Optimized Mobile IP
The optimized mobile IP protocol needs four additional messages.
● Binding request: Any node that wants to know the current location of an MN
can send a binding request to the HA. The HA can check if the MN has allowed
dissemination of its current location. If the HA is allowed to reveal the location
it sends back a binding update.
● Binding update: This message sent by the HA to CNs reveals the current
location of an MN. The message contains the fixed IP address of the MN and
the COA. The binding update can request an acknowledgement.
● Binding acknowledgement: If requested, a node returns this
acknowledgement after receiving a binding update message.
● Binding warning: If a node decapsulates a packet for an MN, but it is not the
current FA for this MN, this node sends a binding warning. The warning
contains MN’s home address and a target node address, i.e., the address of the
node that has tried to send the packet to this MN. The recipient of the warning
then knows that the target node could benefit from obtaining a fresh binding
for the MN. The recipient can be the HA, so the HA should now send a binding
update to the node that obviously has a wrong COA for the MN.
Optimized Mobile IP
Cellular IP (Basic Architecture)
• Micro-mobility
management
protocol
• Provides local
handovers
• Cellular IP
gateway (CIPGW)
for each domain
Cellular IP
Advantage
• Manageability: Cellular IP is mostly self-configuring, and integration of the
CIPGW into a firewall would facilitate administration of mobility-related
functionality.
Disadvantages
• Efficiency: Additional network load is induced by forwarding packets on
multiple paths.
• Transparency: Changes to MNs are required.
• Security: Routing tables are changed based on messages sent by mobile
nodes. Additionally, all systems in the network can easily obtain a copy of
all packets destined for an MN by sending packets with the MN’s source
address to the CIPGW.
HAWAII (Basic Architecture)
• HAWAII (Handoff-
Aware Wireless
Access Internet
Infrastructure)
• Micro-mobility
support transparent as
possible for both
home agents and
mobile nodes.
• The goals are
performance and
reliability
improvements and
support for quality of
service mechanisms.
HAWAII (Basic Architecture)
Step 1 : On entering an
HAWAII domain, a mobile
node obtains a co-located
COA.
Step 2: A mobile node
registers with the HA.
Step 3: When moving to
another cell inside the
foreign domain, the MN
sends a registration request
to the new base station as
to a foreign agent thus
mixing the concepts of co-
located COA and foreign
agent COA.
HAWAII (Basic Architecture)
Step 4: The base station
intercepts the registration
request and sends out a
handoff update message,
which reconfigures all
routers on the paths from
the old and new base
station to the so-called
crossover router.
When routing has
been reconfigured
successfully, the base
station sends a registration
reply to the mobile node,
again as if it were a foreign
agent.
HAWAII (Basic Architecture)
• The use of challenge-
response extensions for
authenticating a mobile
node is mandatory.
• In contrast to cellular IP,
routing changes are always
initiated by the foreign
domain’s infrastructure, and
the corresponding messages
could be authenticated, e.g.,
by means of an IPSec
authentication header
reducing the risk of
malicious rerouting of
traffic initiated by bogus
mobile hosts.
HAWAII
Advantages
• Security: Challenge-response extensions are mandatory. In contrast to
Cellular IP, routing changes are always initiated by the foreign domain’s
infrastructure.
• Transparency: HAWAII is mostly transparent to mobile nodes.
Disadvantages
• Security: There are no provisions regarding the setup of IPSec tunnels.
• Implementation: No private address support is possible because of co-
located COAs.
Fast Mobile IPV6
• Drawback in MIPV6 is
handoff delays.
• FMIPV6 proposes the
mechanisms to
reduce the handoff
delay
• There are two types
of handover, namely
predictive and
reactive
Fast MobileIPV6: Call Flow for Predictive Handoff
Fast MobileIPV6: Call Flow for Reactive Handoff
HMIPV6 (Basic Architecture)
• Micro-mobility management
protocol
• Introduces hierarchies for
handling micro-mobility
issues.
• HMIPv6 provides micro-
mobility support by installing
a mobility anchor point
(MAP), which is responsible
for a certain domain and acts
as a local HA within this
domain for visiting MNs.
HMIPV6 (Basic Architecture)
• Mobility Anchor Point
• A MAP domain’s
boundaries are defined by
the access routers (AR)
advertising the MAP
information to the attached
MNs.
• Local handovers
• Binding update.
• RCOA stays unchanged
• Support smooth handovers
• Limited location privacy
HMIPV6
Advantages
• Security: MNs can have (limited) location privacy because
LCOAs can
be hidden.
• Efficiency: Direct routing between CNs sharing the same link is
possible
Disadvantages
• Transparency: Additional infrastructure component (MAP).
• Security: Routing tables are changed based on messages sent by
mobile nodes. This requires strong authentication and protection
against denial of service attacks. Additional security functions
might be necessary in MAPs.
IPV6
• Every IPv6 node masters address autoconfiguration
• Neighbor discovery
• A soft handover is possible with IPv6
• The FA is not needed any more
Mobile IPV6
• Route optimization
• No need for the CH
to be equipped with
additional software
like MIP-RO (Mobile
IP with route
optimization.
IPV4 Vs IPV6
IPv4 (Internet Protocol Version 4) IPv6 (Internet Protocol Version 6)
Encryption and authentication is not provided in IPv4 (Internet
Protocol Version 4).
Encryption and authentication is provided in IPv6 (Internet Protocol
Version 6)
Header of IPv4 is 20 – 60 bytes. Header of IPv6 is fixed at 40 bytes
Checksumfield is available in IPv4. Checksumfield is not available in IPv6.
Packet flow identification is not available in IPv4 (Internet Protocol
Version 4).
Packet flow identification is available in IPv6. Flow label field is available in
the header.
IPv4 addresses are usually represented in dot-decimal notation,
consisting of four decimal numbers, each ranging from 0 to 255,
separated by dots.
An IPv6 address is represented as eight groups of four hexadecimal digits,
each group representing 16 bits.
Sender and forwarding routers performs fragmentation in IPv4 Fragmentationis performed only by the sender in IPv6.
In IPv4, security features relies on application In IPv6, there is an inbuilt security feature named IPSEC.
End to end connection integrity cannot be achieved in IPv4. End to end connection integrity can be done in IPv6.
IPv4 supports DHCP and Manual address configuration IPv6 supports renumbering and auto address configuration.
IPv4 addresses are 32-bit long IPv6 addresses are 128 bits long.
The address space in IPv4 is 4.29 ×109 The address space in IPv6 is 3.4 ×1038
IPv4 has a broadcast message transmission scheme. Multicast and Anycast message transmissionscheme is available in IPv6.

