SlideShare a Scribd company logo
Mobile IP
Background
• With new applications developing at a rapid
  pace, and advancements in Mobile
  Computing technology, the number of users
  replacing their desktop PCs with super-
  portable laptops is on the up.
Topics covered
•   Simple overview : Mobile IP
•   Tunneling
•   TCP Comparison
•   Route Optimization
•   Mobile IP in IPv6
Design Goals : Mobile IP
• Make size and frequency of routing updates
  as small as possible.
• Software level : Simplicity in
  implementation
• Allow mobile nodes to operate with on one
  IP address, instead of a spool of addresses.
Terminology
• Mobile Node
• Home Address, Home Link, and Home
  Agent.
• Care-of Address, Foreign Link, and Foreign
  Agent.
Components : Mobile IP
• Agent Discovery : Provides information
  about home and foreign agents to the
  mobile node.
• Registration : Mobile node requests services
  from its foreign agent.
• Mobile IP defines the rules for routing any
  type of packet - unicast, multicast, and
  broadcast.
Overview of Operation

• When a mobile host moves out of its home
  site, it contacts the closest foreign agent.
• Registration takes place.
• Previous foreign(local) agent if any are
  notified regarding the change.
• Communication starts. (also known as
  triangle routing).
Overview of Operation
Figure 1 :CN sending data to MN at home

                                   Correspondent node




             bulk data

                acknowledgements

              Home agent                                Foreign agent




bulk
       adv
             acknowledgements
                                           Scenario A:
              Mobile node                  No tunnelling
                                           No fragmentation
                                           No dogleg route
Overview of Operation
   Figure 2:MN sending data to CN from home

                               Correspondent node




       acknowledgements

                   bulk data

           Home agent                               Foreign agent



acknowledgements
      adv
                                       Scenario B:
         bulk
                                       No tunnelling
           Mobile node                 No fragmentation
                                       No dogleg route
Overview of Operation
Figure 3:CN sending data to MN through Foreign Agent

                                   Correspondent node




            bulk data                acknowledgements

                     tunnelled bulk data

            Home agent                                   Foreign agent



                                            bulk data
      Scenario C:                                 adv
      MTU is 1500 bytes                                 acknowledgements
      Tunnelling of bulk data
      Fragmentation                                      Mobile node
      Dogleg route
Overview of Operation
Figure 4:MN sending data to CN via Foreign Agent

                               Correspondent node




      acknowledgements                bulk data

               tunnelled acknowledgements

                                                  Foreign agent
          Home agent




                                    acknowledgements
    Scenario D:                               adv
    No tunnelling of data                      bulk data
    Tunnelling of acks
    No fragmentation                                Mobile node
    Dogleg route
TCP Performance in Mobile-IP

• Factors affecting TCP performance
  –   Tunneling overhead
  –   Dogleg route overhead
  –   Fragmentation overhead
  –   Handover overhead
Scenario 1:
                                              Correspondent node




                        bulk data

                           acknowledgements

                         Home agent                                Foreign agent




           bulk
                  adv
                        acknowledgements
                                                      Scenario A:
                         Mobile node                  No tunnelling
                                                      No fragmentation
                                                      No dogleg route



Fig. 1 - Mobile node is receiving bulk data from the
correspondent node while the mobile node is at home. MTU
is 1500 bytes
Scenario 2:
                                      Correspondent node




              acknowledgements

                          bulk data

                  Home agent                               Foreign agent



       acknowledgements
             adv
                                              Scenario B:
                bulk
                                              No tunnelling
                  Mobile node                 No fragmentation
                                              No dogleg route




Fig. 2 - Mobile node is sending bulk data to the
correspondent node while the mobile node is at home. MTU
is 1500 bytes
Scenario 3:
                                         Correspondent node




                  bulk data                acknowledgements

                           tunnelled bulk data

                  Home agent                                   Foreign agent



                                                  bulk data
            Scenario C:                                 adv
            MTU is 1500 bytes                                 acknowledgements
            Tunnelling of bulk data
            Fragmentation                                      Mobile node
            Dogleg route




Fig. 3 - Mobile node is receiving bulk data from the
correspondent node while the mobile node is at a foreign
network. MTU is 1500 bytes
Scenario 4:
                                         Correspondent node




                acknowledgements                bulk data

                         tunnelled acknowledgements

                                                            Foreign agent
                    Home agent




                                              acknowledgements
              Scenario D:                               adv
              No tunnelling of data                      bulk data
              Tunnelling of acks
              No fragmentation                                Mobile node
              Dogleg route




