WhitePaper Mobile IP Overview December 2002

advertisement
White
Paper
Mobile IP Overview
December 2002
Haakon VII's gate 5B, N-0161 Oslo, Norway
Tel: +47 24 13 47 00 Fax: +47 24 13 47 01
hello@birdstep.com www.birdstep.com
Preface
Mobile IP, wireless LANs, Virtual Private Networks and seamless roaming are
areas of increasing growth of interest these days. The increased reliance on
the Internet as a business tool and the development of sophisticated
wireless communications systems have freed employees from the need to
remain at their desk when doing productive work. These trends make Mobile
IP an important element in the network infrastructure.
This White Paper contains an introduction to the concept of Mobile IP.
Birdstep has worked for many years in the development of a Mobile IP client
that follows the existing standards defined by the Internet Engineering Task
Force (IETF). To understand how our client works we have written this
White Paper, which describes the elements, included in Mobile IP and the
mechanisms used to make Mobile IP possible. Detailed information on the
Birdstep Intelligent Mobile IP Client can be found in our web
(www.birdstep.com)
Mobile IP Overview
Page 2 of 13
Table of Contents
Introduction........................................................................................... 4
Mobile IP ............................................................................................... 6
Usage scenarios ................................................................................... 10
IP zones/ hotspots ............................................................................ 10
Push services.................................................................................... 11
Conferencing .................................................................................... 12
VPN security ..................................................................................... 13
Mobile IP Overview
Page 3 of 13
Introduction
In order to communicate, all IP devices and IP-based end-systems must be
configured with an IP address in accordance with the IP protocol and its
addressing scheme. Otherwise, these end-systems cannot locate or access
other end-systems inside or outside the local subnet. Unfortunately, for endusers to use IP addresses such as 193.71.196.92 to address services on
other end-systems is non-intuitive and awkward. As a result, IETF has
standardized a hierarchical domain name service (denoted DNS) that
provides a mapping mechanism from canonical names such as
www.birdstep.com to the corresponding IP address that incidentally is
193.71.196.92. The canonical name is more intuitive and identifies the endsystem as the web server of the commercial company Birdstep.
IP-based networks rely on IP addresses and routing protocols to route IP
packets from the source to the destination end-system. The user services
built on top of IP rely on either the TCP (Transmission Control Protocol) or
UDP (User Datagram Protocol) transport layer protocol. UDP is an unreliable
transport layer protocol that is mainly used for management traffic, audio
and video transfer. TCP is the reliable transport layer protocol that is used
for mail transfer, web traffic and other reliable data transfers. Since an endsystem can handle several TCP or UDP connections simultaneously, a
TCP/UDP specific port number is used to identify each connection. These
port numbers are not necessarily unique within an end-system, but the
following invariant (shown in Figure 1) will always hold.
Mobile IP Overview
Page 4 of 13
The tuple
< sou rce IP address, so urce po rt n um ber,
destinatio n IP address, destin atio n port num ber>
is unique for each connection during its lifetim e.
Figure 1: Communication invariant
This is useful for heavily loaded web server. All incoming connections can be
addressed to the same port number (i.e. 80 is the default web server port
number) of the web server and be handled simultaneously. Still, the
different combinations of <source IP address, source port number> will
identify each HTTP request uniquely. Without this capability, the web would
not work at all.
The invariant makes it also clear that if end-systems change their point-ofaccess and are reconfigured with a new IP address, all on-going connections
must be terminated. The only solution that makes it possible for on-going
connections to continue working is using Mobile IP.
Although DNS makes it possible to alter the mapping of a canonical name to
a new IP address to schemes such as Dynamic DNS, this will invalidate the
invariant. Another problem is the extensive use of DNS caching on the
Internet. DNS lookups are usually cached in clients and non-authorative DNS
servers to prevent unnecessary DNS traffic. Usually, a DNS entry will have a
24-hour time-to-live period. Thus, Dynamic DNS is not meant for highly
mobile users. Another drawback is that some end-systems will not even
have DNS entries due to administrative or security restrictions.