More Related Content

PPTX
Mobile IP
PPTX
Module 05 mobility management (1)
PDF
Mobile IP.pdf
PDF
A review study of handover performance in mobile ip
PDF
Mobile IP1) Mobile IP(MIP) is an Internet Engineering Task Force(.pdf
PPTX
Mobile IP
PDF
Mobileip 161105154557
Mobile IP
Module 05 mobility management (1)
Mobile IP.pdf
A review study of handover performance in mobile ip
Mobile IP1) Mobile IP(MIP) is an Internet Engineering Task Force(.pdf
Mobile IP
Mobileip 161105154557

Similar to MC-M5 omputer Engineering Learning presentation (20)

PDF
Mobileip 161105154557
PPT
Who Needs Mobile Ip Anyway
PDF
Mobile Networking through Mobile IP
PPTX
Mobile IP - pavankumar_912
PPT
mobile IP wireless mobile newtork microproject 6th sem
PDF
Ipv4 Vs Ipv6
DOCX
Fast Handovers in heterogeneous Wireless Networks
PDF
Seminar technical
PPTX
Tushar mobile i-pv6
PDF
Pertemuan 13. Mobile Ip.pdf
PPT
Wireless & Mobile Communications_Third_unit.ppt
PPT
Understanding i pv6 2
PDF
An overview of internet engineering task force mobility management protocols...
DOCX
Individual CommentsYour answers missed there below topics, sp.docx
PPTX
Mobile IP
PPT
Mobile IP 1
PPT
Mobile
PPT
Mobile
Mobileip 161105154557
Who Needs Mobile Ip Anyway
Mobile Networking through Mobile IP
Mobile IP - pavankumar_912
mobile IP wireless mobile newtork microproject 6th sem
Ipv4 Vs Ipv6
Fast Handovers in heterogeneous Wireless Networks
Seminar technical
Tushar mobile i-pv6
Pertemuan 13. Mobile Ip.pdf
Wireless & Mobile Communications_Third_unit.ppt
Understanding i pv6 2
An overview of internet engineering task force mobility management protocols...
Individual CommentsYour answers missed there below topics, sp.docx
Mobile IP
Mobile IP 1
Mobile
Mobile
Ad

Recently uploaded (20)

