Mobile IPv6 Overview

Size: px
Start display at page:

Download "Mobile IPv6 Overview"

Transcription

1 Sungkyunkwan University Prepared by H. Choo Copyright Networking Laboratory

2 Lecture Outline Network Layer Mobile IPv6 Proxy Mobile IPv6 Networking Laboratory 2/87

3 Sungkyunkwan University Network Layer Computer Networks: A Top-Down Approach, 2013 by B. Forouzan and F. Mosharraf McGraw-Hill Science Engineering Copyright Networking Laboratory

4 Contents Network Layer Introduction Network Layer Services Network Layer Protocol IPv4 IPv6 Networking Laboratory 4/87

5 Network Layer Introduction (1/2) VIDEO Video Content The video lets you have a view with a route of data packet on the Internet One of trillions involved in the trillions of Internet interactions that happen every second Look deep beneath the surface of the most basic Internet transaction, and follow the packet as it flows from your fingertips, through circuits, wires, and cables, to a host server, and then back again, all in less than a second Link: Networking Laboratory 5/87

6 Network Layer Introduction (2/2) [Fig 4.1 Communication at the network layer ] Networking Laboratory 6/87

7 Network Layer Introduction Network-layer Services: Packetizing Encapsulating the payload (data received from upper layer) in a network-layer packet at the source If the content of the payload is too large, it needs to be fragmented Decapsulating the payload from the network layer packet at the destination If the packet is fragmented at the source or at routers along the path, the network layer is responsible for waiting until all fragments arrive, reassembling them, and delivering to the upper-layer Networking Laboratory 7/87

8 Network Layer Introduction Network-Layer Services: Routing and Forwarding Routing Since a physical network is a combination of networks (LANs and WANs), therefore, there is more than one route from the source to the destination We have to find the best one among these possible routes Forwarding Move packets from router s input to appropriate router output Forwarding value Send the packet out of interface 2 B Data B Data [ Fig 4.2 Forwarding process ] Networking Laboratory 8/87

9 Network Layer Protocol IPv4 An IP address is a 32-bit address The IP addresses are unique The address space of IPv4 is 2 32 or 4, 294, 967, 296 Notation Binary Notation : In binary notation, the IP address is displayed as 32 bits Dotted-Decimal Notation : Internet addresses are usually written in decimal form with a decimal point separating the bytes [ Fig 4.29 Three different notations in IPv4 addressing ] Networking Laboratory 9/87

10 Network-Layer Protocol IP Datagram Format (1/11) Packets used by the IP are called IP datagrams [ Fig 4.24 IP datagram ] Networking Laboratory 10/87

11 Network-Layer Protocol IP Datagram Format (2/11) Version (VER) 4-bit field which defines the version of the IP protocol Currently the version is 4 Version 6 may totally replace version 4 in the future If the machine is using some other version of IP, the datagram is discarded Header length (HLEN) 4-bit field which defines the total length of the datagram header in 4-byte words This field is needed because the head length is variable Service type 8-bit field which was referred to as type of service (TOS) Networking Laboratory 11/87

12 Network-Layer Protocol IP Datagram Format (3/11) Total length 16-bit field which defines the total length of the IP datagram in bytes Length of data = total length header length This field is necessary in case that the padding is added in the frame Length: Minimum 46 bytes L2 header Data < 46 bytes Padding L2 Trailer [ Encapsulation of a small datagram in an Ethernet frame ] Identification: 16-bit field which is used in fragmentation Networking Laboratory 12/87

13 Network-Layer Protocol IP Datagram Format (4/11) Flags 3-bit field which is used in fragmentation Time to live A datagram has a limited lifetime in its travel through an internet This field is originally designed to hold a timestamp, which was decremented by each visited router This field is mostly used to control the maximum number of hops visited by the datagram. This value is approximately two times the maximum number of routers between any two hosts If the value is zero, the router discards the datagram Networking Laboratory 13/87

14 Network-Layer Protocol IP Datagram Format (5/11) Protocol: 8-bit field which defines the higher level protocol that uses the services of the IP layer [ Figure 4.25: Multiplexing and demultiplexing using the value of the protocol field ] Networking Laboratory 14/87

15 Network-Layer Protocol IP Datagram Format (6/11) Checksum 16-bit field used for error check using checksum Source address 32-bit field which defines the IP address of the source Destination address 32-bit field which defines the IP address of the destination Networking Laboratory 15/87

16 Network-Layer Protocol IP Datagram Format (7/11) Maximum Transfer Unit: when a datagram is encapsulated in a frame, the total size of the datagram must be less than MTU [ Figure 4.26: Maximum transfer unit (MTU) ] Networking Laboratory 16/87

17 Network-Layer Protocol IP Datagram Format (8/11) Fields Related to Fragmentation: Fragmentation is to divide the datagram to make it possible to pass through a network The source usually does not fragment the IP packet When a datagram is fragmented, each fragment has its own header with most of the fields repeated, but some changed The reassembly of the datagram is done only by the destination host Networking Laboratory 17/87

18 Network-Layer Protocol IP Datagram Format (9/11) Fields Related to Fragmentation Identification (16-bit) This field identifies a datagram originating from the source host The combination of the identification and source IP address must uniquely define a datagram as it leaves the source host The identification number helps the destination in reassembling the datagram Flags (3-bit) The first bit is reserved The second bit is called the do not fragment bit The third bit is called the more fragment bit D: Do not fragment M: more fragment D M Networking Laboratory 18/87

19 Network-Layer Protocol IP Datagram Format (10/11) Fields Related to Fragmentation Fragmentation offset (13-bit) This is offset of the data in the original datagram measured in units of 8 bytes [ Fig 4.27 Fragmentation examples ] Networking Laboratory 19/87

20 Network-Layer Protocol IP Datagram Format (11/11) An example of fragmentation [ Fig 4.28 Detailed fragmentation example ] Networking Laboratory 20/87

21 Network Layer Protocol IPv6 (1/2) An IPv6 address is 128 bits long. Compared with the 32-bit address of IPv4, this is a huge (2 96 times) increase in the address space The main changes in the IPv6 protocol: Larger address space. Better header format: IPv6 uses a new header format in which options are separated from the base header and inserted. This simplifies and speeds up the routing process because most of the options do not need to be checked by routers New options: IPv6 has new options to allow for additional functionalities Allowance for extension: to allow the extension of the protocol if required by new technologies or applications Support for resource allocation: two new fields, traffic class and flow label, have been added to enable the source to request special handling of the packet. E.g. support traffic such as real-time audio and video Support for more security: providing the encryption and authentication options Networking Laboratory 21/87

22 Network Layer Protocol IPv6 (2/2) VIDEO Video Content When the Internet was launched in 1983, no one ever dreamed that there might be billions of devices and users trying to get online But like a telephone network that is running out of phone numbers, the current Internet is running out of IP addresses And if we don't roll out Internet Protocol v6 (IPv6), we won't have the room we need to grow and the Internet would become tangled, unsafe and unsustainable Link: Networking Laboratory 22/87

23 Sungkyunkwan University Mobile IPv6 Mobile IPv6 (Mobility in a Wireless Internet) by Hesham Soliman Addison Wesley Publisher Copyright Networking Laboratory

24 Contents MIPv6 Introduction MIPv6 Scenario MIPv6 Messages MIPv6 Mobility Support Route Optimization Route Optimized Packets Proxy MIPv6 Networking Laboratory 24/87

25 MIPv6 Introduction Mobile IPv6 is for supporting mobility in IPv6 While devices move to another place, something happens To maintain ongoing connections while moving, Mobile IPv6 uses the redirection function provided by some mechanism How Mobile IPv6 provides reachability and maintenance of ongoing connections without any collisions and errors Overview of Mobile IPv6 Networking Laboratory 25/87

26 MIPv6 Introduction Terminology (MN, CN, HoA) Mobile Node (MN) A node that changes its location within the Internet topology Correspondent Node (CN) Any node that communicates with the MN Home Address (HoA) A stable address that belongs to the MN Used by CNs to reach MN Networking Laboratory 26/87

27 MIPv6 Introduction Terminology (Links, HA) Home Link A link to which the home address prefix is assigned Home Agent (HA) A router located on the home link Redirects packets addressed to the MN Foreign Link Any links (other than the home link) visited by the MN Networking Laboratory 27/87

28 MIPv6 Introduction Terminology (CoA, Binding) Care-of address (CoA) An address assigned to the MN when located in Foreign Link Based on the prefix of the Foreign Link combined with the MN s interface identifier Identifies the current location of the MN Binding The association of the MN s HoA with a CoA (between the stable home address and the MN s current location) Binding is refreshed or updated when the MN has a new CoA (because it has moved to a new link) Networking Laboratory 28/87

29 MIPv6 Introduction Terminology (Binding Cache, BUL) Binding Cache A cache stored in volatile memory containing a number of bindings Maintained by both the CN and HA Contains the MN s HoA, CoA and lifetime Binding Update List (BUL) A list maintained by the MN in volatile memory Maintained for the MN to know when a binding needs to be refreshed Networking Laboratory 29/87