Fig. 4 - Mobile node is sending bulk data to the
correspondent node while the mobile node is at a foreign
network. MTU is 1500 bytes
Scenario 5:
                                                  Correspondent node




                       bulk data                         acknowledgements

                                   tunnelled bulk data


                       Home agent                                             Foreign agent




                                                                 bulk data

                                                                       adv
                                                                             acknowledgements
              Scenario E:
              MTU is 1450 bytes                                               Mobile node
              Tunnelling of bulk data
              No fragmentation
              Dogleg route




Fig. 5 - Mobile node is receiving bulk data from the
correspondent node while the mobile node is at a foreign
network. MTU is 1450 bytes
Comparisons: Differences in Setup




 Scenario :    Sender of the Location of           MTU (in
               file             mobile node        bytes)
 A             CN               At home            1500
 B             MN               At home            1500
 C             CN               At foreign         1500
 D             MN               At foreign         1500
 E             CN               At foreign         1450
Table 1 - Differences in setup between the five different scenario
Comparisons: Presence of tunneling, fragmentation
                                     and dogleg route


Scenario :   Tunnelling   Fragmentation   Dogleg route
             overhead     overhead        overhead
             present?     present?        present?
A            No           No              No
B            No           No              No
C            Yes          Yes             Yes
D            Yes          No              No
E            Yes          No              Yes
Test Details

• MTU in scenario 5 was reduced solely to
  prevent fragmentation.
• Comparison using FTP file transfer, 30.2
  MB file ≈ 241.6 Mbits
• Repeated 20 times
• Throughput = file size / mean transfer time
• % throughput = throughput / maximum
  capacity of link
Comparisons: Mean transfer time and standard
                  deviation for FTP file transfer



Scenario : Mean transfer   Standard        Throughput
           time (s)        deviation (s)   (Mbit/s)
A          41.21           1.81            5.86
B          43.30           1.04            5.58
C          78.22           1.43            3.09
D          46.17           1.14            5.23
E          75.62           1.33            3.19
Evaluations
• File transfer takes 90% more time to complete, with all 3
  overheads.
• Encapsulation and Decapsulation of bulk data or
  acknowledgments takes the same time
• The longer route results in a higher delay before the
  packets reach the mobile node
• Link usage will increase if the IP packet and its
  encapsulated form both use the same link while being
  routed to the destination
• The tunneling overhead causes the file transfer to take
  about 7% more time to complete
Evaluations
• Fragmentation overhead causes the file transfer to take
  about 6% more time to complete
• The dogleg route overhead obtained using this method
  causes the file transfer to take about 80% more time to
  complete
• The handover overhead will depend on the TCP handover
  latency, the frequency of handoffs, the duration of the TCP
  connection and the agent advertisement interval
• The TCP handover latency is about 60% more than the
  MIP network handover latency
Evaluations

• The handover overhead is about 13%.
• Two ways of reducing the handover overhead:
   – reduce the retransmission timer value
   – reduce the agent advertisement interval.
     • Tradeoff: bandwidth consumption
Route Optimization and
                     Authentication

• The paper describes the Internet Mobile
  Host Protocol with the following features:
  – route optimization
  – authentication of management packets
  – performance and operational
    transparency to the user.
IMHP Architecture Entities

• Mobile host
  – unique home address
• Local Agent
  – helps mobile host register, provides care-
    off address
  – maintains a visitor list
    • lists all the mobile hosts
    • needs to be refreshed
IMHP Architecture Entities

• Cache Agent
  – Maintains the location cache
  – using cache entry the data packet is
    “tunneled” to the mobile host.
    • Done by including a small IMHP header
    • adds 8 or 12 bytes of overhead to each
      packet
IMHP Architecture Entities

