1. Optimized Mobile IP
The optimized mobile IP protocol needs four additional messages.
● Binding request: Any node that wants to know the current location of an MN
can send a binding request to the HA. The HA can check if the MN has allowed
dissemination of its current location. If the HA is allowed to reveal the location
it sends back a binding update.
● Binding update: This message sent by the HA to CNs reveals the current
location of an MN. The message contains the fixed IP address of the MN and
the COA. The binding update can request an acknowledgement.
● Binding acknowledgement: If requested, a node returns this
acknowledgement after receiving a binding update message.
● Binding warning: If a node decapsulates a packet for an MN, but it is not the
current FA for this MN, this node sends a binding warning. The warning
contains MN’s home address and a target node address, i.e., the address of the
node that has tried to send the packet to this MN. The recipient of the warning
then knows that the target node could benefit from obtaining a fresh binding
for the MN. The recipient can be the HA, so the HA should now send a binding
update to the node that obviously has a wrong COA for the MN.
3. Cellular IP (Basic Architecture)
• Micro-mobility
management
protocol
• Provides local
handovers
• Cellular IP
gateway (CIPGW)
for each domain
4. Cellular IP
Advantage
• Manageability: Cellular IP is mostly self-configuring, and integration of the
CIPGW into a firewall would facilitate administration of mobility-related
functionality.
Disadvantages
• Efficiency: Additional network load is induced by forwarding packets on
multiple paths.
• Transparency: Changes to MNs are required.
• Security: Routing tables are changed based on messages sent by mobile
nodes. Additionally, all systems in the network can easily obtain a copy of
all packets destined for an MN by sending packets with the MN’s source
address to the CIPGW.
5. HAWAII (Basic Architecture)
• HAWAII (Handoff-
Aware Wireless
Access Internet
Infrastructure)
• Micro-mobility
support transparent as
possible for both
home agents and
mobile nodes.
• The goals are
performance and
reliability
improvements and
support for quality of
service mechanisms.
6. HAWAII (Basic Architecture)
Step 1 : On entering an
HAWAII domain, a mobile
node obtains a co-located
COA.
Step 2: A mobile node
registers with the HA.
Step 3: When moving to
another cell inside the
foreign domain, the MN
sends a registration request
to the new base station as
to a foreign agent thus
mixing the concepts of co-
located COA and foreign
agent COA.
7. HAWAII (Basic Architecture)
Step 4: The base station
intercepts the registration
request and sends out a
handoff update message,
which reconfigures all
routers on the paths from
the old and new base
station to the so-called
crossover router.
When routing has
been reconfigured
successfully, the base
station sends a registration
reply to the mobile node,
again as if it were a foreign
agent.
8. HAWAII (Basic Architecture)
• The use of challenge-
response extensions for
authenticating a mobile
node is mandatory.
• In contrast to cellular IP,
routing changes are always
initiated by the foreign
domain’s infrastructure, and
the corresponding messages
could be authenticated, e.g.,
by means of an IPSec
authentication header
reducing the risk of
malicious rerouting of
traffic initiated by bogus
mobile hosts.
9. HAWAII
Advantages
• Security: Challenge-response extensions are mandatory. In contrast to
Cellular IP, routing changes are always initiated by the foreign domain’s
infrastructure.
• Transparency: HAWAII is mostly transparent to mobile nodes.
Disadvantages
• Security: There are no provisions regarding the setup of IPSec tunnels.
• Implementation: No private address support is possible because of co-
located COAs.
10. Fast Mobile IPV6
• Drawback in MIPV6 is
handoff delays.
• FMIPV6 proposes the
mechanisms to
reduce the handoff
delay
• There are two types
of handover, namely
predictive and
reactive
13. HMIPV6 (Basic Architecture)
• Micro-mobility management
protocol
• Introduces hierarchies for
handling micro-mobility
issues.
• HMIPv6 provides micro-
mobility support by installing
a mobility anchor point
(MAP), which is responsible
for a certain domain and acts
as a local HA within this
domain for visiting MNs.
14. HMIPV6 (Basic Architecture)
• Mobility Anchor Point
• A MAP domain’s
boundaries are defined by
the access routers (AR)
advertising the MAP
information to the attached
MNs.
• Local handovers
• Binding update.
• RCOA stays unchanged
• Support smooth handovers
• Limited location privacy
15. HMIPV6
Advantages
• Security: MNs can have (limited) location privacy because
LCOAs can
be hidden.
• Efficiency: Direct routing between CNs sharing the same link is
possible
Disadvantages
• Transparency: Additional infrastructure component (MAP).
• Security: Routing tables are changed based on messages sent by
mobile nodes. This requires strong authentication and protection
against denial of service attacks. Additional security functions
might be necessary in MAPs.
16. IPV6
• Every IPv6 node masters address autoconfiguration
• Neighbor discovery
• A soft handover is possible with IPv6
• The FA is not needed any more
17. Mobile IPV6
• Route optimization
• No need for the CH
to be equipped with
additional software
like MIP-RO (Mobile
IP with route
optimization.
18. IPV4 Vs IPV6
IPv4 (Internet Protocol Version 4) IPv6 (Internet Protocol Version 6)
Encryption and authentication is not provided in IPv4 (Internet
Protocol Version 4).
Encryption and authentication is provided in IPv6 (Internet Protocol
Version 6)
Header of IPv4 is 20 – 60 bytes. Header of IPv6 is fixed at 40 bytes
Checksumfield is available in IPv4. Checksumfield is not available in IPv6.
Packet flow identification is not available in IPv4 (Internet Protocol
Version 4).
Packet flow identification is available in IPv6. Flow label field is available in
the header.
IPv4 addresses are usually represented in dot-decimal notation,
consisting of four decimal numbers, each ranging from 0 to 255,
separated by dots.
An IPv6 address is represented as eight groups of four hexadecimal digits,
each group representing 16 bits.
Sender and forwarding routers performs fragmentation in IPv4 Fragmentationis performed only by the sender in IPv6.
In IPv4, security features relies on application In IPv6, there is an inbuilt security feature named IPSEC.
End to end connection integrity cannot be achieved in IPv4. End to end connection integrity can be done in IPv6.
IPv4 supports DHCP and Manual address configuration IPv6 supports renumbering and auto address configuration.
IPv4 addresses are 32-bit long IPv6 addresses are 128 bits long.
The address space in IPv4 is 4.29 ×109 The address space in IPv6 is 3.4 ×1038
IPv4 has a broadcast message transmission scheme. Multicast and Anycast message transmissionscheme is available in IPv6.