SlideShare uma empresa Scribd logo
1 de 55
Mobile IP
Background
• With new applications developing at a rapid
  pace, and advancements in Mobile
  Computing technology, the number of users
  replacing their desktop PCs with super-
  portable laptops is on the up.
Topics covered
•   Simple overview : Mobile IP
•   Tunneling
•   TCP Comparison
•   Route Optimization
•   Mobile IP in IPv6
Design Goals : Mobile IP
• Make size and frequency of routing updates
  as small as possible.
• Software level : Simplicity in
  implementation
• Allow mobile nodes to operate with on one
  IP address, instead of a spool of addresses.
Terminology
• Mobile Node
• Home Address, Home Link, and Home
  Agent.
• Care-of Address, Foreign Link, and Foreign
  Agent.
Components : Mobile IP
• Agent Discovery : Provides information
  about home and foreign agents to the
  mobile node.
• Registration : Mobile node requests services
  from its foreign agent.
• Mobile IP defines the rules for routing any
  type of packet - unicast, multicast, and
  broadcast.
Overview of Operation

• When a mobile host moves out of its home
  site, it contacts the closest foreign agent.
• Registration takes place.
• Previous foreign(local) agent if any are
  notified regarding the change.
• Communication starts. (also known as
  triangle routing).
Overview of Operation
Figure 1 :CN sending data to MN at home

                                   Correspondent node




             bulk data

                acknowledgements

              Home agent                                Foreign agent




bulk
       adv
             acknowledgements
                                           Scenario A:
              Mobile node                  No tunnelling
                                           No fragmentation
                                           No dogleg route
Overview of Operation
   Figure 2:MN sending data to CN from home

                               Correspondent node




       acknowledgements

                   bulk data

           Home agent                               Foreign agent



acknowledgements
      adv
                                       Scenario B:
         bulk
                                       No tunnelling
           Mobile node                 No fragmentation
                                       No dogleg route
Overview of Operation
Figure 3:CN sending data to MN through Foreign Agent

                                   Correspondent node




            bulk data                acknowledgements

                     tunnelled bulk data

            Home agent                                   Foreign agent



                                            bulk data
      Scenario C:                                 adv
      MTU is 1500 bytes                                 acknowledgements
      Tunnelling of bulk data
      Fragmentation                                      Mobile node
      Dogleg route
Overview of Operation
Figure 4:MN sending data to CN via Foreign Agent

                               Correspondent node




      acknowledgements                bulk data

               tunnelled acknowledgements

                                                  Foreign agent
          Home agent




                                    acknowledgements
    Scenario D:                               adv
    No tunnelling of data                      bulk data
    Tunnelling of acks
    No fragmentation                                Mobile node
    Dogleg route
TCP Performance in Mobile-IP

• Factors affecting TCP performance
  –   Tunneling overhead
  –   Dogleg route overhead
  –   Fragmentation overhead
  –   Handover overhead
Scenario 1:
                                              Correspondent node




                        bulk data

                           acknowledgements

                         Home agent                                Foreign agent




           bulk
                  adv
                        acknowledgements
                                                      Scenario A:
                         Mobile node                  No tunnelling
                                                      No fragmentation
                                                      No dogleg route



Fig. 1 - Mobile node is receiving bulk data from the
correspondent node while the mobile node is at home. MTU
is 1500 bytes
Scenario 2:
                                      Correspondent node




              acknowledgements

                          bulk data

                  Home agent                               Foreign agent



       acknowledgements
             adv
                                              Scenario B:
                bulk
                                              No tunnelling
                  Mobile node                 No fragmentation
                                              No dogleg route




Fig. 2 - Mobile node is sending bulk data to the
correspondent node while the mobile node is at home. MTU
is 1500 bytes
Scenario 3:
                                         Correspondent node




                  bulk data                acknowledgements

                           tunnelled bulk data

                  Home agent                                   Foreign agent



                                                  bulk data
            Scenario C:                                 adv
            MTU is 1500 bytes                                 acknowledgements
            Tunnelling of bulk data
            Fragmentation                                      Mobile node
            Dogleg route




Fig. 3 - Mobile node is receiving bulk data from the
correspondent node while the mobile node is at a foreign
network. MTU is 1500 bytes
Scenario 4:
                                         Correspondent node




                acknowledgements                bulk data

                         tunnelled acknowledgements

                                                            Foreign agent
                    Home agent




                                              acknowledgements
              Scenario D:                               adv
              No tunnelling of data                      bulk data
              Tunnelling of acks
              No fragmentation                                Mobile node
              Dogleg route




Fig. 4 - Mobile node is sending bulk data to the
correspondent node while the mobile node is at a foreign
network. MTU is 1500 bytes
Scenario 5:
                                                  Correspondent node




                       bulk data                         acknowledgements

                                   tunnelled bulk data


                       Home agent                                             Foreign agent




                                                                 bulk data

                                                                       adv
                                                                             acknowledgements
              Scenario E:
              MTU is 1450 bytes                                               Mobile node
              Tunnelling of bulk data
              No fragmentation
              Dogleg route




Fig. 5 - Mobile node is receiving bulk data from the
correspondent node while the mobile node is at a foreign
network. MTU is 1450 bytes
Comparisons: Differences in Setup




