WC-unit 4
WC-unit 4
1 MOBILEIP
In response to the increasing popularity of palm-top and other mobile computers
Mobile IF was developed to enable computers to maintain Internet connectivity
while moving from one Internet attachment point to another. Although Mobile IP
can work with wired connections, in which a computer is unplugged from one phys
ical attachment point and plugged into another, it is particularly suited to wireless
connections
The term mobile in this context implies that a user is connected to one or
more applications acrOss the Internet, that the user's point of attachment changes
dynamically, and that all connections are automatically maintained despite the
change. Ihis 1S in contrast to a user, such as a business traveler, with a portable com
puter of some sort who arrives at a destination and uses the computer's notebook
to dial into an ISP (Internet service provider). In this latter case, the user's Internet
connection is terminated cach time the user moves anda new connection is initiated
when the user dials back in. Each time an Internet connection is established,
software in the point of attachment (typically an ISP) is used to obtain a new,
temporarily assigned P address. This temporary 1IP address is used by the user's
correspondent for each application-level connection (eg. FTP, Web connection).
A
better termfor kind of use is
this nomadic.
We begin with a general overview of Mobile IP and then look at some of
the details
Operation of Mobile IP
As was described in Chapter 4, routers make use of the IP address in an IP datagram
to perform routing. In particular, the nefwork portion of an IP address (Figure 4.1l)
is used by routers to move a datagram from the source computer to the network to
which the target computer is attached. Then the final router on the path, which is
attached to the same network as the target computer, uses the host portion of the IP
address to deliver the IP datagram to the destination. Further, this IP address is
known to the next higher layer in the protocol architecture (Figure 4.1). In particu-
Jar, most applications over the
Internet are supported by TcP connections. When
a C connection is set up, the C P entity on cach side of the connection knows the
P address of the correspondent host. When a TCP segment is handed down to the
IP layer for delivery, TCP provides the IP address, and IP creates an IP datagram
with that P address in the IP header and sends the datagram out for routing and
deivery. Fiowever, with a mobile host, the lP address may change while one or more
TCP connections are
active.
Figure 12.1 shows in general terms how Mobile IP deals with the problem
ot dynamic IP addresses. A mobile node is assigned to a particular network,
known as its home network. Its IP address on that network, known as its home
address, is static. When the mobile node moves its attachment point to another
Mobile
- O
etie Detw
Foreig
nrret r other
opoo
ns
---*
e
Figure 12.1 Mobile IP Scenario
Discovery
to the router advertisement
The discovery process in Mobile IP is very similar
Accordingly, agent discovery makes
process defined in ICMP (see Appendix 12A).
one or more extensions specific
use of 1CMP router advertisement messages, with
to Mobile IP
Discover Tunneling
Registration
.
ntermet Control
ser Datagram
Protocol (UDP) Message Protocol
(ICMP)
Tnternet Protocol ( u
Mobile node A host or router that changes its point of attachment from one network or subnetwork to
another.A mobile node may change its location without changing 1sidarest tmay
continue to communicate withother Internet nodes at any location usung its (constant)
1Paddres, assuming link-ayer conpectivity to a pointot attachment s availabe
Home address An IP address that is assigned for an extended period of time to a mobile node. If remains
changca regardiess of where the node is attached to the Internet.
Home gent A router on a mobile node s home network which tunnels datagrams for delivery to the
mobile node when it is away from home, and maintains current location information for
the mobile Dode
Home network A network, possibly virtual, having a network prefix matching that of a mobile nodes
bome address Note that standard IP routing mechanisms will deliver datagrams destined
to a mobile nodes Home Address to the mobile nodes Home Network.
Foreign agent Arouter on a mobile node viIted Detwork which provides routing serices to the mobue
mobile node, the foreign agent may serve as a detault router for registered mobile nodes
Foreign Any network other than the mobile node's Home Network,
network
Care-of Ihe termination point of a tunnel toward a mobile node, for datagrams torwarded top
address the mobile node while it is away from home. The protocol can use two different types of
Code Checksum
ter a irss.
elereceee
Preference level n
B : Busy. The foreign agent will not accept registrations from additional mobile
nodes
Move Detection As was mentioned, a mobile node may move from one network
to another due to some handoff mechanism, without the IP level being aware of it.
The agent discovery process is intended to enable the agent to detect such a move.
The agent may use one of two algorithms for this
purpose
Use of lifetime field: When a mobile node receives an agent advertisement from
a foreign agent that it is currently using or that it is now going to register with, it
records the lifetime field as a timer. If the timer expires betore the mobile node
receives another agent advertisement from the agent, then the node assumes
that it has lost contact with that agent. II, in the meantime, the mobile node has
received an agent advertisement from another agent and that advertisement has
not yet expired, the mobile node can register with this new agent. Otherwise, the
mobile node should use agent solicitation to find an agent.
