ROUTE OPTIMIZATION EXTENSION FOR THE MOBILE INTERNET PROTOCOL IN LINUX

Size: px
Start display at page:

Download "ROUTE OPTIMIZATION EXTENSION FOR THE MOBILE INTERNET PROTOCOL IN LINUX"

Transcription

1 ROUTE OPTIMIZATION EXTENSION FOR THE MOBILE INTERNET PROTOCOL IN LINUX M. L. Jiang and Y. C. Tay ABSTRACT The base Mobile Internet Protocol (Mobile IP)[1] provides a means for portable computers to roam freely, changing its point of attachment to the Internet, while without having to change its IP address and reestablish its present transport layer connections. Using the base Mobile IP, all the datagrams destined to the mobile node are routed to its home agent first, then tunneled to the mobile node. This indirect routing can significantly delay the delivery of the datagram to the mobile node and places an unnecessary burden on the networks and routers 1 along this path through the Internet. The Route Optimization Extension Protocol[2] enables correspondent nodes 2 that implement them to cache the binding of the mobile node, then tunnel the datagrams to it directly. This document describes an implementation of the Route Optimization Module that works together with Li Yunzhou s implementation of the base protocol[3] at the National University of Singapore. 1. INTRODUCTION With the exponential increase in the use of the Internet and proliferation of powerful notebooks, being connected to the net while traveling around has become possible and more and more a necessity for people whose professions require frequent traveling and fast responses to the changing environment. However, the current Internet Protocol does not have native support for host migration from one network to another. The current version of the Internet Protocol (IPv4) assumes that the point of attachment of a host to the Internet is fixed and uniquely identified by its IP address, a 32 bit binary number. Datagrams are sent to a computer based on the destination address field in the IP header. This routing mechanism implies that if a host moves to a new network while its IP address is unchanged, datagrams will not reach it; on the other hand if the host changes its IP address accordingly, it will lose any existing transport layer connections. Mobile IP is an enhancement to the old IP version 4. It allows transparent routing of IP datagrams to mobile computers in the Internet. To realize the functionality of the Mobile IP, three entities are defined, namely Home Agent 3, Foreign Agent 4 and Mobile Node 5. Each mobile node is always identified by its home address regardless of its current point 1 Router: A device which forwards traffic between networks. 2 Correspondent Node: A peer with which a mobile node is communicating. 3 Home Agent: A router on a mobile node s home network which tunnels datagrams for delivery to the mobile node when it is away from home, and maintains current location information for the mobile node. 4 Foreign Agent: A router on a mobile node s visited network which provides routing services to the mobile node while registered. 5 Mobile Node: A host or router that changes its point of attachment from one network or subnetwork to another. A mobile node may change its location without changing its IP address.

2 of attachment to the Internet. While not situated at home, a mobile node tries to associate itself with a care-of address 6 which is usually the address of one of the interfaces of the foreign agent. The protocol provides for registering the care-of address with a home agent. The home agent sends datagrams destined for the mobile node through a tunnel 7 to the care-of address. After arriving at the end of the tunnel, each datagram is then delivered to the mobile node. However, in many cases this route is not optimal the following figure demonstrates a typical situation: 1 Correspondent Node 2 1 Router 2 3 The Internet Home Agent 5 4 Mobile Node Foreign Agent Fig 1. A Comparison Between MIP with and without Route Optimization. The thin dotted lines are the route without Route Optimization, the thick dotted lines are the route with Route Optimization. The numbers on the lines indicate the sequence that the datagrams are routed. In this example, the base Mobile IP requires at least 5 hops, while with Route Optimization the datagrams can reach the mobile node in only 2 hops. With Route Optimization, the correspondent node can tunnel its datagrams directly to the mobile node, bypassing the possibly lengthy route for each datagram to the mobile node s home agent. 2. PROTOCOL OVERVIEW Route Optimization provides a means for any node that wishes to optimize its own communication with mobile nodes to maintain a binding cache containing the current location (care-of address) of the mobile nodes. The association of a mobile node s home address and its care-of address is called a mobility binding in Route Optimization s terminology. When sending an IP datagram to a mobile node, if the sender has a binding cache entry for the destination mobile node, it may tunnel the datagram directly to the care-of address indicated in the cached mobility binding. In the absence of any binding cache entry, 6 Care-of Address: The termination point of a tunnel toward a mobile node, for datagrams forwarded to the mobile node while it is away from home. 7 Tunnel: The path followed by a datagram while it is encapsulated.

3 datagrams destined for a mobile node will be routed to the mobile node s home agent first in the same way as the base protocol; as a side effect of this indirect routing, the home agent should inform the sender by sending it a binding update message, giving it a chance to cache the binding. When a mobile node moves and registers with a new foreign agent, the base Mobile IP does not notify the mobile node s previous foreign agent. The old foreign agent eventually deletes the mobile node s registration after the expiration of the lifetime period established when the mobile node registered there. Route Optimization requires the old foreign agent to be reliably notified of the mobile node s new mobility binding. This is done by adding a previous foreign agent notification extension to the registration request message sent to the new foreign agent. The new foreign agent will construct a binding update message from the registration request message and send it over to the old foreign agent to update its binding cache. When the foreign agent receives a tunneled datagram whose destination mobile node is in its binding cache, the Foreign agent can deduce that the tunneling node has an out-ofdate binding cache entry for the mobile node. In this case, the foreign may send a binding warning message to the home agent, advising it to send a binding update message to the node that tunneled this datagram. Due to the nature of Mobile IP, indirect routing and wireless data transmission being involved, vulnerability is increased to some extent. For Route Optimization this is more so because everyone can have the current location of the mobile node by just sending something to it, and the home agent will try to update the sender s binding. Therefore, some authentication algorithms such as key exchange, electronic signature(md5) are included in the draft. However, due to time constraint these are not implemented in this module. 3.1 General Knowledge 3. SYSTEM DESIGN Four more messages are defined as the format given by the draft, namely Binding Update Message, Binding Warning Message, Binding Request Message and Binding Acknowledgment Message. They are all UDP(User Datagram Protocol) messages. Route Optimization uses the same UDP port(434) to transfer messages as the base protocol does. The base protocol of Mobile IP was designed as part of the TCP/IP stacks in the kernel of Linux. Rebuilding a kernel is a very tedious and error-prone process. In future, with Mobile IP gaining popularity, we can expect a large number of computers to be equipped with some software of this kind to optimize routing to mobile computers. Thus for ease of installation and usability, a daemon program that runs in user space rather than embedded in the kernel, is designed for the correspondent nodes.

