Module 28 Mobile IP: Discovery, Registration and Tunneling

Size: px
Start display at page:

Download "Module 28 Mobile IP: Discovery, Registration and Tunneling"

Transcription

1 Module 28 Mobile IP: Discovery, and Tunneling Learning Objectives Introduction to different phases of Mobile IP Understanding how a mobile node search the agents using Discovery process Understand how care-of-addresses are acquired Understand the registration process in which a mobile registers its care-ofaddresses with Home Agent Understand techniques of Tunneling and encapsulation 1. Introduction In the previous module we have introduced Mobile IP technology, its need in context with the mobile ubiquitous scenario, the components entities and working of Mobile IP. We had learnt that whenever the mobile node travels into a new network, it acquires a temporary address which it informs to its home agent. Any packet for the mobile node is forwarded to the temporary address by the Home Agent by encapsulating it in another packet. To support this functioning, the first thing necessary is that the mobile node understands that it is in a foreign network, search for the foreign agent and obtain COA. Then secondly the mobile node registers COA with the Home agent. Then the mechanisms for tunneling and encapsulations follow. All these activities are performed in three phases identified as: Discovery, and Tunneling. This module aims with deep understanding of these phases and the activities underneath them. 2. Discovery In this phase, the mobile node finds that it is in a foreign network and searches for a foreign agent. This can be done in two ways by agent Advertisements and agent solicitation. 2.1 Agent Advertisement Agent advertisements are used to discover the home and foreign agents while moving from one network area to network. The process is similar as when the internet nodes detect routers by ICMP router discovery protocol (RFC 1256). Therefore the same RFC 1256 is used for agent discovery with the support of mobility by attaching special extensions to ICMP messages. The Home Agent and Foreign Agent periodically send a router advertisement ICMP messages in the form of beacon frames. In this way they show their willingness to act as Mobile IP routers. When the mobile node receives the advertisement; it compares the network part of the agent s IP address with the network part of its own IP address (Home address). A mismatch in network parts indicates that mobile node is in a foreign network. The foreign agent provides foreign-

2 agent care-of-address through agent advertisement which is the address of foreign agent itself. Many nodes can share the same care-of-address which reduces demand of already scarce IPv4 addresses and also IPv6 addresses looking at the sprawl of mobile computing devices. It also reduces bandwidth because foreign agent is end of the tunnel therefore messages from foreign agent to mobile node are not encapsulated. The following Extensions are applied to ICMP router Advertisement and are shown in Figure 1 Original ICMP Packet type =16 length Sequence number registration lifetime R B H F M G r T reserved COA 1 COA 2 Figure 1: Agent Advertisement Packet with Mobility Extension Mobile-IP extension 1) Type = 16 2) Length = number of COA provided with the message. It is equal to 6+4*(no. of addresses) 3) lifetime = maximum lifetime specified by the agent in seconds which the node can request during registration. 4) Sequence No. = total no. of advertisements sent during initialization. 5) The flags after registration lifetime explain the features of advertisement. They are described as: R-bit: registration with this agent is required even when the mobile node uses a colocated COA. B-bit: The Foreign agent is busy to take any registrations H-bit: Agentis home agent F-bit: Agent is foreign agent M-bit: Minimal encapsulation is used for encapsulation G-bit: Generic routing encapsulation is used r-bit: was initially set to V in first version of mobile IP (RFC 2002) suggested use of header compression and should be ignored. T-bit: reverse tunneling. The fields following the flags lists the COAs advertised. The foreign agent should advertise at least one CoA. Home agents do not broadcast care-ofaddresses but they still broadcast mobility agent advertisements which the mobile node knows when they return to their home network.

3 2.2 Agent Solicitation The mobile node can also broadcast an agent solicitation based on RFC 1256 for router solicitations. It will be answered by the foreign agent. A mobile node can search the foreign agent using agent solicitation. To avoid flooding of the network, three solicitations are sent per second as it enters a new network. This gap can be large for dynamic networks with moving mobile nodes or the app s which require continuous packet stream. If a node does not get reply for agent solicitation, it decreases the rate of solicitations to avoid flooding of network. If the mobile node moves to a network that has no foreign agents or all the agents are busy it can acquire a temporary address through DHCP (RFC 2131).The mobile node acts as its own foreign agent and the address obtained as known as co-located care-of-address. 3. Once the care-of-address is achieved through the two steps describe as above the mobile node registers it with its Home agent and informs about the current location where the packets intended for it can be forwarded. The mobile node sends a registration request to the Home Agent with its Care-of address information. The Home Agent receives this request and accepts or reject it andaccordingly sends a registration reply back to the mobile node. The process of registration request depends on the location of COA. Case 1. When care-of-address is of foreign agent In case of foreign agent COA, the registration is done via FA as shown in Figure 2. MN FA HA request request reply reply Figure 2 : process of mobile node with FA COA

4 It involves four steps a. The Mobile node sends a registration request to foreign agent and at the same time requests for forwarding services. b. FA forwards the registration request to the Home agent of that mobile node. c. HA either accepts or rejects the request and sends a registration reply to the FA. d. FA relays this reply to the mobile node. Duringthe registration process, the Home agent maintains mobile binding containing the Home address, Care-of-address and registration lifetime. This is called binding of the mobile node. lifetime is negotiated during registration process and represents validity of registration in seconds. It cannot be greater than provided with agent advertisement. The registration is valid till that period and is automatically deleted after the lifetime expires. The MN registers again before the binding period expires when it moves to another foreign network or when it returns to the Home network. This prevents mobility bindings of the nodes which are no longer used. The registration can be unsuccessful if there are too many tunnels at HA and it cannot handle more requests or when there is authentication failure or HA is not reachable to FA. Case 2. If the mobile node uses co-located address it can directly send request to the Home Agent (Figure 3) MN request HA reply Figure 3: process of mobile node with HA