30 MIPv6 Introduction Introduction Video VIDEO Content Introduction of terminologies in MIPv6 Brief introduction of MIPv6 operation Duration 7 minutes and 33 seconds Networking Laboratory 30/87

31 MIPv6 Introduction Overview of Mobile IPv6 (1/2) MIPv6 was designed to allow an MN to be reachable and to maintain ongoing connections while changing the MN s location MIPv6 uses a stable IP address assigned to MN i.e. HoA (Home Address) The reasons for uses of the HoA To be reachable by having a stable entry in the DNS To hide the IP layer mobility from upper layers Networking Laboratory 31/87

32 MIPv6 Introduction Overview of Mobile IPv6 (2/2) In order for nodes to be reachable The address should not be changed every time they move the need for the HoA provided by MIPv6 Why keeping a stable address independently of the MN s location? All CNs try to reach the MN, without knowing the actual location of the MN Networking Laboratory 32/87

33 MIPv6 Scenario Operation of Mobile Node (1/2) MN s Home Address (HoA) is formed by appending an interface identifier to the prefix advertised on the Home Link MN operates like any other IPv6 nodes while at home receives packets addressed to any of its HoAs delivered via normal routing Networking Laboratory 33/87

34 MIPv6 Scenario Operation of Mobile Node (2/2) When the MN moves from Home Link to the Foreign Link MN forms the CoA based on the prefix of the Foreign Link MN informs the Home Agent By sending a Binding Update (BU) message BU contains the MN s Home Address and its CoA Home Agent needs to store Binding Update to forward packets to the MN Binding cache contains all bindings for the Mobile Nodes Each entry in the binding cache stores a binding for one home address Networking Laboratory 34/87

35 MIPv6 Scenario Operation of Home Agent (1/3) When the Home Agent receives the binding update HA searches its binding cache to see if an entry already exists If the entry already exists updates that entry with the new information received Otherwise, a new one is created Home Agent acts as a proxy for the Mobile Node on the Foreign Link Networking Laboratory 35/87

36 MIPv6 Scenario Operation of Home Agent (2/3) To ensure this representation is understood by all nodes on the home link HA sends a proxy neighbor advertisement to the all-node multicast address The advertisement includes (in the target address field) the MN s home address the HA s link-layer address Then, packets to the MN is forwarded to the Home Agent s Link- Layer address Networking Laboratory 36/87

37 MIPv6 Scenario Operation of Home Agent (3/3) Networking Laboratory 37/87

38 MIPv6 Scenario Tunneling (CN->MN) Upon receiving a packet addressed to the Mobile Node HA checks its binding cache When entry is found, the packet is tunneled to the MN s CoA Src: CN address Dst: MN home address Src: HA address Dst: MN care-of address Original packet Outer header Original packet Src: CN address Dst: MN home address Packet from CN to MN s home address HA Tunnelled packet Networking Laboratory 38/87

39 MIPv6 Scenario Tunneling (MN->CN) The tunnel is bidirectional and when the MN sends any packets MN tunnels them first to the HA HA decapsulates the packet and forwards the original one to its destination Src: MN home address Dst: CN address Src: MN care-of address Dst: HA address Original packet Outer header Original packet Src: MN home address Dst: CN address Packet sent from MN to CN HA Tunnelled packet from MN Networking Laboratory 39/87

40 MIPv6 Scenario Tunneling (Figure) Home Link Home Agent IPv6 packets Mobile IPv6 messages Foreign Link Correspondent Node Mobile Node Foreign Link Networking Laboratory 40/87

41 MIPv6 Scenario Tunneling (Transparency) Tunneling is required to ensure the transparency of the service provided by the Home Agent To preserve the end-to-end nature of packets exchanged between the MN and CNs Routers must not modify the content of source and destination addresses in the IP header Thereby, preserves the integrity of the packet and allows end-to-end integrity checks Tunneling is essential to maintain transparency for upper layers If the HA rewrites the destination address in the packet Packet s integrity is compromised Causing the Authentication Header to fail Networking Laboratory 41/87

42 Practice Problem What is the difference between Home Address (HoA) and Care of Address (CoA)? HoA is assigned by Home Agent in the home network, and is fixed for the mobile node. Whereas, CoA is assigned by the Foreign Agent in the foreign network and is temporary Networking Laboratory 42/87

43 MIPv6 Messages IPv6 Header Version: 4-bit IP version Class: Traffic Class (Congestion control and non-congestion control traffic) Flow Label: QoS Management Next Header: Specifies the next encapsulated protocol. Hop Limit: Replaces the time to live field of IPv4 Networking Laboratory 43/87

44 MIPv6 Messages Next Header Fields Value Header 0 Hop-by-Hop Options Header 6 TCP 17 UDP 41 Encapsulated IPv6 Header 43 Routing Header 44 Fragment Header 50 Encapsulating Security Payload 51 Authentication Header 58 ICMPv6 (Internet Control Message Protocol Version 6) 59 No Next Header 60 Destination Options Header 135 Mobility Header Networking Laboratory 44/87

45 MIPv6 Messages Chain of the Next Header Fields IPv6 Header Next Header = 6 (TCP) TCP Segment IPv6 Header Next Header = 43 (Routing) Routing Header Next Header = 17 (UDP) UDP Segment IPv6 Header Next Header = 43 (Routing) Routing Header Next Header = 51 (AH) Authentication Header Next Header = 6 (TCP) TCP Segment Networking Laboratory 45/87

46 MIPv6 Messages Extension Header Order All the IPv6 nodes on the path need to process the options in this header For intermediate destination For final destination Networking Laboratory 46/87

47 MIPv6 Messages Binding Updates and Binding Acks MN ensures that it has a binding with Home Agent If the binding is lost or the Binding Update message was not received MN will be unreachable while away from home Hence, a reliable protocol is required to install a binding in the Home Agent s binding cache Home Agent is required to acknowledge the Binding Update message sent by the Mobile Node BU and BA included in Mobility Header Networking Laboratory 47/87

48 MIPv6 Messages BU, BA and Mobility Header Mobility Header is used to carry all MIPv6 messages Format 8bit 8bit 8bit 8bit Payload protocol Header length MH Type reserved Checksum Message Data Message Data Payload protocol field: Indicates the type of the following header Header length field: Indicates the length of this extension header Mobility header (MH) type field: Used as a switch to indicate which message is included in the mobility header Binding Update has the MH Type value 5 Binding Acknowledgement has the MH Type value 6 Networking Laboratory 48/87

49 MIPv6 Messages BU Message 8bit 8bit 16bit Sequence number A H L K Reserved Lifetime A (Acknowledge) flag: Acknowledgment is required H (Home Registration) flag: Binding Update is sent to a home agent L (Link-Local Address Compatibility) flag: The home address reported by the mobile node has the same interface identifier as the mobile node's link-local address K (Key Management Mobility Capability) flag: Indicates whether the protocol used to establish a security association between the MN and HA must be rerun every time the MN moves, e.g. IPsec Lifetime field: 16-bit unsigned integer The number of time units remaining before the binding MUST be considered expired A value of zero indicates that the Binding Cache entry for the mobile node MUST be deleted One time unit is 4 seconds Networking Laboratory 49/87

50 MIPv6 Messages BA Message 8bit 8bit 16bit Status K Reserved Sequence number Lifetime Status field: Success or failure of the binding Value below 128 indicate success Rest of the value indicate the reasons for failure If MN does not receive BA, MN continues to retransmit the BU Until an ACK is received or Until a maximum timeout value (256 sec) is reached After receiving the BA from the HA, the MN needs to ensure that information is stored to be able to refresh the binding For this purpose, MN maintains a data structure called the binding update list Networking Laboratory 50/87

51 MIPv6 Messages Binding Cache Structure Maintained by HA and CNs Home Address Care of Address Remaining Lifetime Flag Max. value of SN Recent usage inform. Home Address : HoA for the MN, searching key Care of Address : CoA for the MN Remaining Lifetime Flag : indicate whether or not "home registration" entry Maximum value of the SN : value of Sequence Number field received in previous BU (8 bits long) Recent usage inform : related to implement cache replacement policy Networking Laboratory 51/87

52 MIPv6 Messages Binding Update List Structure Maintained by MN IP Addr. Home Addr. CoA Interface ID Initial value of Lifetime Remaining Lifetime Max. value of SN Flag IP Address : IP address of the node to which a BU was sent Home Address : MN s home address CoA : MN s CoA Initial value of Lifetime Remaining Lifetime Maximum value of the SN last BU Time Retransmission State : the time remaining until the next retransmission attempt for the Binding Update Flag : indicates that future BUs should not be sent to this destination Networking Laboratory 52/87

53 MIPv6 Mobility Support Movement Detection (Packet Loss) The MN should always inform its HA of its current location (CoA) This is done by using the BU and BA messages However, its HA continues to forward packets to its previous CoA until the MN updates its movement This results in packet losses Networking Laboratory 53/87

