Mobile IP adds mobility support to the Internet network layer protocol IP. It allows nodes to continue receiving datagrams no matter where they are attached to the Internet. Mobile IP uses home agents and foreign agents to tunnel packets to a mobile node's current location, represented by its care-of address. When away from its home network, a mobile node registers its care-of address with its home agent. The home agent intercepts packets destined for the mobile node and tunnels them to the care-of address using encapsulation. This allows the mobile node to maintain its home IP address while connecting via foreign networks.
Physical channels carry information over the air interface between the mobile station and base transceiver station. Logical channels map user data and signaling information onto physical channels. There are two main types of logical channels - traffic channels which carry call data, and control channels which communicate service information. Control channels include broadcast channels which transmit cell-wide information, common channels used for paging and access procedures, and dedicated channels for signaling during calls or when not on a call. Logical channels are mapped onto physical channels to effectively transmit information wirelessly between network components in a GSM system.
The document discusses different channel allocation strategies for cellular networks. It describes fixed channel allocation, where channels are permanently assigned to cells. Dynamic channel allocation allows channels to be allocated as needed to cells. Hybrid allocation uses a combination of fixed and dynamic. Channel borrowing allows cells to use channels assigned to neighboring cells if available. The key is to allocate channels efficiently while avoiding interference between cells using the same channel.
MPLS enables packets to be forwarded based on labels rather than IP addresses. PE routers add labels to incoming packets and remove labels from outgoing packets. P routers swap or pop labels to forward packets. MPLS with L3 VPN allows private networks in different locations to communicate securely over a shared infrastructure by associating routes with virtual routing instances (VRFs) and advertising them using BGP. An example configuration shows VRF and BGP configuration, along with commands to view MPLS label bindings and packet forwarding information.
The document discusses the network layer in computer networking. It describes how the network layer is responsible for routing packets from their source to destination. It covers different routing algorithms like distance vector routing and link state routing. It also compares connectionless and connection-oriented services, as well as datagram and virtual circuit subnets. Key aspects of routing algorithms like optimality, stability, and fairness are defined.
It is description about trunking theory that is used to develop trunked system that can allocate a limited number of channels to a large number of users.
The document discusses IEEE standards for local area networks (LANs) including Ethernet LANs, Token Ring LANs, and wireless LANs. It describes the IEEE 802 standards family, common LAN topologies and cabling, how CSMA/CD and token protocols work, and comparisons of Ethernet and Token Ring technologies. It also outlines wireless LAN specifications including 802.11, 802.11a, 802.11b, and 802.11g.
The document discusses IEEE 802.11 standards for wireless LANs. It describes the formation of the IEEE 802.11 working group in 1990 to develop wireless LAN MAC and physical specifications. It then summarizes key IEEE 802.11 standards including 802.11a, 802.11b, 802.11g, 802.11n, and more recent standards. It provides an overview of IEEE 802.11 architecture including the basic service set, extended service set, and distribution system. It also discusses services provided at the MAC layer such as reliable data delivery, access control, and security.
This document provides an overview of cellular networks. It discusses key concepts like cells, base stations, frequency reuse, and multiple access methods. It describes how location of mobile devices is managed through location updating and paging. It also covers handoff which allows active calls to continue seamlessly as users move between different cells.
Physical channels carry information over the air interface between the mobile station and base transceiver station. Logical channels map user data and signaling information onto physical channels. There are two main types of logical channels - traffic channels which carry call data, and control channels which communicate service information. Control channels include broadcast channels which transmit cell-wide information, common channels used for paging and access procedures, and dedicated channels for signaling during calls or when not on a call. Logical channels are mapped onto physical channels to effectively transmit information wirelessly between network components in a GSM system.
The document discusses different channel allocation strategies for cellular networks. It describes fixed channel allocation, where channels are permanently assigned to cells. Dynamic channel allocation allows channels to be allocated as needed to cells. Hybrid allocation uses a combination of fixed and dynamic. Channel borrowing allows cells to use channels assigned to neighboring cells if available. The key is to allocate channels efficiently while avoiding interference between cells using the same channel.
MPLS enables packets to be forwarded based on labels rather than IP addresses. PE routers add labels to incoming packets and remove labels from outgoing packets. P routers swap or pop labels to forward packets. MPLS with L3 VPN allows private networks in different locations to communicate securely over a shared infrastructure by associating routes with virtual routing instances (VRFs) and advertising them using BGP. An example configuration shows VRF and BGP configuration, along with commands to view MPLS label bindings and packet forwarding information.
The document discusses the network layer in computer networking. It describes how the network layer is responsible for routing packets from their source to destination. It covers different routing algorithms like distance vector routing and link state routing. It also compares connectionless and connection-oriented services, as well as datagram and virtual circuit subnets. Key aspects of routing algorithms like optimality, stability, and fairness are defined.
It is description about trunking theory that is used to develop trunked system that can allocate a limited number of channels to a large number of users.
The document discusses IEEE standards for local area networks (LANs) including Ethernet LANs, Token Ring LANs, and wireless LANs. It describes the IEEE 802 standards family, common LAN topologies and cabling, how CSMA/CD and token protocols work, and comparisons of Ethernet and Token Ring technologies. It also outlines wireless LAN specifications including 802.11, 802.11a, 802.11b, and 802.11g.
The document discusses IEEE 802.11 standards for wireless LANs. It describes the formation of the IEEE 802.11 working group in 1990 to develop wireless LAN MAC and physical specifications. It then summarizes key IEEE 802.11 standards including 802.11a, 802.11b, 802.11g, 802.11n, and more recent standards. It provides an overview of IEEE 802.11 architecture including the basic service set, extended service set, and distribution system. It also discusses services provided at the MAC layer such as reliable data delivery, access control, and security.
This document provides an overview of cellular networks. It discusses key concepts like cells, base stations, frequency reuse, and multiple access methods. It describes how location of mobile devices is managed through location updating and paging. It also covers handoff which allows active calls to continue seamlessly as users move between different cells.