4 For the other 3 entities (mobile node, foreign agent and home agent), because of the strong interaction between the Route Optimization Module and the base protocol, the code has been embedded in Mr Li Yunzhou s implementation of the base protocol. All the routines are written in C. Compilation directives are added carefully so that users are free to choose whether to have this module or not. 3.2 Correspondent Node The daemon program listens on UDP port 434 for any Route Optimization messages. It makes use of the tunneling device, which is a loadable module of the kernel, to encapsulate the IP messages to be sent to the mobile node in another IP header whose destination address is the foreign agent. Datagrams that are encapsulated in this way are called IPinIP[4] datagrams. Then the Internet will be able to route them to the foreign agent. The daemon is implemented with three soft states: Idle, Binding Awaiting, Binding Updated. They are controlled by timers which improve the robustness of the system even when control messages are lost in transit. Figure 2 shows the transition datagrams of the correspondent node. Since the correspondent node may talk to several mobile nodes at the same time, different binding cache entries can be in different states independently. Timer Twait is to limit the amount of time to wait for the Binding Update message to come back. Timer Tlife is the life time of the binding cache entry. Since a daemon program does not have a controlling terminal, normally the behavior of a daemon is instructed through some Inter Process Communication. In this case a command line program is designed which talks to the daemon through a unix stream socket. It turns the daemon on and off, as well as reports to the users the tunneling and routing information of the daemon. Idle CN0 Binding Warning Twait Expiry Binding Update (lifetime 0) Tlife Expiry Binding Awaiting CN1 Binding Warning Binding Update Binding Updated CN2 Fig 2. Transition Datagram for the Correspondent Node.

5 3.3 Mobile Node, Home Agent and Foreign Agent The base protocol of Mobile IP was implemented in the Linux Kernel, so it is virtually impossible to achieve the Route Optimization Extension s goal without any kernel hacks. Therefore, for these three entities the entire code of Route Optimization is in the kernel. Various interceptions have been added into the TCP/IP stack of the Linux kernel to allow interaction. Due to the complexity of the kernel, detailed explanation of what and how this is done with these three entities will not be presented here. However a short description for each is given as follows: For the mobile node, whenever it detects that it is registering through a new foreign agent, it will affix a previous foreign agent notification extension inside the registration request message. It will then keep sending binding update messages to the old foreign agent until it receives a binding acknowledgment. For the foreign agent, it has to remove entries from its registration table and optionally establish an entry in the binding cache upon receipt of the binding update message; to assemble a binding update message using the previous foreign agent notification extension in the registration request message, and send it to the previous foreign agent; to advise the home agent to inform the correspondent node of its outdated mobility binding by sending the home agent a binding warning message. For the home agent, it should send a binding update message to the correspondent node when it receives a binding warning message or an IP datagram to be forwarded to the mobile node (the home agent can deduce that the correspondent node does not have a updated mobility binding, because otherwise it would have directly tunneled the datagram to the foreign agent). 4. PROBLEMS AND SOLUTIONS Our implementation conforms to the Internet Engineering Task Force s version 4 of the Route Optimization Extension. In version 3, the way a foreign agent informs a correspondent node of its outdated binding cache is quite different. It sends a binding warning message to the mobile node instead of to the home agent directly. Our correspondent node is able to cooperate with these two kinds of foreign agents. Upon receipt of the binding warning message, it will request the mobile node s mobility binding from the home agent. The base protocol supports multiple simultaneous mobility bindings, which enables the mobile node to register with multiple foreign agents and the home agent will tunnel a separate copy of each arriving datagram to each care-of address. However, the Internet draft for Route Optimization does not support this feature explicitly. In our implementation, the home agent will simply update the correspondent nodes with the first mobility binding of the mobile node it finds in its registration table. This is not an elegant way of solving this problem. In future releases, some extensions will probably be defined to support this feature in the correspondent node.

6 By default, the loadable module that deals with IP tunneling provides only two tunneling devices. This restricts the correspondent node to having a maximum of two binding cache entries at the same time. This will not be enough in practice. Though it is possible to modify the source code of the kernel in order to have more tunneling devices, that has not been tested. 5. USING THE SOFTWARE The source code for Route Optimization and the base protocol can be found at the URL: ftp://ftp.nus.sg/pub/mobile-ip. Instructions for installation and using this software are also included. They are fully tested under Linux kernel version , however the correspondent node daemon and its command line program should be able to run regardless of the kernel versions. They are free software and can be redistributed and modified under the terms of the GNU General Public License. 6. CONCLUSION AND FUTURE WORK This is the first version of the Route Optimization Module and one of the first of its kind in the world. We focused mainly on feasibility. It is not meant to be used practically. Because anybody can just manipulate the correspondent node s routing by sending it some fake binding update messages and hijack its traffic. In the next version, the security features will hopefully be implemented. ACKNOWLEDGEMENTS First and foremost I would like to thank my supervisor Dr. Tay Yong Chiang and Dr. Chua Kee Chaing for their support and guidance throughout the project. Thanks to Mr. Li Yunzhou and Mr. Amlan Saha who were also working on the Mobile IP project with me; especially Yunzhou who has not only solved a lot of technical problems for me but also many problems in life. Thanks to Mr. Loh Kok Jeng for his helpfulness and caring. Finally to all my CCN lab colleagues, life in the lab would not have been so fun without them. REFERENCES [1] C. Perkins. IP Mobility Support, Internet Draft, December [2] D.B. Johnson and C. Perkins. Route Optimization in Mobile IP. Internet Draft, November [3] Y.Z. Li. ftp://ftp.nus.sg/pub/mobile-ip. Internet Archive, July [4] C.Perkins. IP Encapsulation within IP. Internet Draft, October 1995.

