C08 Network Protocols
C08 Network Protocols
C08 Network Protocols
• Motivation
• Data transfer , Encapsulation
• Security, IPv6, Problems
• DHCP
• Ad-hoc networks, Routing protocols
Prof. Jó Ueyama
• Transparency
• mobile end-systems keep their IP address
• continuation of communication after interruption of link
possible
• point of connection to the fixed network can be changed
• Compatibility
• support of the same layer 2 protocols as IP
• no changes to current end-systems and routers required
• mobile end-systems can communicate with fixed systems
• Security
• authentication of all registration messages
• Efficiency and scalability
• only little additional messages to the mobile system required
(connection typically via a low bandwidth radio link)
• world-wide support of a large number of mobile systems in
the whole Internet
courtesy from Prof. Dr.-Ing. Jochen H. Schiller 8.3
Terminology
• Mobile Node (MN)
• system (node) that can change the point of connection
to the network without changing its IP address
• Home Agent (HA)
• system in the home network of the MN, typically a router
• registers the location of the MN, tunnels IP datagrams to the COA
• Foreign Agent (FA)
• system in the current foreign network of the MN, typically a router
• forwards the tunneled datagrams to the MN, typically also the
default router for the MN
• Care-of Address (COA)
• address of the current tunnel end-point for the MN (at FA or MN)
• Co-located COA
• actual location of the MN from an IP point of view
• can be chosen, e.g., via DHCP
• Correspondent Node (CN)
• communication partner
courtesy from Prof. Dr.-Ing. Jochen H. Schiller 8.4
Example network
HA
MN
router
end-system router
HA
2
MN
FA foreign
network
HA
1 MN
FA foreign
network
receiver
COA
router
home router MN
FA
network HA
foreign
Internet network
CN router
3.
router
home router MN
2. FA
network HA
4.
foreign
Internet network
1.
CN router
0 7 8 15 16 23 24 31
type code checksum
#addresses addr. size lifetime
router address 1
preference level 1
router address 2
preference level 2
...
type = 16
length = 6 + 4 * #COAs type = 16 length sequence number
R: registration required registration lifetime R B H F M G r T reserved
B: busy, no more registrations COA 1
H: home agent COA 2
F: foreign agent
...
M: minimal encapsulation
G: GRE encapsulation
r: =0, ignored (former Van Jacobson compression)
T: FA supports reverse tunneling
reserved: =0, ignored
MN re FA HA MN re HA
gist gist
requ ration requ ration
e st es t
regi
s
requ tration
est
n
i st ratio
reg
y
n repl
i st ratio
reg
y t
repl
n
i st ratio
reg
y
repl
0 7 8 15 16 23 24 31
type = 1 S B DMG r T x lifetime
home address
home agent
COA
identification
S: simultaneous bindings (requests that multiple copies of packet are sent to each registered COA)
B: broadcast datagrams
D: decapsulation by MN (If Co-located COA is adopted)
M mininal encapsulation
G: GRE encapsulation
r: =0, ignored
T: reverse tunneling requested
x: =0, ignored
Type 1 → registration request
GRE original
outer header original data
header header
CN HA FAold FAnew MN
Data Data
MN changes
location
Update Registration
ACK
Data
Data Data
Warning
Request
Update
ACK
Data
Data
t
HA
2
MN
FA foreign
network
1. MN sends to FA
3 2. FA tunnels packets to HA
CN by encapsulation
3. HA forwards the packet to the
receiver (standard case)
receiver
client relay
selection of configuration
DHCPREQUEST DHCPREQUEST
(reject) (options) confirmation of
configuration
DHCPACK
initialization completed
release
DHCPRELEASE delete context
A B C
courtesy from Prof. Dr.-Ing. Jochen H. Schiller 8.29
Solution: Wireless ad-hoc networks
• Network without infrastructure
• Use components of participants for networking
• Examples
• Single-hop: All partners max. one hop apart
• Bluetooth piconet, PDAs in a room,
gaming devices…
Mobile
Router
Manet
Mobile
Devices
Mobile IP,
DHCP
Fixed
Network
N4 N4
N5 N5
time = t1 time = t2
good link
weak link
• Reasons
• Classical approaches from fixed networks fail
• Very slow convergence, large overhead
• High dynamicity, low bandwidth, low computing power
• Discover a path
• only if a path for sending packets to a certain destination is
needed and no path is currently available
• Maintaining a path
• only while the path is in use one has to make sure that it can
be used continuously
• Optimizations
• limit broadcasting if maximum diameter of the network is known
• caching of address lists (i.e. paths) with help of passing packets
• stations can use the cached information for path discovery (own paths
or paths for other hosts)
C
G Q
B I
E
K M O
A
H
D L
F J N
B I
E
K M O
A
H
D L
F J N
P R
[O,C/G,4711]
C
G [O,C/G,4711] Q
[O,C/B,4711]
B I
E
K M O
A
[O,C/E,4711] H
D L
F J N
P R
C
G Q
[O,C/G/I,4711]
B I
E
K M O
A
H
[O,C/E/H,4711]
[O,C/B/A,4711] D L
F J N
[O,C/B/D,4711]
(alternatively: [O,C/E/D,4711])
P R
C
G Q
[O,C/G/I/K,4711]
B I
E
K M O
A
H
D L
F J N
[O,C/E/H/J,4711]
[O,C/B/D/F,4711]
P R
C
G Q
[O,C/G/I/K/M,4711]
B I
E
K M O
A
H
D L
F J N
[O,C/E/H/J/L,4711]
(alternatively: [O,C/G/I/K/L,4711])
P R
C
G Q
B I
E
K M O
A
H
D L
F J N
[O,C/E/H/J/L/N,4711]
P R
C
G Q
Path: M, K, I, G
B I
E
K M O
A
H
D L
F J N
R1
S1 N3
N4
N5 N6 R2
S2
N8 N9
N7
neighbors
(i.e. within radio range)
Cluster
Super cluster