• Home Agent
  – maintains a home list
  – special case: home agent maintains a
    visitor entry for mobile host
  – must also be a cache agent for its mobile
    hosts
Authentication
• Basically required to authenticate
  binding and management packets.
• MH to HA : by including an
  authenticator based on a shared secret
• General Authentication: node sends a
  request for binding with random
  number and gets reply with the same
  number.
Authentication
• Use of route flag in management packet to
  enforce normal IP routing of packet.
• Local agent authenticates visitor list entries
  from the home agent.
• All entries into lists are timer based.
Optimization
• special tunnel packet - destination of
  tunnel is same as destination of packet.
• Specified as a set of forwarding rules
  for the IMHP entities.
Rules for forwarding
• Node receives tunneled packet with its
  own destination address.
• Node receives a non-tunneled packet
  with its own destination address
Rules: Home Agent
• HA receives an IMHP management
  packet with route flag set.
• HA receives a special tunnel packet.
• HA receives packet for one of its
  mobile hosts
  – HA has a visitor entry for the host.
  – HA does not have a visitor entry.
Rules: Home Agent
• HA never tunnels a packet back to a
  node that has just tunneled the packet
  to it.
Rules: Other Agents
• Receives special tunnel packet with route
  flag set.
• LA receives a tunneled packet for host in
  visitor list.
• LA receives a regular packet for host in
  visitor list
• CA receives a packet and has an entry in its
  location cache.
Rules: Other Agents

• Receives packet that was tunneled directly
  to this node, and the agent is unable to
  forward it further.
   – Solution : special tunnel
Bindings

• Binding notifications:
  – MH notifies HA and previous LA about
    “change of address”.
  – Any node can notify any other node
    about wrong binding information stored
    by it.
  – Notification Back-off
IMHP : Other Issues

• restrictions on advertising bindings - use of
  private flag.
• MH in Popup Mode
   – requires facilities such as DHCP
   – acts as its own local agent.
   – Binding should be kept private
• Performance of MH at home should be like
  a stationary host.
Mobility Support in IPv6
• IPv6:
  – 128 bit address space
  – link local addresses
• Extension headers : Destination
  Options header, hop-by-hop header,
  routing header and an authentication
  header.
Overview of Mobile IPv6
• All packets carrying information must be
  authenticated.
• Avoid “remote redirection” attacks
• Allows MH to allow more than one care-of
  addresses at a time, but registers only one of
  its bindings.
• Allows CH to dynamically learn the MH’s
  binding. In this case it uses the Routing
  header but does not encapsulate.
Overview of Mobile IPv6

• Reasonable to expect all the IPv6 nodes to
  have caching capabilities.
• Implementation of the Binding Updates and
  Binding Acknowledgments - the key to
  reliability and optimization.
Binding Update Option

• Provides optimization and performance in
  IPv6
• Used by mobile host to:
  – notify home agent of its primary care-of
    address
  – notify correspondent nodes of its current
    binding
• Binding Updates should always be
  authenticated.
Binding Update Format
Binding Update Format

• Lifetime:time duration for which the
  binding remains valid.
• Identification: To ensure in order
  processing of updates.
• Care-of address: Holds the current care of
  address
Binding Update Format

• Flags:
  – H: Destination requested to serve as home
    agent.
  – A: Acknowledgment expected
  – L:Link Local address present
• Updates could be retransmitted if there is no
  acknowledgment.
Binding Acknowledgment Format
Binding Acknowledgment Format

• Code: indicates whether binding update
  was accepted or rejected.
  – < 128 update accepted
  – >= 128 update rejected
• Lifetime: during for which node will retain
  the binding.
• Refresh: time interval for sending updates
• Identification: Same number as the update.
Sending Updates

• First update sent to home agent to register
  the new care-of address.
  – From another foreign network
  – From the home network
• Can be included in a regular packet or sent
  alone.
• Only the mobile node can send its own
  binding updates.
Movement detection

• Neighbor Discovery protocol including
  Router Discovery and Neighbor
  Unreachability Detection to create list
• Selects the default router from the list
• configures its care-off address
Unreachability

• detecting unreachability
  –   using the Neighbor Unreachability detection
  –   using the higher layers
  –   using the lower layers.
  –   When not receiving packets
Smooth Handoffs

• Using overlapping cells - accept packets at
  multiple addresses for a short while.
• Router Assisted - Previous router can
  forward packets to new local router.

• Renumbering the home network
CH & HA Operations

• Sending packet to MH
• Handling ICMP error messages
• Home agent discovery
More information on Mobile IP

• National University of Singapore
• Carnegie Mellon University
• Columbia University
• Presentation based on the reading
  list sent out earlier.