PPTX
Management Information system : MIS-e-Business Systems.pptx
PPTX
Module 8- Technological and Communication Skills.pptx
PDF
PREDICTION OF DIABETES FROM ELECTRONIC HEALTH RECORDS
PPTX
communication and presentation skills 01
PDF
BIO-INSPIRED ARCHITECTURE FOR PARSIMONIOUS CONVERSATIONAL INTELLIGENCE : THE ...
PDF
Improvement effect of pyrolyzed agro-food biochar on the properties of.pdf
PPTX
"Array and Linked List in Data Structures with Types, Operations, Implementat...
PPTX
6ME3A-Unit-II-Sensors and Actuators_Handouts.pptx
PDF
Design Guidelines and solutions for Plastics parts
PPTX
tack Data Structure with Array and Linked List Implementation, Push and Pop O...
PPTX
Fundamentals of Mechanical Engineering.pptx
PPTX
Information Storage and Retrieval Techniques Unit III
PDF
UNIT no 1 INTRODUCTION TO DBMS NOTES.pdf
PDF
Abrasive, erosive and cavitation wear.pdf
PPT
Total quality management ppt for engineering students
PDF
A SYSTEMATIC REVIEW OF APPLICATIONS IN FRAUD DETECTION
PDF
III.4.1.2_The_Space_Environment.p pdffdf
PPTX
Sorting and Hashing in Data Structures with Algorithms, Techniques, Implement...
PDF
Visual Aids for Exploratory Data Analysis.pdf
PDF
Categorization of Factors Affecting Classification Algorithms Selection
Management Information system : MIS-e-Business Systems.pptx
Module 8- Technological and Communication Skills.pptx
PREDICTION OF DIABETES FROM ELECTRONIC HEALTH RECORDS
communication and presentation skills 01
BIO-INSPIRED ARCHITECTURE FOR PARSIMONIOUS CONVERSATIONAL INTELLIGENCE : THE ...
Improvement effect of pyrolyzed agro-food biochar on the properties of.pdf
"Array and Linked List in Data Structures with Types, Operations, Implementat...
6ME3A-Unit-II-Sensors and Actuators_Handouts.pptx
Design Guidelines and solutions for Plastics parts
tack Data Structure with Array and Linked List Implementation, Push and Pop O...
Fundamentals of Mechanical Engineering.pptx
Information Storage and Retrieval Techniques Unit III
UNIT no 1 INTRODUCTION TO DBMS NOTES.pdf
Abrasive, erosive and cavitation wear.pdf
Total quality management ppt for engineering students
A SYSTEMATIC REVIEW OF APPLICATIONS IN FRAUD DETECTION
III.4.1.2_The_Space_Environment.p pdffdf
Sorting and Hashing in Data Structures with Algorithms, Techniques, Implement...
Visual Aids for Exploratory Data Analysis.pdf
Categorization of Factors Affecting Classification Algorithms Selection
Ad