RIP is an interior gateway protocol that uses distance vector routing and the Bellman-Ford algorithm to dynamically adapt to network changes. It works by having each router calculate the distances to reachable networks and share these distances with neighboring routers. However, RIP has issues with slow convergence and count-to-infinity problems when network failures occur. Several techniques are used to address these issues, including hold downs, split horizon, poison reverse updates, and triggered updates.
This document discusses multiple access protocols used to coordinate access to shared broadcast channels. It describes various channel partitioning protocols like TDMA and FDMA that divide channels by time or frequency. Random access protocols like ALOHA and CSMA are also covered, which allow nodes to transmit randomly and detect collisions. CSMA/CD improves on CSMA by allowing nodes to detect collisions quickly and abort transmissions. Taking-turns protocols pass control of the channel between nodes either through polling or token passing. The document provides examples and compares the efficiency of different multiple access protocols.
The document discusses ad-hoc networks and their key characteristics. It describes several challenges in ad-hoc networks including limited battery power, dynamic network topology, and scalability issues. It also summarizes several ad-hoc network routing protocols (e.g. DSDV, AODV, DSR), addressing both table-driven and on-demand approaches. Additionally, it outlines some ad-hoc MAC protocols like MACA and PAMAS that aim to manage shared wireless medium access.
The document discusses the GSM protocol stack and frame formatting. It describes the different layers of the protocol stack including the physical layer which handles radio transmission, the data link layer which provides error-free transmission, and the networking layer which is responsible for communication between network resources and mobility. It also discusses the signaling system 7 (SS7) standard and various application protocols used in GSM like BSSAP, BSSMAP, DTAP, ISUP, MAP, and TCAP. Furthermore, it explains the concepts of physical and logical channels in GSM and how logical channels can be mapped to physical channels.
Carrier-sense multiple access with collision detection (CSMA/CD) is a media access control method used most notably in early Ethernet technology for local area networking.Carrier-sense multiple access with collision detection is a media access control method used most notably in early Ethernet technology for local area networking. It uses carrier-sensing to defer transmissions until no other stations are transmitting.
Wireless communication is 95 stander cdmaVijay Kumar
This document summarizes the IS-95 CDMA standard. It describes the key interfaces in IS-95 including A, Abis, B, C, D interfaces. It explains CDMA multiple access technique and how IS-95 uses unique codes to differentiate subscribers. It provides details on the forward and reverse CDMA channels, overhead channels, access channels, and framing in IS-95. It gives an overview of the key aspects of the IS-95 standard including the forward and reverse link architecture and channels.
The document provides an overview of switching systems and technologies. It discusses how early telephone networks used manual switching operated by human operators. It then describes the evolution of automatic telephone exchanges using digital controls and technologies like circuit switching and packet switching. It also summarizes Strowger switching, the first widely used automatic telephone exchange system, which uses stepping switches operated by dial pulses to connect calls.
This document discusses various techniques used to improve mobile radio link performance including equalization, diversity, and channel coding. It describes equalization techniques that compensate for intersymbol interference caused by multipath. It explains different types of diversity including spatial, time, and frequency diversity that are used to mitigate fading. Specifically, it outlines four common spatial diversity techniques: selection diversity, maximal ratio combining, equal gain diversity, and scanning diversity. The document also discusses time diversity and RAKE receivers used in code division multiple access systems to exploit multipath for additional time diversity gain.
The document discusses high-speed local area networks (LANs). It notes that the computing power of personal computers has increased, making LANs an essential computing platform. Traditional networks like 10 Mbps Ethernet and 16 Mbps token ring are no longer fast enough to handle the frequent transfers of large volumes of data needed in modern, transaction-oriented environments. The document then outlines some examples of uses for high-speed LANs, such as centralized server farms and powerful workgroups. It also discusses technologies that have been developed to increase LAN transmission speeds, such as Fast Ethernet, Gigabit Ethernet, and FDDI.
The document discusses HiperLAN, a wireless local area network standard. It describes the two main types of HiperLAN (Type 1 and Type 2) and their key features such as supported data rates and quality of service. HiperLAN Type 2 uses connection-oriented communication and provides handover between access points. The document also discusses complementary standards like HiperAccess and HiperLink, and compares HiperLAN to other wireless networking standards like IEEE 802.11 and Bluetooth.
Diversity Techniques in Wireless CommunicationSahar Foroughi
This document discusses diversity techniques for wireless communication, including cooperative diversity. It begins by introducing wireless systems and the impairments they face like fading. It then covers various diversity techniques like space, frequency, and time diversity that provide multiple transmission paths to reduce fading. Cooperative diversity is described as allowing single-antenna devices to achieve MIMO-like benefits by sharing antennas. The document outlines cooperative transmission protocols and challenges at different network layers in implementing cooperation. In conclusion, diversity techniques improve performance by providing multiple signal replicas to overcome fading, while cooperation enables reliability and throughput gains with challenges to address across protocol layers.
This document provides an overview of wireless sensor networks. It discusses key definitions, advantages, applications and challenges. Sensor networks can provide energy and detection advantages over traditional systems. They enable applications in various domains including military, environmental monitoring, healthcare and home automation. The document also outlines enabling technologies and discusses important considerations like network architectures, hardware components, energy consumption and optimization goals.
This document discusses routing protocols for ad hoc wireless networks. It begins by outlining some key issues in designing routing protocols for these networks, such as mobility, bandwidth constraints, and frequent topology changes. It then classifies routing protocols as being either table-driven, on-demand, or hybrid approaches. Table-driven protocols maintain consistent, up-to-date routing information through periodic table updates. On-demand protocols only discover routes when needed, to reduce overhead. The document proceeds to describe several examples of these different routing protocol types.
