ABSTRACT
We present the design and implementation of an end-to-end architecture for Internet host mobility using dynamic updates to the Domain Name System (DNS) to track host location. Existing TCP connections are retained using secure and efficient connection migration, enabling established connections to seamlessly negotiate a change in endpoint IP addresses without the need for a third party. Our architecture is secure—name updates are effected via the secure DNS update protocol, while TCP connection migration uses a novel set of Migrate options—and provides a pure end-system alternative to routing-based approaches such as Mobile IP.
Mobile IP was designed under the principle that fixed Internet hosts and applications were to remain unmodified and only the underlying IP substrate should change. Our architecture requires no changes to the unicast IP substrate, instead modifying transport protocols and applications at the end hosts. We argue that this is not a hindrance to deployment; rather, in a significant number of cases, it allows for an easier deployment path than Mobile IP, while simultaneously giving better performance. We compare and contrast the strengths of end-to-end and network-layer mobility schemes, and argue that end-to-end schemes are better suited to many common mobile applications. Our performance experiments show that hand-off times are governed by TCP migrate latencies, and are on the order of a round-trip time of the communicating peers.
- 1.ADJIE-WINOTO, W., SCHWARTZ, E., BALAKRISHNAN, H., AND LILLEY, J. The design and implementation of an intentional naming system. In Pros. ACM SOSP '99 (Dec. 1999), pp. 186--201.]] Google ScholarDigital Library
- 2.AKAMAI TECHNOLOGIES, INC. http : //www. akamai. com.]]Google Scholar
- 3.AMERICAN NATIONAL STANDARDS INSTITUTE. Public key cryptography for the financial service industry: The elliptic curve digital signature algorithm. ANSI X9.62 - 1998, Jan. 1999.]]Google Scholar
- 4.ATKINSON, R. Security architecture for the intemet protocol. RFC 1825, IETF, Aug. 1995.]]Google Scholar
- 5.BALAKRISHNAN, H., SESHAN, S., AND KATZ, R. H. Improving reliable transport and handoff performance in cellular wireless networks. ACM Wireless Networks 1, 4 (Dec. 1995), 469--481.]] Google ScholarDigital Library
- 6.CACERES, R., AND IFTODE, L. Improving the performance of reliable transport protocols in mobile computing environments. IEEE JSAC 13, 5 (June 1995).]]Google Scholar
- 7.DROMS, R. Dynamic Host Configuration Protocol. RFC 2131, IETF, Mar. 1997.]]Google Scholar
- 8.EASTLAKE, 3RD, D. E. Secure domain name system dynamic update. RFC 2137, IETF, Apr. 1997.]] Google ScholarDigital Library
- 9.FERGUSON, P., AND GENIE, D. Network ingress filtering: Defeating denial of service attacks which employ IP source address spoofing. RFC 2267, IETF, Jan. 1998.]] Google ScholarDigital Library
- 10.GUPTA, S., AND REDDY, A. L. N. A client oriented, IP level redirection mechanism. In Proc. IEEE Infocom '99 (Mar. 1999).]]Google ScholarCross Ref
- 11.HUITEMA, C. Multi-homed TCP. Intemet Draft, IETF, May 1995. (expired).]]Google Scholar
- 12.IEEE. Wireless medium access control (MAC) and physical layer (PHY) specifications. Standard 802.11, 1999.]]Google Scholar
- 13.JACOBSON, V. Congestion avoidance and control. In Proc. ACM SIGCOMM '88 (Aug. 1988), pp. 314-329.]] Google ScholarDigital Library
- 14.JACOBSON, V., BRADEN, R., AND BORMAN, D. TCP extensions for high performance. RFC 1323, IETF, May 1992.]] Google ScholarDigital Library
- 15.JOSEPH, A. D., TAUBER, J. A., AND KAASHOEK, M. F. Mobile computing with the rover toolkit. IEEE Trans. on Computers 46, 3 (Mar. 1997), 337-352.]] Google ScholarDigital Library
- 16.KARN, P. Qualcomm white paper on mobility and IP addressing, http : //people. qualcomm, com/karn/ papers/mobi i ity. html, Feb. 1997.]]Google Scholar
- 17.LENSTRA, A. K., AND VERHEUL, E. R. Selecting cryptographic key sizes, h t t p : //www. c r y p t o s a v v y , corn, Nov. 1999.]]Google Scholar
