Professional Documents
Culture Documents
C08-Mobile Routing PDF
C08-Mobile Routing PDF
4/9/2018
Mobile IP
Motivation
Data transfer
Encapsulation
Security
IPv6
Problems
Micro mobility support
DHCP
Ad-hoc networks
8.1
Routing protocols
Traditional Routing
A routing protocol sets up a routing table in
routers
Compatibility
No changes to current hosts, OS, routers
mobile end-systems can communicate with fixed systems
Security
authentication of all registration messages
Efficiency and scalability
only few additional messages to mobile system (low bandwidth)
Global support for large number of mobile systems
Mobile IP: Basic Idea
MN Router
S
3
Home
agent
Router Router
1 2
Mobile IP: Basic Idea
move
Router
S MN
3
Foreign agent
Home agent
Terminology
Mobile Node (MN)
Laptop, PDA, etc.. that may move about
Home Agent (HA)
Router in home network of the MN, helps in forwarding
registers current MN location, tunnels IP datagrams to COA
Foreign Agent (FA)
Router in current foreign network of MN
forwards tunneled datagrams to the MN
Example network
HA
MN
router
end-system router
Data transfer to the mobile system
HA
2
MN
FA foreign
network
FA foreign
network
Source: Schiller
Example
There are two mobile hosts -> MH1 & MH2
And their Home Agents -> HA1 & HA2
MH1 is in its Home Network
MH2 is in a Foreign Networks
Suppose:
MH1 initiates data transfer with MH2.
What is the path of the packets?
MH1 now moves to a Foreign network
Example (continued)
Encapsulation Decapsulation
10.100.5.2 10.8.13.5 10.100.5.2 10.8.13.5
8.16 4/9/2018
Example (continued)
8.19 4/9/2018
Network integration
Agent Advertisement
HA and FA periodically send advertisement messages into their
subnets
MN reads a COA from the FA advertisement messages
Registration (always limited lifetime!)
MN signals COA to the HA via the FA, HA acknowledges
Messeges need to be secured by authentication
Advertisement
HA advertises the MN IP address (as for fixed systems)
routers adjust their entries, (HA responsible for a long time)
All packets to MN are sent to HA
8.20 4/9/2018
B- busy
set to zero Reverse
H- home ignored tunneling
registration
F- foreign
M- minimal
G- generic
8.21 4/9/2018
Registration
MN FA HA MN HA
MN has COA
8.22 4/9/2018
Registration request
S-HA to retain prior
mobility bindings
B- MN to receive
the broadcast
packets from HA
D-decapsulation
at tunnel endpoint
M-minimal
G- Generic
r- set to zero
T- reverse
tunneling
x- set to zero
8.23 4/9/2018
Registration reply
8.24 4/9/2018
Encapsulation
IP-in-IP encapsulation
Internet header
Inner header complete encapsulated
length
packet
Version
Type of
protocol
8.27 4/9/2018
Minimal encapsulation
With IP-in-IP encapsulation, several fields are
redundant (Not necessary).
Minimal encapsulation
Internet header
Inner header complete encapsulated
length
packet
Version
Type of
protocol
Original
sender
address of
CN
4/9/2018
Sequence
no
checksum
Routing
fields
key
Optimization of packet
forwarding
Triangular Routing
For eg: Japanese and a German meet at a conference on
Hawaii.
sender sends all packets via HA to MN
Triangular routes longer, higher latency and network load
“Solutions”
HA informs a sender about the location of MN
sender learns current location of MN
direct tunneling to this location
big security problems!
Change of FA
packets on-the-fly during the change can be lost
new FA informs old FA to avoid packet loss
old FA forwards remaining packets to new FA
Update also enables old FA to release resources for MN 8.10
8.32 4/9/2018
Request
8.34 4/9/2018
Reverse tunneling
MN can directly send its packets to the CN.
Problems
Firewalls:
intranet must pass through the firewall.
Home firewalls rejects packet from MN (unless reverse tunneling)
MN can no longer send packets back to home network
Multi-cast:
MN in a foreign network cannot transmit multi-cast packets in a
way that they emanate from its home network without a
reverse tunnel.
TTL:
Mobile IP is no longer transparent if a user has to adjust the TTL
while moving.
8.35 4/9/2018
Reverse tunneling
Reverse tunneling now creates a triangular
routing problem in the reverse direction.
All packets from an MN to a CN go through the
HA.
Reverse tunneling also raises several security
issues
For eg: tunnels starting in the private network of a
company and reaching out into the internet could
be hijacked and abused for sending packets through
a firewall.