54 MIPv6 Mobility Support Movement Detection (Procedure) To minimize packet losses, Mobile Node Movement occurs Home Agent 1. Detect movement 2. Form a new care-of address 3. Inform the HA by sending a binding update Movement detected MN forms new care-of address Packet losses Steps 1 and 2 need to be executed ASAP Binding update Binding acknowledge Two events for Movement Detection A new prefix has appeared on link The current default router has disappeared MIPv6 makes the minimum interval between router advertisements to 0.05 second (standard interval is 3 seconds) Networking Laboratory 54/87

55 MIPv6 Mobility Support Movement Detection (More Routers?) If a Mobile Node is located on a link that has more than one default router router_1 and router_2 are connected on the same link If the MN initially configures its CoA based on router_1 s advertised prefix, then receives an advertisement from router_2 MN might think that it has moved In fact it does not! How do we solve this situation? Networking Laboratory 55/87

56 MIPv6 Mobility Support Movement Detection (Approach) To avoid the situation in this scenario, Configure all routers on the link to advertise the same prefixed Design a new option that should be added to the router advertisement This option could include a globally unique address that identifies the link All routers on the link would have to include this option regardless of the prefixes they advertise Prefix: 3ffe:200:8:1/64 Prefix: 3ffe:200:8:2/64 router_1 router_2 Ethernet Mobile Node Networking Laboratory 56/87

57 MIPv6 Mobility Support Returning Home (1/2) When the MN returns to its Home Link Inform the HA that should stop receiving MN s packet The MN must send a BU to the HA with a lifetime of zero and a CoA equal to the MN s HoA MN needs to configure its Home Address to be able to send the BU But, HA still assumes that it should defend the MN s HoA, which would cause DAD to fail and prevent the MN from configuring its HoA (DAD, Duplicate Address Detection) To avoid DAD, The MN needs to learn from HA s MAC address Networking Laboratory 57/87

58 MIPv6 Mobility Support Returning Home (2/2) neighbor solicitation Src add = the unspecified add(::) Dst add = the HA s solicited node multicast address Target add = the HA s global IP address neighbor advertisement To the all-node multicast address binding update with HA s MAC address Src add = its home address Dst add = the HA s address Networking Laboratory 58/87

59 MIPv6 Mobility Support Dynamic Home Agent Address Discovery Mobile Node needs to locate a suitable Home Agent HA s address can be configured in the MN (with a nonvolatile memory) This approach has some drawbacks If too many mobile nodes register with the home agent, Addresses successfully change if HA address change occurs, otherwise the HA may fail or simply get overloaded Can be done by Dynamic Home Agent Address Discovery (DHAAD) message MIPv6 provides a Dynamic Home Agent Address Discovery Allow MNs to discover HAs addresses Allow HAs to share the load between them in cases where multiple HAs are located on the same link by utilizing a preference parameter Networking Laboratory 59/87

60 MIPv6 Mobility Support Home Agent Information Option 8bit 8bit 16bit Type Length Reserved Home Agent Preference Home Agent Lifetime preference is included in the new option Home Agent Information Option Included in router advertisement Every HA on a link keeps a list (the home agent list) containing an IP address of each HA on the link and its preference To communicate the information in the HA list to MNs preference using DHAAD messages, Carried in two ICMP messages DHAAD request and DHAAD reply messages Default value is zero Larger values indicate higher availability of the Home Agent Home Agent lifetime: How long a router can serve as a Home Agent Networking Laboratory 60/87

61 MIPv6 Mobility Support Virtual Home Links A DoS attack can be launched by Bad Guy sharing a link with Home Agent If the home prefix is not associated to any physical link and if the home link is a virtual link, these problems can be avoided The home prefix can be configured on the Home Agent and Mobile Nodes only The Home Agent would not send any router advertisements for this prefix Consequently, MN would never return home HA makes sure that the home address is not allocated to another node Since no one else is located on the home link except Mobile Nodes and the Home Agent, no proxy neighbor advertisement would be sent on the wire Bad Guy cannot launch DoS attacks on the Mobile Node s home address Networking Laboratory 61/87

62 MIPv6 Mobility Support Additional Delays Routing packets through the HA always adds additional delays Home Link Home Agent IPv6 packets Mobile IPv6 messages Foreign Link Correspondent Node Mobile Node Foreign Link Networking Laboratory 62/87

63 Practice Problem What is the purpose of Binding Update and Acknowledgement messages? Mobile node uses the Binding Update message to inform the Home Agent about its current location (CoA), so that Home Agent can re-direct the mobile node bound traffic to it. Binding Acknowledgement message is sent by Home Agent to Mobile node in the response of Binding Update message. Networking Laboratory 63/87

64 Route Optimization The worst-case scenario MN and CN share the same link The best-case scenario CNs were on the MN s home link A problem with forcing traffic through HA While it may be possible to eventually detect the failure of HA, Its failure would cause the MN to lose all ongoing connections Route optimization is about to Route packets between a MN and a CN Using the shortest possible path MN is aware of When packets are routed through the HA When it receives tunneled packets addressed to its HoA How does a MN know if the communication with a CN lasts for a short or a long time? NO concrete answer A smart MN s implementation Duration of a connection, RTT, and amount of data Correspondent Node Home Link Home Agent IPv6 packets Mobile Node Foreign Link Correspondent Node Networking Laboratory 64/87

65 Route Optimization Signaling (1/2) When MN receives a packet tunneled from HA MN must decide whether route optimization is needed MN informs the CN of its current location Using the binding update message The CN maintains a binding cache Similar to the one maintained by the HA BU sent to CN must not set the H-, K-, L-bits 8bit 8bit 8bit 8bit Payload protocol Header length MH Type Reserved Checksum Sequence number A H L K Reserved Lifetime <The binding update message format> A (Acknowledge) flag, H (Home Registration) flag, L (Link-Local Address Compatibility) flag, K (Key Management Mobility Capability) flag: Networking Laboratory 65/87

66 Route Optimization Signaling (2/2) When a CN receives a BU from a MN It creates a new entry in the binding cache Updates the existing one with the new location of the MN Home Link Home Agent Binding update and binding ack Mobile IPv6 messages IPv6 packets Foreign Link Correspondent Node Mobile Node Foreign Link <Route Optimization Signaling> Networking Laboratory 66/87

67 Route Optimization Two Aims of the BU Allow packets directly between MNs and CNs without going through the HA Maintain ongoing connections MIPv6 defines two messages New routing header type 2 New destination option called the home address option Sending Route Optimized packets to CN Networking Laboratory 67/87

68 Route Optimization Summary When the MN sends a BU to a CN Indicate the home address At the home address option in the destination option s extension header After the BU, MN s home address is stored in CN s binding cache If the A flag is set, binding acknowledgment to MN MN updates binding update list CN s IPv6 address, MN s HoA and CoA, sequence number, lifetime MN uses the home address option src : home address, dst : CN address The home address option is essentially a disguised form of tunneling Networking Laboratory 68/87

69 Route Optimized Packets Sending Route Optimized Packets to CN Mobility is kept transparent to upper layers When a CN receives a packet containing a home address option Replaces the source address in the packet s header with the address included in the home address option before passing the packet to upper layers It is important to note that MN includes the home address option only in packets sent directly to CN i.e., BU was sent and accepted Adding the home address option before sending a packet IPv6 header Src:home address Dst:CN address Application data IPv6 header Src:home address Dst:CN address Dst opt header Care-of address Application data IPv6 header Src:care-of address Dst:CN address Dst opt header Home address Application data (a) original packet (b) home address option added (c) final packet to be sent Networking Laboratory 69/87

70 Route Optimized Packets Receiving Route Optimized Packets from CNs New routing header: Type field set to 2 When receiving the packet MN processes the routing header Replacing the destination address (CoA) with the address in the routing header (home address) A BU Sent to CN The process of route optimization involves 3 distinct steps Detecting that packets are tunneled by the HA Sending a binding update to the CN Sending packets directly to the CN and including the home address option in those packets Networking Laboratory 70/87

71 Route Optimized Packets BU Sent to CN, and then When CN has not accepted the BU, CN discards packets To ensure the acceptance of the BU MN can request an acknowledgment, A-flag in the BU What if CN failed? Binding error message No binding cache entry exists for home address Type field value of 7 Status field set to 1, 2 8bit 8bit 8bit 8bit Next Header Header length MH Type Checksum Status Reserved Home address (128 bits) <Binding error message> Networking Laboratory 71/87

72 Route Optimized Packets Why Not IP in IP Tunneling for Route Optimization? The basic idea behind route optimization is 1) to hide the MN s home address inside the packets; 2) to avoid breaking ingress filtering; and 3) to route packets to the right location in the topology The same effect could have been achieved by using IP in IP tunneling between MN and CN Following the BU processing, a tunnel can be established between the MN and the CN Using tunneling between the MN and the CN (a) Tunneled packets originating from the MN (b) Tunneled packets originating from the CN Care-of address Correspondent address Addresses in outer header Correspondent address Care-of address Home address Correspondent address Addresses in inner header Correspondent address Home address Advantage: Using the existing mechanism known to Tunneling Disadvantage: More network bandwidth Networking Laboratory 72/87