 Scenario :    Sender of the Location of           MTU (in
               file             mobile node        bytes)
 A             CN               At home            1500
 B             MN               At home            1500
 C             CN               At foreign         1500
 D             MN               At foreign         1500
 E             CN               At foreign         1450
Table 1 - Differences in setup between the five different scenario
Comparisons: Presence of tunneling, fragmentation
                                     and dogleg route


Scenario :   Tunnelling   Fragmentation   Dogleg route
             overhead     overhead        overhead
             present?     present?        present?
A            No           No              No
B            No           No              No
C            Yes          Yes             Yes
D            Yes          No              No
E            Yes          No              Yes
Test Details

• MTU in scenario 5 was reduced solely to
  prevent fragmentation.
• Comparison using FTP file transfer, 30.2
  MB file ≈ 241.6 Mbits
• Repeated 20 times
• Throughput = file size / mean transfer time
• % throughput = throughput / maximum
  capacity of link
Comparisons: Mean transfer time and standard
                  deviation for FTP file transfer



Scenario : Mean transfer   Standard        Throughput
           time (s)        deviation (s)   (Mbit/s)
A          41.21           1.81            5.86
B          43.30           1.04            5.58
C          78.22           1.43            3.09
D          46.17           1.14            5.23
E          75.62           1.33            3.19
Evaluations
• File transfer takes 90% more time to complete, with all 3
  overheads.
• Encapsulation and Decapsulation of bulk data or
  acknowledgments takes the same time
• The longer route results in a higher delay before the
  packets reach the mobile node
• Link usage will increase if the IP packet and its
  encapsulated form both use the same link while being
  routed to the destination
• The tunneling overhead causes the file transfer to take
  about 7% more time to complete
Evaluations
• Fragmentation overhead causes the file transfer to take
  about 6% more time to complete
• The dogleg route overhead obtained using this method
  causes the file transfer to take about 80% more time to
  complete
• The handover overhead will depend on the TCP handover
  latency, the frequency of handoffs, the duration of the TCP
  connection and the agent advertisement interval
• The TCP handover latency is about 60% more than the
  MIP network handover latency
Evaluations

• The handover overhead is about 13%.
• Two ways of reducing the handover overhead:
   – reduce the retransmission timer value
   – reduce the agent advertisement interval.
     • Tradeoff: bandwidth consumption
Route Optimization and
                     Authentication

• The paper describes the Internet Mobile
  Host Protocol with the following features:
  – route optimization
  – authentication of management packets
  – performance and operational
    transparency to the user.
IMHP Architecture Entities

• Mobile host
  – unique home address
• Local Agent
  – helps mobile host register, provides care-
    off address
  – maintains a visitor list
    • lists all the mobile hosts
    • needs to be refreshed
IMHP Architecture Entities

• Cache Agent
  – Maintains the location cache
  – using cache entry the data packet is
    “tunneled” to the mobile host.
    • Done by including a small IMHP header
    • adds 8 or 12 bytes of overhead to each
      packet
IMHP Architecture Entities

• Home Agent
  – maintains a home list
  – special case: home agent maintains a
    visitor entry for mobile host
  – must also be a cache agent for its mobile
    hosts
Authentication
• Basically required to authenticate
  binding and management packets.
• MH to HA : by including an
  authenticator based on a shared secret
• General Authentication: node sends a
  request for binding with random
  number and gets reply with the same
  number.
Authentication
• Use of route flag in management packet to
  enforce normal IP routing of packet.
• Local agent authenticates visitor list entries
  from the home agent.
• All entries into lists are timer based.
Optimization
• special tunnel packet - destination of
  tunnel is same as destination of packet.
• Specified as a set of forwarding rules
  for the IMHP entities.
Rules for forwarding
• Node receives tunneled packet with its
  own destination address.
• Node receives a non-tunneled packet
  with its own destination address
Rules: Home Agent
• HA receives an IMHP management
  packet with route flag set.
• HA receives a special tunnel packet.
• HA receives packet for one of its
  mobile hosts
  – HA has a visitor entry for the host.
  – HA does not have a visitor entry.
Rules: Home Agent
• HA never tunnels a packet back to a
  node that has just tunneled the packet
  to it.
Rules: Other Agents
• Receives special tunnel packet with route
  flag set.
• LA receives a tunneled packet for host in
  visitor list.
• LA receives a regular packet for host in
  visitor list
• CA receives a packet and has an entry in its
  location cache.
Rules: Other Agents

• Receives packet that was tunneled directly
  to this node, and the agent is unable to
  forward it further.
   – Solution : special tunnel
Bindings

• Binding notifications:
  – MH notifies HA and previous LA about
    “change of address”.
  – Any node can notify any other node
    about wrong binding information stored
    by it.
  – Notification Back-off
IMHP : Other Issues

