End-to-End Architectures for the Internet Host Mobility: An Overview

Size: px
Start display at page:

Download "End-to-End Architectures for the Internet Host Mobility: An Overview"

Transcription

1 Page 1 of 7 End-to-End Architectures for the Internet Host Mobility: An Overview Bilal Farooq Lahore University of Management Sciences Department of Computer Science bilalf@lums.edu.pk April 7 th, 2003 Abstract: With the emergence of mobile portable computing devices and establishment of Internet as a swift global communication medium, the need for mobility support on Internet is becoming louder and louder. In recent years a lot of effort has been made towards achieving mobility on Internet. This effort has resulted in two different types of architectures: Network-layer based architecture and End-to-End architecture. This paper explores end-to-end architectures and compares it with its counterpart. 1. Introduction: Use of mobile portable devices (e.g. laptops, handheld computers, and cellular phones) to access Internet is becoming more and more common nowadays. These portable devices have introduced the need of high degree of mobility on the Internet. Internet was never designed to support mobility. To achieve transparent host mobility on the Internet, researchers around the world, are now concentrating on two basic approaches: The network-layer mobility scheme and the end-to-end mobility scheme. In network-layer mobility scheme, host mobility is handled in the network structure. Whereas, in end-toend mobility scheme, mobility is handled at a higher level in the end host [10]. Mobile IP, PPTP, and L2TP use IP tunneling techniques to achieve network-layer transparent mobility [10]. End-to-end architecture uses straight-line unicast routing instead of a triangular approach, adopted in network-layer architectures [10, 14]. Due to this fact end-to-end architecture performs better than the network-layer architecture. Moreover, network-layer architecture requires wide-scale changes in the network structure and on the other hand, end-to-end architecture requires changes only in the end hosts. Thus end-to-end approach is easy and fast to deploy in the current internet infrastructure. 2. Related work: IP v4, the most widely used network-level protocol on Internet, works on the assumption that a 2.1 Mobile IP: Mobile IP is a network-layer mobility scheme, which needs infrastructure changes at network layer Foreign agent intercepts all the packets destined to its advertised care-of IP addresses, and finds if the des Home Agent Foreign Agent CommH Mobile Node

2 Page 2 of 7 Figure 2.1 Communication route in Mobile IP Problem with Mobile IP is that it needs major changes in the current infrastructure of Internet. In Mobile Perkins and Johnson [9] suggested that the correspondent host could cache the care-of address of mobile 2.2 Multicast-based Architecture, MSM-IP: Mysore and Bharghavan introduced the idea of using multicast addresses to achieve mobility. Myso 2.3 MSOCKS: MSOCKS is a transport-layer based solution to mobility of the host on Internet. Whenever a mobile It is not feasible that every mobile host could have its own proxy. Mobile hosts have to share the proxy. T 3. End-to-End Architecture overview: Saltzer, Reed and Clark in their classic paper on end-to-end argument, wrote: If the same functionality can be logically implemented in two layers in a layered system then it is advisable to implement that functionality at the higher layer [13]. End-to-End Architecture follows the same argument. Providing mobility support at end points enables higher layers to know about the changes and adjust themselves to the changes in a manner that best fits their needs. Unlike Mobile IP end-to-end approach does not require any change in current infrastructure of Internet. End-to-End architecture ensures that the communication between two hosts remain unaffected by mobility. Generally there are four components of an end-to-end architecture for the host mobility on Internet: addressing, mobile host location announcement, seamless communication, and session layer connection management. 4. Addressing: Like Mobile IP, in End-to-End architecture issue of obtaining IP address in new network is kept separate from location announcement and seamless communication. Dynamic Host Configuration Protocol (DHCP) [2], Autoconfiguration Protocol [19], or manual assignment can be used as an addressing scheme. 5. Location Announcement: Once the IP address of a mobile host changes, its new host name/ip address mapping must be communicated to correspondent nodes. If the mobile host were always a client, then it was no need to communicate the new mapping but in case of servers and other applications running on the mobile host announcement of the new mapping is necessary. Snoeren and Hari in their work [14] proposed that widely deployed DNS can be used for propagating mapping updates over the Internet. Currently all the End-to-End architectures use widely employed DNS system to announce the new host name/ip address mapping. Mobile host detects its change in the point of attachment by user level daemon and then sends the new host name/ip address mapping using secure DNS dynamic update protocol [3] with the TTL value of 0 (so that the update is not cached). Due to the distributed nature of DNS, protocol assumes that data in the system will be updated very slowly [6]. This may cause the correspondent node to send packets to the mobile host s old location, which results packet loss and thus retransmissions. Snoeren, Hari and Kaashoek in their work [15] argued that binding mobility-handling with naming system unnecessarily restricts the mobility services, and restricts the ability to leverage advances in name resolution techniques. By removing this binding, applications can use name resolution system which best suits them. Another issue in using DNS

3 Page 3 of 7 dynamic update is the danger of hijacking of DNS dynamic updates. 6. Seamless Communication: In case of new connection the DNS update is enough for a correspondent host to connect to mobile host at its new location but preserving an already established connection requires additional consideration. A major problem in seamless mobility of a host in Internet is the fact that the TCP connection is associated with a particular IP address and port number. A TCP connection is uniquely identified by a 4-tuple: <source IP address, source port, destination IP address, destination port>. Even if a packet reaches a TCP connection with a source IP address other than the one in the 4-tuple of that TCP connection, it is dropped. To keep the TCP connection intact even if mobile host s IP address changes, Snoeren and Hari [14, 16] proposed a set of TCP options to migrate connection from one IP address to another, thereby permitting on-the-fly re-addressing of end-hosts. TCP at mobile host sends the correspondent host a variable-length [3] Migrate-Permitted option (figure 6.1) during the three-way initial SYN handshake. Migrate- Permitted option comes in two variants: the insecure version of length 3 bytes and the secure version of 20 bytes. The secure version consists of 1 byte Curve Name and a 17 bytes Elliptical Curve Deffie- Hellman Public Key fragment, and is used to negotiate a secret key connection. Migrate-Permitted negotiates a shared connection token which is used to identify the connection in case of migration. When a TCP connection at Mobile host becomes aware that its IP address/port pair is about to change, it pauses transmission of all buffered TCP packets and if possible, sends duplicate ACKs, advertising a receiver window size of zero to suppress further transmission from the fixed host. When mobile host gets its new IP address, it sends TCP migrate option (figure 6.2) to the correspondent host. Migrate option consists of an 8 bytes token and an 8 bytes request. Token consists of authentication information exchanged earlier in migrate-permitted option and is used to secure migration. Correspondent host on receiving migrate request authenticates the request by comparing the token sent by the mobile host. If the request is authenticated, correspondent host sends a SYN/ACK with the ACK field set to the acknowledgement of the last packet acknowledged on the previous connection. It also resets the congestion-related state of the connection to initial values. This is done because of the fact that the congestion state in the new network might not be the same as it was in the previous network. Upon receipt of SYN/ACK, the mobile host sends an ACK with sequence number of the last packet sent. When correspondent host receives that ACK, the migration process is completed and the connection continues as before. Length: Curve ECDH Kind: 15 3/20 Name PK Figure 1.1 TCP Migrate Permitted Option Kind: 16 Length: 19 Req No Token Token (cont.) Request Request (cont.) Figure 6.2 TCP Migrate Option If the address allocation policy at mobile host s old network reassigns the old IP address before migrate request of mobile host could reach the correspondent node, the new node obtaining that old IP will send RST if it receives packets for the mobile host. To overcome this problem Snoeren and Hari modified the traditional TCP state machine to include MIGRATE_WAIT state. Figure 6.3 shows the original and figure 6.4 shows the modified TCP state diagram. Due to this change the RST receipt does not terminates the connection but the connection goes into MIGRATE_WAIT state and waits for the migration request. If the time out occurs only then the connection is closed. The resulting TCP connection can thus identified by either traditional 4-tuple or by new triple: <source address, source port, token>. Fundamentally, the Migrate option allows the corresponding hosts to synchronize two separate TCP connections such that the context is identical [16].