8.36 4/9/2018
IP Micro-mobility support
Micro-mobility support:
Efficient local handover inside foreign domain without involving a home
agent
Reduces control traffic on backbone
Especially needed for route optimization
Example approaches:
Cellular IP
HAWAII
Hierarchical Mobile IP (HMIP)
8.38 4/9/2018
Cellular IP
Operation:
„CIP Nodes“ maintain
Internet
routing entries (soft
state) for MNs
Mobile IP
Multiple entries possible
Routing entries updated CIP Gateway
based on update data/control
packets sent by MN packets
from MN 1
CIP Gateway:
Mobile IP tunnel endpoint
Initial registration BS BS BS
packets from
processing
MN2 to MN 1
Other micromobility
MN1 MN2
protocols
HAWAII
Hierarchical Mobile
IPv6 (HMIPv6)
8.39 4/9/2018
Cellular IP
Advantages:
Manageability: Cellular IP is mostly self-configuring,
and integration of the CIPGW into a firewall would
facilitate administration of mobility-related
functionality.
Disadvantages:
Efficiency: Additional network load is induced by
forwarding packets on multiple paths.
Transparency: Changes to MNs are required.
Security: Routing tables are changed based on
messages sent by mobile nodes.
8.40 4/9/2018
Hawaii
Handoff-Aware Wireless Access
Internet Infrastructure
1. A mobile node obtains a co-
located COA
2. Registers with the HA
3. when moving to another cell
inside the foreign domain, the
MN sends a registration
request to the new base
station as to a foreign agent
4. Base station intercepts the
registration request and sends
out a handoff update
message, which reconfigures
all routers on the paths from
the old and new base station
to the so-called crossover
router
8.41 4/9/2018
Hawaii
Advantages
Security: Challenge-response extensions are
mandatory. In contrast to Cellular IP, routing
changes are always initiated by the foreign
domain’s infrastructure.
Transparency: HAWAII is mostly transparent to mobile
nodes.
Disadvantages
Security: There are no provisions regarding the setup
of IPSec tunnels.
Implementation: No private address support is
possible because of colocated COAs.
8.42 4/9/2018
DHCPDISCOVER
server client
client relay
8.46 4/9/2018
DHCPDISCOVER DHCPDISCOVER
determine the determine the
configuration configuration
DHCPOFFER DHCPOFFER
collection of replies
time
selection of configuration
DHCPREQUEST DHCPREQUEST
(reject) (options) confirmation of
configuration
DHCPACK
initialization completed
release
DHCPRELEASE delete context
8.47 4/9/2018
DHCP characteristics
Server
several servers can be configured for DHCP, coordination not yet
standardized (i.e., manual configuration)
Renewal of configurations
IP addresses have to be requested periodically, simplified protocol
Big security problems!
no authentication of DHCP information specified
8.48 4/9/2018
A B C
8.49 4/9/2018
Examples
Single-hop: All partners max. one hop apart
Bluetooth piconet, PDAs in a room,
gaming devices…
Manet
Mobile
Devices
Mobile IP,
DHCP
Fixed
Network
8.20
8.52 4/9/2018
N4 N4
N5 N5
time = t1 time = t2
good link
weak link
8.53 4/9/2018
Distance Vector
periodic exchange of cost to everyone else, with neighbors
selection of shortest path if several paths available
Link State
periodic notification of all routers about the current cost to
neighbors
routers get a complete picture of the network, run Djikstra’s
algorithm
Example
ARPA packet radio network (1973), DV-Routing
every 7.5s exchange of routing tables including link quality
Receive packets, update tables
8.54 4/9/2018
Problems of traditional
routing algorithms
Dynamic of the topology
frequent changes of connections, connection
quality, participants
Reasons
Classical approaches from fixed networks fail
Fast link quality changes, slow convergence, large overhead
Highly dynamic, low bandwidth, low computing power
A 1 B 2 C
Dest. Next Metric Seq Dest. Next Metric Seq Dest. Next Metric Seq.
A A 0 A-550 A A 1 A-550 A B 1 A-550
B B 1 B-100 B B 0 B-100 B B 2 B-100
C B 3 C-586 C C 2 C-588 C C 0 C-588
DSDV (Route Advertisement)
B increases Seq.Nr from 100 ->
102
B broadcasts routing information
to Neighbors A, C including
destination sequence numbers
A 1 B 1 C
Dest. Next Metric Seq Dest. Next Metric Seq Dest. Next Metric Seq.
A A 0 A-550 A A 1 A-550 A B 2 A-550
B B 1 B-102 B B 0 B-102 B B 1 B-102
C B 2 C-588 C C 1 C-588 C C 0 C-588
DSDV (New Node)
2. Insert entry for D with
sequence number D-000
Then immediately broadcast
own table 1. D broadcast for first time
Send Sequence number D-
000
(D, 0, D-000)
A B C D
Dest. Next Metric Seq. Dest. Next Metric Seq. Dest. Next Metric Seq.
