Mobile Network Layer
Mobile Network Layer
Introduction
Requirements
Quick Solution
-Assign new IP address when enter into new location.
● Routers are built for fast forwarding but not for fast update of routing table.
●Mobile Nodes – a host or router that changes its point of attachment from one
datagrams for delivery to the mobile node when it is away from home.
Foreign Agent – router on a mobile node's visited network which provides routing
It detunnel and deliver the datagram to the mobile node that were tunneled by
●
Correspondent Node (CN) – partner through which MN is connected. It can be
Foreign network – it is a current subnet the MN visits and which is not a home
network.
view.
All the packets sent to the MN are delivered to the COA,not directly to the IP
address of the MN
Marks the tunnel endpoint (i.e address where packets exit the tunnel)
Location of COA:●
●
Foreign agent COA – COA could be located at the FA, i.e COA is an IP
IP packet delivery
Internet , not having info on the current location of MN, routes the packet to the
●
HA now intercept the packet(to find current location)
Not found in home n/w then encapsulated and tunnelled to the COA.
A new header put in front of the old header showing the (FA) COA as the new
destination.
Last, MN sends the packets as usual with its own fixed IP address as source and
Agent Discovery
●
solicitations messages.
Agent Advertisement
●
●
advertisement message.
extensions.
ICMP part
Code – 0 or 16
–
Type – 9
node
–
Type – 16
Seq. No
R – reg. , B – busy , H – HA , F – FA ,
No agent advertisement
anytime.
Registration
HA.
COA.
Registration (COA is co-locted)
Registration request
●
●
the FA or HA address.
Type – 3
Home IP address
●
Home Agent address
Packets entering a tunnel are forwarded inside the tunnel and leave the
tunnel unchanged.
packet header and data and putting it into the data part of a new
packet.
Encapsulation Methods
IP-in-IP encapsulation
inner header)
packet length.
for fragments
●
IP checksum – error detection
Type – 55
●
included.
C – checksum is present
●
Optimization
HA
HA.
additional messages :–
Binding request
Binding update
Binding acknowledgement
–
Binding warning
CN
COA/MN
Optimized mobile IP
binding request.
update.
●
location.
FA new will inform FA old about the new
registration.
data to FA new.
DHCP
●
Dynamic Host Configuration Protocol
Self Study
system functionality.
Instant infrastructure
Disaster relief
Remote areas
Routing
●
●
of the link.
n/w
DSDV Routing
●
Destination Sequence Distance Vector is an enhancement
Sequence No. - each routing adv. comes with a seq. no. Seq. no.
DSDV Example
DSDV Example
DSR
●
Route discovery – a node only discover route to a destination
via a route, it has to make sure that the route is held upright.
DSR
If the node receive a route request:If the node has already received the request (which is
packet.
request.
Destination may receive several list containing different paths
from the initiator.It could return the best path, the first path or
several path.
AODV
barodia_1437
40.3K views
TCP/IP Network ppt by extraganesh
extraganesh
147.8K views
Naiyan Noor
16.8K views
Vikram Nandini
236 views
237 views
Mobileip 161105154557
99 views
Leadership styles
Mohini Sahu
579.5K views
PROFDRSUSMITAKUNDU
63.8K views
Health education
Har Jindal
332.8K views
P4 foundation by rahulhada
P4 foundationP4 foundation
P4 foundation
Rahul Hada
175 views
P4 foundation by rahulhada
P4 foundationP4 foundation
P4 foundation
Rahul Hada
111 views
Socio-technical System
Rahul Hada
9.9K views
Гра "Карусель" для повторення Past SimpleГра "Карусель" для повторення Past Simple
Natali Rafalska
152 views
Mark Kor
95 views
Yannis
101 views
Related Books
View All
Ebook
Ramon Nastase
★★★★☆
4/5
Ebook
alasdair gilchrist
★★★★☆
4/5
Ebook
IPv4 Subnetting for Beginners: Your Complete Guide to Master IP Subnetting in 4 Simple Steps:
Computer Networking, #1
Ramon Nastase
★★★★★
5/5
Related Audiobooks
View All
Audiobook
Erick Stack
★★★★☆
4/5
Audiobook
COMPTIA NETWORK+: Tips and Tricks to Learn and Study about The CompTIA Network+
Certification from A-Z
Walker Schmidt
☆☆☆☆☆
0/5
Audiobook
HACKING: 3 BOOKS IN 1
Alex Wagner
★★★★★
5/5
2. Introduction ● ● ● ● In this protocols and mechanisms developed for the network layer to
support mobility. It provides protocol enhancement that allows transparent routing of IP
datagrams to mobile nodes in the internet. Mobile IP – Adds mobility support to the internet
network layer protocol IP. RFC 2002 is a reference document for the complete detail about the
mobile IP.
3. Goals, Assumptions and Requirements ● Receving of IP datagram after leaving your home
network. ● Now nodes needs a so-called topologically correct address. Quick Solution – –
Assign new IP address when enter into new location. ● Increase problem with higher layer
protocols like TCP , as they rely on IP layer. ● Routers are built for fast forwarding but not for
fast update of routing table. Quick solution not working.