4 Page 4 of 7 Figure 6.1: Partial TCP state transition diagram[18] Figure 6.1: Partial TCP state transition diagram with Migrate transitions [16] 7. Migrate Project: Migrate project provides mobility services at session layer of the end host. Session layer provides a unified abstraction to the application to handle mobility: a session. Session caters for the changes in transport, network and even other session layer protocol states. Session provides check-pointing and resumption facilities for periods of disconnection, enabling comprehensive, session-based state

5 Page 5 of 7 management for mobile-aware applications [17]. 8. End-to-End Architecture: A Step Further: Hari and Snoeren in their work assume that both end points of the connection are not simultaneously mobile. This is a significant drawback which not only limits the mobility but in many cases fails to provide mobility e.g. in case of ad hoc networks where all nodes are mobile. Tilak and Abu-Ghazaleh [20] in their work proposed further changes in the TCP state diagram, which enables concurrent peer migration. Figure 8.1 shows the further modified TCP state machine. Figure 8.1 Partial TCP state transition diagram Proposed by Tilak and Abu-Ghazaleh Following situations could occur in case of any migration: 8.1 Only one mobile host moved to new network (one-way migration): This is the case, which is already handled in Snoeren and Hari s work and does not need any additional consideration. 8.2 First a single mobile host moved to new network. The other peer moved to its new network after receiving the migrate request from first mobile host: Here if the other peer sent SYN/ACK before moving to new network, then its the same case as two one-way migrations and can be handled in the same manner as 8.1. If the other peer didn t send a SYN/ACK before it moved, then once the peer gets new address in the new network, it sends SYN/Migrate and move to SYN-SENT state. First peer on receiving SYN/Migrate sends SYN/ACK and moves to SYN/RECEIVED state. 8.3 Both peers moved at the same time. Thus no one has received any migrate request. In this case both peers go to SYN/SENT state after sending SYN/Migrate. As the location of both peers have changed thus these messages gets lost. Both peers assume it to be due to network congestion or error. So they retransmit SYN/Migrate several times but will not get any reply. Tilak and Abu-Ghazaleh proposed that after k failures the mobile node should move to ADDRESS- RESOLVE state. In ADDRESS-RESOLVE state, mobile host contacts DNS server for the new address resolution of its peer. The value of k can be any value depending on previous congestion behaviors or it may be any static value. This scheme also takes care of losses due to congestion, errors or temporary

6 Page 6 of 7 disconnection. The DNS lookup in those cases will return the peer s old address and retransmissions will occur. Tilak and Abu-Ghazaleh in their work claims that this approach has no additional security considerations and has the same level of security as the Hari and Snoeren s scheme. Moreover it adds minimal overhead to the previous approach. But this approach has not been implemented and tested yet. 9. Conclusions and open problems: End-to-end architectures are more flexible and efficient solutions to the host mobility on Internet. They do not require changes in the network infrastructure but do require changes in the transport and higher layers of the end hosts. End-to-end architectures ensure a secure, seamless connection to an application, with a minimum overhead. Current end-to-end architectures rely on DNS updates, which force all applications to use same single naming system. Different applications have different requirements thus requiring a different naming system to expresses those requirements. Restricting these applications to a single naming system results in a significant overhead and performance degradation [17]. Moreover, DNS does not have any explicit support for mobility. More mobility specific naming systems like Intentional Naming System INS [1], Universal Plug and Play UPNP, and JINI should also be tested for location announcement in end-to-end architecture. End-to-end architecture is only designed, implemented and tested on TCP protocol. Its performance on UDP protocol is also required to be studied extensively. Tilak and Abu-Ghazaleh proposed a solution for concurrent host mobility but this approach is never implemented and tested. Only after implementation and testing of their approach we will be able to analyze it. References: [1] ADJIE-WINOTO, W., SCHWARTZ, E., BALAKRISHNAN, H., AND LILLEY, J. The design and implementation of an intentional naming system, ACM SOSP Operating System Review, Volume 34, No 5: Pg , Dec [2] DROMS, R., Dynamic Host Configuration Protocol, RFC 2131, IETF, Mar [3] EASTLAKE, D., 3 rd., Secure Domain Name System Dynamic Update, RFC 2137, IETF, Apr [4] FERGUSON, P., Network Ingress Filtering: Defeating Denial of Service Attacks which employ IP Source Address Spoofing, RFC 2267, IETF, Jan [5] MALTZ, D., AND BHAGWAT, P., MSOCKS: An architecture of transport layer mobility, In Proc. IEEE In [6] MOCKAPETRIS, P., Domain Concepts and Facilities, RFC 1034, IETF, Nov [7] MOCKAPETRIS, P., Domain Names- Implementation and Specification, RFC 1035, IETF, Nov [8] MONTENEGRO, G., Reverse Tunneling for Mobile IP, RFC 2344, IETF, May [9] PERKINS, CHARLES E., AND JOHNSON, D. B., Route optimization in mobile IP, Internet Draft, IETF, O [10] PERKINS, CHARLES E., Mobile Networking Through Mobile IP, Sun Microsystems, [11] PERKINS, CHARLES. E., IP Mobility Support, RFC 2002, IETF, Oct [12] POSTEL, J., Domain Name System Structure and Delegation, RFC 1591, IETF, Mar [13] SALTZER, J., REED, D., AND CLARK, D. End-to-end arguments in system design, ACM Transactions on Computer Systems 2, 4, Nov [14] SNOEREN, Alex C., AND BALAKRISHNAN, H. An End-to-End Approach to Host Mobility, ACM/IEEE [15] SNOEREN, Alex C., BALAKRISHNAN, H., AND KAASHOEK, M. FRANS. Reconsidering Internet Mobi