ROUTE OPTIMIZATION EXTENSITON FOR THE MOBILE INTERNET PROTOCOL IN LINUX

ROUTE OPTIMIZATION EXTENSITON FOR THE MOBILE INTERNET PROTOCOL IN LINUX ROUTE OPTIMIZATION EXTENSITON FOR THE MOBILE INTERNET PROTOCOL IN LINUX ABSTRACT The base Mobile Internet Protocol (Mobile IP) provides a means for portable computers to roam freely, changing its point

More information

LECTURE 8. Mobile IP

LECTURE 8. Mobile IP 1 LECTURE 8 Mobile IP What is Mobile IP? The Internet protocol as it exists does not support mobility Mobile IP tries to address this issue by creating an anchor for a mobile host that takes care of packet

More information

Fixed Internetworking Protocols and Networks. IP mobility. Rune Hylsberg Jacobsen Aarhus School of Engineering

Fixed Internetworking Protocols and Networks. IP mobility. Rune Hylsberg Jacobsen Aarhus School of Engineering Fixed Internetworking Protocols and Networks IP mobility Rune Hylsberg Jacobsen Aarhus School of Engineering rhj@iha.dk 1 2011 ITIFN Mobile computing Vision Seamless, ubiquitous network access for mobile

More information

SJTU 2018 Fall Computer Networking. Wireless Communication

SJTU 2018 Fall Computer Networking. Wireless Communication SJTU 2018 Fall Computer Networking 1 Wireless Communication Internet Protocol Stack 2 Application: supporting network applications - FTP, SMTP, HTTP Transport: data transfer between processes - TCP, UDP

More information

Charles Perkins Nokia Research Center 2 July Mobility Support in IPv6 <draft-ietf-mobileip-ipv6-14.txt> Status of This Memo

Charles Perkins Nokia Research Center 2 July Mobility Support in IPv6 <draft-ietf-mobileip-ipv6-14.txt> Status of This Memo IETF Mobile IP Working Group INTERNET-DRAFT David B. Johnson Rice University Charles Perkins Nokia Research Center 2 July 2000 Mobility Support in IPv6 Status of This

More information

Mobile IP Overview. Based on IP so any media that can support IP can also support Mobile IP

Mobile IP Overview. Based on IP so any media that can support IP can also support Mobile IP Introduction: Mobile IP Overview An Internet Protocol address (IP address) is a numerical label assigned to each device (e.g., computer, printer) participating in a computer network that uses the Internet

More information

On using Mobile IP Protocols

On using Mobile IP Protocols Journal of Computer Science 2 (2): 211-217, 2006 ISSN 1549-3636 2006 Science Publications On using Mobile IP Protocols Fayza A. Nada Faculty of Computers and Information, Suez Canal University, Ismailia,

More information

Mobile IP and Mobile Transport Protocols

Mobile IP and Mobile Transport Protocols Mobile IP and Mobile Transport Protocols 1 IP routing Preliminaries Works on a hop-by-hop basis using a routing table 32 bits: 129.97.92.42 Address = subnet + host (Mobility No packet for you) Two parts»

More information

2013 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other uses, in any current or future media,

2013 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other uses, in any current or future media, 2013 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other uses, in any current or future media, including reprinting/republishing this material for advertising

More information

Network Security. Security of Mobile Internet Communications. Chapter 17. Network Security (WS 2002): 17 Mobile Internet Security 1 Dr.-Ing G.

Network Security. Security of Mobile Internet Communications. Chapter 17. Network Security (WS 2002): 17 Mobile Internet Security 1 Dr.-Ing G. Network Security Chapter 17 Security of Mobile Internet Communications Network Security (WS 2002): 17 Mobile Internet Security 1 Motivation for Mobile IP Routing in the Internet: Based on IP destination

More information

ECS-087: Mobile Computing

ECS-087: Mobile Computing ECS-087: Mobile Computing Mobile IP Most of the slides borrowed from Prof. Sridhar Iyer Diwakar Yagyasen.1 Effect of Mobility on Protocol Stack Application: new applications and adaptations Transport:

More information

Computer Networks, Andrew Tannenbaum, Chapter 5.6. Computer Networking: A Top Down Approach Featuring the

Computer Networks, Andrew Tannenbaum, Chapter 5.6. Computer Networking: A Top Down Approach Featuring the Mobile IP (IPv4 and IPv6) Dr. John Keeney 3BA33 Elements of a wireless Wired infrastructure wireless hosts laptop, PDA, IP phone run applications may be stationary (nonmobile) or mobile wireless does not

More information

Outline. CS6504 Mobile Computing. Host Mobility Problem 1/2. Host Mobility Problem 2/2. Dr. Ayman Abdel-Hamid. Mobile IPv4.

Outline. CS6504 Mobile Computing. Host Mobility Problem 1/2. Host Mobility Problem 2/2. Dr. Ayman Abdel-Hamid. Mobile IPv4. CS6504 Mobile Computing Outline Host Mobility problem and solutions IETF Mobile IPv4 Dr. Ayman Abdel-Hamid Computer Science Department Virginia Tech Mobile IPv4 1 2 Host Mobility Problem 1/2 Host Mobility

More information

Mobile IP. Mobile IP 1

Mobile IP. Mobile IP 1 Mobile IP Mobile IP 1 Motivation for Mobile IP Routing based on IP destination address, network prefix (e.g. 129.13.42) determines physical subnet change of physical subnet implies change of IP address

More information

Introduction Mobility Support Handover Management Conclutions. Mobility in IPv6. Thomas Liske. Dresden University of Technology

Introduction Mobility Support Handover Management Conclutions. Mobility in IPv6. Thomas Liske. Dresden University of Technology 2005 / High Speed Networks II Outline Introduction Mobility Support Overview of IPv6 Mobility Support Handover Management Mobility Support What means Mobility Support? allow transparent routing of IPv6

More information

Obsoletes: 2002 January 2002 Category: Standards Track

Obsoletes: 2002 January 2002 Category: Standards Track Network Working Group C. Perkins, Ed. Request for Comments: 3220 Nokia Research Center Obsoletes: 2002 January 2002 Category: Standards Track Status of this Memo IP Mobility Support for IPv4 This document