• restrictions on advertising bindings - use of
  private flag.
• MH in Popup Mode
   – requires facilities such as DHCP
   – acts as its own local agent.
   – Binding should be kept private
• Performance of MH at home should be like
  a stationary host.
Mobility Support in IPv6
• IPv6:
  – 128 bit address space
  – link local addresses
• Extension headers : Destination
  Options header, hop-by-hop header,
  routing header and an authentication
  header.
Overview of Mobile IPv6
• All packets carrying information must be
  authenticated.
• Avoid “remote redirection” attacks
• Allows MH to allow more than one care-of
  addresses at a time, but registers only one of
  its bindings.
• Allows CH to dynamically learn the MH’s
  binding. In this case it uses the Routing
  header but does not encapsulate.
Overview of Mobile IPv6

• Reasonable to expect all the IPv6 nodes to
  have caching capabilities.
• Implementation of the Binding Updates and
  Binding Acknowledgments - the key to
  reliability and optimization.
Binding Update Option

• Provides optimization and performance in
  IPv6
• Used by mobile host to:
  – notify home agent of its primary care-of
    address
  – notify correspondent nodes of its current
    binding
• Binding Updates should always be
  authenticated.
Binding Update Format
Binding Update Format

• Lifetime:time duration for which the
  binding remains valid.
• Identification: To ensure in order
  processing of updates.
• Care-of address: Holds the current care of
  address
Binding Update Format

• Flags:
  – H: Destination requested to serve as home
    agent.
  – A: Acknowledgment expected
  – L:Link Local address present
• Updates could be retransmitted if there is no
  acknowledgment.
Binding Acknowledgment Format
Binding Acknowledgment Format

• Code: indicates whether binding update
  was accepted or rejected.
  – < 128 update accepted
  – >= 128 update rejected
• Lifetime: during for which node will retain
  the binding.
• Refresh: time interval for sending updates
• Identification: Same number as the update.
Sending Updates

• First update sent to home agent to register
  the new care-of address.
  – From another foreign network
  – From the home network
• Can be included in a regular packet or sent
  alone.
• Only the mobile node can send its own
  binding updates.
Movement detection

• Neighbor Discovery protocol including
  Router Discovery and Neighbor
  Unreachability Detection to create list
• Selects the default router from the list
• configures its care-off address
Unreachability

• detecting unreachability
  –   using the Neighbor Unreachability detection
  –   using the higher layers
  –   using the lower layers.
  –   When not receiving packets
Smooth Handoffs

• Using overlapping cells - accept packets at
  multiple addresses for a short while.
• Router Assisted - Previous router can
  forward packets to new local router.

• Renumbering the home network
CH & HA Operations

• Sending packet to MH
• Handling ICMP error messages
• Home agent discovery
More information on Mobile IP

• National University of Singapore
• Carnegie Mellon University
• Columbia University
• Presentation based on the reading
  list sent out earlier.


All diagrams and tables have been included
  from the reading list research papers.
Mobile IP

        Prashant Bhargava
CS 599 : Wireless Communications
     and Mobile Computing
           602 08 8857

Mais conteúdo relacionado

Mais procurados (20)

ENCAPSULATION AND TUNNELING
ENCAPSULATION AND TUNNELINGENCAPSULATION AND TUNNELING
ENCAPSULATION AND TUNNELING
 
Key mechanism of mobile ip
Key mechanism of mobile ip Key mechanism of mobile ip
Key mechanism of mobile ip
 
Mobile IP
Mobile IPMobile IP
Mobile IP
 
Mobile network layer (mobile comm.)
Mobile network layer (mobile comm.)Mobile network layer (mobile comm.)
Mobile network layer (mobile comm.)
 
IT6601 Mobile Computing Unit II
IT6601 Mobile Computing Unit IIIT6601 Mobile Computing Unit II
IT6601 Mobile Computing Unit II
 
Mobileip 161105154557
Mobileip 161105154557Mobileip 161105154557
Mobileip 161105154557
 
Mobile IP 1
Mobile IP 1Mobile IP 1
Mobile IP 1
 
Mobile Network Layer
Mobile Network LayerMobile Network Layer
Mobile Network Layer
 
Mobile IP
Mobile IPMobile IP
Mobile IP
 
Mobile internet protocol
Mobile internet protocolMobile internet protocol
Mobile internet protocol
 
Mobile IP
Mobile IP Mobile IP
Mobile IP
 
Mobile network layer
Mobile network layerMobile network layer
Mobile network layer
 
77232345 cours-ip-mobile
77232345 cours-ip-mobile77232345 cours-ip-mobile
77232345 cours-ip-mobile
 
12. mobile ip
12. mobile ip12. mobile ip
12. mobile ip
 
Mobile computing
Mobile computingMobile computing
Mobile computing
 
Mobile Communication
Mobile CommunicationMobile Communication
Mobile Communication
 
Mobile ip
Mobile ipMobile ip
Mobile ip
 
Lecture 15
Lecture 15Lecture 15
Lecture 15
 
Ip packet delivery
Ip packet deliveryIp packet delivery
Ip packet delivery
 
Mobile computing Mobile Transport Layer
Mobile computing Mobile Transport LayerMobile computing Mobile Transport Layer
Mobile computing Mobile Transport Layer
 

Destaque

Mobile IP Presentation
Mobile IP Presentation Mobile IP Presentation
Mobile IP Presentation Er. Rahul Jain
 
mbpurple - the replacement twitter im
mbpurple - the replacement twitter immbpurple - the replacement twitter im
mbpurple - the replacement twitter imSugree Phatanapherom
 
