Contents xiii MOBIKE Protocol 150 MOBIKE Call Flows 151 Connectivity Discovery 152 Network Address Translation(NAT)Traversal 153 Authentication and Accounting 154 MOBIKE in Practice 155 Security Arcbitecture for Non-3GPP Access to Evolved Packet System (EPS)156 Summary 159 Endnotes 160 Chapter 6 Transport/Session Layer Mobility 161 Lower-Layer Mobility Implications to the Transport Layer 162 Solving Mobility Above the Network Layer 165 SCTP 166 SCTP Functional Overview 167 SCTP States 168 Initiation 168 Data Transfer 169 Sburdown 173 SCTP Messages 173 Message Format 173 Cbunk Types 174 SCTP Extensions 176 Multipath TCP 179 Resource Pooling Principle 180 MPTCP Functional Architecture 181 Path Management 184 MPTCP Application Impacts 185 MPTCP for Mobility 185 MSOCKS:An Architecture for Transport Layer Mobility 186 TLM Protocol 187 MSOCKS Summary 189 Other Transport Layer Mobility Approaches 189 Migrate Internet Project 190 Migratory TCP 190 From <www.wowebook.com>
ptg MOBIKE Protocol 150 MOBIKE Call Flows 151 Connectivity Discovery 152 Network Address Translation (NAT) Traversal 153 Authentication and Accounting 154 MOBIKE in Practice 155 Security Architecture for Non-3GPP Access to Evolved Packet System (EPS) 156 Summary 159 Endnotes 160 Chapter 6 Transport/Session Layer Mobility 161 Lower-Layer Mobility Implications to the Transport Layer 162 Solving Mobility Above the Network Layer 165 SCTP 166 SCTP Functional Overview 167 SCTP States 168 Initiation 168 Data Transfer 169 Shutdown 173 SCTP Messages 173 Message Format 173 Chunk Types 174 SCTP Extensions 176 Multipath TCP 179 Resource Pooling Principle 180 MPTCP Functional Architecture 181 Path Management 184 MPTCP Application Impacts 185 MPTCP for Mobility 185 MSOCKS: An Architecture for Transport Layer Mobility 186 TLM Protocol 187 MSOCKS Summary 189 Other Transport Layer Mobility Approaches 189 Migrate Internet Project 190 Migratory TCP 190 Contents xiii From <www.wowebook.com>
xiv Building the Mobile Internet Session Layer Mobility Approaches 191 Summary 193 Endnotes194 Chapter 7 Application Mobility 195 User-Centric Mobility 195 Application Mobility Using the Domain Name System 197 Applicability of DDNS to Interdevice and Intradevice Mobility 198 Application Mobility Using the Session Initiation Protocol 199 SIPand Capabilities 199 SIP Methods 200 SIP Message Format 201 SIP Request and Status Lines 201 SIP Header Fields 202 SIP Message Body 203 Basic SIP Mobility 204 SIP Registration 204 SIP Autbentication 205 SIP Rendezvous Service 207 SIP UA Mobility Example 208 SIP Session Mobility 210 SIP REFER-Based Session Mobility 210 3PCC-Based Basic Session Mobility 212 3PCC-Based Enbanced Session Mobility 213 Other Application Aspects for Supporting Mobility 214 Summary 215 Endnotes 216 Chapter 8 Locator-ldentifier Separation 219 Approaches to Locator-Identifier Separation 221 HP222 Benefits and Challenges 224 Locator-Identifier Separation Protocol-Mobile Node (LISP-MN)225 LISP 225 LISP-MN 227 Benefits and Challenges 228 From <www.wowebook.com>
ptg Session Layer Mobility Approaches 191 Summary 193 Endnotes 194 Chapter 7 Application Mobility 195 User-Centric Mobility 195 Application Mobility Using the Domain Name System 197 Applicability of DDNS to Interdevice and Intradevice Mobility 198 Application Mobility Using the Session Initiation Protocol 199 SIP and Capabilities 199 SIP Methods 200 SIP Message Format 201 SIP Request and Status Lines 201 SIP Header Fields 202 SIP Message Body 203 Basic SIP Mobility 204 SIP Registration 204 SIP Authentication 205 SIP Rendezvous Service 207 SIP UA Mobility Example 208 SIP Session Mobility 210 SIP REFER-Based Session Mobility 210 3PCC-Based Basic Session Mobility 212 3PCC-Based Enhanced Session Mobility 213 Other Application Aspects for Supporting Mobility 214 Summary 215 Endnotes 216 Chapter 8 Locator-Identifier Separation 219 Approaches to Locator-Identifier Separation 221 HIP 222 Benefits and Challenges 224 Locator-Identifier Separation Protocol – Mobile Node (LISP-MN) 225 LISP 225 LISP-MN 227 Benefits and Challenges 228 xiv Building the Mobile Internet From <www.wowebook.com>
Contents xv NAT66229 Benefits and Challenges 230 Identifier-Locator Network Protocol (ILNP)231 Benefits and Challenges 232 Summary 232 Parting Thoughts 232 Endnotes 233 Index 235 From <www.wowebook.com>
ptg NAT66 229 Benefits and Challenges 230 Identifier-Locator Network Protocol (ILNP) 231 Benefits and Challenges 232 Summary 232 Parting Thoughts 232 Endnotes 233 Index 235 Contents xv From <www.wowebook.com>
xvi Building the Mobile Internet Icons Used in This Book 000000 0o0000 DSLAM WiFi Access WI AN Point Controlle Transpor Gateway ASA Route Switch Switch ATM Switch Web Serve Laptop WiFi Enabled Table 00000000000 Cellular IP Phone Wireless Smartphone Connection From <www.wowebook.com>