More information

Outline. CS5984 Mobile Computing. Host Mobility Problem 1/2. Host Mobility Problem 2/2. Host Mobility Problem Solutions. Network Layer Solutions Model

Outline. CS5984 Mobile Computing. Host Mobility Problem 1/2. Host Mobility Problem 2/2. Host Mobility Problem Solutions. Network Layer Solutions Model CS5984 Mobile Computing Outline Host Mobility problem and solutions IETF Mobile IPv4 Dr. Ayman Abdel-Hamid Computer Science Department Virginia Tech Mobile IPv4 1 2 Host Mobility Problem 1/2 Host Mobility

More information

Mobility Support in IPv6

Mobility Support in IPv6 Mobility Support in IPv6 Charles E. Perkins David B. Johnson T. J. Watson Research Center Computer Science Department IBM Corporation Carnegie Mellon University Hawthorne, NY 10532 Pittsburgh, PA 15213

More information

11. IP Mobility 최 양 희 서울대학교 컴퓨터공학부

11. IP Mobility 최 양 희 서울대학교 컴퓨터공학부 11. IP Mobility Introduction Terminal Mobility Person Mobility Network Mobility Internet 2002 Yanghee Choi 2 Mobile IP : Why IP addressing scheme optimized for stationary environment point of attachment

More information

Lecture 7: Mobile IP (Part 1) Dr. Reynold Cheng

Lecture 7: Mobile IP (Part 1) Dr. Reynold Cheng Lecture 7: Mobile IP (Part 1) Dr. Reynold Cheng This lecture is based on the textbook W. Stallings, Wireless Communications and Networks, Prentice Hall, 2005, the slides (prepared by Tom Fronckowiak) and

More information

A Survey on Signaling Load in Mobility Management

A Survey on Signaling Load in Mobility Management ISSN: 2231-4946 Volume IV, Special Issue, December 2014 International Journal of Computer Applications in Engineering Sciences Special Issue on Advances in Computer and Communications www.caesjournals.org

More information

Mobile Transport Layer

Mobile Transport Layer Mobile Transport Layer 1 Transport Layer HTTP (used by web services) typically uses TCP Reliable transport between TCP client and server required - Stream oriented, not transaction oriented - Network friendly:

More information

Da t e: August 2 0 th a t 9: :00 SOLUTIONS

Da t e: August 2 0 th a t 9: :00 SOLUTIONS Interne t working, Examina tion 2G1 3 0 5 Da t e: August 2 0 th 2 0 0 3 a t 9: 0 0 1 3:00 SOLUTIONS 1. General (5p) a) Place each of the following protocols in the correct TCP/IP layer (Application, Transport,

More information

Chapter 8 LOCATION SERVICES

Chapter 8 LOCATION SERVICES Chapter 8 LOCATION SERVICES Distributed Computing Group Mobile Computing Winter 2005 / 2006 Overview Mobile IP Motivation Data transfer Encapsulation Location Services & Routing Classification of location

More information

Network System Security

Network System Security Network System Security Unit 32 Internet Protocol v6 (IPv6) Internet Protocol v6(ipv6) Internet Protocol version 6 (IPv6) is the latest revision of the Internet Protocol (IP) and the first version of the

More information

IPv4 Care-of Address Registration for IPv4 Support on the NEMO Basic Support Protocol

IPv4 Care-of Address Registration for IPv4 Support on the NEMO Basic Support Protocol IPv4 Care-of Address Registration for IPv4 Support on the NEMO Basic Support Protocol Ryuji Wakikawa Carl Williams Keisuke Uehara Jun Murai Keio University. Graduate School of Media and Governance KDDI

More information

312 D.B. Johnson /Scalable support for transparent mobile host internetworking work, it is then delivered to the correct individual host on that netwo

312 D.B. Johnson /Scalable support for transparent mobile host internetworking work, it is then delivered to the correct individual host on that netwo Wireless Networks 1 (1995) 311^321 311 Scalable support for transparent mobile host internetworking 3 David B. Johnson Computer Science Department, Carnegie Mellon University, Pittsburgh, PA, USA Abstract.

More information

Optimal method to Reducing Link and Signaling Costs in Mobile IP

Optimal method to Reducing Link and Signaling Costs in Mobile IP Optimal method to Reducing Link and Signaling Costs in Mobile IP Sridevi Assistant Professor, Department of Computer Science,Karnatak University,Dharwad Abstract The objective of this research paper is

More information

IPv6 Protocols and Networks Hadassah College Spring 2018 Wireless Dr. Martin Land

IPv6 Protocols and Networks Hadassah College Spring 2018 Wireless Dr. Martin Land IPv6 1 IPv4 & IPv6 Header Comparison IPv4 Header IPv6 Header Ver IHL Type of Service Total Length Ver Traffic Class Flow Label Identification Flags Fragment Offset Payload Length Next Header Hop Limit

More information

CSE 4215/5431: Mobile Communications Winter Suprakash Datta

CSE 4215/5431: Mobile Communications Winter Suprakash Datta CSE 4215/5431: Mobile Communications Winter 2013 Suprakash Datta datta@cse.yorku.ca Office: CSEB 3043 Phone: 416-736-2100 ext 77875 Course page: http://www.cse.yorku.ca/course/4215 Some slides are adapted

More information

IP Mobility vs. Session Mobility

IP Mobility vs. Session Mobility IP Mobility vs. Session Mobility Securing wireless communication is a formidable task, something that many companies are rapidly learning the hard way. IP level solutions become extremely cumbersome when

More information

Mohammad Hossein Manshaei 1393

Mohammad Hossein Manshaei 1393 Mohammad Hossein Manshaei manshaei@gmail.com 1393 Mobile IP 2 Mobile Network Layer: Problems and Concerns Entities and Terminology in Mobile IP Mobile Indirect Routing Mobile IP Agent Advertisement Registration

More information

Mobile IP. Mobile Computing. Mobility versus Portability

Mobile IP. Mobile Computing. Mobility versus Portability Mobile IP Mobile Computing Introduction Amount of mobile/nomadic computing expected to increase dramatically in near future. By looking at the great acceptance of mobile telephony, one can foresee a similar