73 Route Optimized Packets What If MN Failed? MN maintains state about the nodes Binding update list The loss of such information in MN results in Different sets of information in the MN, its HA, and CNs If the MN loses the information It immediately attempts to update its HA To update the current binding Use a sequence number larger than the one used in its last BU message If MN is not aware of the last value used, it picks a random value Networking Laboratory 73/87

74 Route Optimized Packets Site-Local Address and MIPv6 One of the problems with site-local addresses MN has no way of knowing whether it is in its home site or another one When the MN moves away from its home link, it does not know If the MN is in fact in the same site the BU is received by the HA, and MIPv6 will work If the MN is in a different site, two possible outcomes Another node in the same site is configured with the same site-local address as the HA; this node will receive the BU from the MN However, since BUs/BAs are protected by IPsec there is no chance of confusion in this case; it will silently discard the packet No node in this site is configured with the HA s site-local address; Therefore, the MN will receive an ICMP error Destination unreachable Networking Laboratory 74/87

75 Route Optimized Packets MN Sending Packets Networking Laboratory 75/87

76 Route Optimized Packets CN Received Packets Networking Laboratory 76/87

77 Sungkyunkwan University Proxy Mobile IPv6 Copyright Networking Laboratory

78 Proxy Mobile IPv6 (PMIPv6) PMIPv6 is a network-based local mobility management protocol developed by the IETF (Internet Engineering Task Force). PMIPv6 is new Idea? Absolutely No!, but new trend!. It s a turn for the better. In the handover latency aspect, PMIPv6 is a very good protocol. More Study and Standardization Needed Route Optimization in PMIPv6 Fast Handover in PMIPv6 Cross-layering Issues PMIPv6 over IEEE (e)/WiBro Fast Handover with leverage of IEEE Networking Laboratory 78/87

79 Goal of PMIPv6 To provide mobility without requiring the host to participate in any mobility related signaling. registration PMIPv6 Scenario (being extended) Networking Laboratory 79/87

80 PMIPv6 Overview (1/2) New entities LMA (Local Mobility Anchor) Home Agent for the MN in the PMIPv6 domain Assigns MN's home prefix and manages the MN's reachability state MAG (Mobile Access Gateway) Manages the mobility related signaling for a MN Tracking the MN's attachment to the link and for signaling the MN's LMA Assumptions (or Restrictions) Link between MN and MAG is a point-to-point link (not shared link) Logically exclusive layer 3 link between MN and MAG Per-MN Prefix model unique home network prefix is assigned to MN Support both Stateless and Stateful address configuration modes Networking Laboratory 80/87

81 PMIPv6 Overview (2/2) IP Tunnel IP-in-IP tunnel between LMA and MAG LMA: Local Mobility Anchor MAG: Mobile Access Gateway MAG LMA Home Network MN s Home Network (Topological Anchor Point) movement MAG LMA Address (LMAA) LMM That will be the tunnel entry-point (Localized Mobility Management) Domain MN s Home Network Prefix (MN-HNP) CAFE:2:/64 MN Home Address (MN-HoA) MN continues to use it as long as it roams within a same domain Proxy Care of Address (Proxy-CoA) The address of MAG That will be the tunnel end-point Proxy Binding Update (PBU) Control message sent by MAG to LMA to establish a binding between MN-HoA and Proxy-CoA Networking Laboratory 81/87

82 PBU and PBA Message Format (1/2) Proxy Binding Update (PBU) Message A, H, L, K: RFC 3775, MIPv6 BU Reuse M : indicates MAP (Mobility Anchor Point) registration (HMIPv6) R : It is set to inform the HA, if the BU message comes from MS P (Proxy Registration Flag) Indicates that the registration is a Proxy registration. Networking Laboratory 82/87

83 PBU and PBA Message Format (2/2) Proxy Binding Update Acknowledgement (PBA) Message K: RFC 3775, MIPv6 BA Reuse R: indicates that the HA that processed the BU supports the MS P (Proxy Registration Flag) indicates that the HA that processed the Proxy Binding Update supports Proxy Registration. Networking Laboratory 83/87

84 PMIPv6 Features (1/3) Home in Any Place Network Entry (or Handover) Procedures After MN attachment, MAG gets MN s profile Obtain MN s home network prefix information Static Scheme Get it from Profile Dynamic Scheme Get it from LMA via PBU/PBA Now MAG has enough information to emulate MN s home link Send the RA (Router Advertisement) messages advertising MN s home network prefix and other parameters MAG runs on the access router will emulate the home link on its access link. MN always obtain its home network prefix, any where in the network. It will ensure that MN believes it is at its home. Networking Laboratory 84/87

85 PMIPv6 Features (2/3) M:1 Tunnel LMA-MAG tunnel is a shared tunnel among many MNs. 1:1 relation m:1 relation One tunnel is associated to multiple MNs Binding Caches. Life-time of a tunnel should not be dependent on the life time of any single BCE (Binding Cache Entry). RA (Router Advertisement) should be UNICASTed to an MN It will contain MN s Home Network Prefix Networking Laboratory 85/87

86 PMIPv6 Features (3/3) LMA s Prefix-based Routing LMA will add prefix routes to MN s home network prefix over the tunnel. Routing State for a MN stored in LMA MAG establishes IP in IP tunnel with LMA Routing State for a MN stored in MAG Networking Laboratory 86/87

87 PMIPv6 Operation Flow PBU: Proxy Binding Update PBA: Proxy Binding Ack. MN MAG AAA&Policy Store LMA CN MN Attachment RA* AAA Query with MN-ID AAA Reply with Profile PBU with MN-ID, Home Network Prefix option, Timestamp option RA** PBA with MN-ID, Home Network Prefix option Optional Tunnel Setup DHCP Request DHCP Response [MN-HoA:CN](data) DHCP Server DHCP Request DHCP Response [Proxy-CoA:LMAA][MN-HoA:CN](data) [MN-HoA:CN](data) Networking Laboratory 87/87

P A R T T W O MOBILE IPv6

P A R T T W O MOBILE IPv6 P A R T T W O MOBILE IPv6 Mobile IPv6 T H R E E Consider a scenario where you had to change your place of residence on a semipermanent basis, for instance, due to relocation of your company. One problem

More information

IPv6 Protocols and Networks Hadassah College Spring 2018 Wireless Dr. Martin Land

IPv6 Protocols and Networks Hadassah College Spring 2018 Wireless Dr. Martin Land IPv6 1 IPv4 & IPv6 Header Comparison IPv4 Header IPv6 Header Ver IHL Type of Service Total Length Ver Traffic Class Flow Label Identification Flags Fragment Offset Payload Length Next Header Hop Limit

More information

Proxy Mobile IPv6 (PMIPv6)

Proxy Mobile IPv6 (PMIPv6) Proxy Mobile IPv6 (PMIPv6) Youn-Hee Han yhhan@kut.ac.kr Korea University of Technology and Education Internet Computing Laboratory http://icl.kut.ac.kr Outline Background PMIPv6 (Proxy Mobile IPv6) Overview

More information

Fixed Internetworking Protocols and Networks. IP mobility. Rune Hylsberg Jacobsen Aarhus School of Engineering

Fixed Internetworking Protocols and Networks. IP mobility. Rune Hylsberg Jacobsen Aarhus School of Engineering Fixed Internetworking Protocols and Networks IP mobility Rune Hylsberg Jacobsen Aarhus School of Engineering rhj@iha.dk 1 2011 ITIFN Mobile computing Vision Seamless, ubiquitous network access for mobile

More information

IPv6. IPv4 & IPv6 Header Comparison. Types of IPv6 Addresses. IPv6 Address Scope. IPv6 Header. IPv4 Header. Link-Local

IPv6. IPv4 & IPv6 Header Comparison. Types of IPv6 Addresses. IPv6 Address Scope. IPv6 Header. IPv4 Header. Link-Local 1 v4 & v6 Header Comparison v6 Ver Time to Live v4 Header IHL Type of Service Identification Protocol Flags Source Address Destination Address Total Length Fragment Offset Header Checksum Ver Traffic Class

More information

Mobile & Wireless Networking. Lecture 9: Mobile IP. [Schiller, Section 8.1]

Mobile & Wireless Networking. Lecture 9: Mobile IP. [Schiller, Section 8.1] 192620010 Mobile & Wireless Networking Lecture 9: Mobile IP [Schiller, Section 8.1] Geert Heijenk Outline of Lecture 11 q Mobile IP Basics q 3 parts of Mobile IP: q Advertising Care-of Addresses q Registration

More information

PMIPv6 PROXY MOBILE IPV6 OVERVIEW OF PMIPV6, A PROXY-BASED MOBILITY PROTOCOL FOR IPV6 HOSTS. Proxy Mobile IPv6. Peter R. Egli INDIGOO.COM. indigoo.