7 Page 7 of 7 [16] SNOEREN, Alex C., AND BALAKRISHNAN, H. TCP Connection Migration, Internet Draft, IETF, Nov [17] SNOEREN, Alex C., BALAKRISHNAN, H., AND KAASHOEK, M. FRANS. The Migrate Approach to Internet Mobility, Proc. Student Oxygen Workshop '01, July [18] STEVEN, W. R., TCP/IP Illustrated, Volume 1: The Protocols, Addison Wesley, Reading, Massachusetts, 1 [19] THOMSON, S., AND NARTEN, T., Ipv6 stateless address autoconfiguration, RFC 2462, IETF, Dec [20] TILAK, SAMEER, AND ABU-GHAZALEH B., NAEL, An Extension to the DNS-based End-to-End Mobil [21] VIXIE, P., Dynamic Updates in the Domain Name System (DNS UPDATES), RFC 2136, IETF, Apr [1] Home/foreign agents advertise their presence via Agent Advertisement messages. Mobile host detects network change by listening these messages or by sending solicitation message to learn about the agent. [2] Registration is made secure against replay attacks. [3] Author assumes that the reader has knowledge of how a traditional TCP works

CSE 123A Computer Netwrking

CSE 123A Computer Netwrking CSE 123A Computer Netwrking Winter 2005 Mobile Networking Alex Snoeren presenting in lieu of Stefan Savage Today s s issues What are implications of hosts that move? Remember routing? It doesn t work anymore

More information

CSE 123b Communications Software

CSE 123b Communications Software CSE 123b Communications Software Spring 2004 Lecture 9: Mobile Networking Stefan Savage Quick announcements Typo in problem #1 of HW #2 (fixed as of 1pm yesterday) Please consider chapter 4.3-4.3.3 to

More information

Quick announcements. CSE 123b Communications Software. Today s issues. Last class. The Mobility Problem. Problems. Spring 2004

Quick announcements. CSE 123b Communications Software. Today s issues. Last class. The Mobility Problem. Problems. Spring 2004 CSE 123b Communications Software Spring 2004 Lecture 9: Mobile Networking Quick announcements Typo in problem #1 of HW #2 (fixed as of 1pm yesterday) Please consider chapter 4.3-4.3.3 to be part of the

More information

Communications Software. CSE 123b. CSE 123b. Spring Lecture 10: Mobile Networking. Stefan Savage

Communications Software. CSE 123b. CSE 123b. Spring Lecture 10: Mobile Networking. Stefan Savage CSE 123b CSE 123b Communications Software Spring 2003 Lecture 10: Mobile Networking Stefan Savage Quick announcement My office hours tomorrow are moved to 12pm May 6, 2003 CSE 123b -- Lecture 10 Mobile

More information

Quick announcement. CSE 123b Communications Software. Last class. Today s issues. The Mobility Problem. Problems. Spring 2003

Quick announcement. CSE 123b Communications Software. Last class. Today s issues. The Mobility Problem. Problems. Spring 2003 CSE 123b Communications Software Quick announcement My office hours tomorrow are moved to 12pm Spring 2003 Lecture 10: Mobile Networking Stefan Savage May 6, 2003 CSE 123b -- Lecture 10 Mobile IP 2 Last

More information

An End-to-End Approach to Host Mobility

An End-to-End Approach to Host Mobility 6th ACM/IEEE International Conference on Mobile Computing and Networking (MobiCom 00) An End-to-End Approach to Host Mobility Alex C. Snoeren and Hari Balakrishnan MIT Laboratory for Computer Science Cambridge,

More information

Fixed Internetworking Protocols and Networks. IP mobility. Rune Hylsberg Jacobsen Aarhus School of Engineering

Fixed Internetworking Protocols and Networks. IP mobility. Rune Hylsberg Jacobsen Aarhus School of Engineering Fixed Internetworking Protocols and Networks IP mobility Rune Hylsberg Jacobsen Aarhus School of Engineering rhj@iha.dk 1 2011 ITIFN Mobile computing Vision Seamless, ubiquitous network access for mobile

More information

Outline. CS5984 Mobile Computing. Host Mobility Problem 1/2. Host Mobility Problem 2/2. Host Mobility Problem Solutions. Network Layer Solutions Model

Outline. CS5984 Mobile Computing. Host Mobility Problem 1/2. Host Mobility Problem 2/2. Host Mobility Problem Solutions. Network Layer Solutions Model CS5984 Mobile Computing Outline Host Mobility problem and solutions IETF Mobile IPv4 Dr. Ayman Abdel-Hamid Computer Science Department Virginia Tech Mobile IPv4 1 2 Host Mobility Problem 1/2 Host Mobility

More information

Outline. CS6504 Mobile Computing. Host Mobility Problem 1/2. Host Mobility Problem 2/2. Dr. Ayman Abdel-Hamid. Mobile IPv4.

Outline. CS6504 Mobile Computing. Host Mobility Problem 1/2. Host Mobility Problem 2/2. Dr. Ayman Abdel-Hamid. Mobile IPv4. CS6504 Mobile Computing Outline Host Mobility problem and solutions IETF Mobile IPv4 Dr. Ayman Abdel-Hamid Computer Science Department Virginia Tech Mobile IPv4 1 2 Host Mobility Problem 1/2 Host Mobility

More information

Charles Perkins Nokia Research Center 2 July Mobility Support in IPv6 <draft-ietf-mobileip-ipv6-14.txt> Status of This Memo

Charles Perkins Nokia Research Center 2 July Mobility Support in IPv6 <draft-ietf-mobileip-ipv6-14.txt> Status of This Memo IETF Mobile IP Working Group INTERNET-DRAFT David B. Johnson Rice University Charles Perkins Nokia Research Center 2 July 2000 Mobility Support in IPv6 Status of This

More information

Handover Management for Mobile Nodes in IPv6 Networks

Handover Management for Mobile Nodes in IPv6 Networks TECHNOLOGY ADVANCES FOR 3G AND BEYOND Handover Management for Mobile Nodes in IPv6 Networks Nicolas Montavont and Thomas Noël LSIIT Louis Pasteur University CNRS, Strasbourg ABSTRACT In this article we

More information

Mohammad Hossein Manshaei 1393

Mohammad Hossein Manshaei 1393 Mohammad Hossein Manshaei manshaei@gmail.com 1393 Mobile IP 2 Mobile Network Layer: Problems and Concerns Entities and Terminology in Mobile IP Mobile Indirect Routing Mobile IP Agent Advertisement Registration

More information

Network Security. Security of Mobile Internet Communications. Chapter 17. Network Security (WS 2002): 17 Mobile Internet Security 1 Dr.-Ing G.