4. Entities and Terminology ● Mobile Nodes – a host or router that changes its point of
attachment from one network or subnetwork to another. – ● Home Agent – a router on a mobile
node's home network which tunnels datagrams for delivery to the mobile node when it is away
from home. – ● Mobile node change its location without changing its IP address. Also, maintain
current location information for the mobile node. Foreign Agent – router on a mobile node's
visited network which provides routing services to the mobile node while registered. – It
detunnel and deliver the datagram to the mobile node that were tunneled by the mobile node's
home agent
6. IP packet delivery ● ● CN wants to send an IP packet to the MN. Internet , not having info on
the current location of MN, routes the packet to the router(Home Agent) responsible for the
home network of MN. ● HA now intercept the packet(to find current location) ● Not found in
home n/w then encapsulated and tunnelled to the COA. ● ● ● A new header put in front of the
old header showing the (FA) COA as the new destination. FA now decapsulates the packets
(remove additional header) Last, MN sends the packets as usual with its own fixed IP address as
source and CN's address as the destination.
7. Agent Discovery ● ● One initial problem of an MN after moving is how to find a foreign
agent ?. Two types of methods: – – Agent advertisement – in this HA and FA advertise their
presence. Agent solicitation – the mobile node send agent solicitations messages.
8. Agent Advertisement ● ● ● FA and HA advertise their presence periodically using special
agent advertisement message. ICMP messages are used with some mobility extensions. Upper
part represent ICMP while lower part represent extention needed for mobility.
10. Agent Solicitation ● No agent advertisement ● Mobile node must send agent solicitations. ●
Sould not flood the network ● ● MN can send three solicitations msgs. , one per sec. , as soon as
enter in new network. Discovery of new agent can be done anytime.
11. Registration ● ● ● Objective – is to inform the HA of the current location for correct
forwarding of packets After receving COA address the MN has to register with the HA.
Registration can be done in two ways:– – Registration of mobile node via the FA Or , directly
with the HA
12. Registration (COA is the FA) ● If the COA is at the FA then, – – MN sends its registration
request containing the COA to the FA which then forward the request to the HA. Now HA will
do the mobility binding containing the mobile node's home IP adress with the current COA.
13. Registration (COA is co-locted) ● ● ● If the COA is co-located. MN send the request
directly to the HA and vice versa. Also , a registration procedure for MNs returning to their
home network.
14. Registration request ● ● ● UDP packets are used for registration requests. IP source address
is the MN interface address and IP destination address is the FA or HA address. Type – 1 , S – an
MN wants the HA to retain prior mobility binding B – MN want to receive broadcast packets
received by HA in home n/w ● M & G – minimal or generic routing encapsulation. ● Destnation
port – 434 ● UDP is used because of low overheads and better performance.
15. Registration Reply ● Type – 3 ● code – result of the registration request ● lifetime – validity
of the registration , ● Home IP address ● Home Agent address ● 64-bit identification used to
match the registration request with reply
16. Tunneling & Encpsulation ● ● ● ● ● It is mechanisms used for forwrding packets between
the HA and COA. Packets entering a tunnel are forwarded inside the tunnel and leave the tunnel
unchanged. It can be achieved by using encapsulation. Encapsulation is the mechanism of taking
a packet consisting of packet header and data and putting it into the data part of a new packet.
The reverse of encapsulation is decapsulation.
17. Encapsulation Methods IP-in-IP encapsulation ● Ver – IP protocol version no. ● IHL –
internet header length ● ● ● ● TOS – type of services (copied from inner header) Length –
complete encapsulated packet length. IP id. , flags , frag. offset – used for fragments TTL -time
to live ● IP-in-IP – upper layer protocol ● IP checksum – error detection IP-in-IP encapsulation
packet format
19. Generic Routing Encapsulation ● Minimal and IP-in-IP only works for IP while generic
routing also supports other network layer protocols ● GRE header starts with several flags ● C –
checksum is present ● R – offset and routing info present ● K – key field , used for the
aunthentication ● S – sequence number present ● ● ● s – strict source source routing is used rsv.
- is used to distinguishes GRE from IPin-IP and minimal encapsulation Protocol – the protocol of
the packet following the GRE.
23. Mobile Ad-hoc networks ● ● ● ● ● Till now mobility of the nodes is supported by the at
least some infrastructure.(home agent, tunnel etc.) Their are situations where their no
infrastructure. Mobiles nodes in an ad-hoc scenario comprise routing and end system
functionality. Under those conditions we use multi-hop ad-hoc network when describing ad-hoc
networking. Use of such network – – – Instant infrastructure Disaster relief Remote areas
24. Routing Differences between wired n/w and ad-hoc n/w ● ● ● ● Asymmetric link – signal
quality uneven in both direction of the link. Redundant links – wired n/w have few redundant
links while ad-hoc will have many redundant links. Interference – it is very high in case of
wireless ad-hoc n/w Dynamic topology – change in topology is very frequent which affects the
routing table and routing methods.
26. DSDV Routing ● If the sequence number of one node in the newly received same as the
corresponding sequence number in the routing table , then the metric will be compared and the
route with the smallest metric will be used.
29. DSR ● Dynamic Source Routing Problem associated with DSDV ● Previous routing
exchange routing information with all nodes , although currently their may be no data to
exchange. ● Cause unnecessary traffic and consumes more battery power. ● DSR , divides the
task into two :– – ● Route discovery – a node only discover route to a destination want to send
somthing to this destination. Route maintenance – if a node is continuously sending packet via a
route, it has to make sure that the route is held upright. DSR eliminates all periodic routing
updates.
30. DSR ● If the node receive a route request:If the node has already received the request (which
is identified using the unique identifier) , it drops the request packet. – If node recognizes its own
address as the destination , the request has reached its target. – Otherwise, the node appends its
own address to a list of traversed hops in the packets and broadcast this update request.
Destination may receive several list containing different paths from the initiator.It could return
the best path, the first path or several path. – ●
31. AODV
Download now
About
Support
Terms
Privacy
Copyright
Cookie Preferences
Everand
English
Current Language