5 UDP packets used for the registration requests and reply. UDP header for registration request contains the following fields type 1 S B D M G R T x lifetime home address home agent COA Identification extensions Type = 1 for registration request Figure 4: request format 8 bits per flag as follows S bit is set if MN wants previous mobility bindings to be retained hence permitting simultaneous binding. B bit is set if MN wishes to receive broadcast messages which the HA receives in Home network. D bit indicates that MN uses co-located address hence take part in tunnels decapsulation at the end point. M bit indicates that the mode of encapsulation is minimal encapsulation. G bit indicates generic routing encapsulation. T bit indicates reverse tunneling from the FA r & x are set to zero Life time = validity of registration in seconds. A zero indicates the deregistration and all the bits set to one indicates infinite time. Remaining fields are Source address of packet which is interface address of MN. Destination address is that of FA or HA depending on type of COA. COA of the MN at the new agent. Identification which is generated by mobile node to uniquely identify a request and match it with registration reply. This field protects against replay attacks of registrations. Extensions contain parameter for authentication. message between mobile node and home agent should be authenticated to prevent any malicious node to disrupt the traffic between mobile node and foreign agent using bogus care-of-address. Using 128-bit secret key and HMAC-MD5 hashing algorithm, a digital signature is generated. Each mobile node and home agent shares a common secret which makes digital signature unique and allows the agent to authenticate the mobile node.

6 Reply: type = 3 code lifetime Home address Home agent COA Identification extensions Figure 5: reply format UDP datagram for reply contains following words: Type field =3 Code = result of registration as specified in Table 1 Lifetime= For how much time in seconds the registration will be valid in case it was successful Code Explanation Successful 0 accepted 1 accepted, but simultaneous mobility bindings unsupported Denied by FA 66 Insufficient resources 67 Mobile node failed authentication 68 Home agent failed authentication 69 Requested lifetime > advertised limit 88 Home agent unreachable Denied by HA 130 Insufficient resources 131 Mobile node failed authentication 132 Foreign agent failed authentication 133 identification mismatch 136 Unknown Home agent address 4. Tunneling and encapsulation 4.1 Tunneling After the registration process, the HA is informed of COA of the mobile node. When a packet arrives at HA for the mobile node, it forwards it to its COA using a tunnel from HA IP address to the COA. Tunneling means establishment of pipe and pipe is the data stream between two connected ends. Data is inserted from one end and it s retrieved as FIFO words from other end. Tunneling is done using encapsulation.

7 4.2 Encapsulation Encapsulation means putting a packet header and data as data of another packet. Decapsulation means removing the packet out from the data part of that packet.the new header is called outer header or tunnel header. The original header is called inner header. There are different ways of performing encapsulation IP-in-IP encapsulation: In this scheme the home agent adds a new IP header called tunnel header. The new tunnel header uses HA address as source address and mobile node s COA as the tunnel destination address. The tunnel header use 4 as the protocol number indicating that the next protocol header is again an IP header. Sr Dest Proto C M? DATA Encapsulated diagram Sr Dest Proto H CO 4 or 55 Src Dest Proto C M? DATA Home agent Foreign agent Mobile node Figure 6: IP within IP Encapsulation

8 Version = 4 IHL DS (TOS) Total length IP identification flags fragment offset time to live Protocol = 4 Header checksum IP address of HA (source) Care-of-address of MN (Destination) Version = 4 IHL DS (TOS) Total length IP identification flags fragment offset time to live Protocol = 4 Header checksum IP address of CN (source) Home address of MN (Destination) Outer Header Inner Header Minimal Encapsulation (RFC, 2004) Figure 7: IP within IP Encapsulation It is an optional encapsulation. To remove the several redundant fields like TOS, minimal encapsulation is used. The changes are in the inner header. The values of fields reflecting different are Protocol field =55 Destination address is IP address of exit point of tunnel S is original source address present bit; s=1 original source address Length field is incremented by size of forwarded packet. Increments depend on value of s. If s=1,it is 12 octets else it is 8 ver. IHL DS (TOS) length IP identification Flags Fragment offset TTL Protocol =55 IP checksum Lay 4 protocol IP address of HA S reserved IP checksum IP address of MN Original sender IP address (id S=1) TCP/UDP/ payload Figure 8: Minimal Encapsulation

9 4.2.3 Generic routing Encapsulation (RFC 1701, 2784) This method supports encapsulation of packet of one protocol suite into data part of another packet of another network protocol type. In this, an additional GRE header is prepended to the original packet. Both of these are added as data part of new header. Original Header Original data Outer header GRE header Original header Original data New header New data 5. Conclusion In this module, we have elaborately discussed the implementation of Mobile IP technology in different phases. We had understood the methods for agent discovery, registration process and how Home agent performs Tunneling and encapsulation. It can be concluded that Mobile IP technology provides uninterrupted connectivity to the devices moving from one network to another network.

Fixed Internetworking Protocols and Networks. IP mobility. Rune Hylsberg Jacobsen Aarhus School of Engineering

Fixed Internetworking Protocols and Networks. IP mobility. Rune Hylsberg Jacobsen Aarhus School of Engineering Fixed Internetworking Protocols and Networks IP mobility Rune Hylsberg Jacobsen Aarhus School of Engineering rhj@iha.dk 1 2011 ITIFN Mobile computing Vision Seamless, ubiquitous network access for mobile

More information

CSE 4215/5431: Mobile Communications Winter Suprakash Datta

CSE 4215/5431: Mobile Communications Winter Suprakash Datta CSE 4215/5431: Mobile Communications Winter 2013 Suprakash Datta datta@cse.yorku.ca Office: CSEB 3043 Phone: 416-736-2100 ext 77875 Course page: http://www.cse.yorku.ca/course/4215 Some slides are adapted

More information

LECTURE 8. Mobile IP

LECTURE 8. Mobile IP 1 LECTURE 8 Mobile IP What is Mobile IP? The Internet protocol as it exists does not support mobility Mobile IP tries to address this issue by creating an anchor for a mobile host that takes care of packet

More information

Mobile Communications Mobility Support in Network Layer

Mobile Communications Mobility Support in Network Layer Motivation Mobility support needed to be able to use mobile devices in the Mobile devices need IP address for their communication Applications would like to communicate while being on the move Mobile Communications