Network Security. Security of Mobile Internet Communications. Chapter 17. Network Security (WS 2002): 17 Mobile Internet Security 1 Dr.-Ing G. Network Security Chapter 17 Security of Mobile Internet Communications Network Security (WS 2002): 17 Mobile Internet Security 1 Motivation for Mobile IP Routing in the Internet: Based on IP destination

More information

An Analysis of The Fast Handovers for Mobile IPv6 Protocol

An Analysis of The Fast Handovers for Mobile IPv6 Protocol An Analysis of The Fast Handovers for Mobile IPv6 Protocol Janne Lundberg Helsinki University of Technology Laboratory for Theoretical Computer Science May 28, 2003 Abstract Fast Handovers for Mobile IPv6

More information

ECS-087: Mobile Computing

ECS-087: Mobile Computing ECS-087: Mobile Computing Mobile IP Most of the slides borrowed from Prof. Sridhar Iyer Diwakar Yagyasen.1 Effect of Mobility on Protocol Stack Application: new applications and adaptations Transport:

More information

CSE 565 Computer Security Fall 2018

CSE 565 Computer Security Fall 2018 CSE 565 Computer Security Fall 2018 Lecture 18: Network Attacks Department of Computer Science and Engineering University at Buffalo 1 Lecture Overview Network attacks denial-of-service (DoS) attacks SYN

More information

Internet Engineering Task Force. C. Perkins Nokia Research Center R. Droms(ed.) Cisco Systems 22 November 2000

Internet Engineering Task Force. C. Perkins Nokia Research Center R. Droms(ed.) Cisco Systems 22 November 2000 Internet Engineering Task Force INTERNET DRAFT DHC Working Group Obsoletes: draft-ietf-dhc-dhcpv6-15.txt J. Bound Compaq Computer Corp. M. Carney Sun Microsystems, Inc C. Perkins Nokia Research Center

More information

Chapter 12 Network Protocols

Chapter 12 Network Protocols Chapter 12 Network Protocols 1 Outline Protocol: Set of defined rules to allow communication between entities Open Systems Interconnection (OSI) Transmission Control Protocol/Internetworking Protocol (TCP/IP)

More information

Mobile Transport Layer Lesson 10 Timeout Freezing, Selective Retransmission, Transaction Oriented TCP and Explicit Notification Methods

Mobile Transport Layer Lesson 10 Timeout Freezing, Selective Retransmission, Transaction Oriented TCP and Explicit Notification Methods Mobile Transport Layer Lesson 10 Timeout Freezing, Selective Retransmission, Transaction Oriented TCP and Explicit Notification Methods 1 Timeout freezing of transmission (TFT) Used in situations where

More information

Mobile SCTP for IP Mobility Support in All-IP Networks

Mobile SCTP for IP Mobility Support in All-IP Networks Mobile SCTP for IP Mobility Support in All-IP Networks Seok Joo Koh sjkoh@cs.knu.ac.kr Abstract The Stream Control Transmission Protocol (SCTP) is a new transport protocol that is featured multi-streaming

More information

Guide To TCP/IP, Second Edition UDP Header Source Port Number (16 bits) IP HEADER Protocol Field = 17 Destination Port Number (16 bit) 15 16

Guide To TCP/IP, Second Edition UDP Header Source Port Number (16 bits) IP HEADER Protocol Field = 17 Destination Port Number (16 bit) 15 16 Guide To TCP/IP, Second Edition Chapter 5 Transport Layer TCP/IP Protocols Objectives Understand the key features and functions of the User Datagram Protocol (UDP) Explain the mechanisms that drive segmentation,

More information

Internet Engineering Task Force INTERNET DRAFT. C. Perkins Nokia Research Center R. Droms(ed.) Cisco Systems 1 March 2001

Internet Engineering Task Force INTERNET DRAFT. C. Perkins Nokia Research Center R. Droms(ed.) Cisco Systems 1 March 2001 Internet Engineering Task Force INTERNET DRAFT DHC Working Group Obsoletes: draft-ietf-dhc-dhcpv6-16.txt J. Bound Nokia M. Carney Sun Microsystems, Inc C. Perkins Nokia Research Center R. Droms(ed.) Cisco

More information

11. IP Mobility 최 양 희 서울대학교 컴퓨터공학부

11. IP Mobility 최 양 희 서울대학교 컴퓨터공학부 11. IP Mobility Introduction Terminal Mobility Person Mobility Network Mobility Internet 2002 Yanghee Choi 2 Mobile IP : Why IP addressing scheme optimized for stationary environment point of attachment

More information

Mobile IP. Mobile IP 1

Mobile IP. Mobile IP 1 Mobile IP Mobile IP 1 Motivation for Mobile IP Routing based on IP destination address, network prefix (e.g. 129.13.42) determines physical subnet change of physical subnet implies change of IP address

More information

Internet Engineering Task Force INTERNET DRAFT. C. Perkins Nokia Research Center R. Droms(ed.) Cisco Systems 15 April 2001

Internet Engineering Task Force INTERNET DRAFT. C. Perkins Nokia Research Center R. Droms(ed.) Cisco Systems 15 April 2001 Internet Engineering Task Force INTERNET DRAFT DHC Working Group Obsoletes: draft-ietf-dhc-dhcpv6-18.txt J. Bound Nokia M. Carney Sun Microsystems, Inc C. Perkins Nokia Research Center R. Droms(ed.) Cisco

More information

Outline 9.2. TCP for 2.5G/3G wireless

Outline 9.2. TCP for 2.5G/3G wireless Transport layer 9.1 Outline Motivation, TCP-mechanisms Classical approaches (Indirect TCP, Snooping TCP, Mobile TCP) PEPs in general Additional optimizations (Fast retransmit/recovery, Transmission freezing,

More information

Mobile IP and Mobile Transport Protocols

Mobile IP and Mobile Transport Protocols Mobile IP and Mobile Transport Protocols 1 IP routing Preliminaries Works on a hop-by-hop basis using a routing table 32 bits: 129.97.92.42 Address = subnet + host (Mobility No packet for you) Two parts»

More information

A DHCPv6 Based IPv6 Autoconfiguration Mechanism for Subordinate MANET

A DHCPv6 Based IPv6 Autoconfiguration Mechanism for Subordinate MANET 2008 IEEE Asia-Pacific Services Computing Conference A DHCPv6 Based IPv6 Autoconfiguration Mechanism for Subordinate MANET Shubhranshu Singh Advanced Technology Division Samsung India Software Operations

More information

On using Mobile IP Protocols

On using Mobile IP Protocols Journal of Computer Science 2 (2): 211-217, 2006 ISSN 1549-3636 2006 Science Publications On using Mobile IP Protocols Fayza A. Nada Faculty of Computers and Information, Suez Canal University, Ismailia,

More information

LECTURE 8. Mobile IP

LECTURE 8. Mobile IP 1 LECTURE 8 Mobile IP What is Mobile IP? The Internet protocol as it exists does not support mobility Mobile IP tries to address this issue by creating an anchor for a mobile host that takes care of packet

More information

SJTU 2018 Fall Computer Networking. Wireless Communication

SJTU 2018 Fall Computer Networking. Wireless Communication SJTU 2018 Fall Computer Networking 1 Wireless Communication Internet Protocol Stack 2 Application: supporting network applications - FTP, SMTP, HTTP Transport: data transfer between processes - TCP, UDP

More information

DHCP for IPv6. Palo Alto, CA Digital Equipment Company. Nashua, NH mentions a few directions about the future of DHCPv6.