This document discusses the Internet Protocol (IP) version 4 and 6. It describes the key tasks of IP including addressing computers and fragmenting packets. IP version 4 uses 32-bit addresses while IP version 6 uses 128-bit addresses and has improvements like larger address space and better security. The document also covers IP address classes, private addressing, subnetting, Classless Inter-Domain Routing (CIDR), and address blocks.
Routing protocols for ad hoc wireless networks Divya Tiwari
The document discusses routing protocols for ad hoc wireless networks. It outlines several key challenges for these protocols, including mobility, bandwidth constraints, error-prone shared wireless channels, and hidden/exposed terminal problems. It also categorizes routing protocols based on how routing information is updated (proactively, reactively, or through a hybrid approach), whether they use past or future temporal network information, the type of network topology supported (flat or hierarchical), and how they account for specific resources like power.
Ad hoc wireless networks allow devices to connect and communicate with each other without a centralized access point. Nodes in an ad hoc network relay messages through intermediate hops to reach destinations. Examples include Bluetooth networks and wireless mesh networks. Issues in ad hoc networks include medium access control, routing with mobility and bandwidth constraints, and providing quality of service guarantees.
Mobile IP is a protocol that allows mobile devices to change location while maintaining the same IP address. It works by assigning mobile devices a permanent home address and registering a care-of address with their home agent when visiting foreign networks. The home agent intercepts packets destined for the mobile device's home address and tunnels them to its current care-of address. This allows the mobile device to stay connected to the internet as it moves between networks while keeping the same home address.
This document discusses Mobile Internet Protocol (Mobile IP) and how it allows mobile devices to stay connected to the internet without changing their IP address as they move between different networks. It covers key topics such as:
- The basics of Mobile IP including definitions of terms like home agent, foreign agent, and care-of-address.
- How Mobile IP works including the process of discovering the care-of-address, registering with foreign agents, and tunneling packets to the mobile node's current location.
- Adaptations made to transport protocols like TCP to improve performance over wireless networks.
RIP is an interior gateway protocol that uses distance vector routing and the Bellman-Ford algorithm to dynamically adapt to network changes. It works by having each router calculate the distances to reachable networks and share these distances with neighboring routers. However, RIP has issues with slow convergence and count-to-infinity problems when network failures occur. Several techniques are used to address these issues, including hold downs, split horizon, poison reverse updates, and triggered updates.
This document discusses multiple access protocols used to coordinate access to shared broadcast channels. It describes various channel partitioning protocols like TDMA and FDMA that divide channels by time or frequency. Random access protocols like ALOHA and CSMA are also covered, which allow nodes to transmit randomly and detect collisions. CSMA/CD improves on CSMA by allowing nodes to detect collisions quickly and abort transmissions. Taking-turns protocols pass control of the channel between nodes either through polling or token passing. The document provides examples and compares the efficiency of different multiple access protocols.
The document discusses ad-hoc networks and their key characteristics. It describes several challenges in ad-hoc networks including limited battery power, dynamic network topology, and scalability issues. It also summarizes several ad-hoc network routing protocols (e.g. DSDV, AODV, DSR), addressing both table-driven and on-demand approaches. Additionally, it outlines some ad-hoc MAC protocols like MACA and PAMAS that aim to manage shared wireless medium access.
The document discusses the GSM protocol stack and frame formatting. It describes the different layers of the protocol stack including the physical layer which handles radio transmission, the data link layer which provides error-free transmission, and the networking layer which is responsible for communication between network resources and mobility. It also discusses the signaling system 7 (SS7) standard and various application protocols used in GSM like BSSAP, BSSMAP, DTAP, ISUP, MAP, and TCAP. Furthermore, it explains the concepts of physical and logical channels in GSM and how logical channels can be mapped to physical channels.
Carrier-sense multiple access with collision detection (CSMA/CD) is a media access control method used most notably in early Ethernet technology for local area networking.Carrier-sense multiple access with collision detection is a media access control method used most notably in early Ethernet technology for local area networking. It uses carrier-sensing to defer transmissions until no other stations are transmitting.
Wireless communication is 95 stander cdmaVijay Kumar
This document summarizes the IS-95 CDMA standard. It describes the key interfaces in IS-95 including A, Abis, B, C, D interfaces. It explains CDMA multiple access technique and how IS-95 uses unique codes to differentiate subscribers. It provides details on the forward and reverse CDMA channels, overhead channels, access channels, and framing in IS-95. It gives an overview of the key aspects of the IS-95 standard including the forward and reverse link architecture and channels.
The document provides an overview of switching systems and technologies. It discusses how early telephone networks used manual switching operated by human operators. It then describes the evolution of automatic telephone exchanges using digital controls and technologies like circuit switching and packet switching. It also summarizes Strowger switching, the first widely used automatic telephone exchange system, which uses stepping switches operated by dial pulses to connect calls.
This document discusses various techniques used to improve mobile radio link performance including equalization, diversity, and channel coding. It describes equalization techniques that compensate for intersymbol interference caused by multipath. It explains different types of diversity including spatial, time, and frequency diversity that are used to mitigate fading. Specifically, it outlines four common spatial diversity techniques: selection diversity, maximal ratio combining, equal gain diversity, and scanning diversity. The document also discusses time diversity and RAKE receivers used in code division multiple access systems to exploit multipath for additional time diversity gain.
The document discusses high-speed local area networks (LANs). It notes that the computing power of personal computers has increased, making LANs an essential computing platform. Traditional networks like 10 Mbps Ethernet and 16 Mbps token ring are no longer fast enough to handle the frequent transfers of large volumes of data needed in modern, transaction-oriented environments. The document then outlines some examples of uses for high-speed LANs, such as centralized server farms and powerful workgroups. It also discusses technologies that have been developed to increase LAN transmission speeds, such as Fast Ethernet, Gigabit Ethernet, and FDDI.
