Presentation is loading. Please wait.

Presentation is loading. Please wait.

COM555: Mobile Technologies Location-Identifier Separation.

Similar presentations


Presentation on theme: "COM555: Mobile Technologies Location-Identifier Separation."— Presentation transcript:

1 COM555: Mobile Technologies Location-Identifier Separation

2 Application Layer Transport Layer Internet Layer Data Link Layer Physical Layer IP-address,, port (Endpoint Identifier) IP-address (Routing Locator) In the current Internet TCP/IP Protocol Stack, the IP address functions simultaneously as: A Routing Locator (an identifier with a topological meaning) and An Endpoint Identifier

3 Location-Identifier Separation When a host changes its point of attachment to the Internet, its IP address must change as well Therefore all transport sessions will break There have been various ‘workarounds’ to implement mobility on the Internet

4 Location-Identifier Separation More fundamental approaches aim to separate Routing Locators and Endpoint Identifiers to remove all identification related functionality from topology related information such as IP addresses. Current implementations adopt IP as the communications endpoint. New approaches have become known as Location-Identifier (L.I.) Separation.

5 Location-Identifier Separation These more fundamental approaches require the redesign of the Internet protocol stack: Such proposals are, by definition radical, and will be difficult to implement. (Recall IPv4 vs Ipv6) The ideas have emerged from the Routing Research Group (RRG) of the Internet Research Task Force (IRTF)

6 L.I Separation The lack of L.I. Separation causes problems beyond simply mobility: A key issue is user location privacy When –Identifiers are long lived, and –A publicly available mapping exists between identifiers and locators, it is possible to determine the location of a host and thus, the user using it Without the user’s permission, or knowledge

7 Privacy Invasion of privacy is increasingly becoming a criminal offence! It is important that new mechanisms, by default, do not reveal the location of a particular host to unknown observers.

8 Proposed Solutions Four proposed solutions have exercised the RRG: The Host Identity Protocol (HIP) Network Address Translation for IPv6 to IPv6 (NAT66) Identifier-Locator Network Protocol (ILNP) Location-Identifier Separation Protocol- Mobile Node (LISP-MN)

9 Fundamental Approaches to Location- Identifier Separation Most approaches to LI Separation fall into two broad categories: –Those that introduce an extra layer to hold the original endpoint identifiers –Those that split the IPv6 address space into a part that has topological meaning, and a part that is used to identify the host.

10 Case Study All four approaches have their advocates and detractors. None of them are ‘perfect’. All are ‘work in progress’ We will briefly review LISP-MN as this has gained significant industrial support in recent years.

11 Location-Identifier Separation Protocol – Mobile Node (LISP-MN) The LISP-NM Protocol enables a mobile node to roam across network whilst retaining its IP address. During hand-off, sessions may ‘pause’, and some data loss is possible. The key issue however is that sessions are not dropped. So they do not have to be set up again

12 LISP-MN LISP-MN aims to make it possible for mobile devices to roam while keeping TCP sessions alive and to be simultaneously connected to two different networks. (Multihomed). LISP-MN is based on a LISP infrastructure:

13 LISP Lisp implements a Map-and-Encap scheme. Packets are encapsulated at the border router of the sender domain: The Ingress Tunnel Router. (ITR) Packets are decapsulated at the border router of the receiver domain: The Egress Tunnel Router (ETR)

14 Encapsulation By this mechanism, core routing (routing between domains) is independent of the encapsulated endpoint identifiers. LISP adds an extra Internet layer below the existing one.