More information

Mohammad Hossein Manshaei 1393

Mohammad Hossein Manshaei 1393 Mohammad Hossein Manshaei manshaei@gmail.com 1393 Mobile IP 2 Mobile Network Layer: Problems and Concerns Entities and Terminology in Mobile IP Mobile Indirect Routing Mobile IP Agent Advertisement Registration

More information

Mobile Communications Chapter 8: Network Protocols/Mobile IP

Mobile Communications Chapter 8: Network Protocols/Mobile IP Mobile Communications Chapter 8: Network Protocols/Mobile IP Motivation Data transfer, Encapsulation Security, IPv6, Problems Micro mobility support DHCP Ad-hoc networks, Routing protocols Prof. Jó Ueyama

More information

Mobile & Wireless Networking. Lecture 9: Mobile IP. [Schiller, Section 8.1]

Mobile & Wireless Networking. Lecture 9: Mobile IP. [Schiller, Section 8.1] 192620010 Mobile & Wireless Networking Lecture 9: Mobile IP [Schiller, Section 8.1] Geert Heijenk Outline of Lecture 11 q Mobile IP Basics q 3 parts of Mobile IP: q Advertising Care-of Addresses q Registration

More information

Mobile Communications Chapter 9: Network Protocols/Mobile IP

Mobile Communications Chapter 9: Network Protocols/Mobile IP Mobile Communications Chapter 9: Network Protocols/Mobile IP Motivation Data transfer Encapsulation Security IPv6 Problems DHCP Ad-hoc s Routing protocols 9.0.1 Motivation for Mobile IP Routing based on

More information

IPv6 Protocols and Networks Hadassah College Spring 2018 Wireless Dr. Martin Land

IPv6 Protocols and Networks Hadassah College Spring 2018 Wireless Dr. Martin Land IPv6 1 IPv4 & IPv6 Header Comparison IPv4 Header IPv6 Header Ver IHL Type of Service Total Length Ver Traffic Class Flow Label Identification Flags Fragment Offset Payload Length Next Header Hop Limit

More information

This chapter introduces protocols and mechanisms developed for the network

This chapter introduces protocols and mechanisms developed for the network Mobile network layer 8 This chapter introduces protocols and mechanisms developed for the network layer to support mobility. The most prominent example is Mobile IP, discussed in the first section, which

More information

Mobile IP Overview. Based on IP so any media that can support IP can also support Mobile IP

Mobile IP Overview. Based on IP so any media that can support IP can also support Mobile IP Introduction: Mobile IP Overview An Internet Protocol address (IP address) is a numerical label assigned to each device (e.g., computer, printer) participating in a computer network that uses the Internet

More information

Introduction to IPv6. IPv6 addresses

Introduction to IPv6. IPv6 addresses Introduction to IPv6 (Chapter 4 in Huitema) IPv6,Mobility-1 IPv6 addresses 128 bits long Written as eight 16-bit integers separated with colons E.g. 1080:0000:0000:0000:0000:0008:200C:417A = 1080::8:800:200C:417A

More information

IPv6. IPv4 & IPv6 Header Comparison. Types of IPv6 Addresses. IPv6 Address Scope. IPv6 Header. IPv4 Header. Link-Local

IPv6. IPv4 & IPv6 Header Comparison. Types of IPv6 Addresses. IPv6 Address Scope. IPv6 Header. IPv4 Header. Link-Local 1 v4 & v6 Header Comparison v6 Ver Time to Live v4 Header IHL Type of Service Identification Protocol Flags Source Address Destination Address Total Length Fragment Offset Header Checksum Ver Traffic Class

More information

11. IP Mobility 최 양 희 서울대학교 컴퓨터공학부

11. IP Mobility 최 양 희 서울대학교 컴퓨터공학부 11. IP Mobility Introduction Terminal Mobility Person Mobility Network Mobility Internet 2002 Yanghee Choi 2 Mobile IP : Why IP addressing scheme optimized for stationary environment point of attachment

More information

Mobility Management - Basics

Mobility Management - Basics Mobility Management - Basics Summer Semester 2012 Integrated Communication Systems Group Ilmenau University of Technology Content Motivation Problem and possible solutions IP-based mobility management

More information

Outline. CS5984 Mobile Computing. Host Mobility Problem 1/2. Host Mobility Problem 2/2. Host Mobility Problem Solutions. Network Layer Solutions Model

Outline. CS5984 Mobile Computing. Host Mobility Problem 1/2. Host Mobility Problem 2/2. Host Mobility Problem Solutions. Network Layer Solutions Model CS5984 Mobile Computing Outline Host Mobility problem and solutions IETF Mobile IPv4 Dr. Ayman Abdel-Hamid Computer Science Department Virginia Tech Mobile IPv4 1 2 Host Mobility Problem 1/2 Host Mobility

More information

Outline. CS6504 Mobile Computing. Host Mobility Problem 1/2. Host Mobility Problem 2/2. Dr. Ayman Abdel-Hamid. Mobile IPv4.

Outline. CS6504 Mobile Computing. Host Mobility Problem 1/2. Host Mobility Problem 2/2. Dr. Ayman Abdel-Hamid. Mobile IPv4. CS6504 Mobile Computing Outline Host Mobility problem and solutions IETF Mobile IPv4 Dr. Ayman Abdel-Hamid Computer Science Department Virginia Tech Mobile IPv4 1 2 Host Mobility Problem 1/2 Host Mobility

More information

ECS-087: Mobile Computing

ECS-087: Mobile Computing ECS-087: Mobile Computing Mobile IP Most of the slides borrowed from Prof. Sridhar Iyer Diwakar Yagyasen.1 Effect of Mobility on Protocol Stack Application: new applications and adaptations Transport:

More information

Mobile IP. rek. Petr Grygárek Petr Grygarek, Advanced Computer Networks Technologies 1

