Passive Duplicate Address Detection (DAD) Sangho Shin Andrea Forte Henning Schulzrinne Columbia University.

Slides:



Advertisements
Similar presentations
Everything.
Advertisements

1 Wireless and Mobile Networks Part 2 November 25, 2008 Department of Electrical and Computer Engineering University of Western Ontario ECE 436a Networking:
Fast L3 Handoff in Wireless LANs Andrea G. Forte Sangho Shin Henning Schulzrinne.
Computer Networks21-1 Chapter 21. Network Layer: Address Mapping, Error Reporting, and Multicasting 21.1 Address Mapping 21.2 ICMP 21.3 IGMP 21.4 ICMPv6.
CMPE 150- Introduction to Computer Networks 1 CMPE 150 Fall 2005 Lecture 25 Introduction to Computer Networks.
Internet Control Protocols Savera Tanwir. Internet Control Protocols ICMP ARP RARP DHCP.
8-1 Last time □ Network layer ♦ Introduction forwarding vs. routing ♦ Virtual circuit vs. datagram details connection setup, teardown VC# switching forwarding.
 As defined in RFC 826 ARP consists of the following messages ■ ARP Request ■ ARP Reply.
Helper Protocols Protocols that either make it easier for IP to do its job, or extend the capabilities of the network layer.
DHCP Dynamic Host Configuration Part 7 NVCC Professional Development TCP/IP.
Doc.: IEEE /1183r0 Submission September 2011 Masataka Ohta, Tokyo Institute of TechnologySlide 1 IP over Congested WLAN Date: Authors:
1 Towards the Quality of Service for VoIP Traffic in IEEE Wireless Networks Sangho Shin PhD candidate Computer Science Columbia University.
Cooperation Between Stations in Wireless Networks Andrea G. Forte and Henning Schulzrinne Department of Computer Science Columbia University, New York.
Chapter 8 Administering TCP/IP.
ICMP: Internet Control Message Protocol used by hosts, routers, gateways to communication network-level information –error reporting: unreachable host,
VoIP over Wireless LANs Sangho Shin Ph.D. Candidate Department of Computer Science Columbia University.
IEEE in the Large: Observations at the IETF Meeting Henning Schulzrinne, Andrea G. Forte, Sangho Shin Department of Computer Science Columbia University.
VoIP over Wireless LANs Sangho Shin Ph.D. Candidate Department of Computer Science Columbia University.
Cooperation in Wireless Networks Andrea G. Forte Henning Schulzrinne November 14, 2005.
Subnetting.
ITIS 6167/8167: Network and Information Security Weichao Wang.
Projects Overview Andrea Forte Fast L3 handoff Passive DAD (pDAD) Cooperative Roaming (CR) Highly congested IEEE networks – Measurements.
EEC-484/584 Computer Networks Lecture 14 Wenbing Zhao
Host Configuration: BOOTP and DHCP
Everything. MACIP End-host IP: MAC: 11:11:11:11:11 gateway IP: MAC: 22:22:22:22:22 Google server IP: MACIP MACInterfaceMACInterface.
Layer 2 Security – No Longer Ignored Security Possibilities at Layer 2 Allan Alton, BSc CISA CISSP NetAnalyst UBC October 18, 2007.
IST 228\Ch3\IP Addressing1 TCP/IP and DoD Model (TCP/IP Model)
DHCP for Multi-hop Wireless Ad-Hoc Networks Presented by William List.
CN2668 Routers and Switches Kemtis Kunanuraksapong MSIS with Distinction MCTS, MCDST, MCP, A+
DHCP: Dynamic Host Configuration Protocol
DHCP Dynamic Host Configuration Protocol. Introduction Client administration:  IP address management: They need to ease the process of joining the network.
Making connections Connecting a computer to a LAN donna Bair-Mundy.
Network Layer – Subnetting and Control Protocols Dr. Sanjay P. Ahuja, Ph.D. Fidelity National Financial Distinguished Professor of CIS School of Computing,
23-Support Protocols and Technologies Dr. John P. Abraham Professor UTPA.
1 Dynamic Host Configuration Protocol (DHCP) Relates to Lab 7. Module about dynamic assignment of IP addresses with DHCP.
Module 3: Configuring Basic TCP/IPv4 Settings. Overview of the TCP/IP Protocol Suite Overview of TCP/IP Addressing Name Resolution Dynamic IP Addressing.
DHCP Dynamic Host Configuration Protocol Information management 2 Groep T Leuven – Information department 2/18 Agenda Introduction BOOTP.
IP Address Allocation, Resolution. Address Allocation.
Cisco – Chapter 11 Routers All You Ever Wanted To Know But Were Afraid to Ask.
Handoff in IEEE Andrea G. Forte Sangho Shin Prof. Henning Schulzrinne.
DHCP Security DHCP Snooping and Security David Mitchell 03/19/2008.
NUS.SOC.CS2105 Ooi Wei Tsang Application Transport Network Link Physical you are here.
Network Layer4-1 Subnets How many?
Chapter 15 DHCP. Dynamic Host Configuration Protocol An Application Layer Protocol A client server protocol that automatically provides an IP host with.
1 CS 4396 Computer Networks Lab Dynamic Host Configuration Protocol (DHCP)
Passive DAD Henning Schulzrinne Columbia University.
Why Use DHCP? DHCP reduces the complexity and amount of administrative work by using automatic TCP/IP configuration Manual TCP/IP Configuration IP addresses.
VoIP over Wireless LANs Sangho Shin. Outline Why VoIP ? Why ? My research Applicability.
DHCP/BOOTP Dynamic Host Configuration Protocol Dynamic Host Configuration Protocol (DHCP) is a network protocol that enables a server to automatically.
Chapter 23: ARP, ICMP, DHCP CS332, IS333 Spring 2014.
CIS 856: TCP/IP and Upper Layer Protocols Karthik Ravindra Nov 11, 2008 Dynamic Host Configuration Protocol [DHCP] - RFC 2131.
Attacking on IPv6 W.lilakiatsakun Ref: ipv6-attack-defense-33904http://
Allocating IP Addressing by Using Dynamic Host Configuration Protocol.
Cooperation between stations in wireless networks Andrea G. Forte, Henning Schulzrinne Department of Computer Science, Columbia University Presented by:
1 Chapter 8: DHCP in IP Configuration Designs Designs That Include DHCP Essential DHCP Design Concepts Configuration Protection in DHCP Designs DHCP Design.
(ITI310) By Eng. BASSEM ALSAID SESSIONS 9: Dynamic Host Configuration Protocol (DHCP)
October 17, 2007 Cooperation Between Stations in Wireless Networks Andrea G. Forte Henning Schulzrinne Department of Computer Science Columbia University.
KYUNG-HWA KIM HENNING SCHULZRINNE 12/09/2008 INTERNET REAL-TIME LAB, COLUMBIA UNIVERSITY DYSWIS.
End-host IP: MAC: 11:11:11:11:11 gateway IP: MAC: 22:22:22:22:22 Google server IP: interne t interface DNS server IP:
Doc.: IEEE /1183r1 Submission September 2011 Masataka Ohta, Tokyo Institute of TechnologySlide 1 IP over Congested WLAN Date: Authors:
Physical Net. Access IP TCP/UDP Application Physical Net. Access IP TCP/UDP Application Physical Net. Access Physical Net. Access IP Physical Net. Access.
Cisco Routers Routers collectively provide the main feature of the network layer—the capability to forward packets end-to-end through a network. routers.
Andrea G. Forte Sangho Shin Henning Schulzrinne
Mobile Networking (I) CS 395T - Mobile Computing and Wireless Networks
Course Review 2015 Computer networks 赵振刚
IEEE in the Large: Observations at the IETF Meeting
VoIP in IEEE Networks Henning Schulzrinne
IPsrc IPdst MACsrc MACdst
Cooperation Between Stations in Wireless Networks
Chapter 5: Link Layer 5.1 Introduction and services
Presentation transcript:

Passive Duplicate Address Detection (DAD) Sangho Shin Andrea Forte Henning Schulzrinne Columbia University

Motivation (1/2) AR (Access Router) AR Layer 3 (IP Layer) Handoff Layer 2 handoff Subnet change Layer 3 handoff New IP acquisition Session update

Motivation (2/2) Standard DHCP procedure (RFC2131) DHCP server DHCP DISCOVER DHCP OFFER DHCP REQUEST DHCP ACK Performs Duplicate Address Detection (DAD) - Send ICMP ECHO to the IP (Broadcast) Pick an unassigned IP Wait for the response for 1 second

Problems of the current DAD Long waiting time Long ICMP response time in congested wireless network ISC DHCP server – 1 sec 1 second waiting time is critical for real time services Unreliable Windows XP SP2 Firewall Block ICMP echo by default Most of the windows machines do not respond to ICMP echo Possible packet loss in wireless networks

Basic Concept Monitor traffic constantly Collect IP usage Update IP table V V V V No explicit DAD Request Response

Architecture (1/2) Address Usage Collector (AUC) DHCP server subnet router switch

Architecture (2/2) DHCP server AUC Relay Agent (RA) RA

Example 1 AUC DHCP server Router IP: MAC:AA-BB-CC Lease table ARP query Web server MAC:AA-BB-CC IPMACExpire AA-BB-CC100 IPMAC AA-BB-CC IP address collection

Example 2 AUC DHCP server Router IP: IP: MAC:DD-EE-FF Lease table Web server MAC:AA-BB-CC IPMACExpire AA-BB-CC100 IPMAC AA-BB-CC IP: MAC:DD-EE-FF ARP query DD-EE-FF100 Bad IP table IPMAC DD-EE-FF Malicious user detection

Example 3 AUC DHCP server Router IP: MAC: Lease table ARP query Web server Block Forward HTTP traffic MAC:AA-BB-CC IPMACExpire AA-BB-CC100 IPMAC AA-BB-CC IP: MAC:DD-EE-FF IP: MAC: DD-EE-FF AA-BB-CC100 Bad IP table IPMAC DD-EE-FF AA-BB-CC FORCE RENEW IP: IP collision detection

Experiments AUC Columbia CS network Columbia WLAN DHCP Server

Experimental results (1/4) Convergence time

Experimental results (2/4) DHCP server traffic load from AUC

Experimental results (3/4) AUC traffic load (ARP and broadcast)

Experimental results (4/4) CPU load of AUC

Conclusions It takes time to acquire an IP from DHCP server mostly because of DAD – 1 sec The current DAD does not work because of Windows XP SP2 Passive DAD performs DAD with no overhead Passive DAD detects IP address collision and illegally used IPs When a address collision is detected, Passive DAD resolves the duplicate IP problem by using DHCP Force Renew

Thank you!