skip to main content
10.1145/345910.345938acmconferencesArticle/Chapter ViewAbstractPublication PagesmobicomConference Proceedingsconference-collections
Article
Free Access

An end-to-end approach to host mobility

Published:01 August 2000Publication History

ABSTRACT

We present the design and implementation of an end-to-end architecture for Internet host mobility using dynamic updates to the Domain Name System (DNS) to track host location. Existing TCP connections are retained using secure and efficient connection migration, enabling established connections to seamlessly negotiate a change in endpoint IP addresses without the need for a third party. Our architecture is secure—name updates are effected via the secure DNS update protocol, while TCP connection migration uses a novel set of Migrate options—and provides a pure end-system alternative to routing-based approaches such as Mobile IP.

Mobile IP was designed under the principle that fixed Internet hosts and applications were to remain unmodified and only the underlying IP substrate should change. Our architecture requires no changes to the unicast IP substrate, instead modifying transport protocols and applications at the end hosts. We argue that this is not a hindrance to deployment; rather, in a significant number of cases, it allows for an easier deployment path than Mobile IP, while simultaneously giving better performance. We compare and contrast the strengths of end-to-end and network-layer mobility schemes, and argue that end-to-end schemes are better suited to many common mobile applications. Our performance experiments show that hand-off times are governed by TCP migrate latencies, and are on the order of a round-trip time of the communicating peers.