Mobile IP. rek. Petr Grygárek Petr Grygarek, Advanced Computer Networks Technologies 1 Mobile IP Petr Grygárek rek 1 Basic principle Picture from IOS IP and IP Routing Configuration Guide Mobile node maintains the same IP address even while roaming in foreign networks even if it s address

More information

Introduction to IPv6. IPv6 addresses

Introduction to IPv6. IPv6 addresses Introduction to IPv6 (Chapter4inHuitema) IPv6,Mobility-1 IPv6 addresses 128 bits long Written as eight 16-bit hexadecimal integers separated with colons E.g. 1080:0000:0000:0000:0000:0008:200C:417A = 1080::8:800:200C:417A

More information

Mobile IP. Mobile IP 1

Mobile IP. Mobile IP 1 Mobile IP Mobile IP 1 Motivation for Mobile IP Routing based on IP destination address, network prefix (e.g. 129.13.42) determines physical subnet change of physical subnet implies change of IP address

More information

MOBILE IP AND WIRELESS APPLICATION PROTOCOL

MOBILE IP AND WIRELESS APPLICATION PROTOCOL MOBILE IP AND WIRELESS APPLICATION PROTOCOL In this chapter, we look at two standards that provide application-level support for wireless networking: Mobile IP and Wireless Application Protocol (WAP).

More information

Introduction to IPv6. IPv6 addresses

Introduction to IPv6. IPv6 addresses Introduction to IPv6 (Chapter 4 in Huitema) IPv6,Mobility-1 IPv6 addresses 128 bits long Written as eight 16-bit integers separated with colons E.g. 1080:0000:0000:0000:0000:0008:200C:417A = 1080::8:800:200C:417A

More information

How Mobile IP Works? Presenter: Ajoy Singh

How Mobile IP Works? Presenter: Ajoy Singh How Mobile IP Works? Presenter: Ajoy Singh Agenda Required background What problems does Mobile IP solve? Mobile IP: protocol overview Scope Requirements Design goals Functional entities 5/2/2002 How Mobile

More information

Mobility Management Basics

Mobility Management Basics Mobility Management Basics Summer Semester 2011 Integrated Communication Systems Group Ilmenau University of Technology Content Motivation Problem and possible solutions IP-based mobility management Conclusions

More information

King Fahd University of Petroleum & Minerals Computer Engineering g Dept

King Fahd University of Petroleum & Minerals Computer Engineering g Dept King Fahd University of Petroleum & Minerals Computer Engineering g Dept COE 543 Mobile and Wireless Networks Term 082 Dr. Ashraf S. Hasan Mahmoud Rm 22-148-3 Ext. 1724 Email: ashraf@kfupm.edu.sa 6/1/2009

More information

Mobile IP. Mobile Computing. Mobility versus Portability

Mobile IP. Mobile Computing. Mobility versus Portability Mobile IP Mobile Computing Introduction Amount of mobile/nomadic computing expected to increase dramatically in near future. By looking at the great acceptance of mobile telephony, one can foresee a similar

More information

Network Security. Security of Mobile Internet Communications. Chapter 17. Network Security (WS 2002): 17 Mobile Internet Security 1 Dr.-Ing G.

Network Security. Security of Mobile Internet Communications. Chapter 17. Network Security (WS 2002): 17 Mobile Internet Security 1 Dr.-Ing G. Network Security Chapter 17 Security of Mobile Internet Communications Network Security (WS 2002): 17 Mobile Internet Security 1 Motivation for Mobile IP Routing in the Internet: Based on IP destination

More information

Chapter 8 LOCATION SERVICES

Chapter 8 LOCATION SERVICES Chapter 8 LOCATION SERVICES Distributed Computing Group Mobile Computing Winter 2005 / 2006 Overview Mobile IP Motivation Data transfer Encapsulation Location Services & Routing Classification of location

More information

What is mobility? Mobile IP. Mobility Impact on Protocol Stack (cont.) Advanced Topics in Computer Networks

What is mobility? Mobile IP. Mobility Impact on Protocol Stack (cont.) Advanced Topics in Computer Networks Advanced Topics in Computer Networks What is mobility? spectrum of mobility, from the perspective: Mobile IP no mobility high mobility Chalermek Intanagonwiwat Slides courtesy of James F. Kurose, Keith

More information

Mobility Management. Advanced Mobile Communication Networks. Integrated Communication Systems Group Ilmenau University of Technology

Mobility Management. Advanced Mobile Communication Networks. Integrated Communication Systems Group Ilmenau University of Technology Mobility Management Advanced Mobile Communication Networks Integrated Communication Systems Group Ilmenau University of Technology Motivation The Internet and mobile communication networks are experiencing

More information

Mobile IP Support for RFC 3519 NAT Traversal

Mobile IP Support for RFC 3519 NAT Traversal The Mobile IP: Support for RFC 3519 NAT Traversal feature introduces an alternative method for tunneling Mobile IP data traffic. New extensions in the Mobile IP registration request and reply messages

More information

Mobile Computing. Chapter 8: Mobile Network Layer

Mobile Computing. Chapter 8: Mobile Network Layer Mobile Computing Chapter 8: Mobile Network Layer Prof. Sang-Jo Yoo Contents Mobile IP overview Agent discovery Registration Tunneling DHCP Mobile IP multicasting 2 Motivation for Mobile IP Routing based

More information

Mobility Management. Advanced Mobile Communication Networks. Integrated Communication Systems Group Ilmenau University of Technology

Mobility Management. Advanced Mobile Communication Networks. Integrated Communication Systems Group Ilmenau University of Technology Mobility Management Advanced Mobile Communication Networks Integrated Communication Systems Group Ilmenau University of Technology Motivation The Internet and mobile communication networks are experiencing

More information

Mobile IP. Page 1. 10/5/98 Mohamed Khalil IP10 MKIPM001

Mobile IP. Page 1. 10/5/98 Mohamed Khalil IP10 MKIPM001 Introduction In the last few years the number of notebook users has been increased tremendously, due to the great improvement in this technology with respect to size, speed, and weight. In addition, most