The only viable solution for an application is to terminate the ongoing
connection and to reconnect to the remote end-system(s) automatically.
This may not always be possible without the implementation of a highavailability, configuration and management server for that particular
application. Otherwise, these systems will not be able to reach the mobile
node. Although mobile nodes can access Internet services through gateways
on the visited network (i.e. foreign sub-network), some of the services such
as VPN services and mail transmission can be limited due to security issues
on the Internet.
Today’s myriad of networks and access methods combined with the ever
increasing need to be always on requires the possibility to be able to
seamlessly move from one connection to the other without application
interruption. This is possible with Mobile IP.
Mobile IP Overview
Page 5 of 13
Mobile IP
Connecting to the Internet from a laptop or PDA using PPP and GSM is
straightforward. The laptop will be assigned an IP address from the dial-up
server it uses, either via Dynamic Host Control Protocol (DHCP) or a similar
proprietary protocol. Using this address, the laptop can visit web pages and
download mail from centralized mail servers. However, no one will know the
current address of the laptop, unless the mobile user registers the
information in a centralized application-specific server, such as a video
conferencing server. Whenever the mobile user is connected to another IP
network, all the application-specific servers must be updated. This will make
it harder for mobile users roaming different IP networks or zones to run
applications with two-way information exchange such as Voice over IP
(VoIP) connections or video conferencing.
Mobile IP is one viable solution to this problem. Mobile IP is an open
standard, defined by the Internet Engineering Task Force (IETF) that allows
users to keep the same IP address, stay connected, and maintain ongoing
applications while roaming between IP networks. Basically, Mobile IP will
maintain the invariant discussed in the previous section by using a special
address (denoted Home address) that always will be operational. As long as
the mobile end-system has at least one operational network interface, it can
be reached by other end-systems on the Internet through that interface.
The Mobile IP standard is based on a few components described below:
The Mobile Node (MN) is a device such as a laptop or PDA that has
software that enables network-roaming capabilities.
Home network is the network where the Mobile Node belongs.
Home address is the IP address the Mobile Node is configured with
whenever it is connected to its home network.
Mobile IP Overview
Page 6 of 13
Corresponding Nodes (CN) are the end-systems the Mobile Nodes
communicate with. These nodes can of course communicate with other
end-systems to.
Care-of address is the IP address the Mobile Node is currently is using on
the sub-network it is currently connected to.
Home Agent (HA) is an entity on the home network that offers Home
Agent services (i.e. packet interception and tunneling of packets to the
Mobile Node) to one or more Mobile Nodes.
Foreign Network is the network the Mobile Node currently is connected
to.
Foreign Agent (FA) is an entity in the foreign network that offers Foreign
Agent services (i.e. packet decapsulation of packets from the Home
Agent) to the Mobile Nodes that are connected to the Foreign Network.
Mobile Nodes move between IP networks, changing their IP addresses
correspondingly. Every Mobile Node will have a specific home address, and
will request Home Agent services from one of the Home Agents on its own
sub-network. The Mobile Nodes will also request forwarding services from
Foreign Agents in the sub-networks they visit. These agents will advertise
their Foreign Agent services by sending out agent advertisements regularly.
In some situations, rather than waiting for agent advertisements, the Mobile
Node can send a solicitation to Foreign Agents. This solicitation forces any
agent on the link to immediately send an agent advertisement. These
processes are illustrated in Figure 2. If several Foreign Agents advertise their
services, the Mobile Node will choose one of them based on its own set of
preferences. The same process is true for advertisements of potential Home
Agents on the Home sub-network when the Mobile Node is connected to
that network. Both these messages, i.e. agent solicitation and
advertisement, are sent as part of an ICMP Router Advertisement message.
Agent solicitation
Home/Foreign
Agent
Agent advertisement
(ICMP Router Advert.)
