RN) can relay packets to and from the R-MN for the amount of time required by the R-MN to complete the authentication process. The R-MN needs to: Discover the available RNs for a given AP (Similar procedure to the one used for A-STAs) Select an RN and start the relaying of packets after the L2 handoff.

Cooperative Authentication (4/4) In order to select an RN the R-MN sends a RELAY_REQ multicast frame. RELAY_REQ format: AP_ID (AD_ID) R-MN MAC address CN MAC and IP RN MAC and IP RELAY_REQ frame is received by all the STAs in the multicast group (or a subset), including the CN and the RN

Security Issues (1/2) A malicious MN might try to re-use the relaying mechanism over and over without ever authenticate. Each RELAY_REQ allows an RN to relay packets for a limited amount of time RELAY_REQ frames are multicast. All STAs can help in detecting a bad behavior RNs can detect if the R-MN is performing the normal authentication or not. Authentication failure can also be detected

Security Issues (2/2) Countermeasures work only if we can be sure of the identity of a client  MAC spoofing A possible solution to MAC spoofing attacks is to perform authentication and encryption at the multicast group level

Other Applications In a multi-domain environment Cooperative Roaming (CR) can help in choosing AP/domain according to roaming agreements, billing, etc. CR can help for admission control and load balancing, by redirecting MNs to different APs and/or different networks. CR can help in discovering services (encryption, authentication, bit-rate, Bluetooth, UWB, 3G) CR can provide adaptation to changes in the network topology (802.11h) CR can help in the interaction between nodes in infrastructure and ad-hoc/mesh networks.

Conclusions Cooperation among stations allows seamless L2 and L3 handoffs for real-time applications Completely independent from the authentication mechanism used It does not require any changes in either the infrastructure or the protocol It does require many STAs supporting the protocol and a high degree of mobility Suitable for indoor and outdoor environments Sharing information  Power efficient