Virtual Private Network main
Virtual Private Network mainVirtual Private Network main
Virtual Private Network mainKanika Gupta
 
OpenMP Tutorial for Beginners
OpenMP Tutorial for BeginnersOpenMP Tutorial for Beginners
OpenMP Tutorial for BeginnersDhanashree Prasad
 
What Makes Great Infographics
What Makes Great InfographicsWhat Makes Great Infographics
What Makes Great InfographicsSlideShare
 
Masters of SlideShare
Masters of SlideShareMasters of SlideShare
Masters of SlideShareKapost
 
STOP! VIEW THIS! 10-Step Checklist When Uploading to Slideshare
STOP! VIEW THIS! 10-Step Checklist When Uploading to SlideshareSTOP! VIEW THIS! 10-Step Checklist When Uploading to Slideshare
STOP! VIEW THIS! 10-Step Checklist When Uploading to SlideshareEmpowered Presentations
 
10 Ways to Win at SlideShare SEO & Presentation Optimization
10 Ways to Win at SlideShare SEO & Presentation Optimization10 Ways to Win at SlideShare SEO & Presentation Optimization
10 Ways to Win at SlideShare SEO & Presentation OptimizationOneupweb
 
How To Get More From SlideShare - Super-Simple Tips For Content Marketing
How To Get More From SlideShare - Super-Simple Tips For Content MarketingHow To Get More From SlideShare - Super-Simple Tips For Content Marketing
How To Get More From SlideShare - Super-Simple Tips For Content MarketingContent Marketing Institute
 
2015 Upload Campaigns Calendar - SlideShare
2015 Upload Campaigns Calendar - SlideShare2015 Upload Campaigns Calendar - SlideShare
2015 Upload Campaigns Calendar - SlideShareSlideShare
 
What to Upload to SlideShare
What to Upload to SlideShareWhat to Upload to SlideShare
What to Upload to SlideShareSlideShare
 
How to Make Awesome SlideShares: Tips & Tricks
How to Make Awesome SlideShares: Tips & TricksHow to Make Awesome SlideShares: Tips & Tricks
How to Make Awesome SlideShares: Tips & TricksSlideShare
 
Getting Started With SlideShare
Getting Started With SlideShareGetting Started With SlideShare
Getting Started With SlideShareSlideShare
 

Destaque (18)

Mobile IP Presentation
Mobile IP Presentation Mobile IP Presentation
Mobile IP Presentation
 
Mobile ip
Mobile ipMobile ip
Mobile ip
 
mbpurple - the replacement twitter im
mbpurple - the replacement twitter immbpurple - the replacement twitter im
mbpurple - the replacement twitter im
 
Virtual Private Network main
Virtual Private Network mainVirtual Private Network main
Virtual Private Network main
 
OpenMP Tutorial for Beginners
OpenMP Tutorial for BeginnersOpenMP Tutorial for Beginners
OpenMP Tutorial for Beginners
 
Mobile ip np
Mobile ip npMobile ip np
Mobile ip np
 
Gprs architecture ppt
Gprs architecture pptGprs architecture ppt
Gprs architecture ppt
 
Gprs ppt
Gprs pptGprs ppt
Gprs ppt
 
What Makes Great Infographics
What Makes Great InfographicsWhat Makes Great Infographics
What Makes Great Infographics
 
Masters of SlideShare
Masters of SlideShareMasters of SlideShare
Masters of SlideShare
 
STOP! VIEW THIS! 10-Step Checklist When Uploading to Slideshare
STOP! VIEW THIS! 10-Step Checklist When Uploading to SlideshareSTOP! VIEW THIS! 10-Step Checklist When Uploading to Slideshare
STOP! VIEW THIS! 10-Step Checklist When Uploading to Slideshare
 
You Suck At PowerPoint!
You Suck At PowerPoint!You Suck At PowerPoint!
You Suck At PowerPoint!
 
10 Ways to Win at SlideShare SEO & Presentation Optimization
10 Ways to Win at SlideShare SEO & Presentation Optimization10 Ways to Win at SlideShare SEO & Presentation Optimization
10 Ways to Win at SlideShare SEO & Presentation Optimization
 
How To Get More From SlideShare - Super-Simple Tips For Content Marketing
How To Get More From SlideShare - Super-Simple Tips For Content MarketingHow To Get More From SlideShare - Super-Simple Tips For Content Marketing
How To Get More From SlideShare - Super-Simple Tips For Content Marketing
 
2015 Upload Campaigns Calendar - SlideShare
2015 Upload Campaigns Calendar - SlideShare2015 Upload Campaigns Calendar - SlideShare
2015 Upload Campaigns Calendar - SlideShare
 
What to Upload to SlideShare
What to Upload to SlideShareWhat to Upload to SlideShare
What to Upload to SlideShare
 
How to Make Awesome SlideShares: Tips & Tricks
How to Make Awesome SlideShares: Tips & TricksHow to Make Awesome SlideShares: Tips & Tricks
How to Make Awesome SlideShares: Tips & Tricks
 
Getting Started With SlideShare
Getting Started With SlideShareGetting Started With SlideShare
Getting Started With SlideShare
 