ptg Icons Used in This Book xvi Building the Mobile Internet Wireless Residential Gateway WiFi Enabled Tablet DSLAM Cellular Smartphone WiFi Access Point Lightweight Single Radio Access Point Switch WLAN Controller Policy Server Web Server Route Switch ATM Switch Processor Wireless Transport Cisco ASA Bridge Router SIP Proxy Server Cell Phone IP Phone PC Laptop Wireless Connection LWAPP IP From <www.wowebook.com>
Introduction This book examines the different techniques for building mobility into the Internet.The breadth of approaches currently in operation should cause us all to pose the question as to whether,in the future,a single utopian mobility solution can be defined that accom- modates all scenarios,or whether solving"mobility"requires a decomposition of the "mobility problem space"into a number of distinct use cases. The tremendous success of mobile broadband-based services based on cellular architec- 之mdthe atn use cases involv Should such data link layer techniques be enhanced to address alternative use cases?This is an important question to answer,because we confidently predict that the mobility use cases will broaden from today's homogeneous,cellular-only view of the world: Devices will become more heterogeneous from an access perspective.Wi-Fi dual- mode capabilities will become widely integrated into the next generation of cellular devices. Users will increasingly have access to more than a single cellphone for accessing the mobile Internet. ◆ cific limitations of mobile access,including being able to accommodate switches in access technologies and rapid fluctuations in available bandwidth. This book takes a look at mobility from a broad perspective of use cases and examines how mobility solutions are in fact pervasive across all layers of the protocol stack.The book provides details of how mobility functionality has been added to these layers and describes use cases that demonstrate the different approaches to building the mobile Internet. Who Should Read This Book This book is intended to increase the reader's understanding of how mobility can be sup- ported in IP networking. The book assumes at least a basic understanding of standard networking technologies. including the Internet Protocol itself.Many concepts are introduced to give the reader exposure to the key mobility functionality that can coexist across different protocol lay ers.The book does not give mendhrionsonwhicdhofthcsetchnolog hould be From <www.wowebook.com>
ptg Introduction This book examines the different techniques for building mobility into the Internet. The breadth of approaches currently in operation should cause us all to pose the question as to whether, in the future, a single utopian mobility solution can be defined that accommodates all scenarios, or whether solving “mobility” requires a decomposition of the “mobility problem space” into a number of distinct use cases. The tremendous success of mobile broadband–based services based on cellular architectures where mobility has been effectively performed at the data link layer has shown how that approach is perfectly acceptable for providing wide-area mobility to use cases involving a single device with a single interface. Should such data link layer techniques be enhanced to address alternative use cases? This is an important question to answer, because we confidently predict that the mobility use cases will broaden from today’s homogeneous, cellular-only view of the world: ■ Devices will become more heterogeneous from an access perspective. Wi-Fi dualmode capabilities will become widely integrated into the next generation of cellular devices. ■ Users will increasingly have access to more than a single cellphone for accessing the mobile Internet. ■ As the majority of users who access the Internet become mobile, applications will increasingly look to become “mobile-aware,” tailoring their operation to address specific limitations of mobile access, including being able to accommodate switches in access technologies and rapid fluctuations in available bandwidth. This book takes a look at mobility from a broad perspective of use cases and examines how mobility solutions are in fact pervasive across all layers of the protocol stack. The book provides details of how mobility functionality has been added to these layers and describes use cases that demonstrate the different approaches to building the mobile Internet. Who Should Read This Book This book is intended to increase the reader’s understanding of how mobility can be supported in IP networking. The book assumes at least a basic understanding of standard networking technologies, including the Internet Protocol itself. Many concepts are introduced to give the reader exposure to the key mobility functionality that can coexist across different protocol layers. The book does not give recommendations on which of these technologies should be deployed for supporting mobility use cases, nor does it provide a transition plan for existing network operators for adding mobile functionality. Each network operator is xvii From <www.wowebook.com>