PMIPv6 PROXY MOBILE IPV6 OVERVIEW OF PMIPV6, A PROXY-BASED MOBILITY PROTOCOL FOR IPV6 HOSTS. Proxy Mobile IPv6. Peter R. Egli INDIGOO.COM. indigoo. PMIPv6 PMIPv6 Proxy Mobile IPv6 PROXY MOBILE IPV6 OVERVIEW OF PMIPV6, A PROXY-BASED MOBILITY PROTOCOL FOR IPV6 HOSTS Peter R. Egli INDIGOO.COM 1/25 Contents 1. Why PMIPv6 when we have MIP? 2. PMIPv6 terminology

More information

Category: Standards Track June Mobile IPv6 Support for Dual Stack Hosts and Routers

Category: Standards Track June Mobile IPv6 Support for Dual Stack Hosts and Routers Network Working Group H. Soliman, Ed. Request for Comments: 5555 Elevate Technologies Category: Standards Track June 2009 Status of This Memo Mobile IPv6 Support for Dual Stack Hosts and Routers This document

More information

LECTURE 8. Mobile IP

LECTURE 8. Mobile IP 1 LECTURE 8 Mobile IP What is Mobile IP? The Internet protocol as it exists does not support mobility Mobile IP tries to address this issue by creating an anchor for a mobile host that takes care of packet

More information

Mohammad Hossein Manshaei 1393

Mohammad Hossein Manshaei 1393 Mohammad Hossein Manshaei manshaei@gmail.com 1393 Mobile IP 2 Mobile Network Layer: Problems and Concerns Entities and Terminology in Mobile IP Mobile Indirect Routing Mobile IP Agent Advertisement Registration

More information

Module 28 Mobile IP: Discovery, Registration and Tunneling

Module 28 Mobile IP: Discovery, Registration and Tunneling Module 28 Mobile IP: Discovery, and Tunneling Learning Objectives Introduction to different phases of Mobile IP Understanding how a mobile node search the agents using Discovery process Understand how

More information

Introduction to IPv6. IPv6 addresses

Introduction to IPv6. IPv6 addresses Introduction to IPv6 (Chapter 4 in Huitema) IPv6,Mobility-1 IPv6 addresses 128 bits long Written as eight 16-bit integers separated with colons E.g. 1080:0000:0000:0000:0000:0008:200C:417A = 1080::8:800:200C:417A

More information

Mobile Communications Chapter 8: Network Protocols/Mobile IP

Mobile Communications Chapter 8: Network Protocols/Mobile IP Mobile Communications Chapter 8: Network Protocols/Mobile IP Motivation Data transfer, Encapsulation Security, IPv6, Problems Micro mobility support DHCP Ad-hoc networks, Routing protocols Prof. Jó Ueyama

More information

Mobility Management. Advanced Mobile Communication Networks. Integrated Communication Systems Group Ilmenau University of Technology

Mobility Management. Advanced Mobile Communication Networks. Integrated Communication Systems Group Ilmenau University of Technology Mobility Management Advanced Mobile Communication Networks Integrated Communication Systems Group Ilmenau University of Technology Motivation The Internet and mobile communication networks are experiencing

More information

CSE 4215/5431: Mobile Communications Winter Suprakash Datta

CSE 4215/5431: Mobile Communications Winter Suprakash Datta CSE 4215/5431: Mobile Communications Winter 2013 Suprakash Datta datta@cse.yorku.ca Office: CSEB 3043 Phone: 416-736-2100 ext 77875 Course page: http://www.cse.yorku.ca/course/4215 Some slides are adapted

More information

Network Layer. Mobile IP. Slides adapted from Prof. Dr.-Ing. Jochen H. Schiller and W. Stallings

Network Layer. Mobile IP. Slides adapted from Prof. Dr.-Ing. Jochen H. Schiller and W. Stallings Network Layer Mobile IP Slides adapted from Prof. Dr.-Ing. Jochen H. Schiller and W. Stallings 1 Mobile IP - Definition Mobile IP (MIP) is a modification to IP that allows nodes to continue to receive

More information

Network Security. Security of Mobile Internet Communications. Chapter 17. Network Security (WS 2002): 17 Mobile Internet Security 1 Dr.-Ing G.

Network Security. Security of Mobile Internet Communications. Chapter 17. Network Security (WS 2002): 17 Mobile Internet Security 1 Dr.-Ing G. Network Security Chapter 17 Security of Mobile Internet Communications Network Security (WS 2002): 17 Mobile Internet Security 1 Motivation for Mobile IP Routing in the Internet: Based on IP destination

More information

Seamless Handover Scheme for Proxy Mobile IPv6

Seamless Handover Scheme for Proxy Mobile IPv6 IEEE International Conference on Wireless & Mobile Computing, Networking & Communication Seamless Handover Scheme for Proxy Mobile IPv6 Ju-Eun Kang 1, Dong-Won Kum 2, Yang Li 2, and You-Ze Cho 2 1 LGDACOM

More information

Mobility Management - Basics

Mobility Management - Basics Mobility Management - Basics Summer Semester 2012 Integrated Communication Systems Group Ilmenau University of Technology Content Motivation Problem and possible solutions IP-based mobility management

More information

Charles Perkins Nokia Research Center 2 July Mobility Support in IPv6 <draft-ietf-mobileip-ipv6-14.txt> Status of This Memo

Charles Perkins Nokia Research Center 2 July Mobility Support in IPv6 <draft-ietf-mobileip-ipv6-14.txt> Status of This Memo IETF Mobile IP Working Group INTERNET-DRAFT David B. Johnson Rice University Charles Perkins Nokia Research Center 2 July 2000 Mobility Support in IPv6 Status of This

More information

Mobile IPv6. Raj Jain. Washington University in St. Louis

Mobile IPv6. Raj Jain. Washington University in St. Louis Mobile IPv6 Raj Jain Washington University in Saint Louis Saint Louis, MO 63130 Jain@cse.wustl.edu These slides are available on-line at: http://www.cse.wustl.edu/~jain/cse574-06/ 13-1 Overview! IPv6:

More information

Overview of the MIPv6 Implementation

Overview of the MIPv6 Implementation Overview of the MIPv6 Implementation Tunneling Tunneling support was added as it is necessary for MIPv6. Interfaces have interfaceids that uniquely identify them. Similarly, every tunnel has a virtual

More information

SEN366 (SEN374) (Introduction to) Computer Networks

SEN366 (SEN374) (Introduction to) Computer Networks SEN366 (SEN374) (Introduction to) Computer Networks Prof. Dr. Hasan Hüseyin BALIK (12 th Week) The Internet Protocol 12.Outline Principles of Internetworking Internet Protocol Operation Internet Protocol

More information

IPv6: An Introduction

IPv6: An Introduction Outline IPv6: An Introduction Dheeraj Sanghi Department of Computer Science and Engineering Indian Institute of Technology Kanpur dheeraj@iitk.ac.in http://www.cse.iitk.ac.in/users/dheeraj Problems with

More information

Analysis of Proxy Mobile IPv6: A Network-based Mobility Solution

Analysis of Proxy Mobile IPv6: A Network-based Mobility Solution Analysis of Proxy Mobile IPv6: A Network-based Mobility Solution Md. Shohrab Hossain and Mohammed Atiquzzaman School of Computer Science, University of Oklahoma, Norman, OK 7319 Email: {shohrab, atiq}@ou.edu

More information

Mobile Communications Mobility Support in Network Layer

Mobile Communications Mobility Support in Network Layer Motivation Mobility support needed to be able to use mobile devices in the Mobile devices need IP address for their communication Applications would like to communicate while being on the move Mobile Communications

More information

Mobile IP and Mobile Transport Protocols

Mobile IP and Mobile Transport Protocols Mobile IP and Mobile Transport Protocols 1 IP routing Preliminaries Works on a hop-by-hop basis using a routing table 32 bits: 129.97.92.42 Address = subnet + host (Mobility No packet for you) Two parts»

More information

Introduction to IPv6. IPv6 addresses

Introduction to IPv6. IPv6 addresses Introduction to IPv6 (Chapter 4 in Huitema) IPv6,Mobility-1 IPv6 addresses 128 bits long Written as eight 16-bit integers separated with colons E.g. 1080:0000:0000:0000:0000:0008:200C:417A = 1080::8:800:200C:417A

More information

Introduction to IPv6. IPv6 addresses

Introduction to IPv6. IPv6 addresses Introduction to IPv6 (Chapter4inHuitema) IPv6,Mobility-1 IPv6 addresses 128 bits long Written as eight 16-bit hexadecimal integers separated with colons E.g. 1080:0000:0000:0000:0000:0008:200C:417A = 1080::8:800:200C:417A

More information

IPv4 addressing, NAT. Computer Networking: A Top Down Approach 6 th edition Jim Kurose, Keith Ross Addison-Wesley.