Semelhante a Mobile IP 2

transport protocols
 transport protocols  transport protocols
transport protocols aibad ahmed
 
IT8602 - Mobile Communication Unit IV
IT8602 - Mobile Communication   Unit IV IT8602 - Mobile Communication   Unit IV
IT8602 - Mobile Communication Unit IV pkaviya
 
Design and implementation of TARF: A Trust Aware Routing Framework for Wirele...
Design and implementation of TARF: A Trust Aware Routing Framework for Wirele...Design and implementation of TARF: A Trust Aware Routing Framework for Wirele...
Design and implementation of TARF: A Trust Aware Routing Framework for Wirele...ketaki19deshmukh
 
MOBILE COMPUTING Unit 2.pptx
MOBILE COMPUTING Unit 2.pptxMOBILE COMPUTING Unit 2.pptx
MOBILE COMPUTING Unit 2.pptxkarthiksmart21
 
Peer-to-Peer Application Recognition Based on Signaling Activity
Peer-to-Peer Application Recognition Based on Signaling ActivityPeer-to-Peer Application Recognition Based on Signaling Activity
Peer-to-Peer Application Recognition Based on Signaling ActivityAcademia Sinica
 
Chapter 7 - Wireless and Mobile Networks
Chapter 7 - Wireless and Mobile NetworksChapter 7 - Wireless and Mobile Networks
Chapter 7 - Wireless and Mobile NetworksAndy Juan Sarango Veliz
 
LTE = Femtocells Biggest Opportunity
LTE = Femtocells Biggest OpportunityLTE = Femtocells Biggest Opportunity
LTE = Femtocells Biggest OpportunityContinuous Computing
 
Q4. We used remote port forwarding in this scenario. How does local .pdf
Q4. We used remote port forwarding in this scenario. How does local .pdfQ4. We used remote port forwarding in this scenario. How does local .pdf
Q4. We used remote port forwarding in this scenario. How does local .pdfizabellejaeden956
 
MIS Chapter 3
MIS Chapter 3MIS Chapter 3
MIS Chapter 3Lee Gomez
 
Roaming v2
Roaming v2Roaming v2
Roaming v2supott
 
Mobility And Mobile I Pv4
Mobility And Mobile I Pv4Mobility And Mobile I Pv4
Mobility And Mobile I Pv4Ram Dutt Shukla
 

Semelhante a Mobile IP 2 (20)

Network and DNS Vulnerabilities
Network and DNS VulnerabilitiesNetwork and DNS Vulnerabilities
Network and DNS Vulnerabilities
 
transport protocols
 transport protocols  transport protocols
transport protocols
 
IT8602 - Mobile Communication Unit IV
IT8602 - Mobile Communication   Unit IV IT8602 - Mobile Communication   Unit IV
IT8602 - Mobile Communication Unit IV
 
Unit 2
Unit 2Unit 2
Unit 2
 
Design and implementation of TARF: A Trust Aware Routing Framework for Wirele...
Design and implementation of TARF: A Trust Aware Routing Framework for Wirele...Design and implementation of TARF: A Trust Aware Routing Framework for Wirele...
Design and implementation of TARF: A Trust Aware Routing Framework for Wirele...
 
MOBILE COMPUTING Unit 2.pptx
MOBILE COMPUTING Unit 2.pptxMOBILE COMPUTING Unit 2.pptx
MOBILE COMPUTING Unit 2.pptx
 
Vpn networks kami
Vpn networks kamiVpn networks kami
Vpn networks kami
 
D0362035
D0362035D0362035
D0362035
 
Peer-to-Peer Application Recognition Based on Signaling Activity
Peer-to-Peer Application Recognition Based on Signaling ActivityPeer-to-Peer Application Recognition Based on Signaling Activity
Peer-to-Peer Application Recognition Based on Signaling Activity
 
It6601 mobile computing unit2
It6601 mobile computing unit2It6601 mobile computing unit2
It6601 mobile computing unit2
 
unit-2 mc.pdf
unit-2 mc.pdfunit-2 mc.pdf
unit-2 mc.pdf
 
ch1-Basics Of DCN.new.ppt
ch1-Basics Of DCN.new.pptch1-Basics Of DCN.new.ppt
ch1-Basics Of DCN.new.ppt
 
Chapter 7 - Wireless and Mobile Networks
Chapter 7 - Wireless and Mobile NetworksChapter 7 - Wireless and Mobile Networks
Chapter 7 - Wireless and Mobile Networks
 
LTE = Femtocells Biggest Opportunity
LTE = Femtocells Biggest OpportunityLTE = Femtocells Biggest Opportunity
LTE = Femtocells Biggest Opportunity
 
Q4. We used remote port forwarding in this scenario. How does local .pdf
Q4. We used remote port forwarding in this scenario. How does local .pdfQ4. We used remote port forwarding in this scenario. How does local .pdf
Q4. We used remote port forwarding in this scenario. How does local .pdf
 
Vp npresentation
Vp npresentationVp npresentation
Vp npresentation
 
MIS Chapter 3
MIS Chapter 3MIS Chapter 3
MIS Chapter 3
 
Roaming v2
Roaming v2Roaming v2
Roaming v2
 
Mobility And Mobile I Pv4
Mobility And Mobile I Pv4Mobility And Mobile I Pv4
Mobility And Mobile I Pv4
 