Home/Foreign
Agent
Agent advertisement
(ICMP Router Advert.)
Figure 2: Agent advertisement and solicitation
Mobile IP Overview
Page 7 of 13
Corresponding Nodes are nodes that communicate with these Mobile Nodes
irrespective of their current location. The Mobile Node will be assigned a
care-of IP address by the foreign network it visits through DHCP or a
proprietary mechanism. Mobile Nodes will always inform their Home Agent
on the home sub-network about their current care-of address, enabling the
Home Agent to intercept all packets destined for the Mobile Nodes through
their home addresses, and to tunnel them to the Mobile Node via the
Foreign Agent.
Registration Request
Registration Request
Foreign
Home
Agent
Agent
Registration Reply
(UDP message)
Registration Reply
(UDP message)
Figure 3: Address registration via Foreign Agent
The Foreign Agent will receive packets destined for the Mobile Nodes, and
forward them via the Mobile Node’s current care-of address. The Foreign
Agent can also participate in the address registration of the current care-ofaddress from the Mobile Node to the Home Agent. This is illustrated in
Figure 3 where the Foreign Agent forwards the Registration Request and the
corresponding Registration Reply from the Home Agent. This mandatory
forwarding can be requested for authorization or accounting purposes.
Mobile IP allows roaming between networks in different administrative
domains that use separate solutions for Authentication, Authorization, and
Accounting (AAA). Foreign Agents can use a local authority (AAAL) that may
not have enough information stored locally to carry out the verification of
the client’s credentials itself. However, the AAAL will have enough
information to negotiate the verification of client credentials with external
authorities in the Mobile Node’s home sub-network. The local and the
external authorities should be configured with sufficient security
relationships and access controls so that they can negotiate the necessary
authorization. Different users may receive different access rights to different
services based for instance on their specific customer subscription. The
authorization will depend on secure authentication of each Mobile IP client.
Mobile IP uses a strong authentication scheme for security purposes. All
registration messages between a Mobile Node and Home Agent are required
to contain the Mobile-Home Authentication Extension (MHAE).
Mobile IP Overview
Page 8 of 13
A pre-shared 128-bit key provided to both the Mobile Node and the Home
Agent protects the integrity of the registration messages. The keyed
message digest algorithm 5 (MD5) is used to compute the authenticator
value in the appended MHAE, which is mandatory. Mobile IP also supports
the hash-based message authentication code (HMAC-MD5). Other
authentication codes can also be used, given that such support of other
authentication codes are supported by the Mobile Node and the Home
Agent. The receiver compares the authenticator value it computes over the
message with the value in the extension to verify the authenticity.
In certain situations, there will either be no Foreign Agents available or the
Mobile Nodes do not wish to use them. In these situations, the Mobile Node
can use co-located care-of addresses. With a co-located care-of address, the
Mobile Node will operate as its own Foreign Agent and decapsulate all
tunneled packets that are received from the Home Agent. The decapsulated
packets will be forwarded internally to the home address of the Mobile
Node. As illustrated in Figure 4 this will simplify the registration process at
the expense of decapsulation in the Mobile Node.
Registration Request
Home
Agent
Registration Reply
(UDP message)
Figure 4: Direct address registrations
Although Mobile IP uses tunneling from the Home Agent to the Mobile
Node's care-of address, there is no tunneling in the reverse direction.
Packets from the Mobile Node to peer nodes can go directly through the
Internet from the Mobile Node to the Corresponding Node. This is true as
long as the foreign sub-network allows packets from the Mobile Node with
the home address as the IP source address to be routed towards the
destination. This might be a security problem violating the strict ingress
filtering in the foreign network routers and firewalls. In situations where this
is the case, a topologically correct reverse tunnel should be established from
the care-of address to the Home Agent.
Compared to the cellular mobility of GSM and GPRS, Mobile IP can take
advantage of any IP network including both cellular technologies such as
GSM and GPRS and IP zones based on ISDN, ADSL, Ethernet, ATM, WLAN or
Bluetooth. Mobile IP will also make it possible for users to choose the best
access technology available at every moment.