References

  1. 1.ADJIE-WINOTO, W., SCHWARTZ, E., BALAKRISHNAN, H., AND LILLEY, J. The design and implementation of an intentional naming system. In Pros. ACM SOSP '99 (Dec. 1999), pp. 186--201.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  2. 2.AKAMAI TECHNOLOGIES, INC. http : //www. akamai. com.]]Google ScholarGoogle Scholar
  3. 3.AMERICAN NATIONAL STANDARDS INSTITUTE. Public key cryptography for the financial service industry: The elliptic curve digital signature algorithm. ANSI X9.62 - 1998, Jan. 1999.]]Google ScholarGoogle Scholar
  4. 4.ATKINSON, R. Security architecture for the intemet protocol. RFC 1825, IETF, Aug. 1995.]]Google ScholarGoogle Scholar
  5. 5.BALAKRISHNAN, H., SESHAN, S., AND KATZ, R. H. Improving reliable transport and handoff performance in cellular wireless networks. ACM Wireless Networks 1, 4 (Dec. 1995), 469--481.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. 6.CACERES, R., AND IFTODE, L. Improving the performance of reliable transport protocols in mobile computing environments. IEEE JSAC 13, 5 (June 1995).]]Google ScholarGoogle Scholar
  7. 7.DROMS, R. Dynamic Host Configuration Protocol. RFC 2131, IETF, Mar. 1997.]]Google ScholarGoogle Scholar
  8. 8.EASTLAKE, 3RD, D. E. Secure domain name system dynamic update. RFC 2137, IETF, Apr. 1997.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  9. 9.FERGUSON, P., AND GENIE, D. Network ingress filtering: Defeating denial of service attacks which employ IP source address spoofing. RFC 2267, IETF, Jan. 1998.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  10. 10.GUPTA, S., AND REDDY, A. L. N. A client oriented, IP level redirection mechanism. In Proc. IEEE Infocom '99 (Mar. 1999).]]Google ScholarGoogle ScholarCross RefCross Ref
  11. 11.HUITEMA, C. Multi-homed TCP. Intemet Draft, IETF, May 1995. (expired).]]Google ScholarGoogle Scholar
  12. 12.IEEE. Wireless medium access control (MAC) and physical layer (PHY) specifications. Standard 802.11, 1999.]]Google ScholarGoogle Scholar
  13. 13.JACOBSON, V. Congestion avoidance and control. In Proc. ACM SIGCOMM '88 (Aug. 1988), pp. 314-329.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  14. 14.JACOBSON, V., BRADEN, R., AND BORMAN, D. TCP extensions for high performance. RFC 1323, IETF, May 1992.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  15. 15.JOSEPH, A. D., TAUBER, J. A., AND KAASHOEK, M. F. Mobile computing with the rover toolkit. IEEE Trans. on Computers 46, 3 (Mar. 1997), 337-352.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  16. 16.KARN, P. Qualcomm white paper on mobility and IP addressing, http : //people. qualcomm, com/karn/ papers/mobi i ity. html, Feb. 1997.]]Google ScholarGoogle Scholar
  17. 17.LENSTRA, A. K., AND VERHEUL, E. R. Selecting cryptographic key sizes, h t t p : //www. c r y p t o s a v v y , corn, Nov. 1999.]]Google ScholarGoogle Scholar
  18. 18.MALTZ, D., AND BHAGWAT, P. MSOCKS: An architecture for transport layer mobility. In Proc. IEEE lnfocom '98 (Mar. 1998).]]Google ScholarGoogle Scholar
  19. 19.MATHIS, M., MAHDAVl, J., FLOYD, S., AND ROMANOW, A. TCP selective acknowledgment options. RFC 2018, IETF, Oct. 1996.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  20. 20.MOCKAPETRIS, P. V., AND DUNLAP, K. Development of the domain name system. In Proc. ACM SIGCOMM '88 (Aug. 1988), pp. 123-133.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  21. 21.MORRIS, R. T. A weakness in the 4.2BSD UNIX TCP/IP software. Computing science technical report 117, AT&T Bell Laboratories, Murray Hill, New Jersey, Feb. 1985.]]Google ScholarGoogle Scholar
  22. 22.MUMMERT, L. B., EBLING, M. R., AND SATYA- NARAYANAN, M. Exploiting weak connectivity for mobile file access. In Proc. ACM SOSP '95 (Dec. 1995), pp. 143- 155.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  23. 23.MYSORE, J., AND BHARGHAVAN, V. A new multicastingbased architecture for internet host mobility. In Proc. ACM/IEEE Mobicom '97 (Sept. 1997), pp. 161-172.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  24. 24.NATIONAL INSTITUTE OF STANDARDS AND TECHNOL- OGY. The Secure Hash Algorithm (SHA- 1). NIST FIPS PUB 180-1, U.S. Department of Commerce, Apr. 1995.]]Google ScholarGoogle Scholar
  25. 25.NOBLE, B. D., SATYANARAYANAN, M., NARAYANAN, D., TILTON, J. E., FL1NN, J., AND WALKER, K. R. Agile application-aware adaptation for mobility. In Proc. ACM SOSP '97 (Oct. 1997), pp. 276--287.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  26. 26.PERKINS, C. E., AND CALHOUN, P. R. Mobile IP challenge/response extensions. Internet Draft, IETF, Feb. 2000. draft-ietf-mobileip-challenge-09, txt (work in progress).]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  27. 27.PERKINS, C. E., AND JOHNSON, D. B. Mobility support in IPv6. In Proc. ACM/IEEE Mobicom '96 (Nov. 1996), pp. 27- 37.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  28. 28.PERKINS, C. E., AND JOHNSON, D. B. Route optimization in mobile IP. Internet Draft, IETF, Feb. 2000. d r a f t - iet f-mobi leip- opt im- 09. txt (work in progress).]]Google ScholarGoogle Scholar
  29. 29.PERKINS, ED., C. E. IP mobility support. RFC 2002, IETF, Oct. 1996.]]Google ScholarGoogle ScholarDigital LibraryDigital Library
  30. 30.POLLARD, J. Monte carlo methods for index computation mod p. Mathematics of Computation 32 (1978), 918-924.]]Google ScholarGoogle Scholar
  31. 31.POSTEL, ED., J. Transmission Control Protocol. RFC 793, IETF, Sept. 1981.]]Google ScholarGoogle Scholar
  32. 32.SALTZER, J. H., REED, D. P., AND CLARK, n. n. Endto-end arguments in system design. ACM TOCS 2, 4 (Nov. 1984), 277-288.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  33. 33.STEVENS, W. R. TCP/IP Illustrated, Volume 1: The Protocols. Addison Wesley, Reading, Massachusetts, 1994.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  34. 34.THOMSON, S., AND NARTEN, T. IPv6 stateless address autoconfiguration. RFC 2462, IETF, Dec. 1998.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  35. 35.VIXIE, P., THOMSON, S., REKHTER, Y., AND BOUND, J. Dynamic updates in the domain name system (DINS UP- DATE). RFC 2136, IETF, Apr. 1997.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  36. 36.ZUCCHERATO, R., AND ADAMS, C. Using elliptic curve Diffie-Hellman in the SPKM GSS-API. Internet Draft, IETF, Aug. 1999. draft-ietf-cat-ecdh-spkm-00, txt (work in progress).]]Google ScholarGoogle Scholar

Index Terms

  1. An end-to-end approach to host mobility

              Recommendations

              Comments

              Login options

              Check if you have access through your login credentials or your institution to get full access on this article.

              Sign in
              • Published in

                cover image ACM Conferences
                MobiCom '00: Proceedings of the 6th annual international conference on Mobile computing and networking
                August 2000
                300 pages
                ISBN:1581131976
                DOI:10.1145/345910

                Copyright © 2000 ACM

                Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

                Publisher

                Association for Computing Machinery

                New York, NY, United States

                Publication History

                • Published: 1 August 2000

                Permissions

                Request permissions about this article.

                Request Permissions

                Check for updates

                Qualifiers

                • Article

                Acceptance Rates

                MobiCom '00 Paper Acceptance Rate28of226submissions,12%Overall Acceptance Rate440of2,972submissions,15%

              PDF Format

              View or Download as a PDF file.

              PDF

              eReader

              View online with eReader.

              eReader