VPN
VPN VPN
VPN
 

Último

Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeThiyagu K
 
Separation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesSeparation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesFatimaKhan178732
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...EduSkills OECD
 
Measures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDMeasures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDThiyagu K
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Krashi Coaching
 
social pharmacy d-pharm 1st year by Pragati K. Mahajan
social pharmacy d-pharm 1st year by Pragati K. Mahajansocial pharmacy d-pharm 1st year by Pragati K. Mahajan
social pharmacy d-pharm 1st year by Pragati K. Mahajanpragatimahajan3
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13Steve Thomason
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Sapana Sha
 
Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..Disha Kariya
 
Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Celine George
 
JAPAN: ORGANISATION OF PMDA, PHARMACEUTICAL LAWS & REGULATIONS, TYPES OF REGI...
JAPAN: ORGANISATION OF PMDA, PHARMACEUTICAL LAWS & REGULATIONS, TYPES OF REGI...JAPAN: ORGANISATION OF PMDA, PHARMACEUTICAL LAWS & REGULATIONS, TYPES OF REGI...
JAPAN: ORGANISATION OF PMDA, PHARMACEUTICAL LAWS & REGULATIONS, TYPES OF REGI...anjaliyadav012327
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactdawncurless
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityGeoBlogs
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformChameera Dedduwage
 
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...Sapna Thakur
 
APM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAPM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAssociation for Project Management
 
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...fonyou31
 

Último (20)

Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and Mode
 
Separation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesSeparation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and Actinides
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
 
Measures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDMeasures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SD
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
 
social pharmacy d-pharm 1st year by Pragati K. Mahajan
social pharmacy d-pharm 1st year by Pragati K. Mahajansocial pharmacy d-pharm 1st year by Pragati K. Mahajan
social pharmacy d-pharm 1st year by Pragati K. Mahajan
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
 
Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..
 
Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17
 
JAPAN: ORGANISATION OF PMDA, PHARMACEUTICAL LAWS & REGULATIONS, TYPES OF REGI...
JAPAN: ORGANISATION OF PMDA, PHARMACEUTICAL LAWS & REGULATIONS, TYPES OF REGI...JAPAN: ORGANISATION OF PMDA, PHARMACEUTICAL LAWS & REGULATIONS, TYPES OF REGI...
JAPAN: ORGANISATION OF PMDA, PHARMACEUTICAL LAWS & REGULATIONS, TYPES OF REGI...
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impact
 
Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1
 
Advance Mobile Application Development class 07
Advance Mobile Application Development class 07Advance Mobile Application Development class 07
Advance Mobile Application Development class 07
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activity
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy Reform
 
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
 
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
 
APM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAPM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across Sectors
 
