An End-to-End Approach to Host Mobility

From: <nadeem.abji_at_utoronto.ca>
Date: Wed, 18 Oct 2006 02:52:09 -0400

Paper Review: An End-to-End Approach to Host Mobility

The paper presents a novel approach to enable host mobility on the
Internet, specifically the migration of existing TCP connections
without a need for a third party. An end-to-end approach was taken
rather than a network-layer scheme as is the case with mobile IP. The
paper argues that this method provides ease of deployment and better
performance. To locate hosts which have moved, the system uses the
Domain Name System (DNS) to update the name-to-address mapping in the
host?s home domain.

In their system, a host obtains an IP address valid in the foreign
domain it is migrating to. This has several benefits in that it
doesn?t violate any trust issues, maintains the scalability of
Internet routing due to the IP addressing scheme and does not require
any triangle-routing or reverse tunnelling. Unless a new system is
truly groundbreaking, the fewer the modifications it makes to the
TCP/IP model, the greater the likelihood it has to being implemented.
Their scheme exploits the abstraction provided by DNS. A host name is
not required to have any geographical connotation and thus can be used
as an identifier even when the host is mobile.

The paper brings up a possible race-condition for the case where a
mobile host migrates after a host trying to contact it has retrieved a
now invalid address from DNS. The solution stated is to have
application-level support. The authors seem to skirt around this
issue as this goes against the goal of making the mobility
transparent. They are lucky in the sense that these race conditions
are a rare occurrence and the infrequent errors they cause have
acceptable consequences.

To allow for migration of TCP connections a new Migrate TCP option is
included in SYN segments. This is necessary since each TCP connection
is associated with a source and destination address port 4-tuple which
naturally does not allow migration. Hijacked connections are guarded
against by utilizing a secure token. Even though IPv6?s IPSec
provides the means for securing a token, the author?s present their
own scheme since it is unclear when and if IPv6 will become the
standard. A MIGRATE_WAIT state is introduced to handle the situation
where mobile hosts are in the process of migrating and have not yet
reconnected from a new location. The paper suggests a passive
approach to migration, which is a good idea, since mobile hosts may be
on the go before they have a chance to notify the receiver. This
methodology is clearly more generic and will be able to support more
applications varying in nature. Mobile hosts are able to signal an
impending migration, but are not required to.

One noted advantage of handling mobility end-to-end is that it allows
the higher layers to be aware of the fact that the host has relocated.
  This could, for example, allow TCP to begin in slow-start after a
location change to adapt to new network conditions. Their scheme also
does not require any changes to TCP headers, packet format or semantics.

The authors seem to go back and forth on certain issues such as
performance enhancements, security measures, deployment and address
caching leaving the impression that they are not fully clear
themselves on some design aspects. Also, for a paper suggesting a
modification to the TCP protocol, they could have conducted some
extensive experiments rather than their very basic one. This would
lend more credibility to statements like their scheme provides better
performance than mobile IP. Aside from these issues the paper has
some very useful ideas. First, an end-to-end approach to host
mobility is both feasible and perhaps even the more natural
methodology. Second, there are several issues which must be taken
into consideration especially involving security when designing such a
system. Third, it is important to leave the system as generic as
possible to support applications which vary in nature which is similar
to one of the goals of the Internet. Fourth, the DNS system can be
used to provide a simple form of identity in the Internet required for
mobility. Finally, the implications of IPv6 must be considered in the
design of new systems.

-- Nadeem Abji
Received on Wed Oct 18 2006 - 02:52:36 EDT

This archive was generated by hypermail 2.2.0 : Wed Oct 18 2006 - 14:38:18 EDT