MOBILITY - PowerPoint PPT Presentation

About This Presentation
Title:

MOBILITY

Description:

Home Network. FA. Foreign Network. Mobile Host. Specifications. Agent Discovery ... secret exchanged while mobile is at home. Authenticating a binding at CA ... – PowerPoint PPT presentation

Number of Views:236
Avg rating:3.0/5.0
Slides: 26
Provided by: bhas2
Category:
Tags: mobility

less

Transcript and Presenter's Notes

Title: MOBILITY


1
MOBILITY
  • Beyond Third Generation Cellular
  • Feb 5 1998

2
Overview
  • Mobile IP
  • IMHP
  • Mobility in GSM

3
Mobility IP The Problem
  • Hierarchical IP addressing based on physical
    location
  • The same address is used for identification as
    well as location
  • For identification, an unchanging address is
    required
  • For mobility, a dynamic address is required

4
Solution
  • A level of indirection
  • Use two addresses
  • Home address (identification)
  • Foreign address (location)
  • How to obtain a foreign (care-of) address?
  • How to manage the binding between the two
    addresses?
  • How to forward packets?

5
Why handle mobility at the Network Layer?
  • Higher layers should not be concerned with
    mobility
  • Mobility management independent of physical layer
  • can move from one physical network to another
  • The problem of mobility is transformed to one of
    routing

6
Goals
  • Mobility
  • Communicate with nodes that run old IP
  • Messages about the location of a mobile should be
    authenticated
  • No constraints on assignment of IP addresses

7
Previous Approaches
  • Sony MHP, Columbia MHP, IBMs MHP
  • Use IP options
  • Use a mobility router backbone or home gateways
  • Use of multicast in the backbone
  • Propagation of bindings for route optimization

8
Mobile IP Architecture
Mobile Host
9
Specifications
  • Agent Discovery
  • Registration
  • Tunneling

10
Agent Discovery
  • Agents advertise their presence
  • Mobile can send solicitation messages
  • Mobile-IP modifies the ICMP router discovery
    procedure

11
Registration
  • Mobile registers its care-of address with its HA
  • This could be strongly authenticated
  • shared secret between mobile HA
  • Registration request reply messages
  • UDP port 434 is used

12
Tunneling (forwarding)
  • HA should intercept messages coming for the
    mobile (may use proxy ARP)
  • HA tunnels the IP packet to the care-of address

13
Care-of Address
  • Could be FAs address
  • the FA de-tunnels the packet and sends it to the
    mobile
  • Mobile could have its own foreign address
    (obtained through DHCP)
  • the mobile de-tunnels the packets itself

14
New Concerns
  • Inefficiency triangle routing

HA
FA
Mobile
Host talking to mobile
  • Security concerns Any node on the internet can
    do remote redirection

15
Internet Mobile Host Protocol
  • Aims to provide
  • routing efficiency
  • authentication
  • Route optimization Security is difficult
  • Security Current Internet security
  • Ideal solution would require key distribution

16
Route Optimization
  • Cache Agents (CA)
  • cache bindings
  • cache entries are authenticated
  • entries are timed out
  • A node that wishes to optimize its communication
    should function as CA

17
Binding Management
  • Lazy notification
  • Mobile host always notifies its HA when it moves
    (registration)
  • Node N (CA/HA/LA) receives a packet to be
    tunneled to the mobile gt N sends binding
    notification to source node S
  • Binding notifications are re-sent with back-off

18
Authentication
  • Mobile to HA
  • strong authentication based on shared secret
  • secret exchanged while mobile is at home
  • Authenticating a binding at CA
  • send request to mobile/HA with random number
  • get reply and check random number

19
Authentication (Continued)
  • Visitor-List entries at FA
  • need not be authenticated (since binding is
    authenticated)
  • Visitor-List entry deletion
  • mobile exchanges a secret with the LA when entry
    is created
  • this shared secret is used to authenticate
    visitor-entry deletion

20
Other features
  • Binding advertisement may be suppressed
    optionally
  • Intermediate CAs may provide partial
    optimization
  • snoop to detect location update messages

21
Mobility in GSM
  • Designed for mobility integrated approach
  • Identification is not tied with location
    information
  • Cryptographic keys for authentication
  • Other differences
  • scale
  • connection oriented nature

22
Architecture
HLR
MSC
MSC
VLR
EIR
MSC
BSC
BSC
BTS
BTS
23
Location Update
Mobile
Base-Station
channel request
  • When a mobile
  • moves from one cell
  • to another
  • or when it powers up
  • it initiates a location update procedure

immediate assignment
location update request
authentication request
authentication response
location updating accept
TMSI allocation complete
channel release
24
Hand-over
  • Hand-over may involve
  • Only one BSC
  • Only one MSC
  • More than one MSC
  • When more than one MSC is involved, the old MSC
    is still in control of call-management

Mobile
Base-Station
conversation
measurement report
conversation
hand-over command
hand-over access
physical information
hand-over complete
conversation
25
Authentication
  • Authentication request, response, reject messages
  • Ki Secret Authentication key in SIM
  • Identification request, response messages
  • IMSI, IMEI, TMSI
  • Ki is used to compute Kc - to encrypt data
    control messages
Write a Comment
User Comments (0)
About PowerShow.com