More information

CMPE 257: Wireless and Mobile Networking

CMPE 257: Wireless and Mobile Networking CMPE 257: Wireless and Mobile Networking Katia Obraczka Computer Engineering UCSC Baskin Engineering Lecture 9 CMPE 257 Winter'10 1 Announcements Student presentations: March 8th: Daniel and Teddy March

More information

Mobility Support in Internet and Mobile IP. Gianluca Reali

Mobility Support in Internet and Mobile IP. Gianluca Reali Mobility Support in Internet and Mobile IP Gianluca Reali 1 Problem We have seen that mobile users can change point of attachment In a WLAN, a mobile may change access point. In a cellular network, a mobile

More information

MESSAGES error-reporting messages and query messages. problems processes IP packet specific information

MESSAGES error-reporting messages and query messages. problems processes IP packet specific information ICMP ICMP ICMP is mainly used by operating systems of networked computers to send error messages indicating that a requested service is not available or that host/ router could not be reached. ICMP MESSAGES

More information

Mobile IPv6 Overview

Mobile IPv6 Overview Sungkyunkwan University Prepared by H. Choo Copyright 2000-2018 Networking Laboratory Lecture Outline Network Layer Mobile IPv6 Proxy Mobile IPv6 Networking Laboratory 2/87 Sungkyunkwan University Network

More information

Obsoletes: 2002 January 2002 Category: Standards Track

Obsoletes: 2002 January 2002 Category: Standards Track Network Working Group C. Perkins, Ed. Request for Comments: 3220 Nokia Research Center Obsoletes: 2002 January 2002 Category: Standards Track Status of this Memo IP Mobility Support for IPv4 This document

More information

Mobile IP and Mobile Transport Protocols

Mobile IP and Mobile Transport Protocols Mobile IP and Mobile Transport Protocols 1 IP routing Preliminaries Works on a hop-by-hop basis using a routing table 32 bits: 129.97.92.42 Address = subnet + host (Mobility No packet for you) Two parts»

More information

CMPE 257: Wireless and Mobile Networking

CMPE 257: Wireless and Mobile Networking CMPE 257: Wireless and Mobile Networking Katia Obraczka Computer Engineering UCSC Baskin Engineering Lecture 8 CMPE 257 Winter'11 1 Announcements: Student presentations: Security: Jim. Seth: security in

More information

Mobile Communications Chapter 8: Network Protocols/Mobile IP. Micro mobility support. Routing protocols. Ad-hoc networks. Problems DHCP.

Mobile Communications Chapter 8: Network Protocols/Mobile IP. Micro mobility support. Routing protocols. Ad-hoc networks. Problems DHCP. Mobile Communications Chapter 8: Network Protocols/Mobile IP Motivation Problems Data transfer Micro mobility support Encapsulation DHCP Security Ad-hoc networks IPv6 Routing protocols Prof. Dr.-Ing. Jochen

More information

Packet Header Formats

Packet Header Formats A P P E N D I X C Packet Header Formats S nort rules use the protocol type field to distinguish among different protocols. Different header parts in packets are used to determine the type of protocol used

More information

Mobility Support in Internet and Mobile IP

Mobility Support in Internet and Mobile IP Mobility Support in Internet and Mobile IP CS 515 - Mobile and Wireless Networking İbrahim Körpeoğlu Computer Engineering Department Bilkent University Bilkent / ANKARA İbrahim Körpeoğlu 1 Problem We have

More information

Lecture 7: Mobile IP (Part 1) Dr. Reynold Cheng

Lecture 7: Mobile IP (Part 1) Dr. Reynold Cheng Lecture 7: Mobile IP (Part 1) Dr. Reynold Cheng This lecture is based on the textbook W. Stallings, Wireless Communications and Networks, Prentice Hall, 2005, the slides (prepared by Tom Fronckowiak) and

More information

Smooth Handoff in Mobile IP Master s Thesis by Babak Ayani

Smooth Handoff in Mobile IP Master s Thesis by Babak Ayani Smooth Handoff in Mobile IP Master s Thesis by Babak Ayani 2002-05-14 Department of Microelectronics and Information Technology at KTH Completed at the Department of Electrical Engineering and Computer

More information

IPSec. Slides by Vitaly Shmatikov UT Austin. slide 1

IPSec. Slides by Vitaly Shmatikov UT Austin. slide 1 IPSec Slides by Vitaly Shmatikov UT Austin slide 1 TCP/IP Example slide 2 IP Security Issues Eavesdropping Modification of packets in transit Identity spoofing (forged source IP addresses) Denial of service

More information

CMPE 257: Wireless and Mobile Networking

CMPE 257: Wireless and Mobile Networking CMPE 257: Wireless and Mobile Networking Katia Obraczka Computer Engineering UCSC Baskin Engineering Lecture 8 CMPE 257 Spring'15 1 Announcements Project proposals. Feedback. Class schedule updated. Exam:

More information

CSE 123A Computer Netwrking

CSE 123A Computer Netwrking CSE 123A Computer Netwrking Winter 2005 Mobile Networking Alex Snoeren presenting in lieu of Stefan Savage Today s s issues What are implications of hosts that move? Remember routing? It doesn t work anymore

More information

Last time. BGP policy. Broadcast / multicast routing. Link virtualization. Spanning trees. Reverse path forwarding, pruning Tunneling

Last time. BGP policy. Broadcast / multicast routing. Link virtualization. Spanning trees. Reverse path forwarding, pruning Tunneling Last time BGP policy Broadcast / multicast routing Spanning trees Source-based, group-shared, center-based Reverse path forwarding, pruning Tunneling Link virtualization Whole networks can act as an Internet

More information

IP - The Internet Protocol. Based on the slides of Dr. Jorg Liebeherr, University of Virginia

IP - The Internet Protocol. Based on the slides of Dr. Jorg Liebeherr, University of Virginia IP - The Internet Protocol Based on the slides of Dr. Jorg Liebeherr, University of Virginia Orientation IP (Internet Protocol) is a Network Layer Protocol. IP: The waist of the hourglass IP is the waist

More information

Security Issues In Mobile IP

Security Issues In Mobile IP Security Issues In Mobile IP Zhang Chao Tsinghua University Electronic Engineering 1 OUTLINE 1.Introduction 2.Typical threats 3. Mobile IPv6 and new threats 4.Open issues 2 OUTLINE 1.Introduction 2.Typical

More information

IPv4. Christian Grothoff.