More information

Chapter 13 TRANSPORT. Mobile Computing Winter 2005 / Overview. TCP Overview. TCP slow-start. Motivation Simple analysis Various TCP mechanisms

Chapter 13 TRANSPORT. Mobile Computing Winter 2005 / Overview. TCP Overview. TCP slow-start. Motivation Simple analysis Various TCP mechanisms Overview Chapter 13 TRANSPORT Motivation Simple analysis Various TCP mechanisms Distributed Computing Group Mobile Computing Winter 2005 / 2006 Distributed Computing Group MOBILE COMPUTING R. Wattenhofer

More information

Mobile host protocols support host

Mobile host protocols support host INTERNATIONAL JOURNAL OF NETWORK MANAGEMENT Int. J. Network Mgmt 2000; 10:191 214 Location update and routing scheme for a mobile computing environment By Anna Hać Ł and Yujing Huang We present a new hierarchical

More information

A Hybrid Load Balance Mechanism for Distributed Home Agents in Mobile IPv6

A Hybrid Load Balance Mechanism for Distributed Home Agents in Mobile IPv6 A Hybrid Load Balance Mechanism for Distributed Home Agents in Mobile IPv6 1 Hui Deng 2Xiaolong Huang 3Kai Zhang 3 Zhisheng Niu 1Masahiro Ojima 1R&D Center Hitachi (China) Ltd. Beijing 100004, China 2Dept.

More information

Concept Questions Demonstrate your knowledge of these concepts by answering the following questions in the space provided.

Concept Questions Demonstrate your knowledge of these concepts by answering the following questions in the space provided. 113 Chapter 9 TCP/IP Transport and Application Layer Services that are located in the transport layer enable users to segment several upper-layer applications onto the same transport layer data stream.

More information

Chapter 12 Network Protocols

Chapter 12 Network Protocols Chapter 12 Network Protocols 1 Outline Protocol: Set of defined rules to allow communication between entities Open Systems Interconnection (OSI) Transmission Control Protocol/Internetworking Protocol (TCP/IP)

More information

User Datagram Protocol

User Datagram Protocol Topics Transport Layer TCP s three-way handshake TCP s connection termination sequence TCP s TIME_WAIT state TCP and UDP buffering by the socket layer 2 Introduction UDP is a simple, unreliable datagram

More information

Lecture 13 Page 1. Lecture 13 Page 3

Lecture 13 Page 1. Lecture 13 Page 3 IPsec Network Security: IPsec CS 239 Computer Software March 2, 2005 Until recently, the IP protocol had no standards for how to apply security Encryption and authentication layered on top Or provided

More information

IPv6. IPv4 & IPv6 Header Comparison. Types of IPv6 Addresses. IPv6 Address Scope. IPv6 Header. IPv4 Header. Link-Local

IPv6. IPv4 & IPv6 Header Comparison. Types of IPv6 Addresses. IPv6 Address Scope. IPv6 Header. IPv4 Header. Link-Local 1 v4 & v6 Header Comparison v6 Ver Time to Live v4 Header IHL Type of Service Identification Protocol Flags Source Address Destination Address Total Length Fragment Offset Header Checksum Ver Traffic Class

More information

A Mobile Host Protocol Supporting Route Optimization and Authentication

A Mobile Host Protocol Supporting Route Optimization and Authentication IEEE Journal on Selected Areas in Communications, special issue on Mobile and Wireless Computing Networks, 13(5):839 849, June 1995. c IEEE. A Mobile Host Protocol Supporting Route Optimization and Authentication

More information

An Enhancement of Mobile IP by Home Agent Handover

An Enhancement of Mobile IP by Home Agent Handover An Enhancement of Mobile IP by Home Agent Handover Li-Sheng Yu and Chun-Chuan Yang Multimedia and Communications Laboratory Department of Computer Science and Information Engineering National Chi Nan University,

More information

Modification to Ipv6 Neighbor Discovery and Mobile Node Operation

Modification to Ipv6 Neighbor Discovery and Mobile Node Operation RESEARCH INVENTY: International Journal of Engineering and Science ISSN: 2278-4721, Vol. 1, Issue 6 (October 2012), PP 39-49 www.researchinventy.com Modification to Ipv6 Neighbor Discovery and Mobile Node

More information

Mobile Communications Chapter 8: Network Protocols/Mobile IP

Mobile Communications Chapter 8: Network Protocols/Mobile IP Mobile Communications Chapter 8: Network Protocols/Mobile IP Motivation Data transfer, Encapsulation Security, IPv6, Problems Micro mobility support DHCP Ad-hoc networks, Routing protocols Prof. Jó Ueyama

More information

Mobility Management - Basics

Mobility Management - Basics Mobility Management - Basics Summer Semester 2012 Integrated Communication Systems Group Ilmenau University of Technology Content Motivation Problem and possible solutions IP-based mobility management

More information

Ubiquitous Mobile Host Internetworking

Ubiquitous Mobile Host Internetworking Ubiquitous Mobile Host Internetworking David B. Johnson School of Computer Science Carnegie Mellon University Pittsburgh, PA 152 13-389 1 dbj Qcs. cmu. edu 1. Introduction With the increasing popularity

More information

NETWORK SIMULATION USING NCTUns. Ankit Verma* Shashi Singh* Meenakshi Vyas*

NETWORK SIMULATION USING NCTUns. Ankit Verma* Shashi Singh* Meenakshi Vyas* NETWORK SIMULATION USING NCTUns Ankit Verma* Shashi Singh* Meenakshi Vyas* 1. Introduction: Network simulator is software which is very helpful tool to develop, test, and diagnose any network protocol.