DHCP for IPv6. Palo Alto, CA Digital Equipment Company. Nashua, NH mentions a few directions about the future of DHCPv6. DHCP for IPv6 Charles E. Perkins and Jim Bound Sun Microsystems, Inc. Palo Alto, CA 94303 Digital Equipment Company Nashua, NH 03062 Abstract The Dynamic Host Conguration Protocol (DHCPv6) provides a framework

More information

Chapter 09 Network Protocols

Chapter 09 Network Protocols Chapter 09 Network Protocols Copyright 2011, Dr. Dharma P. Agrawal and Dr. Qing-An Zeng. All rights reserved. 1 Outline Protocol: Set of defined rules to allow communication between entities Open Systems

More information

End-to-End Host Mobility Using SCTP

End-to-End Host Mobility Using SCTP End-to-End Host Mobility Using SCTP Lei Li, Russell Clark, Ellen Zegura College of Computing, Georgia Institute of Technology, Atlanta, Georgia 30332 leili,rjc,ewz @cc.gatech.edu Abstract We present the

More information

Mobile Communications Chapter 9: Network Protocols/Mobile IP

Mobile Communications Chapter 9: Network Protocols/Mobile IP Mobile Communications Chapter 9: Network Protocols/Mobile IP Motivation Data transfer Encapsulation Security IPv6 Problems DHCP Ad-hoc s Routing protocols 9.0.1 Motivation for Mobile IP Routing based on

More information

User Datagram Protocol

User Datagram Protocol Topics Transport Layer TCP s three-way handshake TCP s connection termination sequence TCP s TIME_WAIT state TCP and UDP buffering by the socket layer 2 Introduction UDP is a simple, unreliable datagram

More information

2013 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other uses, in any current or future media,

2013 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other uses, in any current or future media, 2013 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other uses, in any current or future media, including reprinting/republishing this material for advertising

More information

Introduction Mobility Support Handover Management Conclutions. Mobility in IPv6. Thomas Liske. Dresden University of Technology

Introduction Mobility Support Handover Management Conclutions. Mobility in IPv6. Thomas Liske. Dresden University of Technology 2005 / High Speed Networks II Outline Introduction Mobility Support Overview of IPv6 Mobility Support Handover Management Mobility Support What means Mobility Support? allow transparent routing of IPv6

More information

Outline. What is TCP protocol? How the TCP Protocol Works SYN Flooding Attack TCP Reset Attack TCP Session Hijacking Attack

Outline. What is TCP protocol? How the TCP Protocol Works SYN Flooding Attack TCP Reset Attack TCP Session Hijacking Attack Attacks on TCP Outline What is TCP protocol? How the TCP Protocol Works SYN Flooding Attack TCP Reset Attack TCP Session Hijacking Attack TCP Protocol Transmission Control Protocol (TCP) is a core protocol

More information

Features of a proxy server: - Nowadays, by using TCP/IP within local area networks, the relaying role that the proxy

Features of a proxy server: - Nowadays, by using TCP/IP within local area networks, the relaying role that the proxy Que: -Proxy server Introduction: Proxy simply means acting on someone other s behalf. A Proxy acts on behalf of the client or user to provide access to a network service, and it shields each side from

More information

TCP /IP Fundamentals Mr. Cantu

TCP /IP Fundamentals Mr. Cantu TCP /IP Fundamentals Mr. Cantu OSI Model and TCP/IP Model Comparison TCP / IP Protocols (Application Layer) The TCP/IP subprotocols listed in this layer are services that support a number of network functions:

More information

Mobile Communications Mobility Support in Network Layer

Mobile Communications Mobility Support in Network Layer Motivation Mobility support needed to be able to use mobile devices in the Mobile devices need IP address for their communication Applications would like to communicate while being on the move Mobile Communications

More information

Mobile Transport Layer

Mobile Transport Layer Mobile Transport Layer 1 Transport Layer HTTP (used by web services) typically uses TCP Reliable transport between TCP client and server required - Stream oriented, not transaction oriented - Network friendly:

More information

TCP/IP Protocol Suite

TCP/IP Protocol Suite TCP/IP Protocol Suite Computer Networks Lecture 5 http://goo.gl/pze5o8 TCP/IP Network protocols used in the Internet also used in today's intranets TCP layer 4 protocol Together with UDP IP - layer 3 protocol

More information

IPv6: An Introduction

IPv6: An Introduction Outline IPv6: An Introduction Dheeraj Sanghi Department of Computer Science and Engineering Indian Institute of Technology Kanpur dheeraj@iitk.ac.in http://www.cse.iitk.ac.in/users/dheeraj Problems with

More information

Security Issues In Mobile IP

Security Issues In Mobile IP Security Issues In Mobile IP Zhang Chao Tsinghua University Electronic Engineering 1 OUTLINE 1.Introduction 2.Typical threats 3. Mobile IPv6 and new threats 4.Open issues 2 OUTLINE 1.Introduction 2.Typical

More information

TCP/IP Networking. Training Details. About Training. About Training. What You'll Learn. Training Time : 9 Hours. Capacity : 12

TCP/IP Networking. Training Details. About Training. About Training. What You'll Learn. Training Time : 9 Hours. Capacity : 12 TCP/IP Networking Training Details Training Time : 9 Hours Capacity : 12 Prerequisites : There are no prerequisites for this course. About Training About Training TCP/IP is the globally accepted group

More information

Mobile Communications Chapter 9: Mobile Transport Layer

Mobile Communications Chapter 9: Mobile Transport Layer Prof. Dr.-Ing Jochen H. Schiller Inst. of Computer Science Freie Universität Berlin Germany Mobile Communications Chapter 9: Mobile Transport Layer Motivation, TCP-mechanisms Classical approaches (Indirect