IPv4 addressing, NAT. Computer Networking: A Top Down Approach 6 th edition Jim Kurose, Keith Ross Addison-Wesley. IPv4 addressing, NAT http://xkcd.com/195/ Computer Networking: A Top Down Approach 6 th edition Jim Kurose, Keith Ross Addison-Wesley Some materials copyright 1996-2012 J.F Kurose and K.W. Ross, All Rights

More information

Mobile IP. Mobile IP 1

Mobile IP. Mobile IP 1 Mobile IP Mobile IP 1 Motivation for Mobile IP Routing based on IP destination address, network prefix (e.g. 129.13.42) determines physical subnet change of physical subnet implies change of IP address

More information

IP - The Internet Protocol. Based on the slides of Dr. Jorg Liebeherr, University of Virginia

IP - The Internet Protocol. Based on the slides of Dr. Jorg Liebeherr, University of Virginia IP - The Internet Protocol Based on the slides of Dr. Jorg Liebeherr, University of Virginia Orientation IP (Internet Protocol) is a Network Layer Protocol. IP: The waist of the hourglass IP is the waist

More information

Mobile Communications Chapter 9: Network Protocols/Mobile IP

Mobile Communications Chapter 9: Network Protocols/Mobile IP Mobile Communications Chapter 9: Network Protocols/Mobile IP Motivation Data transfer Encapsulation Security IPv6 Problems DHCP Ad-hoc s Routing protocols 9.0.1 Motivation for Mobile IP Routing based on

More information

Internet Engineering Task Force (IETF) Request for Comments: 6612 Category: Informational May 2012 ISSN:

Internet Engineering Task Force (IETF) Request for Comments: 6612 Category: Informational May 2012 ISSN: Internet Engineering Task Force (IETF) G. Giaretta, Ed. Request for Comments: 6612 Qualcomm Category: Informational May 2012 ISSN: 2070-1721 Interactions between Proxy Mobile IPv6 (PMIPv6) and Mobile IPv6

More information

Chapter 4 Network Layer

Chapter 4 Network Layer Sungkyunkwan University Chapter 4 Network Layer Prepared by H. Choo 2018-Fall Computer Networks Copyright 2000-2014 2000-2018 Networking Laboratory 1/52 Presentation Outline 4.1 Introduction 4.2 Network-Layer

More information

IPv6 Neighbor Discovery

IPv6 Neighbor Discovery The IPv6 neighbor discovery process uses Internet Control Message Protocol (ICMP) messages and solicited-node multicast addresses to determine the link-layer address of a neighbor on the same network (local

More information

ET4254 Communications and Networking 1

ET4254 Communications and Networking 1 Topic 9 Internet Protocols Aims:- basic protocol functions internetworking principles connectionless internetworking IP IPv6 IPSec 1 Protocol Functions have a small set of functions that form basis of

More information

SJTU 2018 Fall Computer Networking. Wireless Communication

SJTU 2018 Fall Computer Networking. Wireless Communication SJTU 2018 Fall Computer Networking 1 Wireless Communication Internet Protocol Stack 2 Application: supporting network applications - FTP, SMTP, HTTP Transport: data transfer between processes - TCP, UDP

More information

ECS-087: Mobile Computing

ECS-087: Mobile Computing ECS-087: Mobile Computing Mobile IP Most of the slides borrowed from Prof. Sridhar Iyer Diwakar Yagyasen.1 Effect of Mobility on Protocol Stack Application: new applications and adaptations Transport:

More information

MESSAGES error-reporting messages and query messages. problems processes IP packet specific information

MESSAGES error-reporting messages and query messages. problems processes IP packet specific information ICMP ICMP ICMP is mainly used by operating systems of networked computers to send error messages indicating that a requested service is not available or that host/ router could not be reached. ICMP MESSAGES

More information

Mobility Management Basics

Mobility Management Basics Mobility Management Basics Summer Semester 2011 Integrated Communication Systems Group Ilmenau University of Technology Content Motivation Problem and possible solutions IP-based mobility management Conclusions

More information

Proxy Mobile IPv6 (PMIPv6)

Proxy Mobile IPv6 (PMIPv6) Sungkyunkwan University Proxy Mobile IPv6 (PMIPv6) - Grand ICT 연구센터지원사업라이프컴패니온쉽경험을위한지능형인터랙션융합연구 - 무선포함접속방식에독립적인차세대네트워킹기술개발 SDN/NFV 기반의기업유무선통합네트워크를위한액세스기술독립적오픈소스컨트롤러개발 - 자율제어네트워킹및자율관리핵심기술개발생체모방자율제어시스템및자율관리

More information

Mobile IP. rek. Petr Grygárek Petr Grygarek, Advanced Computer Networks Technologies 1

Mobile IP. rek. Petr Grygárek Petr Grygarek, Advanced Computer Networks Technologies 1 Mobile IP Petr Grygárek rek 1 Basic principle Picture from IOS IP and IP Routing Configuration Guide Mobile node maintains the same IP address even while roaming in foreign networks even if it s address

More information

TSIN02 - Internetworking

TSIN02 - Internetworking Lecture 2: The Internet Protocol Literature: Forouzan: ch 4-9 and ch 27 2004 Image Coding Group, Linköpings Universitet Outline About the network layer Tasks Addressing Routing Protocols 2 Tasks of the

More information

EC441 Fall 2018 Introduction to Computer Networking Chapter4: Network Layer Data Plane

EC441 Fall 2018 Introduction to Computer Networking Chapter4: Network Layer Data Plane EC441 Fall 2018 Introduction to Computer Networking Chapter4: Network Layer Data Plane This presentation is adapted from slides produced by Jim Kurose and Keith Ross for their book, Computer Networking:

More information

Internet Protocols (chapter 18)

Internet Protocols (chapter 18) Internet Protocols (chapter 18) CSE 3213 Fall 2011 Internetworking Terms 1 TCP/IP Concepts Connectionless Operation Internetworking involves connectionless operation at the level of the Internet Protocol

More information

Position of IP and other network-layer protocols in TCP/IP protocol suite

Position of IP and other network-layer protocols in TCP/IP protocol suite Position of IP and other network-layer protocols in TCP/IP protocol suite IPv4 is an unreliable datagram protocol a best-effort delivery service. The term best-effort means that IPv4 packets can be corrupted,

More information

Mobile IP Overview. Based on IP so any media that can support IP can also support Mobile IP

Mobile IP Overview. Based on IP so any media that can support IP can also support Mobile IP Introduction: Mobile IP Overview An Internet Protocol address (IP address) is a numerical label assigned to each device (e.g., computer, printer) participating in a computer network that uses the Internet

More information

internet technologies and standards

internet technologies and standards Institute of Telecommunications Warsaw University of Technology 2017 internet technologies and standards Piotr Gajowniczek Andrzej Bąk Michał Jarociński Network Layer The majority of slides presented in

More information

Chapter 8 LOCATION SERVICES

Chapter 8 LOCATION SERVICES Chapter 8 LOCATION SERVICES Distributed Computing Group Mobile Computing Winter 2005 / 2006 Overview Mobile IP Motivation Data transfer Encapsulation Location Services & Routing Classification of location

More information

TSIN02 - Internetworking

TSIN02 - Internetworking Lecture 2: Internet Protocol Literature: Forouzan: ch (4-6), 7-9 and ch 31 2004 Image Coding Group, Linköpings Universitet Lecture 2: IP Goals: Understand the benefits Understand the architecture IPv4

More information

Mobile IPv6. Washington University in St. Louis

Mobile IPv6. Washington University in St. Louis Mobile IPv6 Raj Jain Professor of Computer Science and Engineering Washington University in Saint Louis Saint Louis, MO 63130 Audio/Video recordings of this lecture are available at: http://www.cse.wustl.edu/~jain/cse574-08/

More information

Information Network Systems The network layer. Stephan Sigg

Information Network Systems The network layer. Stephan Sigg Information Network Systems The network layer Stephan Sigg Tokyo, November 1, 2012 Error-detection and correction Decoding of Reed-Muller codes Assume a second order (16, 11) code for m = 4. The r-th order

More information

Obsoletes: 2002 January 2002 Category: Standards Track

Obsoletes: 2002 January 2002 Category: Standards Track Network Working Group C. Perkins, Ed. Request for Comments: 3220 Nokia Research Center Obsoletes: 2002 January 2002 Category: Standards Track Status of this Memo IP Mobility Support for IPv4 This document

More information

IPv6 Protocol. Does it solve all the security problems of IPv4? Franjo Majstor EMEA Consulting Engineer Cisco Systems, Inc.