15 15 Application Layer Transport Layer Internet Layer Data Link Layer Physical Layer Identifier Internet Layer Locator Identifier LISP Stack

16 LISP Transmission 1.The Host looks up the correspondent host in a DNS and gets an Endpoint Identifier; 2.Host makes a packet with it source Endpoint Identifier and the Destination Endpoint Identifier 3.Packet is sent to the ITR which encapsulates it with the Routing Locator of the ITR as the source, and the Routing Locator of an ETR as the target. (This requires a mapping mechanism) 4.The packet is transmitted over the Internet to the ETR 5.The ETR decapsulates the packet and sends it to the destination Endpoint Identifier

17 17 RLOC ITR1: 10.0.0.0/8 RLOC ITR1: 10.0.0.0/8 RLOC ITR2: 11.0.0.0/8 RLOC ITR2: 11.0.0.0/8 RLOC ETR2: 13.0.0.0/8 RLOC ETR2: 13.0.0.0/8 RLOC ETR1: 12.0.0.0/8 RLOC ETR1: 12.0.0.0/8 Internet Core EID: 1.0.0.0/8 EID: 1.0.0.0/8 EID: 2.0.0.0/8 EID: 2.0.0.0/8 EID: 1.0.0.1 EID: 1.0.0.1 EID: 2.0.0.2 EID: 2.0.0.2 1.0.0.1 -> 2.0.0.2 11.0.0.1 -> 12.0.0.2 Host EID 1.0.0.1 wants To send to Host EID 2.0.0.2 ITR2 does a DNS on 2.0.0.2 and gets13.0.0.2 and 12.0.0.2: The latter has priority The packet Arrives at ITR2 ITR2 encapsulates The packet with source 1.0.0.1 and Destination 2.0.0.2 in a packet With source 11.0.0.1 And destination 12.0.0.2 ETR1 receives the packet And decapsulates it. ETR! Forwards the packet To EID 2.0.0.2 Typical LISP Scenario

18 LISP-MN LISP-MN leverages the mapping infrastructure of LISP to support mobile devices This happens by turning the mobile device into a LISP ITR and ETR for itself The mobile device sends map requests All packets originating at the mobile device are LISP encapsulated

19 Map Servers The mobile device can answer directly to incoming Map requests, or it can designate its map server as a proxy Map Servers have similar behaviour to Home Agents in Mobile IP Unlike mobile IP, the actual data never flows through these servers. They just answer to the mapping requests. Also, home agents never provide mapping information because that is left to the mobile node

20 20 RLOC ITR1: 10.0.0.0/8 RLOC ITR1: 10.0.0.0/8 RLOC ITR2: 11.0.0.0/8 RLOC ITR2: 11.0.0.0/8 3G: 13.0.0.0/8 3G: 13.0.0.0/8 WiFi: 12.0.0.0/8 WiFi: 12.0.0.0/8 Internet Core Domain EID: 1.0.0.0/8 Domain EID: 1.0.0.0/8 Source EID: 1.0.0.1 Source EID: 1.0.0.1 Dest EID: 1.0.0.2 Dest EID: 1.0.0.2 1.0.0.1 -> 1.0.0.2 11.0.0.1 -> 13.0.0.2 3G WiFi 11.0.0.1 -> 13.0.0.2 Example: EID 1.0.0.1 wants to send a packet to EID 1.0.0.2 Mobile host 1.0.0.2 has lost its Wi Fi connection but still has GSM 1.Mobile node updates the Mapping Server to indicate that it is accessible via 13.0.0.2, but not 12.0.0.2 2.The packet arrives at ITR2 (Which has Routing Locator 11.0.0.1) 3.ITR2 Looks up Routing Locators corresponding with EID1.0.0.2 and finds 13.0.0.2 4.ITR2 encapsulates the packet and forwards as normal over the Internet core 5.The mobile host receives the packet and decapsulates it. RLOC Host 12.0.0.2-------- 13.0.0.21.0.0.2 Mapping Server

21 References CISCO Demo LISP_MN –http://bit.ly/oYa2IEhttp://bit.ly/oYa2IE –http://www.cisco.com/c/en/us/products/ios-nx- os-software/locator-id-separation-protocol- lisp/index.htmlhttp://www.cisco.com/c/en/us/products/ios-nx- os-software/locator-id-separation-protocol- lisp/index.html –https://lispmob.org/https://lispmob.org/ –http://lisp.cisco.comhttp://lisp.cisco.com LISP Mobile Project (this is just a link of interest) –http://www.lispmob.org/http://www.lispmob.org/


Download ppt "COM555: Mobile Technologies Location-Identifier Separation."

Similar presentations


Ads by Google