The Internet Mobile Host Protocol (IMHP) Charles E. Perkins

The Internet Mobile Host Protocol (IMHP) Charles E. Perkins

Internet Mobile Host Protocol Proc. INET 94 / JENC5 Perkins, Myles, and Johnson The Internet Mobile Host Protocol (IMHP) Charles E. Perkins <[email protected]> Andrew Myles <[email protected]> David B. Johnson <[email protected]> Abstract work number assigned to the single network of inter- est, packets to and from the mobile computer could be This paper describes the Internet MobileHost Pro- delivered as long as the bridges know whether or not tocol (IMHP), which allows transparent routing of IP the mobile computer is within their individual range. packets to mobile hosts in the Internet, while using Similarly, in order to provide convenient mobility to only the mobile host’s home IP address. No changes the mobile user, we wish to avoid any need for reboot- are required in stationaryhosts thatcommunicate with ing the computer after each network reconnection (i.e., mobile hosts, and no changes are required in mobile after each move from one attachment point to another). hosts above the IP level. IMHP quickly converges to Our vision is that of a large population of mobile optimal routing following the movement of a mobile users, each expecting and obtaining the highest level host, while maintaining the weak security model of of service from their mobile computers and their ex- today’s Internet. Detailed examples of operation are isting (stationary) computer resources, unconstrained presented. by and unaware of the new problems caused by the incompatibility of their network requirements and the original design goals of their internetworking I. Introduction protocols. Within the last few years, there has been im- Our Internet Mobile Host Protocol (IMHP), al- pressive growth in the number of portable comput- lows mobile hosts to move transparently and rapidly ers in use. Moreover, the fact that a computer is around both the local and the wide area network in an portable no longer implies that it has limited process- IP environment. The protocol contains many features ing power. Today’s mobile computers have hundreds drawn from the proposals of Carnegie Mellon Univer- of megabytes of disk space, window-based user in- sity [5, 6] and of Macquarie University and IBM [7]. terfaces, color displays, and sophisticated devices for It uses the general architecture proposed by IBM [8], data communications. The combination of power and and includes aspects also drawn from the proposals of mobility promise to reshape the way we think of com- Sony [13, 12, 11] and of Columbia University [4, 3]. puting within the next few years. Existing computer resources are made available by a worldwide collection of computer networks and II. Requirements protocols. People using portable computers will nat- urally expect to have access to this global network Any host operating using these protocols must re- of computer resources, and at no loss of performance, main compatible with existing hosts. This means that without concern for the fact that their movement tends we cannot specify any changes to the base IP or TCP to violate the basic assumptions upon which the global protocols, and that we cannot require any changes to network was built in the first place. existing routers or hosts. A mobile host using IMHP will be able to communicate successfully with all ex- The first problem encountered is that internetwork- isting Internet hosts. ing protocols such as IP assume that the computer’s network address logically encodes the computer’s lo- Existing applications must continue to work with- cation. This is a side effect of the way that the “net- out interruption when a mobile host moves between work number” is encoded into the network-layer ad- adjacent cells, as long as the uninterrupted operation dress; in thepast, networks were thoughtof as physical is physically possible. This means that even though entities that were unlikely to move. Indeed, until re- the route to the mobile host might change, no dis- cently computers moved so rarely that the network connection/reconnection will be visible to transport impact of any movement could be handled by man- layer entities. Thus, application programs can expect ual reconfiguration of routers and other administrative to operate continuously over a single session even equipment. though the network attachment point of the mobile host changes. For maximal flexibility, we must consider move- ments across domains consisting of multiple indepen- We must avoid introducing any additional security dent networks. This is a more difficult case to solve holes into the mechanisms which operate the Internet. than merely allowingmovement alongthearea defined This means that our protocol need not protect against by a single network. In the latter case, it would be intrusions by other hosts which can promiscuously sufficient to provide bridges between the mobile com- “snoop” on physically passing packets, but that no puter and the single network. By giving the mobile other external agents can corrupt data or management computer a network address compatible with the net- packets communicated with the mobile host. 642-1 ,y, III. Definitions IMHP makes no assumptions about whether mobile hosts use wired or wireless interfaces for connection The followingspecific