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
 

Mobile IP 2

  • 2. Background • With new applications developing at a rapid pace, and advancements in Mobile Computing technology, the number of users replacing their desktop PCs with super- portable laptops is on the up.
  • 3. Topics covered • Simple overview : Mobile IP • Tunneling • TCP Comparison • Route Optimization • Mobile IP in IPv6
  • 4. Design Goals : Mobile IP • Make size and frequency of routing updates as small as possible. • Software level : Simplicity in implementation • Allow mobile nodes to operate with on one IP address, instead of a spool of addresses.
  • 5. Terminology • Mobile Node • Home Address, Home Link, and Home Agent. • Care-of Address, Foreign Link, and Foreign Agent.
  • 6. Components : Mobile IP • Agent Discovery : Provides information about home and foreign agents to the mobile node. • Registration : Mobile node requests services from its foreign agent. • Mobile IP defines the rules for routing any type of packet - unicast, multicast, and broadcast.
  • 7. Overview of Operation • When a mobile host moves out of its home site, it contacts the closest foreign agent. • Registration takes place. • Previous foreign(local) agent if any are notified regarding the change. • Communication starts. (also known as triangle routing).
  • 8. Overview of Operation Figure 1 :CN sending data to MN at home Correspondent node bulk data acknowledgements Home agent Foreign agent bulk adv acknowledgements Scenario A: Mobile node No tunnelling No fragmentation No dogleg route
  • 9. Overview of Operation Figure 2:MN sending data to CN from home Correspondent node acknowledgements bulk data Home agent Foreign agent acknowledgements adv Scenario B: bulk No tunnelling Mobile node No fragmentation No dogleg route
  • 10. Overview of Operation Figure 3:CN sending data to MN through Foreign Agent Correspondent node bulk data acknowledgements tunnelled bulk data Home agent Foreign agent bulk data Scenario C: adv MTU is 1500 bytes acknowledgements Tunnelling of bulk data Fragmentation Mobile node Dogleg route
  • 11. Overview of Operation Figure 4:MN sending data to CN via Foreign Agent Correspondent node acknowledgements bulk data tunnelled acknowledgements Foreign agent Home agent acknowledgements Scenario D: adv No tunnelling of data bulk data Tunnelling of acks No fragmentation Mobile node Dogleg route
  • 12. TCP Performance in Mobile-IP • Factors affecting TCP performance – Tunneling overhead – Dogleg route overhead – Fragmentation overhead – Handover overhead
  • 13. Scenario 1: Correspondent node bulk data acknowledgements Home agent Foreign agent bulk adv acknowledgements Scenario A: Mobile node No tunnelling No fragmentation No dogleg route Fig. 1 - Mobile node is receiving bulk data from the correspondent node while the mobile node is at home. MTU is 1500 bytes
  • 14. Scenario 2: Correspondent node acknowledgements bulk data Home agent Foreign agent acknowledgements adv Scenario B: bulk No tunnelling Mobile node No fragmentation No dogleg route Fig. 2 - Mobile node is sending bulk data to the correspondent node while the mobile node is at home. MTU is 1500 bytes
  • 15. Scenario 3: Correspondent node bulk data acknowledgements tunnelled bulk data Home agent Foreign agent bulk data Scenario C: adv MTU is 1500 bytes acknowledgements Tunnelling of bulk data Fragmentation Mobile node Dogleg route Fig. 3 - Mobile node is receiving bulk data from the correspondent node while the mobile node is at a foreign network. MTU is 1500 bytes
  • 16. Scenario 4: Correspondent node acknowledgements bulk data tunnelled acknowledgements Foreign agent Home agent acknowledgements Scenario D: adv No tunnelling of data bulk data Tunnelling of acks No fragmentation Mobile node Dogleg route Fig. 4 - Mobile node is sending bulk data to the correspondent node while the mobile node is at a foreign network. MTU is 1500 bytes
  • 17. Scenario 5: Correspondent node bulk data acknowledgements tunnelled bulk data Home agent Foreign agent bulk data adv acknowledgements Scenario E: MTU is 1450 bytes Mobile node Tunnelling of bulk data No fragmentation Dogleg route Fig. 5 - Mobile node is receiving bulk data from the correspondent node while the mobile node is at a foreign network. MTU is 1450 bytes
  • 18. Comparisons: Differences in Setup Scenario : Sender of the Location of MTU (in file mobile node bytes) A CN At home 1500 B MN At home 1500 C CN At foreign 1500 D MN At foreign 1500 E CN At foreign 1450 Table 1 - Differences in setup between the five different scenario
  • 19. Comparisons: Presence of tunneling, fragmentation and dogleg route Scenario : Tunnelling Fragmentation Dogleg route overhead overhead overhead present? present? present? A No No No B No No No C Yes Yes Yes D Yes No No E Yes No Yes
  • 20. Test Details • MTU in scenario 5 was reduced solely to prevent fragmentation. • Comparison using FTP file transfer, 30.2 MB file ≈ 241.6 Mbits • Repeated 20 times • Throughput = file size / mean transfer time • % throughput = throughput / maximum capacity of link
  • 21. Comparisons: Mean transfer time and standard deviation for FTP file transfer Scenario : Mean transfer Standard Throughput time (s) deviation (s) (Mbit/s) A 41.21 1.81 5.86 B 43.30 1.04 5.58 C 78.22 1.43 3.09 D 46.17 1.14 5.23 E 75.62 1.33 3.19
  • 22. Evaluations • File transfer takes 90% more time to complete, with all 3 overheads. • Encapsulation and Decapsulation of bulk data or acknowledgments takes the same time • The longer route results in a higher delay before the packets reach the mobile node • Link usage will increase if the IP packet and its encapsulated form both use the same link while being routed to the destination • The tunneling overhead causes the file transfer to take about 7% more time to complete
  • 23. Evaluations • Fragmentation overhead causes the file transfer to take about 6% more time to complete • The dogleg route overhead obtained using this method causes the file transfer to take about 80% more time to complete • The handover overhead will depend on the TCP handover latency, the frequency of handoffs, the duration of the TCP connection and the agent advertisement interval • The TCP handover latency is about 60% more than the MIP network handover latency
  • 24. Evaluations • The handover overhead is about 13%. • Two ways of reducing the handover overhead: – reduce the retransmission timer value – reduce the agent advertisement interval. • Tradeoff: bandwidth consumption
  • 25. Route Optimization and Authentication • The paper describes the Internet Mobile Host Protocol with the following features: – route optimization – authentication of management packets – performance and operational transparency to the user.
  • 26. IMHP Architecture Entities • Mobile host – unique home address • Local Agent – helps mobile host register, provides care- off address – maintains a visitor list • lists all the mobile hosts • needs to be refreshed
  • 27. IMHP Architecture Entities • Cache Agent – Maintains the location cache – using cache entry the data packet is “tunneled” to the mobile host. • Done by including a small IMHP header • adds 8 or 12 bytes of overhead to each packet
  • 28. IMHP Architecture Entities • Home Agent – maintains a home list – special case: home agent maintains a visitor entry for mobile host – must also be a cache agent for its mobile hosts
  • 29. Authentication • Basically required to authenticate binding and management packets. • MH to HA : by including an authenticator based on a shared secret • General Authentication: node sends a request for binding with random number and gets reply with the same number.
  • 30. Authentication • Use of route flag in management packet to enforce normal IP routing of packet. • Local agent authenticates visitor list entries from the home agent. • All entries into lists are timer based.
  • 31. Optimization • special tunnel packet - destination of tunnel is same as destination of packet. • Specified as a set of forwarding rules for the IMHP entities.
  • 32. Rules for forwarding • Node receives tunneled packet with its own destination address. • Node receives a non-tunneled packet with its own destination address
  • 33. Rules: Home Agent • HA receives an IMHP management packet with route flag set. • HA receives a special tunnel packet. • HA receives packet for one of its mobile hosts – HA has a visitor entry for the host. – HA does not have a visitor entry.
  • 34. Rules: Home Agent • HA never tunnels a packet back to a node that has just tunneled the packet to it.
  • 35. Rules: Other Agents • Receives special tunnel packet with route flag set. • LA receives a tunneled packet for host in visitor list. • LA receives a regular packet for host in visitor list • CA receives a packet and has an entry in its location cache.
  • 36. Rules: Other Agents • Receives packet that was tunneled directly to this node, and the agent is unable to forward it further. – Solution : special tunnel
  • 37. Bindings • Binding notifications: – MH notifies HA and previous LA about “change of address”. – Any node can notify any other node about wrong binding information stored by it. – Notification Back-off
  • 38. IMHP : Other Issues • restrictions on advertising bindings - use of private flag. • MH in Popup Mode – requires facilities such as DHCP – acts as its own local agent. – Binding should be kept private • Performance of MH at home should be like a stationary host.
  • 39. Mobility Support in IPv6 • IPv6: – 128 bit address space – link local addresses • Extension headers : Destination Options header, hop-by-hop header, routing header and an authentication header.
  • 40. Overview of Mobile IPv6 • All packets carrying information must be authenticated. • Avoid “remote redirection” attacks • Allows MH to allow more than one care-of addresses at a time, but registers only one of its bindings. • Allows CH to dynamically learn the MH’s binding. In this case it uses the Routing header but does not encapsulate.
  • 41. Overview of Mobile IPv6 • Reasonable to expect all the IPv6 nodes to have caching capabilities. • Implementation of the Binding Updates and Binding Acknowledgments - the key to reliability and optimization.
  • 42. Binding Update Option • Provides optimization and performance in IPv6 • Used by mobile host to: – notify home agent of its primary care-of address – notify correspondent nodes of its current binding • Binding Updates should always be authenticated.
  • 44. Binding Update Format • Lifetime:time duration for which the binding remains valid. • Identification: To ensure in order processing of updates. • Care-of address: Holds the current care of address
  • 45. Binding Update Format • Flags: – H: Destination requested to serve as home agent. – A: Acknowledgment expected – L:Link Local address present • Updates could be retransmitted if there is no acknowledgment.
  • 47. Binding Acknowledgment Format • Code: indicates whether binding update was accepted or rejected. – < 128 update accepted – >= 128 update rejected • Lifetime: during for which node will retain the binding. • Refresh: time interval for sending updates • Identification: Same number as the update.
  • 48. Sending Updates • First update sent to home agent to register the new care-of address. – From another foreign network – From the home network • Can be included in a regular packet or sent alone. • Only the mobile node can send its own binding updates.
  • 49. Movement detection • Neighbor Discovery protocol including Router Discovery and Neighbor Unreachability Detection to create list • Selects the default router from the list • configures its care-off address
  • 50. Unreachability • detecting unreachability – using the Neighbor Unreachability detection – using the higher layers – using the lower layers. – When not receiving packets
  • 51. Smooth Handoffs • Using overlapping cells - accept packets at multiple addresses for a short while. • Router Assisted - Previous router can forward packets to new local router. • Renumbering the home network
  • 52. CH & HA Operations • Sending packet to MH • Handling ICMP error messages • Home agent discovery
  • 53. More information on Mobile IP • National University of Singapore • Carnegie Mellon University • Columbia University
  • 54. • Presentation based on the reading list sent out earlier. All diagrams and tables have been included from the reading list research papers.
  • 55. Mobile IP Prashant Bhargava CS 599 : Wireless Communications and Mobile Computing 602 08 8857