12.1MOBILE IP 365
Use of network prefix: The mobile node checks whether any newly received
agent advertisement is on the same network as the node's current care-of
address. Itit 1S not, the mobile node assumes that it has moved and may regs
ter with the agent whose advertisement the mobile node has just received.
Co-Located Addresses The discussion so far has involved the use of a care-of
address associated wIth a toreign agent; that is, the care-of address is an IP addres
for the toreign agent. This toreign agent will receive datagrams at this care-of
address, intended for the mobile node, and then forward them across the foreign
network to the mobile node. However, in some cases a mobile node may move to a
network that has no foreign agents or on which all foreign agents are busy. As
alternative, the mobile node may act as its own toreign agent Dy usina o
care-of address. A co-located care-of address is an IP address obtained by the mobile
node that B associated with the mobile node S Current intertace to a network.
n e means y wcn a mooue node acquires a co-1Ocated address i s oeyona
Registration
Once a mobile node has recognized that it is on a foreign network and has acquired a
care-of address, it needs to alert a home agent on its home network and request that
the home agent forward its IP traffic. The registration process involves four steps:
1. The mobile node requests the forwarding service by sending a registration
request to the foreign agent that the mobile node wants to use.
2. The foreign agent relays this request to the mobile node's home agent.
3. The home agent either accepts or denies the request and sends a registration
reply to the foreign agent.
1ype
s BDMc|7|| Lifetlme
Home address
Home agent
Care-of address
ldentifcation
Extensions
pe Code
Lifetime
ddress
Home ngent
Identißcation
Extensions
(b) Registration reply message
Figure 124 Mobile IP Registration Messages
12.1/ MOBILE IP 367
Care-Of Address: The IP address at this end of the tunnel. The home
agent
should forward IP datagrams that it receives with mobile node's home address
to this destination address.
Identification: A 64-bit number generated by the mobile node, used for match-
ing registration requests to registration replies and for security purposes, as
explained subsequentiy.
Extensions: The only extension so far defined is the authentication extension,
Cxplained subsequently.
The regístration reply message consists of the following fields:
Type: 3, indicates that this is a registration reply.
Code: Indicates result of
the registration request (Table 12.2).
Lifetime: If the code field indicates that the registration was accepted, the
number of seconds before the registration is considered expired. A value of
Zeroindicates that the mobile node has been de-registered.
Home Address: The home 1P address of the mobile node.
Home Agent: The
IP address
of the mobile node's home agent.
LANX
RI
Internet
LAN Y
LAN Z
Architectural Overview
The WAP Programming Model is based on three clements: the client, the gateway,
and the original server (Figure 12.9). HTTP is used between the gateway and the
onginal server to transter content. The gateway acts as a proxy server for the
wireless domain. Its processor(s) provide services that offload the limited capabili
ties of the hand-held, mobile, wireless terminals For example, the gateway provides
DNS services, converts between WAP protocol stack and the WwW stack (HTTP
and TCP/P), encodes information from the Web into a more compact form that
minimizes wireless communication, and, in the other direction, decodes the com
pacted torm into standard web communication conventions. 1he gateway also
caches frequently requested information.
HTML er
Ordinary HTTPTCP
Web server
HTML
ilter
Intern
wML
over
WML-capable HTPTCPP
Web server
wML ovN
HTTP/TC
PAP
Binary wMIL
over WAP
Mobile
ermin
erininal WAP
Wireless proxy
Nétwork
Wireless
Binary
WAP
The WAP architecture is designed to cope with the two principal limitations of
Wireless web access: the limitations of the mobile node (mall screen size, limited
input capability) and the low data rates of wireless digital networks. Even with the
introduction of 3G wireless networks, which will provide broadband data rates, the
small hand-held mobile nodes will continue to have limited input and display capa
bilities. Thus WAP or a similar capability will be needed for the indefinite future
Caccess
Accessconuo cfieldsetb Data entry items grouping
mage men
imer SetALimer
Tasks
cTu a b i e data
URL
ctD Table row Go to a
Noaction
to ore
Go to previous card
Bold
crefresth> Screen redraw
arge Tont
e n t Binding
Linebreak
ADprevied anchor
mpaa
Italic Ancho Anchor
Cu Underline
Wireless Application Environment
The WAE specifies an application framework for wireless devices such as mobile
telephones, pagers, and PDAs. In essence, the WAE consists of tools and formats
that are intended to ease the task of developing applications and devices supported
by WAP The major elements of the WAE model are as follows (Figure 12.11):
Ser agents
WML user agent
Device OS/services
See Appendix 12C for a brief discussion of the concept of service primitives and parameters
380 CHAPTER 12/ MOBILE IP AND WIRELESS APPLICATION PROTOCOL
o
cenect.in ect.ind
(RC, RS, RA, EH, E
SA, CA. CH, MO)
S-Connectrs S-Diacon
onnect.c
SH, NC)
SMethodlavoke.req
nd.ind C, M, R, RIE, R)
SL,M, R , RI, RB)
pend.ind
(Reason) Methodlavuks.rs
S-Methodlavoke.cnf
MethodResult.req
S-Resume.req
A,CA) S-MethodNResult.ind
e
S.MethodResut.res
AR dNesult.cn
SI, A)
SFush.re4
SL PH, PB)
Push.ind S-CenfrmPush.ind
Asynchronous transactions.