terms are used in thispaper: to the network. Node A device in the network that implements the The home network configuration may correspond Internet Protocol, IP [10]. to a physical subnet or a virtual subnet. For example, the home network may be a physical network con- Router A node that forwards IP datagrams, as spec- nected to the Internet through an IP router, which is ified in [1]. This does not include nodes that, responsible for advertising connectivity to the home though capable of IP forwarding, have that ca- network. The home agent may be a separate node pability turned off, nor does it include nodes attached to the physical home network, or may be that perform IP forwarding only in processing implemented by the same node as the IP router. Alter- IP Source Route options. natively, the home network may be a virtual network, Host Any node that is not a router. which means that mobile hosts never connect directly Mobile host A host that may connect to the Internet to their home network. These example configurations in networks other than its own home network, are illustrated in Figure 1. Other configurations are while still using its home address. also possible in which the home agent is replicated Stationary host A host that is not a mobile host. or distributed, or the home network is distributed, but Correspondent host A host communicating with an- such configurations are not discussed in this paper. other host. This term is used when it is not rele- When a mobile host connects to the network, it vant whether a host is a mobile host or a stationary must perform a registration process before packets host. will be delivered to it. The mechanisms used to iden- Home address An address used to identify a mobile tify that the mobile host has connected to the a new host, no matter where it may currently be located. network depend on the sub-network layer technology Home network The (logical) network on which a being used. Either the potential foreign agent or the mobile host’s home address resides. home agent may reject a registration attempt. Typi- Care-of address An address that defines the location cally the grounds for rejection will be security based, of a mobile host at some particular instant of time. althoughother factors such as load may also be consid- Packets addressed to the mobile host will arrive ered. During the registration process, the mobile host at this address. will specify whether or not its new location should be made available to other IMHP entitiesfor the purposes Foreign agent An agent that offers a care-of address of route optimization (Section IV.C). for visiting mobile hosts, and delivers arriving packets addressed to one of these mobile hosts locally to the mobile host. Home agent An agent that maintains information about the current care-of address of each of the Physical home network Internetwork mobile hosts it is configured to serve, and that for- Router wards packets (addressed to any of these mobile hosts) to the care-of address for that mobile host. Home agent Triangle routing A situation in which a correspon- dent host’s packets to a mobile host are forwarded through the mobile host’s home agent, rather than (a) Home agent as a separate system on the home network following the shortest path directly to the mobile host. Cache agent An agent that caches the location of one Physical or more mobile hosts and forwards packets to home network Internetwork Router and these mobile hosts. home agent IV. Basic Operation IV.A. Infrastructure (b) Home agent in the router to the home network A mobile host is the IMHP entity that may move through the IP internetwork. It is assigned a constant Virtual home network IP address on a home network, known as its home Internetwork Router and address. Correspondent hosts may always use the home agent home address to address packets to a mobile host. A mobile host has a home agent, which is attached to its home network. Each home agent maintains a list (c) A virtual home network known as a home list, which identifies those mobile hosts that it is configured to serve, along with the cur- rent location of each of these mobile hosts, if known. Figure 1 Example home network configurations 642-2 Internet Mobile Host Protocol Proc. INET 94 / JENC5 Perkins, Myles, and Johnson Each foreign agent maintains a list known as a warded to its new location. Any correspondent host visitor list, which identifies those mobile hosts that that implements IMHP (for example, another mobile are currently registered with it.

View Full Text

Details

  • File Type
    pdf
  • Upload Time
    -
  • Content Languages
    English
  • Upload User
    Anonymous/Not logged-in
  • File Pages
    9 Page
  • File Size
    -

Download

Channel Download Status
Express Download Enable

Copyright

We respect the copyrights and intellectual property rights of all users. All uploaded documents are either original works of the uploader or authorized works of the rightful owners.

  • Not to be reproduced or distributed without explicit permission.
  • Not used for commercial purposes outside of approved use cases.
  • Not used to infringe on the rights of the original creators.
  • If you believe any content infringes your copyright, please contact us immediately.

Support

For help with questions, suggestions, or problems, please contact us