Notas do Editor

  1. 06/11/12
  2. 06/11/12 With the Internet explosion, everyone wants to or has to be connected. Mobile IP provides the required solution for hosts to stay mobile.
  3. 06/11/12
  4. 06/11/12
  5. 06/11/12 mobile host/node : A node that can change its link-level point of attachment from one IP subnet to another, while still being reachable via its home address. home address : An IP address assigned to a mobile node within its home subnet. The network prefix in a mobile node&apos;s home address is equal to the network prefix of the home subnet. home net (subnet) : The IP subnet indicated by a mobile node&apos;s home address. Standard IP routing mechanisms will deliver packets destined for a mobile node&apos;s home address to its home subnet. home agent : A router on a mobile node&apos;s home subnet with which the mobile node has registered its current care-of address. While the mobile node is away from home, the home agent intercepts packets on the home subnet destined to the mobile node&apos;s home address, encapsulates them, and tunnels them to the mobile node&apos;s registered care-of address. care-of address : An IP address associated with a mobile node while visiting a foreign subnet, which uses the network prefix of that foreign subnet. Among the multiple care-of addresses that a mobile node may have at a time (e.g., with different network prefixes), the one registered with the mobile node&apos;s home agent is called its &amp;quot;primary” care-of address.
  6. 06/11/12
  7. 06/11/12