IPv4. Christian Grothoff. IPv4 christian@grothoff.org http://grothoff.org/christian/ Sites need to be able to interact in one single, universal space. Tim Berners-Lee 1 The Network Layer Transports datagrams from sending to receiving

More information

Network Layer (4): ICMP

Network Layer (4): ICMP 1 Network Layer (4): ICMP Required reading: Kurose 4.4.3, 4.4.4 CSE 4213, Fall 2006 Instructor: N. Vlajic 2 1. Introduction 2. Network Service Models 3. Architecture 4. Network Layer Protocols in the Internet

More information

Internet Control Message Protocol

Internet Control Message Protocol Internet Control Message Protocol The Internet Control Message Protocol is used by routers and hosts to exchange control information, and to inquire about the state and configuration of routers and hosts.

More information

Mobile Communications Chapter 8: Network Protocols/Mobile IP

Mobile Communications Chapter 8: Network Protocols/Mobile IP Mobile Communications Chapter 8: Network Protocols/Mobile IP Motivation Data transfer, Encapsulation Security, IPv6, Problems Micro mobility support DHCP Ad-hoc networks, Routing protocols 8.1 Motivation

More information

Use of IPSec in Mobile IP

Use of IPSec in Mobile IP Department of Electrical and Computer Engineering ELEG 777 Internet Engineering ( TERM PAPER ) Use of IPSec in Mobile IP DONE BY: SALEM ITANI ID #: 20011003 SUBMITTED TO: Dr. AYMAN KAYSSI DATE: MAY 21,

More information

Communications Software. CSE 123b. CSE 123b. Spring Lecture 10: Mobile Networking. Stefan Savage

Communications Software. CSE 123b. CSE 123b. Spring Lecture 10: Mobile Networking. Stefan Savage CSE 123b CSE 123b Communications Software Spring 2003 Lecture 10: Mobile Networking Stefan Savage Quick announcement My office hours tomorrow are moved to 12pm May 6, 2003 CSE 123b -- Lecture 10 Mobile

More information

Quick announcement. CSE 123b Communications Software. Last class. Today s issues. The Mobility Problem. Problems. Spring 2003

Quick announcement. CSE 123b Communications Software. Last class. Today s issues. The Mobility Problem. Problems. Spring 2003 CSE 123b Communications Software Quick announcement My office hours tomorrow are moved to 12pm Spring 2003 Lecture 10: Mobile Networking Stefan Savage May 6, 2003 CSE 123b -- Lecture 10 Mobile IP 2 Last

More information

SJTU 2018 Fall Computer Networking. Wireless Communication

SJTU 2018 Fall Computer Networking. Wireless Communication SJTU 2018 Fall Computer Networking 1 Wireless Communication Internet Protocol Stack 2 Application: supporting network applications - FTP, SMTP, HTTP Transport: data transfer between processes - TCP, UDP

More information

On using Mobile IP Protocols

On using Mobile IP Protocols Journal of Computer Science 2 (2): 211-217, 2006 ISSN 1549-3636 2006 Science Publications On using Mobile IP Protocols Fayza A. Nada Faculty of Computers and Information, Suez Canal University, Ismailia,

More information

TSIN02 - Internetworking

TSIN02 - Internetworking Lecture 2: Internet Protocol Literature: Forouzan: ch (4-6), 7-9 and ch 31 2004 Image Coding Group, Linköpings Universitet Lecture 2: IP Goals: Understand the benefits Understand the architecture IPv4

More information

Request for Comments: Wichorus G. Tsirtsis Qualcomm T. Ernst INRIA K. Nagami INTEC NetCore October 2009

Request for Comments: Wichorus G. Tsirtsis Qualcomm T. Ernst INRIA K. Nagami INTEC NetCore October 2009 Network Working Group Request for Comments: 5648 Category: Standards Track R. Wakikawa, Ed. Toyota ITC V. Devarapalli Wichorus G. Tsirtsis Qualcomm T. Ernst INRIA K. Nagami INTEC NetCore October 2009 Multiple

More information

CSE 123b Communications Software

CSE 123b Communications Software CSE 123b Communications Software Spring 2004 Lecture 9: Mobile Networking Stefan Savage Quick announcements Typo in problem #1 of HW #2 (fixed as of 1pm yesterday) Please consider chapter 4.3-4.3.3 to

More information

Quick announcements. CSE 123b Communications Software. Today s issues. Last class. The Mobility Problem. Problems. Spring 2004

Quick announcements. CSE 123b Communications Software. Today s issues. Last class. The Mobility Problem. Problems. Spring 2004 CSE 123b Communications Software Spring 2004 Lecture 9: Mobile Networking Quick announcements Typo in problem #1 of HW #2 (fixed as of 1pm yesterday) Please consider chapter 4.3-4.3.3 to be part of the

More information

Binding information contains the entries in the mobility binding table.

Binding information contains the entries in the mobility binding table. GLOSSARY Numerics 802.11b/g An IEEE specification for a wireless LAN airlink. A agent advertisement agent discovery agent solicitation An advertisement message constructed by attachment of a special extension

More information

Modification to Ipv6 Neighbor Discovery and Mobile Node Operation

Modification to Ipv6 Neighbor Discovery and Mobile Node Operation RESEARCH INVENTY: International Journal of Engineering and Science ISSN: 2278-4721, Vol. 1, Issue 6 (October 2012), PP 39-49 www.researchinventy.com Modification to Ipv6 Neighbor Discovery and Mobile Node

More information

Deploying Mobile IP. Session ACC Copyright 2003, Cisco Systems, Inc. All rights reserved. Printed in USA. 8018_05_2003_c1.