MC-M5 omputer Engineering Learning presentation

  • 1. Optimized Mobile IP The optimized mobile IP protocol needs four additional messages. ● Binding request: Any node that wants to know the current location of an MN can send a binding request to the HA. The HA can check if the MN has allowed dissemination of its current location. If the HA is allowed to reveal the location it sends back a binding update. ● Binding update: This message sent by the HA to CNs reveals the current location of an MN. The message contains the fixed IP address of the MN and the COA. The binding update can request an acknowledgement. ● Binding acknowledgement: If requested, a node returns this acknowledgement after receiving a binding update message. ● Binding warning: If a node decapsulates a packet for an MN, but it is not the current FA for this MN, this node sends a binding warning. The warning contains MN’s home address and a target node address, i.e., the address of the node that has tried to send the packet to this MN. The recipient of the warning then knows that the target node could benefit from obtaining a fresh binding for the MN. The recipient can be the HA, so the HA should now send a binding update to the node that obviously has a wrong COA for the MN.
  • 3. Cellular IP (Basic Architecture) • Micro-mobility management protocol • Provides local handovers • Cellular IP gateway (CIPGW) for each domain
  • 4. Cellular IP Advantage • Manageability: Cellular IP is mostly self-configuring, and integration of the CIPGW into a firewall would facilitate administration of mobility-related functionality. Disadvantages • Efficiency: Additional network load is induced by forwarding packets on multiple paths. • Transparency: Changes to MNs are required. • Security: Routing tables are changed based on messages sent by mobile nodes. Additionally, all systems in the network can easily obtain a copy of all packets destined for an MN by sending packets with the MN’s source address to the CIPGW.
  • 5. HAWAII (Basic Architecture) • HAWAII (Handoff- Aware Wireless Access Internet Infrastructure) • Micro-mobility support transparent as possible for both home agents and mobile nodes. • The goals are performance and reliability improvements and support for quality of service mechanisms.
  • 6. HAWAII (Basic Architecture) Step 1 : On entering an HAWAII domain, a mobile node obtains a co-located COA. Step 2: A mobile node registers with the HA. Step 3: When moving to another cell inside the foreign domain, the MN sends a registration request to the new base station as to a foreign agent thus mixing the concepts of co- located COA and foreign agent COA.
  • 7. HAWAII (Basic Architecture) Step 4: The base station intercepts the registration request and sends out a handoff update message, which reconfigures all routers on the paths from the old and new base station to the so-called crossover router. When routing has been reconfigured successfully, the base station sends a registration reply to the mobile node, again as if it were a foreign agent.
  • 8. HAWAII (Basic Architecture) • The use of challenge- response extensions for authenticating a mobile node is mandatory. • In contrast to cellular IP, routing changes are always initiated by the foreign domain’s infrastructure, and the corresponding messages could be authenticated, e.g., by means of an IPSec authentication header reducing the risk of malicious rerouting of traffic initiated by bogus mobile hosts.
  • 9. HAWAII Advantages • Security: Challenge-response extensions are mandatory. In contrast to Cellular IP, routing changes are always initiated by the foreign domain’s infrastructure. • Transparency: HAWAII is mostly transparent to mobile nodes. Disadvantages • Security: There are no provisions regarding the setup of IPSec tunnels. • Implementation: No private address support is possible because of co- located COAs.
  • 10. Fast Mobile IPV6 • Drawback in MIPV6 is handoff delays. • FMIPV6 proposes the mechanisms to reduce the handoff delay • There are two types of handover, namely predictive and reactive
  • 11. Fast MobileIPV6: Call Flow for Predictive Handoff
  • 12. Fast MobileIPV6: Call Flow for Reactive Handoff
  • 13. HMIPV6 (Basic Architecture) • Micro-mobility management protocol • Introduces hierarchies for handling micro-mobility issues. • HMIPv6 provides micro- mobility support by installing a mobility anchor point (MAP), which is responsible for a certain domain and acts as a local HA within this domain for visiting MNs.
  • 14. HMIPV6 (Basic Architecture) • Mobility Anchor Point • A MAP domain’s boundaries are defined by the access routers (AR) advertising the MAP information to the attached MNs. • Local handovers • Binding update. • RCOA stays unchanged • Support smooth handovers • Limited location privacy
  • 15. HMIPV6 Advantages • Security: MNs can have (limited) location privacy because LCOAs can be hidden. • Efficiency: Direct routing between CNs sharing the same link is possible Disadvantages • Transparency: Additional infrastructure component (MAP). • Security: Routing tables are changed based on messages sent by mobile nodes. This requires strong authentication and protection against denial of service attacks. Additional security functions might be necessary in MAPs.
  • 16. IPV6 • Every IPv6 node masters address autoconfiguration • Neighbor discovery • A soft handover is possible with IPv6 • The FA is not needed any more
  • 17. Mobile IPV6 • Route optimization • No need for the CH to be equipped with additional software like MIP-RO (Mobile IP with route optimization.
  • 18. IPV4 Vs IPV6 IPv4 (Internet Protocol Version 4) IPv6 (Internet Protocol Version 6) Encryption and authentication is not provided in IPv4 (Internet Protocol Version 4). Encryption and authentication is provided in IPv6 (Internet Protocol Version 6) Header of IPv4 is 20 – 60 bytes. Header of IPv6 is fixed at 40 bytes Checksumfield is available in IPv4. Checksumfield is not available in IPv6. Packet flow identification is not available in IPv4 (Internet Protocol Version 4). Packet flow identification is available in IPv6. Flow label field is available in the header. IPv4 addresses are usually represented in dot-decimal notation, consisting of four decimal numbers, each ranging from 0 to 255, separated by dots. An IPv6 address is represented as eight groups of four hexadecimal digits, each group representing 16 bits. Sender and forwarding routers performs fragmentation in IPv4 Fragmentationis performed only by the sender in IPv6. In IPv4, security features relies on application In IPv6, there is an inbuilt security feature named IPSEC. End to end connection integrity cannot be achieved in IPv4. End to end connection integrity can be done in IPv6. IPv4 supports DHCP and Manual address configuration IPv6 supports renumbering and auto address configuration. IPv4 addresses are 32-bit long IPv6 addresses are 128 bits long. The address space in IPv4 is 4.29 ×109 The address space in IPv6 is 3.4 ×1038 IPv4 has a broadcast message transmission scheme. Multicast and Anycast message transmissionscheme is available in IPv6.