The document discusses HiperLAN, a wireless local area network standard. It describes the two main types of HiperLAN (Type 1 and Type 2) and their key features such as supported data rates and quality of service. HiperLAN Type 2 uses connection-oriented communication and provides handover between access points. The document also discusses complementary standards like HiperAccess and HiperLink, and compares HiperLAN to other wireless networking standards like IEEE 802.11 and Bluetooth.
Diversity Techniques in Wireless CommunicationSahar Foroughi
This document discusses diversity techniques for wireless communication, including cooperative diversity. It begins by introducing wireless systems and the impairments they face like fading. It then covers various diversity techniques like space, frequency, and time diversity that provide multiple transmission paths to reduce fading. Cooperative diversity is described as allowing single-antenna devices to achieve MIMO-like benefits by sharing antennas. The document outlines cooperative transmission protocols and challenges at different network layers in implementing cooperation. In conclusion, diversity techniques improve performance by providing multiple signal replicas to overcome fading, while cooperation enables reliability and throughput gains with challenges to address across protocol layers.
This document provides an overview of wireless sensor networks. It discusses key definitions, advantages, applications and challenges. Sensor networks can provide energy and detection advantages over traditional systems. They enable applications in various domains including military, environmental monitoring, healthcare and home automation. The document also outlines enabling technologies and discusses important considerations like network architectures, hardware components, energy consumption and optimization goals.
This document discusses routing protocols for ad hoc wireless networks. It begins by outlining some key issues in designing routing protocols for these networks, such as mobility, bandwidth constraints, and frequent topology changes. It then classifies routing protocols as being either table-driven, on-demand, or hybrid approaches. Table-driven protocols maintain consistent, up-to-date routing information through periodic table updates. On-demand protocols only discover routes when needed, to reduce overhead. The document proceeds to describe several examples of these different routing protocol types.
This document discusses the Internet Protocol (IP) version 4 and 6. It describes the key tasks of IP including addressing computers and fragmenting packets. IP version 4 uses 32-bit addresses while IP version 6 uses 128-bit addresses and has improvements like larger address space and better security. The document also covers IP address classes, private addressing, subnetting, Classless Inter-Domain Routing (CIDR), and address blocks.
Routing protocols for ad hoc wireless networks Divya Tiwari
The document discusses routing protocols for ad hoc wireless networks. It outlines several key challenges for these protocols, including mobility, bandwidth constraints, error-prone shared wireless channels, and hidden/exposed terminal problems. It also categorizes routing protocols based on how routing information is updated (proactively, reactively, or through a hybrid approach), whether they use past or future temporal network information, the type of network topology supported (flat or hierarchical), and how they account for specific resources like power.
Ad hoc wireless networks allow devices to connect and communicate with each other without a centralized access point. Nodes in an ad hoc network relay messages through intermediate hops to reach destinations. Examples include Bluetooth networks and wireless mesh networks. Issues in ad hoc networks include medium access control, routing with mobility and bandwidth constraints, and providing quality of service guarantees.
Mobile IP is a protocol that allows mobile devices to change location while maintaining the same IP address. It works by assigning mobile devices a permanent home address and registering a care-of address with their home agent when visiting foreign networks. The home agent intercepts packets destined for the mobile device's home address and tunnels them to its current care-of address. This allows the mobile device to stay connected to the internet as it moves between networks while keeping the same home address.
This document discusses Mobile Internet Protocol (Mobile IP) and how it allows mobile devices to stay connected to the internet without changing their IP address as they move between different networks. It covers key topics such as:
- The basics of Mobile IP including definitions of terms like home agent, foreign agent, and care-of-address.
- How Mobile IP works including the process of discovering the care-of-address, registering with foreign agents, and tunneling packets to the mobile node's current location.
- Adaptations made to transport protocols like TCP to improve performance over wireless networks.
This document discusses network protocols for mobile communications, focusing on Mobile IP. It provides motivation for Mobile IP by explaining limitations of standard IP routing with mobile nodes. Key concepts are introduced, including mobile node, home agent, foreign agent, and care-of address. Mobile IP operations are illustrated, such as registration, encapsulation for packet tunneling, and optimization techniques like reverse tunneling. Implementation details are covered along with integration with IPv6.
The document discusses Mobile IP, which allows mobile devices to change networks while maintaining the same IP address. It describes key concepts like mobile nodes, home networks, foreign agents, and care-of addresses. The mobile IP process involves agent discovery, registration of the mobile node's location, and tunneling of data packets through foreign agents. Dynamic Host Configuration Protocol (DHCP) is also discussed, which dynamically assigns IP addresses to devices on a network.
Mobile IP allows users to move between networks while maintaining the same IP address. It uses home and foreign agents and care-of addresses. A mobile node can register its care-of address with its home agent to receive packets when away from home. There are three main processes: agent discovery to find foreign agents, registration of the mobile node's care-of address with its home agent, and data transfer either via indirect routing through home and foreign agents or direct routing from correspondent nodes to the mobile node. Mobile IP supports host mobility across networks in a transparent manner without changing IP addresses.
Mobile IP allows nodes to change their point of attachment to the network while maintaining ongoing communications using the same IP address. It works by associating each mobile node with a home network and address, and registering the node's current location, or care-of address, with a home agent in the home network. When packets are sent to the mobile node's home address, the home agent intercepts them and tunnels them to the node's current care-of address via encapsulation. This allows the node to receive packets no matter where it is connected.
This document provides an overview of Mobile IP, including its key requirements, terminology, and technical processes. Mobile IP allows devices to change networks without losing connectivity by updating their location through registration with a home agent. It aims to remain compatible with existing IP standards while providing transparency to higher-level applications and efficiency at scale. The document explains concepts such as home and foreign networks, care-of addresses, agents, registration, tunneling, and optimization techniques.