More information

4.0.1 CHAPTER INTRODUCTION

4.0.1 CHAPTER INTRODUCTION 4.0.1 CHAPTER INTRODUCTION Data networks and the Internet support the human network by supplying seamless, reliable communication between people - both locally and around the globe. On a single device,

More information

Scribe Notes -- October 31st, 2017

Scribe Notes -- October 31st, 2017 Scribe Notes -- October 31st, 2017 TCP/IP Protocol Suite Most popular protocol but was designed with fault tolerance in mind, not security. Consequences of this: People realized that errors in transmission

More information

Mobile Communications Chapter 9: Mobile Transport Layer

Mobile Communications Chapter 9: Mobile Transport Layer Prof. Dr.-Ing Jochen H. Schiller Inst. of Computer Science Freie Universität Berlin Germany Mobile Communications Chapter 9: Mobile Transport Layer Motivation, TCP-mechanisms Classical approaches (Indirect

More information

Request for Comments: Wichorus G. Tsirtsis Qualcomm T. Ernst INRIA K. Nagami INTEC NetCore October 2009

Request for Comments: Wichorus G. Tsirtsis Qualcomm T. Ernst INRIA K. Nagami INTEC NetCore October 2009 Network Working Group Request for Comments: 5648 Category: Standards Track R. Wakikawa, Ed. Toyota ITC V. Devarapalli Wichorus G. Tsirtsis Qualcomm T. Ernst INRIA K. Nagami INTEC NetCore October 2009 Multiple

More information

Category: Standards Track June Mobile IPv6 Support for Dual Stack Hosts and Routers

Category: Standards Track June Mobile IPv6 Support for Dual Stack Hosts and Routers Network Working Group H. Soliman, Ed. Request for Comments: 5555 Elevate Technologies Category: Standards Track June 2009 Status of This Memo Mobile IPv6 Support for Dual Stack Hosts and Routers This document

More information

APPENDIX F THE TCP/IP PROTOCOL ARCHITECTURE

APPENDIX F THE TCP/IP PROTOCOL ARCHITECTURE APPENDIX F THE TCP/IP PROTOCOL ARCHITECTURE William Stallings F.1 TCP/IP LAYERS... 2 F.2 TCP AND UDP... 4 F.3 OPERATION OF TCP/IP... 6 F.4 TCP/IP APPLICATIONS... 10 Copyright 2014 Supplement to Computer

More information

Supporting mobility only on lower layers up to the network layer is not

Supporting mobility only on lower layers up to the network layer is not Mobile transport layer Supporting mobility only on lower layers up to the network layer is not enough to provide mobility support for applications. Most applications rely on a transport layer, such as

More information

IP Address Assignment

IP Address Assignment IP Address Assignment An IP address does not identify a specific computer. Instead, each IP address identifies a connection between a computer and a network. A computer with multiple network connections

More information

Lecture 12 Page 1. Lecture 12 Page 3

Lecture 12 Page 1. Lecture 12 Page 3 IPsec Network Security: IPsec CS 239 Computer Software February 26, 2003 Until recently, the IP protocol had no standards for how to apply security Encryption and authentication layered on top Or provided

More information

Outline 9.2. TCP for 2.5G/3G wireless

Outline 9.2. TCP for 2.5G/3G wireless Transport layer 9.1 Outline Motivation, TCP-mechanisms Classical approaches (Indirect TCP, Snooping TCP, Mobile TCP) PEPs in general Additional optimizations (Fast retransmit/recovery, Transmission freezing,

More information

Chapter 09 Network Protocols

Chapter 09 Network Protocols Chapter 09 Network Protocols Copyright 2011, Dr. Dharma P. Agrawal and Dr. Qing-An Zeng. All rights reserved. 1 Outline Protocol: Set of defined rules to allow communication between entities Open Systems

More information

TCP/IP protocol suite

TCP/IP protocol suite TCP/IP protocol suite The TCP/IP protocol suite was developed prior to the OSI model. Therefore, the layers in the TCP/IP protocol suite do not match exactly with those in the OSI model. The original TCP/IP

More information

Network Working Group. Category: Informational February 1997

Network Working Group. Category: Informational February 1997 Network Working Group K. Hamzeh Request for Comments: 2107 Ascend Communications Category: Informational February 1997 Status of this Memo Ascend Tunnel Management Protocol - ATMP This memo provides information

More information

Indirect RSVP for Virtual Cluster Cellular Mobile IP Networks

Indirect RSVP for Virtual Cluster Cellular Mobile IP Networks Indirect SVP for Virtual Cluster Cellular Mobile IP Networks Yu Zeng, Jon W. Mark, and Xuemin Shen University of Waterloo, Waterloo, Ontario, Canada N2L 3G1 {yzeng, jwmark, xshen}@bbcr.uwaterloo.ca Abstract.

More information

Module 28 Mobile IP: Discovery, Registration and Tunneling

Module 28 Mobile IP: Discovery, Registration and Tunneling Module 28 Mobile IP: Discovery, and Tunneling Learning Objectives Introduction to different phases of Mobile IP Understanding how a mobile node search the agents using Discovery process Understand how

More information

Mobile Communications Chapter 9: Network Protocols/Mobile IP

Mobile Communications Chapter 9: Network Protocols/Mobile IP Mobile Communications Chapter 9: Network Protocols/Mobile IP Motivation Data transfer Encapsulation Security IPv6 Problems DHCP Ad-hoc s Routing protocols 9.0.1 Motivation for Mobile IP Routing based on

More information

Mobile & Wireless Networking. Lecture 9: Mobile IP. [Schiller, Section 8.1]

Mobile & Wireless Networking. Lecture 9: Mobile IP. [Schiller, Section 8.1] 192620010 Mobile & Wireless Networking Lecture 9: Mobile IP [Schiller, Section 8.1] Geert Heijenk Outline of Lecture 11 q Mobile IP Basics q 3 parts of Mobile IP: q Advertising Care-of Addresses q Registration

More information

Mobile Communications Mobility Support in Network Layer

Mobile Communications Mobility Support in Network Layer Motivation Mobility support needed to be able to use mobile devices in the Mobile devices need IP address for their communication Applications would like to communicate while being on the move Mobile Communications

More information

CSCI-GA Operating Systems. Networking. Hubertus Franke

CSCI-GA Operating Systems. Networking. Hubertus Franke CSCI-GA.2250-001 Operating Systems Networking Hubertus Franke frankeh@cs.nyu.edu Source: Ganesh Sittampalam NYU TCP/IP protocol family IP : Internet Protocol UDP : User Datagram Protocol RTP, traceroute

More information

CSE 123A Computer Netwrking

CSE 123A Computer Netwrking CSE 123A Computer Netwrking Winter 2005 Mobile Networking Alex Snoeren presenting in lieu of Stefan Savage Today s s issues What are implications of hosts that move? Remember routing? It doesn t work anymore

More information

MOBILE IP AND WIRELESS APPLICATION PROTOCOL

MOBILE IP AND WIRELESS APPLICATION PROTOCOL MOBILE IP AND WIRELESS APPLICATION PROTOCOL In this chapter, we look at two standards that provide application-level support for wireless networking: Mobile IP and Wireless Application Protocol (WAP).