IPv6 Protocol. Does it solve all the security problems of IPv4? Franjo Majstor EMEA Consulting Engineer Cisco Systems, Inc. IPv6 Protocol Does it solve all the security problems of IPv4? Franjo Majstor EMEA Consulting Engineer fmajstor@cisco.com Cisco Systems, Inc. 1 Agenda IPv6 Primer IPv6 Protocol Security Dual stack approach

More information

OPTIMIZING MOBILITY MANAGEMENT IN FUTURE IPv6 MOBILE NETWORKS

OPTIMIZING MOBILITY MANAGEMENT IN FUTURE IPv6 MOBILE NETWORKS OPTIMIZING MOBILITY MANAGEMENT IN FUTURE IPv6 MOBILE NETWORKS Sandro Grech Nokia Networks (Networks Systems Research) Supervisor: Prof. Raimo Kantola 1 SANDRO GRECH - OPTIMIZING MOBILITY MANAGEMENT IN

More information

TCP/IP Protocol Suite

TCP/IP Protocol Suite TCP/IP Protocol Suite Computer Networks Lecture 5 http://goo.gl/pze5o8 TCP/IP Network protocols used in the Internet also used in today's intranets TCP layer 4 protocol Together with UDP IP - layer 3 protocol

More information

CPSC 826 Internetworking. The Network Layer: Routing & Addressing Outline. The Network Layer

CPSC 826 Internetworking. The Network Layer: Routing & Addressing Outline. The Network Layer 1 CPSC 826 Intering The Network Layer: Routing & Addressing Outline The Network Layer Michele Weigle Department of Computer Science Clemson University mweigle@cs.clemson.edu November 10, 2004 Network layer

More information

ETSF05/ETSF10 Internet Protocols Network Layer Protocols

ETSF05/ETSF10 Internet Protocols Network Layer Protocols ETSF05/ETSF10 Internet Protocols Network Layer Protocols 2016 Jens Andersson Agenda Internetworking IPv4/IPv6 Framentation/Reassembly ICMPv4/ICMPv6 IPv4 to IPv6 transition VPN/Ipsec NAT (Network Address

More information

A Global Mobility Scheme for Seamless Multicasting in Proxy Mobile IPv6 Networks

A Global Mobility Scheme for Seamless Multicasting in Proxy Mobile IPv6 Networks ICACT Transactions on on the Advanced Communications Technology (TACT) Vol. Vol. 2, 2, Issue Issue 3, 3, May May 2013 2013 233 A Global Mobility Scheme for Seamless Multicasting in Proxy Mobile IPv6 Networks

More information

O-PMIPv6: Optimized Proxy Mobile IPv6. Ahmad Rasem, Bachelor of Communications Engineering

O-PMIPv6: Optimized Proxy Mobile IPv6. Ahmad Rasem, Bachelor of Communications Engineering O-PMIPv6: Optimized Proxy Mobile IPv6 by Ahmad Rasem, Bachelor of Communications Engineering A thesis submitted to the Faculty of Graduate and Postdoctoral Affairs in partial fulfillment of the requirements

More information

Chapter 09 Network Protocols

Chapter 09 Network Protocols Chapter 09 Network Protocols Copyright 2011, Dr. Dharma P. Agrawal and Dr. Qing-An Zeng. All rights reserved. 1 Outline Protocol: Set of defined rules to allow communication between entities Open Systems

More information

Extended Correspondent Registration Scheme for Reducing Handover Delay in Mobile IPv6

Extended Correspondent Registration Scheme for Reducing Handover Delay in Mobile IPv6 Extended Correspondent Registration Scheme for Reducing Handover Delay in Mobile IPv6 Ved P. Kafle Department of Informatics The Graduate University for Advanced Studies Tokyo, Japan Eiji Kamioka and Shigeki

More information

Mobile IP. Mobile Computing. Mobility versus Portability

Mobile IP. Mobile Computing. Mobility versus Portability Mobile IP Mobile Computing Introduction Amount of mobile/nomadic computing expected to increase dramatically in near future. By looking at the great acceptance of mobile telephony, one can foresee a similar

More information

T Computer Networks II. Mobility Issues Contents. Mobility. Mobility. Classifying Mobility Protocols. Routing vs.

T Computer Networks II. Mobility Issues Contents. Mobility. Mobility. Classifying Mobility Protocols. Routing vs. T-0.50 Computer Networks II Mobility Issues 6.0.008 Overview Mobile IP NEMO Transport layer solutions i SIP mobility Contents Prof. Sasu Tarkoma Mobility What happens when network endpoints start to move?

More information

Outline. CS5984 Mobile Computing. Host Mobility Problem 1/2. Host Mobility Problem 2/2. Host Mobility Problem Solutions. Network Layer Solutions Model

Outline. CS5984 Mobile Computing. Host Mobility Problem 1/2. Host Mobility Problem 2/2. Host Mobility Problem Solutions. Network Layer Solutions Model CS5984 Mobile Computing Outline Host Mobility problem and solutions IETF Mobile IPv4 Dr. Ayman Abdel-Hamid Computer Science Department Virginia Tech Mobile IPv4 1 2 Host Mobility Problem 1/2 Host Mobility

More information

Lecture 17 Overview. Last Lecture. Wide Area Networking (2) This Lecture. Internet Protocol (1) Source: chapters 2.2, 2.3,18.4, 19.1, 9.

Lecture 17 Overview. Last Lecture. Wide Area Networking (2) This Lecture. Internet Protocol (1) Source: chapters 2.2, 2.3,18.4, 19.1, 9. Lecture 17 Overview Last Lecture Wide Area Networking (2) This Lecture Internet Protocol (1) Source: chapters 2.2, 2.3,18.4, 19.1, 9.2 Next Lecture Internet Protocol (2) Source: chapters 19.1, 19.2, 22,1

More information

Outline. CS6504 Mobile Computing. Host Mobility Problem 1/2. Host Mobility Problem 2/2. Dr. Ayman Abdel-Hamid. Mobile IPv4.

Outline. CS6504 Mobile Computing. Host Mobility Problem 1/2. Host Mobility Problem 2/2. Dr. Ayman Abdel-Hamid. Mobile IPv4. CS6504 Mobile Computing Outline Host Mobility problem and solutions IETF Mobile IPv4 Dr. Ayman Abdel-Hamid Computer Science Department Virginia Tech Mobile IPv4 1 2 Host Mobility Problem 1/2 Host Mobility

More information

CS 356: Computer Network Architectures. Lecture 10: IP Fragmentation, ARP, and ICMP. Xiaowei Yang

CS 356: Computer Network Architectures. Lecture 10: IP Fragmentation, ARP, and ICMP. Xiaowei Yang CS 356: Computer Network Architectures Lecture 10: IP Fragmentation, ARP, and ICMP Xiaowei Yang xwy@cs.duke.edu Overview Homework 2-dimension parity IP fragmentation ARP ICMP Fragmentation and Reassembly

More information

Last time. Network layer. Introduction. Virtual circuit vs. datagram details. IP: the Internet Protocol. forwarding vs. routing

Last time. Network layer. Introduction. Virtual circuit vs. datagram details. IP: the Internet Protocol. forwarding vs. routing Last time Network layer Introduction forwarding vs. routing Virtual circuit vs. datagram details connection setup, teardown VC# switching forwarding tables, longest prefix matching IP: the Internet Protocol

More information

Internet Protocol, Version 6

Internet Protocol, Version 6 Outline Protocol, Version 6 () Introduction to Header Format Addressing Model ICMPv6 Neighbor Discovery Transition from to vs. Taken from:chun-chuan Yang Basics: TCP/ Protocol Suite Protocol (IP) Features:

More information

Introduction Mobility Support Handover Management Conclutions. Mobility in IPv6. Thomas Liske. Dresden University of Technology

Introduction Mobility Support Handover Management Conclutions. Mobility in IPv6. Thomas Liske. Dresden University of Technology 2005 / High Speed Networks II Outline Introduction Mobility Support Overview of IPv6 Mobility Support Handover Management Mobility Support What means Mobility Support? allow transparent routing of IPv6

More information

On using Mobile IP Protocols

On using Mobile IP Protocols Journal of Computer Science 2 (2): 211-217, 2006 ISSN 1549-3636 2006 Science Publications On using Mobile IP Protocols Fayza A. Nada Faculty of Computers and Information, Suez Canal University, Ismailia,

More information

Chapter 6 MOBILE IP AND TCP

Chapter 6 MOBILE IP AND TCP Chapter 6 MOBILE IP AND TCP Distributed Computing Group Mobile Computing Summer 2004 Overview Network Protocols / Mobile IP Motivation Data transfer Encapsulation Problems DHCP Mobile Transport Layer /

More information

Modification to Ipv6 Neighbor Discovery and Mobile Node Operation

Modification to Ipv6 Neighbor Discovery and Mobile Node Operation RESEARCH INVENTY: International Journal of Engineering and Science ISSN: 2278-4721, Vol. 1, Issue 6 (October 2012), PP 39-49 www.researchinventy.com Modification to Ipv6 Neighbor Discovery and Mobile Node

More information

L10: Simple Internetworking. Hui Chen, Ph.D. Department of Engineering & Computer Science Virginia State University Petersburg, VA 23806

L10: Simple Internetworking. Hui Chen, Ph.D. Department of Engineering & Computer Science Virginia State University Petersburg, VA 23806 L10: Simple Internetworking Hui Chen, Ph.D. Department of Engineering & Computer Science Virginia State University Petersburg, VA 23806 1 Acknowledgements Some pictures used in this presentation were obtained

More information

CS 457 Lecture 11 More IP Networking. Fall 2011

CS 457 Lecture 11 More IP Networking. Fall 2011 CS 457 Lecture 11 More IP Networking Fall 2011 IP datagram format IP protocol version number header length (bytes) type of data max number remaining hops (decremented at each router) upper layer protocol

More information

IPv4. Christian Grothoff.