A A 0 A-550 A A 1 A-550 A B 2 A-550
B B 1 B-104 B B 0 B-104 B B 1 B-104
C B 2 C-590 C C 1 C-590 C C 0 C-590
D D 1 D-000
DSDV (New Node cont.)
3. C increases its sequence
number to C-592 then
4. B gets this new information broadcasts its new table.
and updates its table…….
A B C D
Dest. Next Metric Seq. Dest. Next Metric Seq. Dest. Next Metric Seq.
A A 0 A-550 A A 1 A-550 A B 2 A-550
B B 1 B-104 B B 0 B-102 B B 1 B-102
C B 2 C-590 C C 1 C-592 C C 0 C-592
D C 2 D-000 D D 1 D-000
DSDV (no loops, no count to infinity)
2. B does its broadcast
-> no affect on C (C knows
that B has stale information
because C has higher seq. number
for destination D) 1. Node C detects broken
-> no loop -> no count to Link:
infinity -> Increase Seq. Nr. by 1
(only case where not the
destination sets the sequence
(D, 2, D-100) (D, 2, D-100) number -> odd number)
A B C D
Dest. Next Metric Seq. Dest.c Next Metric Seq. Dest. Next Metric Seq.
… … … … … … … … …
D B 3 D-100 D C 2 D-100 D D D-101
DSDV (Immediate Advertisement)
3. Immediate 2. Immediate
propagation propagation
B to A: C to B:
(update information has (update information has
higher Seq. Nr. -> replace higher Seq. Nr. -> replace 1. Node C detects broken
table entry) table entry) Link:
-> Increase Seq. Nr. by 1
(only case where not the
destination sets the sequence
(D, , D-101) (D, , D-101) number -> odd number)
A B C D
Dest. Next Metric Seq. Dest.c Next Metric Seq. Dest. Next Metric Seq.
… … … ... … … … ... … … …
D B 4
3 D-100 D C 3
2 D-100 D B
D 1 D-100
D B D-101 D C D-101 D D D-101
DSDV (Problem of Fluctuations)
What are Fluctuations
A Entry for D in A: [D, Q, 14, D-100]
P Q D makes Broadcast with Seq. Nr. D-102
A receives from P Update (D, 15, D-102)
-> Entry for D in A: [D, P, 15, D-102]
A must propagate this route immediately.
A receives from Q Update (D, 14, D-102)
11 Hops 10 Hops -> Entry for D in A: [D, Q, 14, D-102]
A must propagate this route immediately.
Disadvantages
No sleeping nodes
Overhead: most routing information never
used
Dynamic Source Routing (DSR)
[Johnson+ 1996]
Z
S E
F
B
C M L
J
A G
H D
K
I N
[S] Z
S E
F
B
C M L
J
A G
H D
K
I N
Z
S [S,E]
E
F
B
C M L
J
A [S,C] G
H D
K
I N
Z
S E
F [S,E,F]
B
C M L
J
A G
H D
[S,C,G] K
I N
Z
S E
F [S,E,F,J]
B
C M L
J
A G
H D
K
I [S,C,G,K] N
Z
S E
[S,E,F,J,M]
F
B
C M L
J
A G
H D
K
I N
Z
S RREP [S,E,F,J,D]
E
F
B
C M L
J
A G
H D
K
I N
If IEEE 802.11 MAC is used to send data, then links have to be bi-
directional (since Ack is used)
DATA [S,E,F,J,D] Z
S E
F
B
C M L
J
A G
H D
K
I N
Cluster
Clusterhead
Gateway
Ordinary node
Cluster Gateway Switch Routing (CGSR)
– Each node keeps a cluster member table which stores the destination
clusterhead for each node in the network
– Every node periodically broadcasts these cluster member tables using
DSDV protocol
– Nodes update their cluster member tables upon receiving these
broadcasts
– Each node also maintains a routing table that is used to determine the
next hop towards the destination
– When a packet is received, the node checks both cluster member and
routing tables to determine the nearest clusterhead in the route to the
destination
– The node checks its routing table to determine the next hop node to
reach clusterhead
– Both cluster member and routing tables need to be updated
8.100 4/9/2018
A plethora of ad hoc
routing protocols
Flat
proactive
FSLS – Fuzzy Sighted Link State
FSR – Fisheye State Routing
OLSR – Optimised Link State Routing Protocol
TBRPF – Topology Broadcast Based on Reverse Path Forwarding
reactive
AODV – Ad hoc On demand Distance Vector
DSR – Dynamic Source Routing
Hierarchical
CGSR – Clusterhead-Gateway Switch Routing
HSR – Hierarchical State Routing
LANMAR – Landmark Ad Hoc Routing
ZRP – Zone Routing Protocol
Geographic position assisted
DREAM – Distance Routing Effect Algorithm for Mobility
GeoCast – Geographic Addressing and Routing
GPSR – Greedy Perimeter Stateless Routing
LAR – Location-Aided Routing 8.30