Mobile IP is an open standard that allows devices to change networks while maintaining the same IP address. This allows ongoing connections and applications to continue without being dropped when the device roams to a new network. Mobile IP works by assigning the device two IP addresses - a home address that stays the same and a care-of address that changes based on the new network point of attachment. Tunneling is used to forward packets to the device's current location. Mobile IPv6 improves upon Mobile IPv4 by simplifying the mobility management process and integrating support for route optimization.
Mobile IP is an open standard that allows devices to change networks while maintaining the same IP address. This ensures ongoing connections and applications are not dropped when switching networks. It works by assigning two IP addresses - a static home address and a care-of address that changes based on the device's current network location. When the device roams away from its home network, its traffic is encapsulated and tunneled through its home network to maintain connectivity using its home address. Mobile IP provides mobility across IP networks while cellular IP focuses on optimizing mobility within cellular networks.
1. The document discusses various aspects of mobile internet protocol and transport layer protocols.
2. It provides an overview of Mobile IP including its key components like mobile node, home agent, foreign agent and correspondent node. It also describes how Mobile IP works through agent discovery, registration and tunneling.
3. The document also discusses TCP/IP architecture including its four layers and compares it to the OSI model. It describes various techniques to improve TCP performance over mobile networks like indirect TCP, snooping TCP and mobile TCP.
This document discusses the key topics covered in Unit II of a course on Mobile Computing. It covers Mobile Internet Protocol (Mobile IP) which allows users to move between networks while keeping the same IP address. The key components of Mobile IP are described including the mobile node, home agent, foreign agent, and care-of address. It also discusses how packet delivery works when the mobile node moves to a foreign network using tunneling. Improving TCP performance over wireless networks is also covered, including congestion control, slow start, fast retransmission, and indirect TCP which uses the access point as a proxy.
MOBILE INTERNET PROTOCOL AND TRANSPORT LAYER
Overview of Mobile IP – Features of Mobile IP – Key Mechanism in Mobile IP – route Optimization. Overview of TCP/IP – Architecture of TCP/IP- Adaptation of TCP Window – Improvement in TCP Performance.
Mobile IP provides network layer mobility by allowing mobile nodes to change their point of attachment to the network without changing their IP address. It works by tunneling packets destined for a mobile node to its current location through its home agent and foreign agent. The mobile node registers its care-of address with its home agent so that its home agent knows where to tunnel packets. This allows seamless connectivity as the mobile node moves between networks.
The document discusses various topics related to mobile network layer including Mobile IP, DHCP, Ad Hoc networks, and routing protocols.
Mobile IP allows devices to change locations while maintaining network connectivity using care-of addresses, home agents, and tunneling. DHCP dynamically assigns IP addresses in mobile networks. Ad Hoc networks are temporary networks formed without infrastructure between devices using multi-hop routing. Routing protocols for Ad Hoc networks can be proactive, maintaining routes continuously, or reactive, determining routes on demand to reduce overhead.
In this ppt you'll learn about the packet delivery. How the Ip packet is delivered from transmitter to receiver when the Mobile node is in the Foreign network. Also you'll be able to learn all definitions like What is mobile node, correspondent node, Home agent, Foreign Agent, Tunneling, Encapsulation, COA(care of address) etc. After that you'll learn about the Agent advertisement and registering of care of address including different steps.
Mobile IP allows mobile devices to stay connected to the internet as they move between networks. It extends standard IP to support mobility. There are three key mechanisms:
1) Mobile nodes discover their current location through agent advertisements from foreign agents.
2) They register their care-of address with their home agent to update their location.
3) Tunnelling encapsulates and redirects packets to the mobile node's current location.
Similar to mobile ip, Mobile COmmunication Internet Protocol (20)
The Internet of Things (IoT) is rapidly expanding, with over 75 billion connected devices expected by 2025. This growth demands robust security solutions, as IoT-related data breaches in 2022 averaged $9.44 million in costs. Additionally, 57% of IoT device owners have faced cybersecurity incidents or breaches in the past two years. For top-notch IoT security solutions, trust Lumiverse Solutions. Contact us at 9371099207.
Top UI/UX Design Trends for 2024: What Business Owners Need to KnowOnepixll
Discover the top UI/UX design trends for 2024 that every business owner needs to know. This infographic covers five key trends: Dark Mode Dominance, Neumorphism and Soft UI, Voice User Interface (VUI) Integration, Personalization and AI-Driven Design, and Accessibility-First Design. By staying ahead of these trends, you can create engaging, user-friendly digital products that cater to evolving user needs and preferences. Enhance your digital presence and ensure your designs are modern, accessible, and effective.
Cyber Crime with basics and knowledge to cyber sphereRISHIKCHAUDHARY2
In this ppt you will get to know about the cyber security basics as well as the paradigms that are important in the cyber world.
Also this can be helpful for study purpose in college and schools.
You will also get two case studies which can be helpful for better understand.
Seizing the IPv6 Advantage: For a Bigger, Faster and Stronger InternetAPNIC
Paul Wilson, Director General of APNIC, presented on 'Seizing the IPv6 Advantage: For a Bigger, Faster and Stronger Internet' during the APAC IPv6 Council held in Hanoi, Viet Nam on 7 June 2024.
Call Girls In Delhi 🔥 +91-9873940964🔥High Profile Call Girl Delhi
mobile ip, Mobile COmmunication Internet Protocol
1. EPL476 Mobile Networks
Mobile Network Protocols
Instructor: Dr. Vasos Vassiliou
Slides adapted from Prof. Dr.-Ing. Jochen H. Schiller and W. Stallings
3. 3
Mobile IP (I)
Mobile IP adds mobility support to the Internet network
layer protocol IP.
The Internet started at a time when no-one had a concept of
mobile computers.
• The Internet of today lacks mechanisms for the support of users
traveling through the world.
– IP is the common base for thousands of applications and runs over dozens of
different networks; this is the reason for supporting mobility at the IP layer.