More information

CCNA R&S: Introduction to Networks. Chapter 7: The Transport Layer

CCNA R&S: Introduction to Networks. Chapter 7: The Transport Layer CCNA R&S: Introduction to Networks Chapter 7: The Transport Layer Frank Schneemann 7.0.1.1 Introduction 7.0.1.2 Class Activity - We Need to Talk Game 7.1.1.1 Role of the Transport Layer The primary responsibilities

More information

CSE 4215/5431: Mobile Communications Winter Suprakash Datta

CSE 4215/5431: Mobile Communications Winter Suprakash Datta CSE 4215/5431: Mobile Communications Winter 2013 Suprakash Datta datta@cse.yorku.ca Office: CSEB 3043 Phone: 416-736-2100 ext 77875 Course page: http://www.cse.yorku.ca/course/4215 Some slides are adapted

More information

Mobile Routing : Computer Networking. Overview. How to Handle Mobile Nodes? Mobile IP Ad-hoc network routing Assigned reading

Mobile Routing : Computer Networking. Overview. How to Handle Mobile Nodes? Mobile IP Ad-hoc network routing Assigned reading Mobile Routing 15-744: Computer Networking L-10 Ad Hoc Networks Mobile IP Ad-hoc network routing Assigned reading Performance Comparison of Multi-Hop Wireless Ad Hoc Routing Protocols A High Throughput

More information

Wireless Challenges : Computer Networking. Overview. Routing to Mobile Nodes. Lecture 25: Wireless Networking

Wireless Challenges : Computer Networking. Overview. Routing to Mobile Nodes. Lecture 25: Wireless Networking Wireless Challenges 15-441: Computer Networking Lecture 25: Wireless Networking Force us to rethink many assumptions Need to share airwaves rather than wire Don t know what hosts are involved Host may

More information

Mobile IP Overview. Based on IP so any media that can support IP can also support Mobile IP

Mobile IP Overview. Based on IP so any media that can support IP can also support Mobile IP Introduction: Mobile IP Overview An Internet Protocol address (IP address) is a numerical label assigned to each device (e.g., computer, printer) participating in a computer network that uses the Internet

More information

What is mobility? Mobile IP. Mobility Impact on Protocol Stack (cont.) Advanced Topics in Computer Networks

What is mobility? Mobile IP. Mobility Impact on Protocol Stack (cont.) Advanced Topics in Computer Networks Advanced Topics in Computer Networks What is mobility? spectrum of mobility, from the perspective: Mobile IP no mobility high mobility Chalermek Intanagonwiwat Slides courtesy of James F. Kurose, Keith

More information

Da t e: August 2 0 th a t 9: :00 SOLUTIONS

Da t e: August 2 0 th a t 9: :00 SOLUTIONS Interne t working, Examina tion 2G1 3 0 5 Da t e: August 2 0 th 2 0 0 3 a t 9: 0 0 1 3:00 SOLUTIONS 1. General (5p) a) Place each of the following protocols in the correct TCP/IP layer (Application, Transport,

More information

Fast Handover in Mobile IPv4 and IPv6

Fast Handover in Mobile IPv4 and IPv6 Fast Handover in Mobile IPv4 and IPv6 Raoul Schmidiger & Gregor Zographos April 28, 2005 Seminar: Mobile Systems Talk No.4 Content IPv4 (Gregor) IPv6 (Raoul) Problems in IP mobility (Gregor) Standards

More information

Techological Advantages of Mobile IPv6

Techological Advantages of Mobile IPv6 Techological Advantages of Mobile IPv6 Nokia Research Center Mountain View, CA USA Charles E. Perkins http://people.nokia.net/charliep charliep@iprg.nokia.com 1 NOKIA NERD2000.PPT/ 11/20/00 / HFl Outline

More information

CCNA Exploration Network Fundamentals. Chapter 04 OSI Transport Layer

CCNA Exploration Network Fundamentals. Chapter 04 OSI Transport Layer CCNA Exploration Network Fundamentals Chapter 04 OSI Transport Layer Updated: 05/05/2008 1 4.1 Roles of the Transport Layer 2 4.1 Roles of the Transport Layer The OSI Transport layer accept data from the

More information

IPV6 SIMPLE SECURITY CAPABILITIES.

IPV6 SIMPLE SECURITY CAPABILITIES. IPV6 SIMPLE SECURITY CAPABILITIES. 50 issues from RFC 6092 edited by J. Woodyatt, Apple Presentation by Olle E. Johansson, Edvina AB. ABSTRACT The RFC which this presentation is based upon is focused on

More information

Mobility Management Basics

Mobility Management Basics Mobility Management Basics Summer Semester 2011 Integrated Communication Systems Group Ilmenau University of Technology Content Motivation Problem and possible solutions IP-based mobility management Conclusions

More information

The Transport Layer: TCP & Reliable Data Transfer

The Transport Layer: TCP & Reliable Data Transfer The Transport Layer: TCP & Reliable Data Transfer Smith College, CSC 249 February 15, 2018 1 Chapter 3: Transport Layer q TCP Transport layer services: v Multiplexing/demultiplexing v Connection management

More information

Lecture 20 Overview. Last Lecture. This Lecture. Next Lecture. Transport Control Protocol (1) Transport Control Protocol (2) Source: chapters 23, 24

Lecture 20 Overview. Last Lecture. This Lecture. Next Lecture. Transport Control Protocol (1) Transport Control Protocol (2) Source: chapters 23, 24 Lecture 20 Overview Last Lecture Transport Control Protocol (1) This Lecture Transport Control Protocol (2) Source: chapters 23, 24 Next Lecture Internet Applications Source: chapter 26 COSC244 & TELE202

More information

4.0.1 CHAPTER INTRODUCTION

4.0.1 CHAPTER INTRODUCTION 4.0.1 CHAPTER INTRODUCTION Data networks and the Internet support the human network by supplying seamless, reliable communication between people - both locally and around the globe. On a single device,

More information

Mobile Transport Layer Lesson 02 TCP Data Stream and Data Delivery

Mobile Transport Layer Lesson 02 TCP Data Stream and Data Delivery Mobile Transport Layer Lesson 02 TCP Data Stream and Data Delivery 1 TCP Data Stream Consists of bytes Delivered using a virtual connection between sockets Each socket has the port number and IP address

More information

mslp - Mesh-enhanced Service Location Protocol Λ

mslp - Mesh-enhanced Service Location Protocol Λ mslp - Mesh-enhanced Service Location Protocol Λ Weibin Zhao y, Henning Schulzrinne y and Erik Guttman z y Columbia University fzwb,hgsg@cs.columbia.edu z Sun Microsystems erik.guttman@germany.sun.com