Mobile IP Overview
Page 9 of 13
Usage scenarios
The following are some general scenario descriptions where Mobile IP
provides extra added value. Have a look at more specific user scenarios on
the White Paper on user scenarios available on our web (www.birdstep.com).
IP zones/ hotspots
Mobile users will move between different IP networks with different access
technologies and capabilities. An IP Zone is such an IP network that offers
connectivity to mobile users. The connectivity or the available services will
depend on the subscription the mobile user holds. Mobile users with several
network interfaces can connect to IP Zones or cellular technologies using the
optimal access technology from a cost-efficiency or performance viewpoint.
In addition, application can take advantage of the different capabilities
within different IP zones and the capabilities in the cellular coverage area.
Fixed
Network infrastructure
IP zone
1.
IP zone
WLAN
WLAN
GPRS
3.
2.
Figure 5: IP zone and Mobile IP
Mobile IP Overview
Page 10 of 13
When the Mobile Node is connected via GPRS, the application can adapt to
the current conditions in order to reduce the cost of using the network.
When the Mobile Node enter the IP zone, which offers high-bandwidth at a
fraction of the cost of the cellular GPRS technology, Mobile IP will register a
new Care-of-address at the home agent without disrupting the ongoing
communication. Without Mobile IP, the communication will be terminated.
Push services
Some of the new services that emerge are based on push technology. With
this technology, centralized servers could send different types of content
information to subscribers that are located anywhere. Without Mobile IP,
subscribers would not get the information unless the client distributes its
point-of-access to the centralized server whenever the point-of-access
changes. This behavior is clearly application dependent, and if several
different applications. With Mobile IP, this is application independent and
therefore not an issue for application developers.
Fixed
Network infrastructure
IP zone
1.
IP zone
WLAN
WLAN
GPRS
3.
2.
Figure 6: Push services utilizing Birdstep Mobile IP
Everything passes through the Home Agent. Although this represents some
overhead, it is the only way to reach a Mobile Node that moves between
different IP networks utilizing access technologies from WLAN to cellular
technologies.
Mobile IP Overview
Page 11 of 13
Conferencing
Multimedia conferencing requires normally full-duplex, audio and/or video
streaming between the two or more peers. If one or more of these peers are
changing their point-of-access during the conference, these participants will
lose their membership in the multimedia conference. If these participants
support Mobile IP and are reconnected to a new IP network, Mobile IP can
prevent their membership to be withdrawn. Figure 7 illustrates a multimedia
conference that uses reverse tunneling for enhanced security. In this case,
the traffic in both directions will pass through the high-performing Home
Agent. If the only available connection is a GPRS connection, only the low
bandwidth services will survive the change of access technology. Other
solutions might adapt to the changing access bit rate and reduce the audio
sampling rate and/or the video frame rate.
Netmeeting
Fixed
Network infrastructure
IP zone
1.
IP zone
WLAN
Netmeeting
WLAN
GPRS
3.
2.
Netmeeting
Netmeeting
Figure 7: Conferencing and Mobile IP
Mobile IP Overview
Page 12 of 13
VPN security
In the recent years, employees have to a greater extent set up home offices
with dial-up or fixed network connections to the Internet. Access to their
company Intranet has been established by setting up Virtual Private
Networks. VPNs are usually based on permanent tunnels and encryption
scheme such as IPSEC to the company firewall where strict security rules
will limit the access to company resources. These solutions have limitations
when the Mobile Node has moved outside the home office. By combining
VPN functionality with Mobile IP, the Mobile Node can maintain its VPN
network by using a fixed IP address as the Home Address. Some
applications such as SMTP mail have similar restrictions when it comes to
mail transfers. All these solutions can benefit from using Mobile IP and a
fixed Home address when communicating.
Mobile IP Overview
Page 13 of 13
Download