Motivation for Mobile IP:
Routing
• based on IP destination address, network prefix determines physical
subnet
• Change of physical subnet implies change of IP address to have a
topological correct address (standard IP) or needs special entries in
the routing tables
4. 4
Mobile IP (II)
Create specific routes to end-systems – mobile nodes?
• change of all routing table entries to forward packets to the
right destination
• does not scale with the number of mobile hosts and frequent
changes in the location
Changing the IP address?
• adjust the host IP address depending on the current location
• almost impossible to find a mobile host, DNS has not been built
for frequent updates
• TCP connection break
5. 5
Mobile IP (III)
Requirements to Mobile IP:
Transparency
• mobile end-systems keep their IP address
• continuation of communication after interruption of link
possible
• point of connection to the fixed network can be changed
Compatibility
• support of the same layer 2 protocols as IP does
• no changes to current end-systems and routers required
• Mobile end-systems can communicate with fixed systems
6. 6
Mobile IP (IV)
Security
• authentication of all registration messages
Efficiency and scalability
• only little additional messages to the mobile system required
(connection typically via a low bandwidth radio link)
• world-wide support of a large number of mobile systems in the
whole Internet
7. 7
Real-life Solution
Take up the analogy of you moving from one
apartment to another. What do you do?
Leave a forwarding address with your old post-
office
The old post-office forwards mail to your new
post-office, which then delivers it to you
8. 8
Mobile IP - Definition
“Mobile IP (MIP) is a modification to IP
that allows nodes to continue to receive
datagrams no matter where they happen to
be attached to the Internet”
9. 9
Mobile IP (V)
Terminology:
Mobile Node (MN)
• system (node) that can change the point of connection to the network
without changing its IP address
Home Agent (HA)
• system in the home network of the MN, typically a router
• registers the location of the MN, tunnels IP datagrams to the COA
Foreign Agent (FA)
• system in the current foreign network of the MN, typically a router
• forwards the tunneled datagrams to the MN, typically also the default
router of the MN
10. 10
Mobile IP (VI)
Care-of Address (COA)
• address of the current tunnel end-point for the MN (at FA or
MN)
• actual location of the MN from an IP point of view
• can be chosen, e.g., via DHCP
Correspondent Node (CN)
• communication partner
11. 11
Mobile IP in detail …
Combination of 3 separable mechanisms:
Discovering the care-of address
Registering the care-of address
Tunneling to the care-of address
12. 12
CN
2. HA Discovery Request
3. HA Discovery Reply
4. HA Registration through FA
5. HA Registration Ack.
1. CoA Discovery
MN HA
1
2
3
-- MN is Registered with HA --
4
55
-- CoA and HA Discovery --
-- Registration Procedure --
-- CN starts communication with MN --
6. Data Packet
7. IP-in-IP Encapsulation
8. Tunneled Data
-- Signals 6-10a as above --
8 77
6a. Data Packet
-- MN starts communication with CN --
8a Detunnelled Data
9. Binding Update
6a6a
-- Discovery and Registration as above --
FA
8a
66
10
10. IP-in-IP tunneling
99
10a 10a. Detunnelled Data
CN
2. HA Discovery Request
3. HA Discovery Reply
4. HA Registration BU
5. HA Registration BU Ack.
1. CoA Discovery
MN HA
1
2
3
-- MN is Registered with HA --
4
55
-- CoA and HA Discovery --
-- Registration Procedure --
-- CN starts communication with MN --
6. Data Packet
7. IP-in-IP Encapsulation
8. Tunneled Data
-- Signals 6-10 as above --
8
77
6a. Data Packet
-- MN starts communication with CN --
9. Binding Update
6a6a
-- Discovery and Registration as above --
FA
66
10
10. Binding Ack
99
MIPv4 MIPv6
Mobile IP in detail
13. 13
Discovering the care-of address
Discovery process built on top of an existing
standard protocol: router advertisements
Router advertisements extended to carry available
care-of addresses called: agent advertisements
Foreign agents (and home agents) send agent
advertisements periodically
A mobile host can choose not to wait for an
advertisement, and issue a solicitation message
14. 14
Agent advertisements
Foreign agents send advertisements to advertise
available care-of addresses
Home agents send advertisements to make
themselves known
Mobile hosts can issue agent solicitations to
actively seek information
If mobile host has not heard from a foreign agent
its current care-of address belongs to, it seeks
for another care-of address
15. 15
Registering the Care-of
Address
Once mobile host receives care-of address, it
registers it with the home agent
A registration request is first sent to the home
agent (through the foreign agent)
Home agent then approves the request and sends a
registration reply back to the mobile host
Security?
17. 17
Home agent discovery
If the mobile host is unable to
communicate with the home agent, a home
agent discovery message is used
The message is sent as a broadcast to the
home agents in the home network
18. 18
Tunneling to the Care-of address
When home agent receives packets addressed to
mobile host, it forwards packets to the care-of
address
How does it forward it? - encapsulation
The default encapsulation mechanism that must
be supported by all mobility agents using mobile IP
is IP-within-IP
Using IP-within-IP, home agent inserts a new IP
header in front of the IP header of any datagram
19. 19
Tunneling (contd.)
Destination address set to the care-of
address
Source address set to the home agent’s
address
After stripping out the first header, IP
processes the packet again
21. 21
(current physical network
for the MN)
home network
(physical home network
for the MN)
Mobile IP (VII)
Example network
Internet
router
HA
MN
router
FA foreign
network
routerend-system
CN
22. 22
Mobile IP (VIII)
Data transfer to the mobile system
Internet
home network
foreign
network
FA
HA
MN
receiver
1
2
3
sender
CN
1. Sender sends to the IP address of MN,
HA intercepts packet
2. HA tunnels packet to COA, here FA,
by encapsulation
3. FA forwards the packet to the MN
23. 23
foreign
network
home network
Mobile IP (IX)
Data transfer from the mobile system
Internet
HA
MN
sender
receiver
CN
1. Sender sends to the IP address
of the receiver as usual,
FA works as default router
FA
1
24. 24
Mobile IP (XIII)
Optimization of packet forwarding:
Triangular routing
• sender sends all packets via HA to MN
• higher latency and network load
Solutions – optimization
• HA informs a sender about the location of MN
• sender learns the current location of MN
• direct tunneling to this location
• big security problems!