- 18.MALTZ, D., AND BHAGWAT, P. MSOCKS: An architecture for transport layer mobility. In Proc. IEEE lnfocom '98 (Mar. 1998).]]Google Scholar
- 19.MATHIS, M., MAHDAVl, J., FLOYD, S., AND ROMANOW, A. TCP selective acknowledgment options. RFC 2018, IETF, Oct. 1996.]] Google ScholarDigital Library
- 20.MOCKAPETRIS, P. V., AND DUNLAP, K. Development of the domain name system. In Proc. ACM SIGCOMM '88 (Aug. 1988), pp. 123-133.]] Google ScholarDigital Library
- 21.MORRIS, R. T. A weakness in the 4.2BSD UNIX TCP/IP software. Computing science technical report 117, AT&T Bell Laboratories, Murray Hill, New Jersey, Feb. 1985.]]Google Scholar
- 22.MUMMERT, L. B., EBLING, M. R., AND SATYA- NARAYANAN, M. Exploiting weak connectivity for mobile file access. In Proc. ACM SOSP '95 (Dec. 1995), pp. 143- 155.]] Google ScholarDigital Library
- 23.MYSORE, J., AND BHARGHAVAN, V. A new multicastingbased architecture for internet host mobility. In Proc. ACM/IEEE Mobicom '97 (Sept. 1997), pp. 161-172.]] Google ScholarDigital Library
- 24.NATIONAL INSTITUTE OF STANDARDS AND TECHNOL- OGY. The Secure Hash Algorithm (SHA- 1). NIST FIPS PUB 180-1, U.S. Department of Commerce, Apr. 1995.]]Google Scholar
- 25.NOBLE, B. D., SATYANARAYANAN, M., NARAYANAN, D., TILTON, J. E., FL1NN, J., AND WALKER, K. R. Agile application-aware adaptation for mobility. In Proc. ACM SOSP '97 (Oct. 1997), pp. 276--287.]] Google ScholarDigital Library
- 26.PERKINS, C. E., AND CALHOUN, P. R. Mobile IP challenge/response extensions. Internet Draft, IETF, Feb. 2000. draft-ietf-mobileip-challenge-09, txt (work in progress).]] Google ScholarDigital Library
- 27.PERKINS, C. E., AND JOHNSON, D. B. Mobility support in IPv6. In Proc. ACM/IEEE Mobicom '96 (Nov. 1996), pp. 27- 37.]] Google ScholarDigital Library
- 28.PERKINS, C. E., AND JOHNSON, D. B. Route optimization in mobile IP. Internet Draft, IETF, Feb. 2000. d r a f t - iet f-mobi leip- opt im- 09. txt (work in progress).]]Google Scholar
- 29.PERKINS, ED., C. E. IP mobility support. RFC 2002, IETF, Oct. 1996.]]Google ScholarDigital Library
- 30.POLLARD, J. Monte carlo methods for index computation mod p. Mathematics of Computation 32 (1978), 918-924.]]Google Scholar
- 31.POSTEL, ED., J. Transmission Control Protocol. RFC 793, IETF, Sept. 1981.]]Google Scholar
- 32.SALTZER, J. H., REED, D. P., AND CLARK, n. n. Endto-end arguments in system design. ACM TOCS 2, 4 (Nov. 1984), 277-288.]] Google ScholarDigital Library
- 33.STEVENS, W. R. TCP/IP Illustrated, Volume 1: The Protocols. Addison Wesley, Reading, Massachusetts, 1994.]] Google ScholarDigital Library
- 34.THOMSON, S., AND NARTEN, T. IPv6 stateless address autoconfiguration. RFC 2462, IETF, Dec. 1998.]] Google ScholarDigital Library
- 35.VIXIE, P., THOMSON, S., REKHTER, Y., AND BOUND, J. Dynamic updates in the domain name system (DINS UP- DATE). RFC 2136, IETF, Apr. 1997.]] Google ScholarDigital Library
- 36.ZUCCHERATO, R., AND ADAMS, C. Using elliptic curve Diffie-Hellman in the SPKM GSS-API. Internet Draft, IETF, Aug. 1999. draft-ietf-cat-ecdh-spkm-00, txt (work in progress).]]Google Scholar
Index Terms
- An end-to-end approach to host mobility
Recommendations
An end-to-end approach for transparent mobility across heterogeneous wireless networks
With the advent of a myriad of wireless networking technologies, a mobile host today can potentially be equipped with multiple wireless interfaces that have access to different wireless networks. It is widely perceived that future generation wireless ...
An end-middle-end approach to connection establishment
SIGCOMM '07: Proceedings of the 2007 conference on Applications, technologies, architectures, and protocols for computer communicationsThe current model for flow establishment in the Internet: DNS Names, IP addresses, and transport ports, is inadequate. Not all of the problem is due to the small IPv4 address space and resulting NAT boxes. Even where global addresses exist, firewalls ...
Comments