1 / 44

Strategies For Detecting Network Attachment in Wireless IPv6 Networks

Strategies For Detecting Network Attachment in Wireless IPv6 Networks. Greg Daley - Research Fellow Monash University Centre for Telecommunications and Information Engineering. Overview:. Tomorrow’s Wireless Internet Strategies for Detecting Network Attachment in IPv6

titus
Download Presentation

Strategies For Detecting Network Attachment in Wireless IPv6 Networks

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Strategies For Detecting Network Attachment in Wireless IPv6 Networks Greg Daley - Research Fellow Monash University Centre for Telecommunications and Information Engineering

  2. Overview: • Tomorrow’s Wireless Internet • Strategies for Detecting Network Attachment in IPv6 • DNA Working Group Progress • Future Challenges

  3. Tomorrow’s Wireless Internet

  4. Wireless Data Communications • Used for wide purposes • Mobile Data • Wire replacement • Telco to SoHo • Management, Planning, Security • Same convergence as wired networks • Merging of Internet and Telephony • Data services providing voice, voice networks with data

  5. TELCO TELCO TELCO TELCO TELCO Wireless Data Communications

  6. Towards All IPv6 Wireless Internet • Similar applications in Wireless to fixed • New Applications • Peer-to-peer hampered by NAT • IPv6 well positioned for wireless • Basic IPv6 capabilities support dynamism

  7. Internet NAT NAT NAT and Applications

  8. Maintaining Internet Connectivity • Cell to cell transitions can cause address changes • Addresses are used for routing and Session Identification (TCP/UDP) • Hide/Prevent Address changes • Tunnel, Link-Layer switching, Mobility Agents • Manage Address changes • Addressing update, requires peer support

  9. Address Range: OLD CELL 2001:388:608c::/64 NEW CELL Address Range: 3ffe:12:388:fc:/64 Maintaining Internet Connectivity

  10. A M I A M I P I P P I P Internet P P V P P V S 6 6 S 6 6 Maintaining Internet Connectivity

  11. Strategies for Detecting Network Attachment in IPv6

  12. Change Management in Wireless IPv6 • Detect which change will occur (hard?) • Allows predictive repair • Detect when link-layer changes • Detect when change has occurred • React to change • Configuration of addresses, local routers • Signal to proxies and peers • Path restoration after change

  13. M D Peer BU I N Internet P A RS v v RA 6 6 BAck Change Management in Wireless IPv6

  14. Detecting Network Attachment • Avoid reconfiguration if possible • Addresses, Multicast Joins, Mobility Signalling • Detect if configuration change is required • Trade off test cost against config cost • Query the network to detect if change has occurred • Relies upon network information services • Single Message Pair exchange

  15. OLD LINK RA RA RS NEW LINK Detecting Network Attachment

  16. Key DNA Tasks • Address uncertainty management • Response without induced delays • Immediate Change Detection • Authoritative Responses

  17. Key Task: Address Management • Host unaware of address conflicts at attachment point • Link-Local address collision may have occurred, upon link change • Optimistic Duplicate Address Detection is used in sending DNA messages • New RS Tentative-Source Link-Layer Address Option: Optimistic DAD safe solicitations (GD,EN,NM)

  18. FE80::FEOF FE80::FEOF FE80::FEOF Key Task: Address Management

  19. Key Task: Fast Router Advertisement • Existing RFCs have random delay timing • FastRA Schemes reduce delay • Original FastRA – manual config (MK,JK,BP) • Deterministic – Automated config (GD,BP) • Probabilistic – Small random delays (SN,GD) • Hash – Speed of Det, less config (BP,EN)

  20. Router3 Host Router1 Router2 Solicitation T Advertisement Advertisement Advertisement T+.5 Time (s) RFC 2461 RS/RA Timing

  21. Router3 Host Router1 Router2 Solicitation T Advertisement Advertisement Advertisement T+.5 Time (s) Fast Router Advertisement (RA)

  22. Host Router3 Router1 Router2 Solicitation T Advertisement T+.05 Advertisement T+.1 Advertisement T+.5 Time (s) Deterministic FastRA

  23. Host Router3 Router1 Router2 Solicitation Advertisement T Advertisement T+.02 T+.04 Advertisement T+.06 T+.5 Time (s) Probabilistic Fast RA

  24. Host Router3 Router1 Router2 Solicitation T Advertisement T+.02 Advertisement T+.04 Advertisement T+.5 Time (s) Hash ordered Fast RA

  25. Key Task: Link Identification • Early work centred on numeric link-identifiers placed in each RA packet(BP,EN,GD,JHC). • Current schemes use queries: “Is prefix aaaa::/64 on link? (BP,EN,SN)” • Augment Prefix advertisements with learnt information (CompleteRA, Prefix LinkID ) • Message Order Independence analysis (GD,AS,BP)

  26. LINK-A LINK-B LINK-B Link Identification: Identifiers

  27. P1 P2 P3 P3 P2 Link Identification: CompleteRA

  28. P1 P1 here? NO P1: P2 Link Identification: Landmarks

  29. Key Task: Message Authorization • RA message authorization is built into SEND • Separate timers for RS/RA Certificate Chain Solicit/Advert • Last Hop certification • Certificate solicitation in RS • Place certificate in RA if it fits (Modified format – GD)

  30. CA CCS CERT CCA Key Task: Message Authorization

  31. DNA Working Group Progress

  32. Detecting Network Attachment Working Group Documents • DNA Goals • Link Information • DNA with unmodified routers • DNA For IPv6 Hosts • DNA For IPv6 Routers • DNA Solution protocol (under discussion)

  33. Interactions with Existing Protocols • Link Information • Hints to start DNA from L2 • Complete Prefix Lists • Inferring Link Change with unmodified routers • Host Operations • Initiation/After DNA • Router management • Address Prefix and Advertisement Config

  34. New DNA protocol modifications • Builds on IPv6 Router Discovery • New ND message formats, timers • Provide single message pair exchange • Fast Unicast RA delivery and configuration • RA augmented for Link Identification • Automatic Bootstrapping

  35. Future Challenges

  36. IPv4/IPv6 change detection • Dual Stack hosts accessing the Internet • Protocol Specific Mobility: MIPv4/MIPv6 • Protocol Agnostic Mobility: Mobike/HIP • Transition Gateway detection • Detecting IPv4 or IPv6 Network Services • Local Link/Subnet services • More remote services • Getting access to remote resources.

  37. Generic Link-Layer Interfaces • IEEE 802.21 Handoff • Direct input of indications to DNA • Other information • Will generally available Link-Layer information change: • L3 Change Detection? • Mobility/Movement Management

  38. Interface Policy interaction • DNA is run per interface • Limited direction for ‘Inactive’ interfaces • DNA is Mobility Protocol Independent • Is multiple interface management? • Reasoning about local information, like DNA

  39. DNA indications • Path Change Indications • End-to-End interactions • Multiple Interfaces/Multiple Paths.

  40. Change Detection without Neighbour Discovery • Ad-hoc network topologies • Many Wireless Edge Links • Fat Link-Layer Shims • Router Properties in ad-hoc hosts • DNA supports autoconf hosts only

More Related