Deploying Mobile IP. Session ACC Copyright 2003, Cisco Systems, Inc. All rights reserved. Printed in USA. 8018_05_2003_c1. Deploying Mobile IP Session 2 Copyright Printed in USA. Agenda What Is Mobility Mobile IP Enterprise Mobile IP Clients Proxy Mobile IP Cisco IOS Mobile Networks Closing and Futures 3 What Is Mobility?

More information

EEC-684/584 Computer Networks

EEC-684/584 Computer Networks EEC-684/584 Computer Networks Lecture 14 wenbing@ieee.org (Lecture nodes are based on materials supplied by Dr. Louise Moser at UCSB and Prentice-Hall) Outline 2 Review of last lecture Internetworking

More information

Internet. 1) Internet basic technology (overview) 3) Quality of Service (QoS) aspects

Internet. 1) Internet basic technology (overview) 3) Quality of Service (QoS) aspects Internet 1) Internet basic technology (overview) 2) Mobility aspects 3) Quality of Service (QoS) aspects Relevant information: these slides (overview) course textbook (Part H) www.ietf.org (details) IP

More information

Charles Perkins Nokia Research Center 2 July Mobility Support in IPv6 <draft-ietf-mobileip-ipv6-14.txt> Status of This Memo

Charles Perkins Nokia Research Center 2 July Mobility Support in IPv6 <draft-ietf-mobileip-ipv6-14.txt> Status of This Memo IETF Mobile IP Working Group INTERNET-DRAFT David B. Johnson Rice University Charles Perkins Nokia Research Center 2 July 2000 Mobility Support in IPv6 Status of This

More information

Internet Networking recitation #2 IP Checksum, Fragmentation

Internet Networking recitation #2 IP Checksum, Fragmentation Internet Networking recitation #2 IP Checksum, Fragmentation Winter Semester 2012, Dept. of Computer Science, Technion 1 IP Header Diagram Ver. IHL TOS Total Length Identification Flags Fragment Offset

More information

Aalborg University Institute of Electronic Systems - Communication Networks - 6th Semester

Aalborg University Institute of Electronic Systems - Communication Networks - 6th Semester Aalborg University Institute of Electronic Systems - Communication Networks - 6th Semester TITLE: Experimental Analysis of Mobility Support Schemes for Vertical Handover SUBJECT: Basic Wireless Communication

More information

HY 335 Φροντιστήριο 8 ο

HY 335 Φροντιστήριο 8 ο HY 335 Φροντιστήριο 8 ο Χειμερινό Εξάμηνο 2009-2010 Παπακωνσταντίνου Άρτεμις artpap@csd.uoc.gr 4/12/2009 Roadmap IP: The Internet Protocol IPv4 Addressing Datagram Format Transporting a datagram from source

More information

Chapter 6 MOBILE IP AND TCP

Chapter 6 MOBILE IP AND TCP Chapter 6 MOBILE IP AND TCP Distributed Computing Group Mobile Computing Summer 2004 Overview Network Protocols / Mobile IP Motivation Data transfer Encapsulation Problems DHCP Mobile Transport Layer /

More information

Chapter 4: outline. 4.5 routing algorithms link state distance vector hierarchical routing. 4.6 routing in the Internet RIP OSPF BGP

Chapter 4: outline. 4.5 routing algorithms link state distance vector hierarchical routing. 4.6 routing in the Internet RIP OSPF BGP Chapter 4: outline 4.1 introduction 4.2 virtual circuit and datagram networks 4.3 what s inside a router 4.4 IP: Internet Protocol datagram format IPv4 addressing ICMP 4.5 routing algorithms link state

More information

Position of IP and other network-layer protocols in TCP/IP protocol suite

Position of IP and other network-layer protocols in TCP/IP protocol suite Position of IP and other network-layer protocols in TCP/IP protocol suite IPv4 is an unreliable datagram protocol a best-effort delivery service. The term best-effort means that IPv4 packets can be corrupted,

More information

ET4254 Communications and Networking 1

ET4254 Communications and Networking 1 Topic 9 Internet Protocols Aims:- basic protocol functions internetworking principles connectionless internetworking IP IPv6 IPSec 1 Protocol Functions have a small set of functions that form basis of

More information

Category: Standards Track June Mobile IPv6 Support for Dual Stack Hosts and Routers

Category: Standards Track June Mobile IPv6 Support for Dual Stack Hosts and Routers Network Working Group H. Soliman, Ed. Request for Comments: 5555 Elevate Technologies Category: Standards Track June 2009 Status of This Memo Mobile IPv6 Support for Dual Stack Hosts and Routers This document

More information

Introduction Mobility Support Handover Management Conclutions. Mobility in IPv6. Thomas Liske. Dresden University of Technology

Introduction Mobility Support Handover Management Conclutions. Mobility in IPv6. Thomas Liske. Dresden University of Technology 2005 / High Speed Networks II Outline Introduction Mobility Support Overview of IPv6 Mobility Support Handover Management Mobility Support What means Mobility Support? allow transparent routing of IPv6

More information

Network Layer. Mobile IP. Slides adapted from Prof. Dr.-Ing. Jochen H. Schiller and W. Stallings

Network Layer. Mobile IP. Slides adapted from Prof. Dr.-Ing. Jochen H. Schiller and W. Stallings Network Layer Mobile IP Slides adapted from Prof. Dr.-Ing. Jochen H. Schiller and W. Stallings 1 Mobile IP - Definition Mobile IP (MIP) is a modification to IP that allows nodes to continue to receive

More information

Mobility Support in IPv6

Mobility Support in IPv6 Mobility Support in IPv6 Charles E. Perkins David B. Johnson T. J. Watson Research Center Computer Science Department IBM Corporation Carnegie Mellon University Hawthorne, NY 10532 Pittsburgh, PA 15213

More information

ECE4110 Internetwork Programming. Introduction and Overview

ECE4110 Internetwork Programming. Introduction and Overview ECE4110 Internetwork Programming Introduction and Overview 1 EXAMPLE GENERAL NETWORK ALGORITHM Listen to wire Are signals detected Detect a preamble Yes Read Destination Address No data carrying or noise?