More information

CSE 4215/5431: Mobile Communications Winter Suprakash Datta

CSE 4215/5431: Mobile Communications Winter Suprakash Datta CSE 4215/5431: Mobile Communications Winter 2013 Suprakash Datta datta@cse.yorku.ca Office: CSEB 3043 Phone: 416-736-2100 ext 77875 Course page: http://www.cse.yorku.ca/course/4215 Some slides are adapted

More information

Mobile SCTP for IP Mobility Support in All-IP Networks

Mobile SCTP for IP Mobility Support in All-IP Networks Mobile SCTP for IP Mobility Support in All-IP Networks Seok Joo Koh sjkoh@cs.knu.ac.kr Abstract The Stream Control Transmission Protocol (SCTP) is a new transport protocol that is featured multi-streaming

More information

ETSF05/ETSF10 Internet Protocols Transport Layer Protocols

ETSF05/ETSF10 Internet Protocols Transport Layer Protocols ETSF05/ETSF10 Internet Protocols Transport Layer Protocols 2016 Jens Andersson Transport Layer Communication between applications Process-to-process delivery Client/server concept Local host Normally initialiser

More information

MESSAGES error-reporting messages and query messages. problems processes IP packet specific information

MESSAGES error-reporting messages and query messages. problems processes IP packet specific information ICMP ICMP ICMP is mainly used by operating systems of networked computers to send error messages indicating that a requested service is not available or that host/ router could not be reached. ICMP MESSAGES

More information

Outline. CS5984 Mobile Computing. Wireless Access Networks model 1/3. Wireless Access Network and Mobile IP. Dr. Ayman Abdel-Hamid

Outline. CS5984 Mobile Computing. Wireless Access Networks model 1/3. Wireless Access Network and Mobile IP. Dr. Ayman Abdel-Hamid CS5984 Mobile Computing Dr. Ayman Abdel-Hamid Computer Science Department Virginia Tech Mobile IPv4 Micro-mobility Outline MIPv4 Micro-mobility solutions Protocols Cellular IP HAWAII (Handoff-Aware Wireless

More information

Wireless Transmission and Mobility

Wireless Transmission and Mobility Mobile and Ubiquitous Computing Wireless Transmission and Mobility Modulation, MAC and IPv6" George Roussos! g.roussos@dcs.bbk.ac.uk! Modulation" Digital modulation! digital data is translated into an

More information

CCNA Exploration Network Fundamentals. Chapter 06 Addressing the Network IPv4

CCNA Exploration Network Fundamentals. Chapter 06 Addressing the Network IPv4 CCNA Exploration Network Fundamentals Chapter 06 Addressing the Network IPv4 Updated: 20/05/2008 1 6.0.1 Introduction Addressing is a key function of Network layer protocols that enables data communication

More information

ET4254 Communications and Networking 1

ET4254 Communications and Networking 1 Topic 9 Internet Protocols Aims:- basic protocol functions internetworking principles connectionless internetworking IP IPv6 IPSec 1 Protocol Functions have a small set of functions that form basis of

More information

Transparent Mobility in Mobile IPv6: An Experience Report

Transparent Mobility in Mobile IPv6: An Experience Report Transparent Mobility in Mobile IPv6: An Experience Report Rodolfo Kohn Senior Software Engineer at Global Software Group Argentina, Motorola, 146 Hipólito Irigoyen 9th floor, Córdoba, 5000, Argentina.

More information

Jaringan Komputer. The Transport Layer

Jaringan Komputer. The Transport Layer Jaringan Komputer Transport Layer The Transport Layer The heart of the whole protocol hierarchy Task: To provide reliable, cost-effective data transport from the source machine to the destination machine,

More information

CSE 123b Communications Software

CSE 123b Communications Software CSE 123b Communications Software Spring 2004 Lecture 9: Mobile Networking Stefan Savage Quick announcements Typo in problem #1 of HW #2 (fixed as of 1pm yesterday) Please consider chapter 4.3-4.3.3 to

More information

Quick announcements. CSE 123b Communications Software. Today s issues. Last class. The Mobility Problem. Problems. Spring 2004

Quick announcements. CSE 123b Communications Software. Today s issues. Last class. The Mobility Problem. Problems. Spring 2004 CSE 123b Communications Software Spring 2004 Lecture 9: Mobile Networking Quick announcements Typo in problem #1 of HW #2 (fixed as of 1pm yesterday) Please consider chapter 4.3-4.3.3 to be part of the

More information

UNIT IV -- TRANSPORT LAYER

UNIT IV -- TRANSPORT LAYER UNIT IV -- TRANSPORT LAYER TABLE OF CONTENTS 4.1. Transport layer. 02 4.2. Reliable delivery service. 03 4.3. Congestion control. 05 4.4. Connection establishment.. 07 4.5. Flow control 09 4.6. Transmission

More information

Network and Broadband Systems IPv6 What s new? Andreas Hofmeier

Network and Broadband Systems IPv6 What s new? Andreas Hofmeier Network and Broadband Systems IPv6 What s new? Andreas Hofmeier Contents 1 IPv6, What s New? 1 1.1 Introduction.............................. 1 1.2 Address Space............................. 1 1.3 Address

More information

A Study on Mobile Internet Protocol and Mobile Adhoc Network Routing Protocols

A Study on Mobile Internet Protocol and Mobile Adhoc Network Routing Protocols International Journal of Computer Science & Communication Vol. 1, No. 2, July-December 2010, pp. 185-189 A Study on Mobile Internet Protocol and Mobile Adhoc Network Routing Protocols B.V. Manikyala Rao