25. 25
Mobile IP (XIV)
Change of FA
• Packets on-the-fly during the change can be lost
• new FA informs old FA to avoid packet loss, old FA forwards
remaining packets to new FA
• this information also enables the old FA to release resources
for the MN
26. 26
Mobile IP (XV)
Change of the foreign agent with the optimized mobile
IP
CN HA FAold FAnew MN
t
request
update
ACK
data data
MN changes
locationregistration
update
ACKdata
data data
warning
update
ACK
data
data
registration
27. 27
Mobile IP (XVI)
Reverse tunneling:
Internet
receiver
FA
HA
MN
home network
foreign
network
sender
3
2
1
1. MN sends to FA
2. FA tunnels packets to HA
by encapsulation
3. HA forwards the packet to the
receiver (standard case)
CN
28. 28
Mobile IP (XVII)
Mobile IP with reverse tunneling
Router accept often only “topological correct“ addresses
(firewall!)
• a packet from the MN encapsulated by the FA is now topological
correct
• furthermore multicast and TTL problems solved (TTL in the home
network correct, but MN is to far away from the receiver)
Reverse tunneling does not solve
• problems with firewalls, the reverse tunnel can be abused to
circumvent security mechanisms (tunnel hijacking)
• optimization of data paths, i.e. packets will be forwarded through
the tunnel via the HA to a sender (double triangular routing)
The standard is backwards compatible
• the extensions can be implemented easily and cooperate with
current implementations without these extensions
• Agent Advertisements can carry requests for reverse tunneling
32. Mobile IP registration request
home agent
home address
type = 1 lifetime
0 7 8 15 16 312423
T x
identification
COA
extensions . . .
S B DMG r
S: simultaneous bindings
B: broadcast datagrams
D: decapsulation by MN
M mininal encapsulation
G: GRE encapsulation
r: =0, ignored
T: reverse tunneling requested
x: =0, ignored
33. Mobile IP registration reply
home agent
home address
type = 3 lifetime
0 7 8 15 16 31
code
identification
extensions . . .Example codes:
registration successful
0 registration accepted
1 registration accepted, but simultaneous mobility bindings unsupported
registration denied by FA
65 administratively prohibited
66 insufficient resources
67 mobile node failed authentication
68 home agent failed authentication
69 requested Lifetime too long
registration denied by HA
129 administratively prohibited
131 mobile node failed authentication
133 registration Identification mismatch
135 too many simultaneous mobility bindings
35. Encapsulation I
Encapsulation of one packet into another as payload
e.g. IPv6 in IPv4 (6Bone), Multicast in Unicast (Mbone)
here: e.g. IP-in-IP-encapsulation, minimal encapsulation or GRE (Generic
Record Encapsulation)
IP-in-IP-encapsulation (mandatory, RFC 2003)
tunnel between HA and COA
Care-of address COA
IP address of HA
TTL
IP identification
IP-in-IP IP checksum
flags fragment offset
lengthDS (TOS)ver. IHL
IP address of MN
IP address of CN
TTL
IP identification
lay. 4 prot. IP checksum
flags fragment offset
lengthDS (TOS)ver. IHL
TCP/UDP/ ... payload
36. Encapsulation II
Minimal encapsulation (optional)
avoids repetition of identical fields
e.g. TTL, IHL, version, DS (RFC 2474, old: TOS)
only applicable for non fragmented packets, no space left for fragment
identification
care-of address COA
IP address of HA
TTL
IP identification
min. encap. IP checksum
flags fragment offset
lengthDS (TOS)ver. IHL
IP address of MN
original sender IP address (if S=1)
Slay. 4 protoc. IP checksum
TCP/UDP/ ... payload
reserved
37. Generic Routing Encapsulationoriginal
header
original data
new datanew header
outer header
GRE
header
original data
original
header
Care-of address COA
IP address of HA
TTL
IP identification
GRE IP checksum
flags fragment offset
lengthDS (TOS)ver. IHL
IP address of MN
IP address of CN
TTL
IP identification
lay. 4 prot. IP checksum
flags fragment offset
lengthDS (TOS)ver. IHL
TCP/UDP/ ... payload
routing (optional)
sequence number (optional)
key (optional)
offset (optional)checksum (optional)
protocolrec. rsv. ver.CRK S s
RFC 1701
RFC 2784 (updated by 2890)
reserved1 (=0)checksum (optional)
protocolreserved0 ver.C
38. 38
Route Optimizations
Enable direct notification of the
corresponding host
Direct tunneling from the corresponding
host to the mobile host
Binding cache maintained at corresponding
host
40. 40
Binding Update
When a home agent receives a packet to be
tunneled to a mobile host, it sends a binding
update message to the corresponding host
When a home agent receives a binding request
message, it replies with a binding update message
Also used in the the smooth-handoffs optimization
41. 41
Binding Update (Contd.)
Corresponding host caches binding and uses it for
tunneling subsequent packets
Lifetime of binding?
Corresponding host that perceives a near-expiry
can choose to ask for a binding confirmation using
the binding request message
Home agent can choose to ask for an
acknowledgement to which a corresponding host
has to reply with a binding ack message
42. 42
Binding warning
When a foreign agent receives a tunneled
message, but sees no visitor entry for the mobile
host, it generates a binding warning message to
the appropriate home agent
When a home agent receives a warning, it issues an
update message to the corresponding host
What if the foreign agent does not have the home
agent address (why?) ?