More information

History Page. Barracuda NextGen Firewall F

History Page. Barracuda NextGen Firewall F The Firewall > History page is very useful for troubleshooting. It provides information for all traffic that has passed through the Barracuda NG Firewall. It also provides messages that state why traffic

More information

CS 356: Computer Network Architectures. Lecture 15: DHCP, NAT, and IPv6. [PD] chapter 3.2.7, 3.2.9, 4.1.3, 4.3.3

CS 356: Computer Network Architectures. Lecture 15: DHCP, NAT, and IPv6. [PD] chapter 3.2.7, 3.2.9, 4.1.3, 4.3.3 CS 356: Computer Network Architectures Lecture 15: DHCP, NAT, and IPv6 [PD] chapter 3.2.7, 3.2.9, 4.1.3, 4.3.3 Xiaowei Yang xwy@cs.duke.edu Dynamic Host Configuration Protocol (DHCP) Dynamic Assignment

More information

IP - The Internet Protocol

IP - The Internet Protocol IP - The Internet Protocol 1 Orientation IP s current version is Version 4 (IPv4). It is specified in RFC 891. TCP UDP Transport Layer ICMP IP IGMP Network Layer ARP Network Access Link Layer Media 2 IP:

More information

CSEP 561 Internetworking. David Wetherall

CSEP 561 Internetworking. David Wetherall CSEP 561 Internetworking David Wetherall djw@cs.washington.edu Internetworking t Focus: Joining multiple, different networks into one larger network Forwarding models Application Heterogeneity Transport

More information

UNIT III THE NETWORK LAYER

UNIT III THE NETWORK LAYER UNIT III THE NETWORK LAYER Introduction-Virtual Circuit and Datagram Networks- Inside a Router- The Internet Protocol (IP): Forwarding and Addressing in the Internet-Routing Algorithms Routing in the Internet-Broadcast

More information

P A R T T W O MOBILE IPv6

P A R T T W O MOBILE IPv6 P A R T T W O MOBILE IPv6 Mobile IPv6 T H R E E Consider a scenario where you had to change your place of residence on a semipermanent basis, for instance, due to relocation of your company. One problem

More information

FA Service Configuration Mode Commands

FA Service Configuration Mode Commands FA Service Configuration Mode Commands The Foreign Agent Service Configuration Mode is used to create and manage the Foreign Agent (FA) services associated with the current context. Important The commands

More information

Telecom Systems Chae Y. Lee. Contents. Overview. Issues. Addressing ARP. Adapting Datagram Size Notes

Telecom Systems Chae Y. Lee. Contents. Overview. Issues. Addressing ARP. Adapting Datagram Size Notes Internetworking Contents Overview Functions Issues Basic Delivery Unit Addressing Datagram Delivery ARP IPv4 Header Adapting Datagram Size Notes 2 Overview - Example 3 Direct Delivery 4 Indirect Delivery

More information

Chapter 8 roadmap. Network Security

Chapter 8 roadmap. Network Security Chapter 8 roadmap 8.1 What is network security? 8.2 Principles of cryptography 8.3 Message integrity 8.4 Securing e-mail 8.5 Securing TCP connections: SSL 8.6 Network layer security: IPsec 8.7 Securing

More information

IPSec. Overview. Overview. Levente Buttyán

IPSec. Overview. Overview. Levente Buttyán IPSec - brief overview - security associations (SAs) - Authentication Header (AH) protocol - Encapsulated Security Payload () protocol - combining SAs (examples) Overview Overview IPSec is an Internet

More information

Packetization Layer Path Maximum Transmission Unit Discovery (PLPMTU) For IPsec Tunnels

Packetization Layer Path Maximum Transmission Unit Discovery (PLPMTU) For IPsec Tunnels Packetization Layer Path Maximum Transmission Unit Discovery (PLPMTU) For IPsec Tunnels draft-spiriyath-ipsecme-dynamic-ipsec-pmtu-01 Shibu Piriyath, Umesh Mangla, Nagavenkata Suresh Melam, Ron Bonica

More information

OSI Network Layer. Network Fundamentals Chapter 5. Version Cisco Systems, Inc. All rights reserved. Cisco Public 1

OSI Network Layer. Network Fundamentals Chapter 5. Version Cisco Systems, Inc. All rights reserved. Cisco Public 1 OSI Network Layer Network Fundamentals Chapter 5 Version 4.0 1 Objectives Identify the role of the Network Layer, as it describes communication from one end device to another end device. Examine the most

More information

SR for SD-WAN over hybrid networks

SR for SD-WAN over hybrid networks SR for SD-WAN over hybrid networks to optimize SD-WAN services over long distance https://datatracker.ietf.org/doc/draft-dunbar-sr-sdwan-over-hybrid-networks/ Linda.Dunbar@Huawei.com Mehmet.toy@Verizon

More information

Internet Control Message Protocol (ICMP)

Internet Control Message Protocol (ICMP) Internet Control Message Protocol (ICMP) 1 Overview The IP (Internet Protocol) relies on several other protocols to perform necessary control and routing functions: Control functions (ICMP) Multicast signaling

More information

Internet Protocols (chapter 18)

Internet Protocols (chapter 18) Internet Protocols (chapter 18) CSE 3213 Fall 2011 Internetworking Terms 1 TCP/IP Concepts Connectionless Operation Internetworking involves connectionless operation at the level of the Internet Protocol

More information

IPv6 Protocol. Does it solve all the security problems of IPv4? Franjo Majstor EMEA Consulting Engineer Cisco Systems, Inc.

IPv6 Protocol. Does it solve all the security problems of IPv4? Franjo Majstor EMEA Consulting Engineer Cisco Systems, Inc. IPv6 Protocol Does it solve all the security problems of IPv4? Franjo Majstor EMEA Consulting Engineer fmajstor@cisco.com Cisco Systems, Inc. 1 Agenda IPv6 Primer IPv6 Protocol Security Dual stack approach

More information