More information

Internet Routing Protocols Part II

Internet Routing Protocols Part II Indian Institute of Technology Kharagpur Internet Routing Protocols Part II Prof. Indranil Sen Gupta Dept. of Computer Science & Engg. I.I.T. Kharagpur, INDIA Lecture 8: Internet routing protocols Part

More information

Protocol for Tetherless Computing

Protocol for Tetherless Computing Protocol for Tetherless Computing S. Keshav P. Darragh A. Seth S. Fung School of Computer Science University of Waterloo Waterloo, Canada, N2L 3G1 1. Introduction Tetherless computing involves asynchronous

More information

Performance Analysis of Hierarchical Mobile IPv6 in IP-based Cellular Networks

Performance Analysis of Hierarchical Mobile IPv6 in IP-based Cellular Networks Performance Analysis of Hierarchical Mobile IPv6 in IP-based Cellular Networks Sangheon Pack and Yanghee Choi School of Computer Science & Engineering Seoul National University Seoul, Korea Abstract Next-generation

More information

ICS 351: Networking Protocols

ICS 351: Networking Protocols ICS 351: Networking Protocols IP packet forwarding application layer: DNS, HTTP transport layer: TCP and UDP network layer: IP, ICMP, ARP data-link layer: Ethernet, WiFi 1 Networking concepts each protocol

More information

Utilizing Multiple Home Links in Mobile IPv6

Utilizing Multiple Home Links in Mobile IPv6 Utilizing Multiple Home Links in Mobile IPv6 Hongbo Shi and Shigeki Goto Department of Computer Science, Waseda University 3-4-1 Ohkubo Shijuku-ku, Tokyo, 169-8555 JAPAN Email: {shi, goto}@goto.info.waseda.ac.jp

More information

MIP4 Working Group. Generic Notification Message for Mobile IPv4 draft-ietf-mip4-generic-notification-message-16

MIP4 Working Group. Generic Notification Message for Mobile IPv4 draft-ietf-mip4-generic-notification-message-16 MIP4 Working Group Internet-Draft Intended status: Standards Track Expires: April 28, 2011 H. Deng China Mobile H. Levkowetz Netnod V. Devarapalli WiChorus S. Gundavelli Cisco Systems B. Haley Hewlett-Packard

More information

msctp for Vertical Handover Between Heterogeneous Networks

msctp for Vertical Handover Between Heterogeneous Networks msctp for Vertical Handover Between Heterogeneous Networks Seok Joo Koh and Sang Wook Kim Department of Computer Science, Kyungpook National University, Daegoo, Korea {sjkoh, swkim}@cs.knu.ac.kr Abstract.

More information

OPTIMIZING MOBILITY MANAGEMENT IN FUTURE IPv6 MOBILE NETWORKS

OPTIMIZING MOBILITY MANAGEMENT IN FUTURE IPv6 MOBILE NETWORKS OPTIMIZING MOBILITY MANAGEMENT IN FUTURE IPv6 MOBILE NETWORKS Sandro Grech Nokia Networks (Networks Systems Research) Supervisor: Prof. Raimo Kantola 1 SANDRO GRECH - OPTIMIZING MOBILITY MANAGEMENT IN

More information

PLEASE READ CAREFULLY BEFORE YOU START

PLEASE READ CAREFULLY BEFORE YOU START Page 1 of 20 MIDTERM EXAMINATION #1 - B COMPUTER NETWORKS : 03-60-367-01 U N I V E R S I T Y O F W I N D S O R S C H O O L O F C O M P U T E R S C I E N C E Fall 2008-75 minutes This examination document

More information

PLEASE READ CAREFULLY BEFORE YOU START

PLEASE READ CAREFULLY BEFORE YOU START Page 1 of 20 MIDTERM EXAMINATION #1 - A COMPUTER NETWORKS : 03-60-367-01 U N I V E R S I T Y O F W I N D S O R S C H O O L O F C O M P U T E R S C I E N C E Fall 2008-75 minutes This examination document

More information

The Mobile-IP Testbed of the HP-OVUA. MNM Team. March 25, Abstract

The Mobile-IP Testbed of the HP-OVUA. MNM Team. March 25, Abstract The Mobile-IP Testbed of the HP-OVUA Stephen Heilbronner MNM Team heilbron@informatik.uni-muenchen.de March 25, 1997 Abstract Within the HP-OUA a special interest group on Mobility was founded in 1995.

More information

CMPE150 Midterm Solutions

CMPE150 Midterm Solutions CMPE150 Midterm Solutions Question 1 Packet switching and circuit switching: (a) Is the Internet a packet switching or circuit switching network? Justify your answer. The Internet is a packet switching

More information

Introduction to TCP/IP networking

Introduction to TCP/IP networking Introduction to TCP/IP networking TCP/IP protocol family IP : Internet Protocol UDP : User Datagram Protocol RTP, traceroute TCP : Transmission Control Protocol HTTP, FTP, ssh What is an internet? A set

More information

Position of IP and other network-layer protocols in TCP/IP protocol suite

Position of IP and other network-layer protocols in TCP/IP protocol suite Position of IP and other network-layer protocols in TCP/IP protocol suite IPv4 is an unreliable datagram protocol a best-effort delivery service. The term best-effort means that IPv4 packets can be corrupted,

More information

Request for Comments: 2004 Category: Standards Track October Minimal Encapsulation within IP. Status of This Memo

Request for Comments: 2004 Category: Standards Track October Minimal Encapsulation within IP. Status of This Memo Network Working Group C. Perkins Request for Comments: 2004 IBM Category: Standards Track October 1996 Status of This Memo Minimal Encapsulation within IP This document specifies an Internet standards

More information

An Analysis of Mobility Handling in LIN6

An Analysis of Mobility Handling in LIN6 An Analysis of Mobility Handling in LIN6 Masahiro Ishiyama Mitsunobu Kunishi Fumio Teraoka Communication Platform Laboratory, Corporate R&D Center, Toshiba Corporation. Faculty of Science and Technology,

More information