no
WTPis transaction oriented rather than connection oriented. With W1P, there is
explicit connection setup teardown but rather reliable connectionless service.
or a
WTP Transaction Classes WTP provides three transaction classes that may be
invoked by WSP or another higher
layer protocol:
Class 0: Unreliable invoke message with no result message
Class 1: Reliable invoke message with no result message
Class 2: Unreliable invoke message with one reliable result message
Wireless Transport Layer Security
WTLS provides security services between the mobile device (client) and the WAP
gateway. wTLS is based on the industry-standard Transport Layer Security (TLS)
Protocol, which is a refinement of the secure sockets layer (SSL). TLS is the
standardsecurity protocol used between Web browsers and Web servers. wTLSis
more efficient that TLS, requiring fewer message exchanges. To provide end-to-end
security, WTLS is used between the client and the gateway, and TLS is used between
the gateway and the target server. WAP systems translate between WTLS and TLS
within the WAP gateway. Thus, the gateway is a point of vulnerability and must be
given a high level of security from external attacks
WTLS provides the following features:
Data integrity: Ensures that data sent between the client and the gateway are
not modified, using message authentication
Privacy: Ensures that the data cannot be read by a third party, using encryption
S-MethodInvoke.req
S-MethodResult.res
TR-Result.res ACK PDU
TR-Result.cnf
S-MethodResult.cnf
WDP or UDP/AP
User data
Compres
Add MAC
Encrypt
record dheader
WTLS
Figure 12.17 WTLS Record Protocol Operation
WTLS Record Protocol The WTLS Record Protocol takes user data from the
next higher layer (WTP, WTLS handshake protocol, WTLS alert protocol, WTLS
change cipher spec protocol) and encapsulates these data in a PDU. The following
steps occur (Figure 12.17):
The Record Protocol header consists of the following fields (Figure 12.18):
Content Type (8 bits): The higher-layer protocol above the WTLS Record
Protocol.
Cipher Spec Indicator (1 bit): If this bit is zero, it indicates that no compres-
Sion, MACprotection, or encryption is used.
WDP Service The WDP service is defined by two service primitives. The T-DUnit-
data primitive provides a nonconfirmed service with the following parameters:
Source address: Address of the device making a request to the WDP layer
Source port: Application address associated with the source address
Destination address: Destination address for the data submitted to WDP
Destination port: Application address associated with the destination address
User data: User data from the next higher layer, submitted to WDP for trans-
mission to the destination port
Destination Port
Source Port
If the underlying bearer does not provide segmentation and reassembly, the
feature is implemented in WDP in a bearer-independent way.
For example, GSM (Global System for Mobile Communications) dictates a
format for a user data header, in which the header consists of a sequence of infor-
mation elements, and each element is defined by an identifier, a length, and one or
more bytes of value. The WDH PDU for GSM has the following structure
Header length (1 byte): Length of header
Port numbers identifier (1 byte): The value 5 indicates that this information
element consists of two port numbers
Port numbers length (1 byte): The value 4 indicates that the value portion of
this information element is 4 bytes long.
Destination port (2 bytes)
Source port (2 bytes)
SAR identifier (1 byte): The value O indicates that this information element
consists of information for segmentation and reassembly
SAR length (1 byte): The value 3 indicates that the value portion of this
information element is 3 bytes long.
Datagram reference number (1 bytes): An identifier assigned to all of the
segments that make upa block of user data.
Number of segments (1 byte): The total number of segments that need to
be reassembled.
Segment count: A sequence number that identifies this segment within the
sequence of all segments that need to be reassembled to form the block of
user data.