More information

Utilizing Multiple Home Links in Mobile IPv6

Utilizing Multiple Home Links in Mobile IPv6 Utilizing Multiple Home Links in Mobile IPv6 Hongbo Shi and Shigeki Goto Department of Computer Science, Waseda University 3-4-1 Ohkubo Shijuku-ku, Tokyo, 169-8555 JAPAN Email: {shi, goto}@goto.info.waseda.ac.jp

More information

Mobility Management - Basics

Mobility Management - Basics Mobility Management - Basics Summer Semester 2012 Integrated Communication Systems Group Ilmenau University of Technology Content Motivation Problem and possible solutions IP-based mobility management

More information

CIS 5373 Systems Security

CIS 5373 Systems Security CIS 5373 Systems Security Topic 4.1: Network Security Basics Endadul Hoque Slide Acknowledgment Contents are based on slides from Cristina Nita-Rotaru (Northeastern) 2 Network Security INTRODUCTION 3 What

More information

Layer 4: UDP, TCP, and others. based on Chapter 9 of CompTIA Network+ Exam Guide, 4th ed., Mike Meyers

Layer 4: UDP, TCP, and others. based on Chapter 9 of CompTIA Network+ Exam Guide, 4th ed., Mike Meyers Layer 4: UDP, TCP, and others based on Chapter 9 of CompTIA Network+ Exam Guide, 4th ed., Mike Meyers Concepts application set transport set High-level, "Application Set" protocols deal only with how handled

More information

Mobile IP. rek. Petr Grygárek Petr Grygarek, Advanced Computer Networks Technologies 1

Mobile IP. rek. Petr Grygárek Petr Grygarek, Advanced Computer Networks Technologies 1 Mobile IP Petr Grygárek rek 1 Basic principle Picture from IOS IP and IP Routing Configuration Guide Mobile node maintains the same IP address even while roaming in foreign networks even if it s address

More information

Mobile Communications Chapter 8: Network Protocols/Mobile IP

Mobile Communications Chapter 8: Network Protocols/Mobile IP Mobile Communications Chapter 8: Network Protocols/Mobile IP Motivation Data transfer, Encapsulation Security, IPv6, Problems Micro mobility support DHCP Ad-hoc networks, Routing protocols Prof. Jó Ueyama

More information

Internet Layers. Physical Layer. Application. Application. Transport. Transport. Network. Network. Network. Network. Link. Link. Link.

Internet Layers. Physical Layer. Application. Application. Transport. Transport. Network. Network. Network. Network. Link. Link. Link. Internet Layers Application Application Transport Transport Network Network Network Network Link Link Link Link Ethernet Fiber Optics Physical Layer Wi-Fi ARP requests and responses IP: 192.168.1.1 MAC:

More information

MESSAGES error-reporting messages and query messages. problems processes IP packet specific information

MESSAGES error-reporting messages and query messages. problems processes IP packet specific information ICMP ICMP ICMP is mainly used by operating systems of networked computers to send error messages indicating that a requested service is not available or that host/ router could not be reached. ICMP MESSAGES

More information

Lecture Computer Networks

Lecture Computer Networks Prof. Dr. Hans Peter Großmann mit M. Rabel sowie H. Hutschenreiter und T. Nau Sommersemester 2012 Institut für Organisation und Management von Informationssystemen Lecture Computer Networks Internet Protocol

More information

An Efficient DECT-Mobile IP Interworking for Mobile Computing

An Efficient DECT-Mobile IP Interworking for Mobile Computing An Efficient DECT-Mobile IP Interworking for Mobile Computing Anthony Lo *, Winston Seah * and Edwin Schreuder + * Centre for Wireless Communications 1, National University of Singapore, 20 Science Park

More information

The aim of this unit is to review the main concepts related to TCP and UDP transport protocols, as well as application protocols. These concepts are

The aim of this unit is to review the main concepts related to TCP and UDP transport protocols, as well as application protocols. These concepts are The aim of this unit is to review the main concepts related to TCP and UDP transport protocols, as well as application protocols. These concepts are important requirements for developing programs that

More information

Internet Engineering Task Force (IETF) Ericsson July 2011

Internet Engineering Task Force (IETF) Ericsson July 2011 Internet Engineering Task Force (IETF) Request for Comments: 6275 Obsoletes: 3775 Category: Standards Track ISSN: 2070-1721 C. Perkins, Ed. Tellabs, Inc. D. Johnson Rice University J. Arkko Ericsson July

More information

Slide 1. Slide 2. Slide 3. Technological Advantages of Mobile IPv6. Outline of Presentation. Earth with 2 Billion Mobile devices

Slide 1. Slide 2. Slide 3. Technological Advantages of Mobile IPv6. Outline of Presentation. Earth with 2 Billion Mobile devices Slide 1 Technological Advantages of Mobile IPv6 Nokia Research Center Mountain View, CA USA Charles E. Perkins http://people.nokia.net/charliep charliep@iprg.nokia.com 1 NOKIA NERD2000.PPT/ 11/20/00 /

More information

Chapter 13 TRANSPORT. Mobile Computing Winter 2005 / Overview. TCP Overview. TCP slow-start. Motivation Simple analysis Various TCP mechanisms

Chapter 13 TRANSPORT. Mobile Computing Winter 2005 / Overview. TCP Overview. TCP slow-start. Motivation Simple analysis Various TCP mechanisms Overview Chapter 13 TRANSPORT Motivation Simple analysis Various TCP mechanisms Distributed Computing Group Mobile Computing Winter 2005 / 2006 Distributed Computing Group MOBILE COMPUTING R. Wattenhofer

More information

Architecture and Performance of SIGMA: A Seamless Mobility Architecture for Data Networks

Architecture and Performance of SIGMA: A Seamless Mobility Architecture for Data Networks Architecture and Performance of : A Seamless Mobility Architecture for Data Networks Shaojian Fu, Liran Ma, Mohammed Atiquzzaman, Yong-Jin Lee Telecommunications and Networks Research Lab School of Computer

More information

CMPE 257: Wireless and Mobile Networking

CMPE 257: Wireless and Mobile Networking CMPE 257: Wireless and Mobile Networking Katia Obraczka Computer Engineering UCSC Baskin Engineering Lecture 8 CMPE 257 Spring'15 1 Announcements Project proposals. Feedback. Class schedule updated. Exam:

More information

A Framework for Optimizing IP over Ethernet Naming System

A Framework for Optimizing IP over Ethernet Naming System www.ijcsi.org 72 A Framework for Optimizing IP over Ethernet Naming System Waleed Kh. Alzubaidi 1, Dr. Longzheng Cai 2 and Shaymaa A. Alyawer 3 1 Information Technology Department University of Tun Abdul

More information

Foreword xxiii Preface xxvii IPv6 Rationale and Features

Foreword xxiii Preface xxvii IPv6 Rationale and Features Contents Foreword Preface xxiii xxvii 1 IPv6 Rationale and Features 1 1.1 Internet Growth 1 1.1.1 IPv4 Addressing 1 1.1.2 IPv4 Address Space Utilization 3 1.1.3 Network Address Translation 5 1.1.4 HTTP

