Unit 2 Tunneling and Encapsulation
Unit 2 Tunneling and Encapsulation
HA
MN
router
end-system router
Data transfer to the mobile system
HA
2
MN
FA foreign
network
HA
1 MN
FA foreign
network
receiver
router
home router MN
FA
network HA
foreign
Internet network
CN router
3.
router
home router MN
2. FA
network HA
4.
foreign
Internet network
1.
CN router
original
original data
header
GRE original
outer header original data
header header
Change of FA
packets on-the-fly during the change can be lost
new FA informs old FA to avoid packet loss, old FA now
forwards remaining packets to new FA
this information also enables the old FA to release resources
for the MN
data data
MN changes
location
registration registration
update
ACK
data
data data
warning
update
ACK
data
data
t
HA
2
MN
FA foreign
network
1. MN sends to FA
3 2. FA tunnels packets to HA
CN by encapsulation
3. HA forwards the packet to the
receiver (standard case)
receiver
Security
authentication with FA problematic, for the FA typically
belongs to another organization
no protocol for key management and key distribution has been
standardized in the Internet
patent and export restrictions
Firewalls
typically mobile IP cannot be used together with firewalls,
special set-ups are needed (such as reverse tunneling)
QoS
many new reservations in case of RSVP
tunneling makes it hard to give a flow of packets a special
treatment needed for the QoS
Security, firewalls, QoS etc. are topics of current research
and discussions!
IP-Header
IP header Authentification-Header
authentication header UDP/TCP-Paket
UDP/TCP data
FA MH
response:
EHA-FA {session key}
HA EHA-MH {session key}
Application
simplification of installation and maintenance of networked
computers
supplies systems with all necessary information, such as IP
address, DNS server address, domain name, subnet mask,
default router etc.
enables automatic integration of systems into an Intranet or
the Internet, can be used to acquire a COA for Mobile IP
Client/Server-Model
the client sends via a MAC broadcast a request to the DHCP
server (might be via a DHCP relay) DHCPDISCOVER
DHCPDISCOVER
server client
client relay
selection of configuration
DHCPREQUEST DHCPREQUEST
(reject) (options) confirmation of
configuration
DHCPACK
initialization completed
release
DHCPRELEASE delete context
Server
several servers can be configured for DHCP, coordination not
yet standardized (i.e., manual configuration)
Renewal of configurations
IP addresses have to be requested periodically, simplified
protocol
Options
available for routers, subnet mask, NTP (network time
protocol) timeserver, SLP (service location protocol) directory,
A B C
N1 N1
N2 N3
N3 N2
N4 N4
N5 N5
Distance Vector
periodic exchange of messages with all physical neighbors
that contain information about who can be reached at what
distance
selection of the shortest path if several paths available
Link State
periodic notification of all routers about the current state of all
physical links
router get a complete picture of the network
Example
ARPA packet radio network (1973), DV-Routing
every 7.5s exchange of routing tables including link quality
updating of tables also by reception of packets
routing problems solved with limited flooding
Problem
protocols have been designed for fixed networks with
infrequent changes and typically assume symmetric links
Path discovery
broadcast a packet with destination address and unique ID
if a station receives a broadcast packet
if the station is the receiver (i.e., has the correct destination address)
then return the packet to the sender (path was collected in the packet)
if the packet has already been received earlier (identified via ID) then
discard the packet
otherwise, append own address and broadcast packet
sender receives packet with the current path (address list)
Optimizations
limit broadcasting if maximum diameter of the network is
known
caching of address lists (i.e. paths) with help of passing
packets
stations can use the cached information for path discovery (own paths
or paths for other hosts)
Maintaining paths
after sending a packet
wait for a layer 2 acknowledgement (if applicable)
listen into the medium to detect if other stations forward the packet (if
possible)
request an explicit acknowledgement
if a station encounters problems it can inform the sender of a
packet or look-up a new path locally
Internet
cluster
super cluster
N1
N2
R1
S1 N3
N4
N5 N6 R2
S2
N8 N9
N7
neighbors
(i.e. within radio range)