43. 43
Binding Update and Warning
Home Agent
Foreign AgentCorresponding Host
Mobile Host
BU BW
BW
BR
BA
44. Optimization of packet
forwarding
Problem: Triangular Routing
sender sends all packets via HA to MN
higher latency and network load
“Solutions”
sender learns the current location of MN
direct tunneling to this location
HA informs a sender about the location of MN
big security problems!
Change of FA
packets on-the-fly during the change can be lost
new FA informs old FA to avoid packet loss, old FA now
forwards remaining packets to new FA
this information also enables the old FA to release resources
for the MN
45. Change of foreign agent
CN HA FAold FAnew MN
MN changes
location
t
Data Data Data
Update
ACK
Data Data
RegistrationUpdate
ACK
Data
Data Data
Warning
Request
Update
ACK
Data
Data
46. Reverse tunneling (RFC 3024, was: 2344)
Internet
receiver
FA
HA
MN
home network
foreign
network
sender
3
2
1
1. MN sends to FA
2. FA tunnels packets to HA
by encapsulation
3. HA forwards the packet to the
receiver (standard case)
CN
47. Mobile IP with reverse
tunneling
Router accept often only “topological correct“ addresses (firewall!)
a packet from the MN encapsulated by the FA is now topological
correct
furthermore multicast and TTL problems solved (TTL in the home
network correct, but MN is to far away from the receiver)
Reverse tunneling does not solve
problems with firewalls, the reverse tunnel can be abused to circumvent
security mechanisms (tunnel hijacking)
optimization of data paths, i.e. packets will be forwarded through the
tunnel via the HA to a sender (double triangular routing)
The standard is backwards compatible
the extensions can be implemented easily and cooperate with current
implementations without these extensions
Agent Advertisements can carry requests for reverse tunneling
48. 48
Mobile IP and IPv6
Mobile IP was developed for IPv4, but IPv6 simplifies the
protocols
security is integrated and not an add-on, authentication of
registration is included
COA can be assigned via auto-configuration (DHCPv6 is one
candidate), every node has address autoconfiguration
no need for a separate FA, all routers perform router
advertisement which can be used instead of the special agent
advertisement; addresses are always co-located
MN can signal a sender directly the COA, sending via HA not
needed in this case (automatic path optimization)
„soft“ hand-over, i.e. without packet loss, between two subnets
is supported
• MN sends the new COA to its old router
• the old router encapsulates all incoming packets for the MN and
forwards them to the new COA
• authentication is always granted
49. 49
Problems with mobile IP
Security
authentication with FA problematic, for the FA typically
belongs to another organization
no protocol for key management and key distribution has been
standardized in the Internet
patent and export restrictions
Firewalls
typically mobile IP cannot be used together with firewalls,
special set-ups are needed (such as reverse tunneling)
QoS
many new reservations in case of RSVP
tunneling makes it hard to give a flow of packets a special
treatment needed for the QoS
Security, firewalls, QoS etc. are topics of current research
and discussions!
50. 50
Security in Mobile IP
Security requirements (Security Architecture for the
Internet Protocol, RFC 1825)
Integrity
any changes to data between sender and receiver can be
detected by the receiver
Authentication
sender address is really the address of the sender and all data
received is really data sent by this sender
Confidentiality
only sender and receiver can read the data
Non-Repudiation
sender cannot deny sending of data
Traffic Analysis
creation of traffic and user profiles should not be possible
Replay Protection
receivers can detect replay of messages
51. not encrypted encrypted
IP security architecture I
Two or more partners have to negotiate security mechanisms
to setup a security association
typically, all partners choose the same parameters and
mechanisms
Two headers have been defined for securing IP packets:
Authentication-Header
• guarantees integrity and authenticity of IP packets
• if asymmetric encryption schemes are used, non-repudiation can
also be guaranteed
Encapsulation Security Payload
• protects confidentiality between communication partners
Authentification-HeaderIP-Header UDP/TCP-Paketauthentication headerIP header UDP/TCP data
ESP headerIP header encrypted data
52. Mobile Security Association for registrations
parameters for the mobile host (MH), home agent (HA), and
foreign agent (FA)
Extensions of the IP security architecture
extended authentication of registration
prevention of replays of registrations
• time stamps: 32 bit time stamps + 32 bit random number
• nonces: 32 bit random number (MH) + 32 bit random number (HA)
registration reply
registration request
registration request
IP security architecture II
MH FA HA
registration reply
MH-HA authentication
MH-FA authentication FA-HA authentication
53. Key distribution
Home agent distributes session keys
foreign agent has a security association with the home agent
mobile host registers a new binding at the home agent
home agent answers with a new session key for foreign agent
and mobile node
FA MH
HA
response:
EHA-FA {session key}
EHA-MH {session key}
54. 54
Recap
Host mobility and Internet addresses
Post-office analogy
Home agent, foreign agent, care-of address, home
address
Registration and Tunneling
Mobile IP problems
Mobile IP Optimizations
Other options
Editor's Notes
Same Principle as call forwarding!
Same Principle as call forwarding!
Going back to the basic process we can have all the functions acting independently.
These diagrams show the different signaling messages needed to establish a mobile IP connection and communication.
The diagram on the left is for MIPv4 and the one on the right is for MIPv6
In MIPv4 we see that the HA is the one taking care of the triangular routing, whereas is MIPv6 this responsibility is delegated to the mobile node.
IPv6 and MIPv6 were designed from the beginning with mobility in mind and
support these functions in a more simple way
USE POINTER
Mobile IP (MIP) allows IP nodes to maintain connectivity while moving
A Mobile Node (MN) is assigned a Care-of Address (CoA) when it moves to a foreign sub-network
The COA can be an address obtained by the FA OR AN ADDRESS OBTAINED DYNAMICALLY
The Home Agent will intercept and tunnel all packets to the MNs CoA
A Foreign Agent (FA) or the MN will de-tunnel the packets and eventually set up a direct connection with the CH via an Optimal Route