More information

Mobile IPv6 Overview

Mobile IPv6 Overview Sungkyunkwan University Prepared by H. Choo Copyright 2000-2018 Networking Laboratory Lecture Outline Network Layer Mobile IPv6 Proxy Mobile IPv6 Networking Laboratory 2/87 Sungkyunkwan University Network

More information

Lecture 6. Internet Security: How the Internet works and some basic vulnerabilities. Thursday 19/11/2015

Lecture 6. Internet Security: How the Internet works and some basic vulnerabilities. Thursday 19/11/2015 Lecture 6 Internet Security: How the Internet works and some basic vulnerabilities Thursday 19/11/2015 Agenda Internet Infrastructure: Review Basic Security Problems Security Issues in Routing Internet

More information

Improving Reliable Transport and Handoff Performance in Cellular Wireless Networks

Improving Reliable Transport and Handoff Performance in Cellular Wireless Networks Improving Reliable Transport and Handoff Performance in Cellular Wireless Networks H. Balakrishnan, S. Seshan, and R. H. Katz ACM Wireless Networks Vol. 1, No. 4, pp. 469-482 Dec. 1995 P. 1 Introduction

More information

Mobility Support in IPv6

Mobility Support in IPv6 Mobility Support in IPv6 Charles E. Perkins David B. Johnson T. J. Watson Research Center Computer Science Department IBM Corporation Carnegie Mellon University Hawthorne, NY 10532 Pittsburgh, PA 15213

More information

A Mobile Host Protocol Supporting Route Optimization and Authentication

A Mobile Host Protocol Supporting Route Optimization and Authentication IEEE Journal on Selected Areas in Communications, special issue on Mobile and Wireless Computing Networks, 13(5):839 849, June 1995. c IEEE. A Mobile Host Protocol Supporting Route Optimization and Authentication

More information

CSE 4215/5431: Mobile Communications Winter Suprakash Datta

CSE 4215/5431: Mobile Communications Winter Suprakash Datta CSE 4215/5431: Mobile Communications Winter 2013 Suprakash Datta datta@cse.yorku.ca Office: CSEB 3043 Phone: 416-736-2100 ext 77875 Course page: http://www.cse.yorku.ca/course/4215 Some slides are adapted

More information

The effect of Mobile IP handoffs on the performance of TCP

The effect of Mobile IP handoffs on the performance of TCP Mobile Networks and Applications 4 (1999) 131 135 131 The effect of Mobile IP handoffs on the performance of TCP Anne Fladenmuller a and Ranil De Silva b a Alcatel CIT, Software Department, Route de Nozay,

More information

Stream Control Transmission Protocol (SCTP)

Stream Control Transmission Protocol (SCTP) Stream Control Transmission Protocol (SCTP) Definition Stream control transmission protocol (SCTP) is an end-to-end, connectionoriented protocol that transports data in independent sequenced streams. SCTP

More information

20-CS Cyber Defense Overview Fall, Network Basics

20-CS Cyber Defense Overview Fall, Network Basics 20-CS-5155 6055 Cyber Defense Overview Fall, 2017 Network Basics Who Are The Attackers? Hackers: do it for fun or to alert a sysadmin Criminals: do it for monetary gain Malicious insiders: ignores perimeter

More information

Mobile IP. Mobile Computing. Mobility versus Portability

Mobile IP. Mobile Computing. Mobility versus Portability Mobile IP Mobile Computing Introduction Amount of mobile/nomadic computing expected to increase dramatically in near future. By looking at the great acceptance of mobile telephony, one can foresee a similar

More information

Introduction to IPv6. IPv6 addresses

Introduction to IPv6. IPv6 addresses Introduction to IPv6 (Chapter 4 in Huitema) IPv6,Mobility-1 IPv6 addresses 128 bits long Written as eight 16-bit integers separated with colons E.g. 1080:0000:0000:0000:0000:0008:200C:417A = 1080::8:800:200C:417A

More information

An Approach to Efficient and Reliable design in Hierarchical Mobile IPv6

An Approach to Efficient and Reliable design in Hierarchical Mobile IPv6 An Approach to Efficient and Reliable design in Hierarchical Mobile IPv6 Taewan You 1, Seungyun Lee 1, Sangheon Pack 2, and Yanghee Choi 2 1 Protocol Engineering Center, ETRI, 161 Gajoung-dong, Yusong-gu,

More information

Fundamental Questions to Answer About Computer Networking, Jan 2009 Prof. Ying-Dar Lin,

Fundamental Questions to Answer About Computer Networking, Jan 2009 Prof. Ying-Dar Lin, Fundamental Questions to Answer About Computer Networking, Jan 2009 Prof. Ying-Dar Lin, ydlin@cs.nctu.edu.tw Chapter 1: Introduction 1. How does Internet scale to billions of hosts? (Describe what structure

More information

Mobility Management. Advanced Mobile Communication Networks. Integrated Communication Systems Group Ilmenau University of Technology

Mobility Management. Advanced Mobile Communication Networks. Integrated Communication Systems Group Ilmenau University of Technology Mobility Management Advanced Mobile Communication Networks Integrated Communication Systems Group Ilmenau University of Technology Motivation The Internet and mobile communication networks are experiencing

More information

IPv6 Protocols and Networks Hadassah College Spring 2018 Wireless Dr. Martin Land

IPv6 Protocols and Networks Hadassah College Spring 2018 Wireless Dr. Martin Land IPv6 1 IPv4 & IPv6 Header Comparison IPv4 Header IPv6 Header Ver IHL Type of Service Total Length Ver Traffic Class Flow Label Identification Flags Fragment Offset Payload Length Next Header Hop Limit

More information

Chapter 7 Transport Layer. 7.0 Introduction 7.1 Transport Layer Protocols 7.2 TCP and UDP 7.3 Summary

Chapter 7 Transport Layer. 7.0 Introduction 7.1 Transport Layer Protocols 7.2 TCP and UDP 7.3 Summary Chapter 7 Transport Layer 7.0 Introduction 7.1 Transport Layer Protocols 7.2 TCP and UDP 7.3 Summary Transport Layer Transportation of Data Role of the Transport Layer The transport layer is responsible

More information

Category: Standards Track June Mobile IPv6 Support for Dual Stack Hosts and Routers

Category: Standards Track June Mobile IPv6 Support for Dual Stack Hosts and Routers Network Working Group H. Soliman, Ed. Request for Comments: 5555 Elevate Technologies Category: Standards Track June 2009 Status of This Memo Mobile IPv6 Support for Dual Stack Hosts and Routers This document

More information