IPv4. Christian Grothoff. IPv4 christian@grothoff.org http://grothoff.org/christian/ Sites need to be able to interact in one single, universal space. Tim Berners-Lee 1 The Network Layer Transports datagrams from sending to receiving

More information

CMPE 257: Wireless and Mobile Networking

CMPE 257: Wireless and Mobile Networking CMPE 257: Wireless and Mobile Networking Katia Obraczka Computer Engineering UCSC Baskin Engineering Lecture 9 CMPE 257 Winter'10 1 Announcements Student presentations: March 8th: Daniel and Teddy March

More information

Introduction to IPv6 - II

Introduction to IPv6 - II Introduction to IPv6 - II Building your IPv6 network Alvaro Vives 27 June 2017 Workshop on Open Source Solutions for the IoT Contents IPv6 Protocols and Autoconfiguration - ICMPv6 - Path MTU Discovery

More information

II. Principles of Computer Communications Network and Transport Layer

II. Principles of Computer Communications Network and Transport Layer II. Principles of Computer Communications Network and Transport Layer A. Internet Protocol (IP) IPv4 Header An IP datagram consists of a header part and a text part. The header has a 20-byte fixed part

More information

Experimental Evaluation of Proxy Mobile IPv6: an Implementation Perspective

Experimental Evaluation of Proxy Mobile IPv6: an Implementation Perspective Experimental Evaluation of Proxy Mobile IPv6: an Implementation Perspective Giuliana Iapichino and Christian Bonnet Mobile Communications Department Eurecom Sophia Antipolis, France {Giuliana.Iapichino,

More information

Lecture 18 Overview. Last Lecture. This Lecture. Next Lecture. Internet Protocol (1) Internet Protocol (2)

Lecture 18 Overview. Last Lecture. This Lecture. Next Lecture. Internet Protocol (1) Internet Protocol (2) Last Lecture Internet Protocol (1) This Lecture Internet Protocol (2) Lecture 18 Overview Source: chapters 19.1, 19.2, 22,1 22.2, 26.6 Next Lecture Transport Control Protocol (1) Source: chapters 24.1,

More information

Network Layer (4): ICMP

Network Layer (4): ICMP 1 Network Layer (4): ICMP Required reading: Kurose 4.4.3, 4.4.4 CSE 4213, Fall 2006 Instructor: N. Vlajic 2 1. Introduction 2. Network Service Models 3. Architecture 4. Network Layer Protocols in the Internet

More information

CS 43: Computer Networks. 21: The Network Layer & IP November 7, 2018

CS 43: Computer Networks. 21: The Network Layer & IP November 7, 2018 CS 43: Computer Networks 21: The Network Layer & IP November 7, 2018 The Network Layer! Application: the application (e.g., the Web, Email) Transport: end-to-end connections, reliability Network: routing

More information

Chapter 12 Network Protocols

Chapter 12 Network Protocols Chapter 12 Network Protocols 1 Outline Protocol: Set of defined rules to allow communication between entities Open Systems Interconnection (OSI) Transmission Control Protocol/Internetworking Protocol (TCP/IP)

More information

Master Course Computer Networks IN2097

Master Course Computer Networks IN2097 Chair for Network Architectures and Services Prof. Carle Department for Computer Science TU München Master Course Computer Networks IN2097 Prof. Dr.-Ing. Georg Carle Christian Grothoff, Ph.D. Chair for

More information

Internet Control Message Protocol

Internet Control Message Protocol Internet Control Message Protocol The Internet Control Message Protocol is used by routers and hosts to exchange control information, and to inquire about the state and configuration of routers and hosts.

More information

IPv6 Concepts. Improve router performance Simplify IP header Align to 64 bits Address hierarchy with more levels Simplify routing tables

IPv6 Concepts. Improve router performance Simplify IP header Align to 64 bits Address hierarchy with more levels Simplify routing tables IPv6 Concepts Tópicos Avançados de Redes 2016/2017 Why IPv6? 2 Lack of IPv4 addresses Imply NAT, or other solutions; Realm Specific IP (RFC3102) Improve router performance Simplify IP header Align to 64

More information

Virtual Hierarchical Architecture Integrating Mobile IPv6 and MANETs for Internet Connectivity

Virtual Hierarchical Architecture Integrating Mobile IPv6 and MANETs for Internet Connectivity Virtual Hierarchical Architecture Integrating Mobile IPv6 and MANETs for Internet Connectivity Hyemee Park, Tae-Jin Lee, and Hyunseung Choo School of Information and Communication Engineering Sungkyunkwan

More information

TCP/IP Networking. Training Details. About Training. About Training. What You'll Learn. Training Time : 9 Hours. Capacity : 12

TCP/IP Networking. Training Details. About Training. About Training. What You'll Learn. Training Time : 9 Hours. Capacity : 12 TCP/IP Networking Training Details Training Time : 9 Hours Capacity : 12 Prerequisites : There are no prerequisites for this course. About Training About Training TCP/IP is the globally accepted group

More information

Communication Networks ( ) / Fall 2013 The Blavatnik School of Computer Science, Tel-Aviv University. Allon Wagner

Communication Networks ( ) / Fall 2013 The Blavatnik School of Computer Science, Tel-Aviv University. Allon Wagner Communication Networks (0368-3030) / Fall 2013 The Blavatnik School of Computer Science, Tel-Aviv University Allon Wagner Kurose & Ross, Chapter 4 (5 th ed.) Many slides adapted from: J. Kurose & K. Ross

More information

Internet Engineering Task Force (IETF) Request for Comments: 6572 Category: Standards Track

Internet Engineering Task Force (IETF) Request for Comments: 6572 Category: Standards Track Internet Engineering Task Force (IETF) Request for Comments: 6572 Category: Standards Track ISSN: 2070-1721 F. Xia B. Sarikaya Huawei USA J. Korhonen, Ed. Nokia Siemens Networks S. Gundavelli Cisco D.

More information

Guide to TCP/IP Fourth Edition. Chapter 6: Neighbor Discovery in IPv6

Guide to TCP/IP Fourth Edition. Chapter 6: Neighbor Discovery in IPv6 Guide to TCP/IP Fourth Edition Chapter 6: Neighbor Discovery in IPv6 Objectives Describe Neighbor Discovery in IPv6 and how it compares to ARP in IPv4 Explain Neighbor Discovery message interaction between

More information

PMIPv6: A Network-Based Localized Mobility Management Solution

PMIPv6: A Network-Based Localized Mobility Management Solution PMIPv6: A Network-Based Localized Mobility Management Solution by Ignacio Soto, Universidad Politécnica de Madrid; Carlos J. Bernardos, and María Calderón, Universidad Carlos III de Madrid; and Telemaco

More information

COMP211 Chapter 4 Network Layer: The Data Plane

COMP211 Chapter 4 Network Layer: The Data Plane COMP211 Chapter 4 Network Layer: The Data Plane All material copyright 1996-2016 J.F Kurose and K.W. Ross, All Rights Reserved Computer Networking: A Top Down Approach 7 th edition Jim Kurose, Keith Ross

More information

C14a: Internetworks and The Internet

C14a: Internetworks and The Internet CISC 7332X T6 C14a: Internetworks and The Internet Hui Chen Department of Computer & Information Science CUNY Brooklyn College 11/27/2018 CUNY Brooklyn College 1 Acknowledgements Some pictures used in

More information

IPv6 Neighbor Discovery

IPv6 Neighbor Discovery The IPv6 neighbor discovery process uses Internet Control Message Protocol (ICMP) messages and solicited-node multicast addresses to determine the link-layer address of a neighbor on the same network (local

More information

CMPE 257: Wireless and Mobile Networking

CMPE 257: Wireless and Mobile Networking CMPE 257: Wireless and Mobile Networking Katia Obraczka Computer Engineering UCSC Baskin Engineering Lecture 8 CMPE 257 Winter'11 1 Announcements: Student presentations: Security: Jim. Seth: security in

More information

Configuring Proxy Mobile IPv6

Configuring Proxy Mobile IPv6 Information About Proxy Mobile IPv6, page 1 Restrictions on Proxy Mobile IPv6, page 3 (GUI), page 4 (CLI), page 6 Information About Proxy Mobile IPv6 Proxy Mobile IPv6 (PMIPv6) is a network-based mobility

More information