Dynamic Host Configuration for Managing Mobility Between Public and Private Networks

The usage and service options of a pubic network generally differ from a private (enterprise or home) network and consequently, the two networks are often configured differently. The existence of both types of networks motivates our need to improve support and management of nomadic users who frequently roam between them. We describe a solution that allows client devices to configure themselves dynamically to adapt to the local network configuration. In addition to supporting mobility, we describe how our solution also provides fail-over mechanisms for providing highly available service, load balancing, and location services. Furthermore, our solution can be used to scale networks that are deployed in a large setting. We discuss in detail the various issues that need to be dealt with for achieving true device-level mobility, pointing out several unsolved problems in this area. The algorithms and software proposed in this paper have been implemented, are deployed, and are currently being used in a real-world public network that is operational at the Crossroads Mall in Bellevue, Washington.

[1]  Ralph E. Droms,et al.  Dynamic Host Configuration Protocol , 1993, RFC.

[2]  Hari Balakrishnan,et al.  An end-to-end approach to host mobility , 2000, MobiCom '00.

[3]  M. Baker,et al.  Internet Mobility 4x4 , 1996, SIGCOMM.

[4]  Allan C. Rubens,et al.  Remote Authentication Dial In User Service (RADIUS) , 2000, RFC.

[5]  염흥렬,et al.  [서평]「Applied Cryptography」 , 1997 .

[6]  Robert H. Stine FYI on a Network Management Tool Catalog: Tools for Monitoring and Debugging TCP/IP Internets and Interconnected Devices , 1990, RFC.

[7]  Blake Ramsdell,et al.  S/MIME Version 3 Message Specification , 1999, RFC.

[8]  Guido Appenzeller,et al.  User-friendly access control for public network ports , 1999, IEEE INFOCOM '99. Conference on Computer Communications. Proceedings. Eighteenth Annual Joint Conference of the IEEE Computer and Communications Societies. The Future is Now (Cat. No.99CH36320).

[9]  Randall J. Atkinson,et al.  IP Encapsulating Security Payload (ESP) , 1995, RFC.

[10]  Yakov Rekhter,et al.  Address Allocation for Private Internets , 1994, RFC.

[11]  Paramvir Bahl,et al.  RADAR: an in-building RF-based user location and tracking system , 2000, Proceedings IEEE INFOCOM 2000. Conference on Computer Communications. Nineteenth Annual Joint Conference of the IEEE Computer and Communications Societies (Cat. No.00CH37064).

[12]  Mary Baker,et al.  Internet Mobility 4x4 , 1996, SIGCOMM.

[13]  Keith Morneau,et al.  Active Server Pages , 2000 .

[14]  V. Bahl,et al.  The CHOICE Network: Broadband Wireless Internet Access In Public Places , 2000 .

[15]  Hari Balakrishnan,et al.  The design and implementation of an intentional naming system , 1999, SOSP.

[16]  Peter Viscarola,et al.  Windows NT Device Driver Development , 1998 .

[17]  Randy H. Katz,et al.  Composable ad hoc location‐based services for heterogeneous mobile clients , 1999, Wirel. Networks.

[18]  Hari Balakrishnan,et al.  6th ACM/IEEE International Conference on on Mobile Computing and Networking (ACM MOBICOM ’00) The Cricket Location-Support System , 2022 .

[19]  Ben Y. Zhao,et al.  An architecture for a secure service discovery service , 1999, MobiCom.

[20]  Robert T. Braden,et al.  Requirements for Internet Hosts - Communication Layers , 1989, RFC.

[21]  Andy Hopper,et al.  The active badge location system , 1992, TOIS.

[22]  Allan C. Rubens,et al.  Remote Authentication Dial In User Service (RADIUS) , 1997, RFC.

[23]  Dan Harkins,et al.  The Internet Key Exchange (IKE) , 1998, RFC.

[24]  Hugo Krawczyk,et al.  A Security Architecture for the Internet Protocol , 1999, IBM Syst. J..

[25]  Perry Metzger,et al.  Encapsulating Security Payload (ESP) , 1995 .

[26]  Leon Gommans,et al.  Generic AAA Architecture , 2000, RFC.

[27]  Chris Mitchell,et al.  Security defects in CCITT recommendation X.509: the directory authentication framework , 1990, CCRV.