All diagrams and tables have been included
  from the reading list research papers.
Mobile IP

        Prashant Bhargava
CS 599 : Wireless Communications
     and Mobile Computing
           602 08 8857

More Related Content

PPTX
Mobile IP
PPT
mobile ip, Mobile COmmunication Internet Protocol
PPTX
Mobile IP - pavankumar_912
PPTX
Mobile IP
PPT
Mobile IP
PPT
Mobile ip presentation
PDF
Mobile ip group_3
PPSX
Mobile ip overview
Mobile IP
mobile ip, Mobile COmmunication Internet Protocol
Mobile IP - pavankumar_912
Mobile IP
Mobile IP
Mobile ip presentation
Mobile ip group_3
Mobile ip overview

What's hot (20)

PPTX
ENCAPSULATION AND TUNNELING
PPSX
Key mechanism of mobile ip
PPTX
Mobile IP
PPTX
Mobile network layer (mobile comm.)
PDF
IT6601 Mobile Computing Unit II
PDF
Mobileip 161105154557
PPT
Mobile IP 1
PDF
Mobile Network Layer
PPT
Mobile IP
PPTX
Mobile internet protocol
PDF
Mobile IP
PDF
Mobile network layer
PPTX
77232345 cours-ip-mobile
 
PPT
12. mobile ip
PPTX
Mobile computing
PDF
Mobile Communication
PPT
Mobile ip
PPT
Lecture 15
PPTX
Ip packet delivery
PDF
Mobile computing Mobile Transport Layer
ENCAPSULATION AND TUNNELING
Key mechanism of mobile ip
Mobile IP
Mobile network layer (mobile comm.)
IT6601 Mobile Computing Unit II
Mobileip 161105154557
Mobile IP 1
Mobile Network Layer
Mobile IP
Mobile internet protocol
Mobile IP
Mobile network layer
77232345 cours-ip-mobile
 
12. mobile ip
Mobile computing
Mobile Communication
Mobile ip
Lecture 15
Ip packet delivery
Mobile computing Mobile Transport Layer
Ad

Viewers also liked (18)

PDF
Mobile IP Presentation
PPT
Mobile ip
ODP
mbpurple - the replacement twitter im
PPT
Virtual Private Network main
PDF
OpenMP Tutorial for Beginners
PPTX
Mobile ip np
PPTX
Gprs architecture ppt
PPTX
Gprs ppt
PDF
What Makes Great Infographics
PDF
Masters of SlideShare
PDF
STOP! VIEW THIS! 10-Step Checklist When Uploading to Slideshare
PDF
You Suck At PowerPoint!
PDF
10 Ways to Win at SlideShare SEO & Presentation Optimization
PDF
How To Get More From SlideShare - Super-Simple Tips For Content Marketing
PDF
2015 Upload Campaigns Calendar - SlideShare
PPTX
What to Upload to SlideShare
PDF
How to Make Awesome SlideShares: Tips & Tricks
PDF
Getting Started With SlideShare
Mobile IP Presentation
Mobile ip
mbpurple - the replacement twitter im
Virtual Private Network main
OpenMP Tutorial for Beginners
Mobile ip np
Gprs architecture ppt
Gprs ppt
What Makes Great Infographics
Masters of SlideShare
STOP! VIEW THIS! 10-Step Checklist When Uploading to Slideshare
You Suck At PowerPoint!
10 Ways to Win at SlideShare SEO & Presentation Optimization
How To Get More From SlideShare - Super-Simple Tips For Content Marketing
2015 Upload Campaigns Calendar - SlideShare
What to Upload to SlideShare
How to Make Awesome SlideShares: Tips & Tricks
Getting Started With SlideShare
Ad

Similar to Mobile IP 2 (20)

PDF
D0362035
PPT
Mobility And Mobile I Pv4
PDF
Mobileip 161105154557
PPTX
MOBILE COMPUTING Unit 2.pptx
PDF
Extended Study on the Performance Evaluation of ISP MBG based Route Optimiza...
PPTX
Mobile ip
PPTX
mobile_network_layer.pptx
PDF
A Proposed Technique For Solving The Triangle Routing Problem In Mobile IP
PDF
IT8602 - Mobile Communication Unit IV
PPTX
Mobile computing - SARASWATHI RAMALINGAM
PPTX
Luxbg fringe
PDF
PPTX
Mobile Layer with it's application & uses
PPTX
Rpl telecom bretagne
PPTX
It2402 mobile communication unit 4
PPT
Network mobility (NEMO)
PDF
PDF
Chapter4[one.]
PPT
C08-Network_Protocols.ppt
DOCX
D0362035
Mobility And Mobile I Pv4
Mobileip 161105154557
MOBILE COMPUTING Unit 2.pptx
Extended Study on the Performance Evaluation of ISP MBG based Route Optimiza...
Mobile ip
mobile_network_layer.pptx
A Proposed Technique For Solving The Triangle Routing Problem In Mobile IP
IT8602 - Mobile Communication Unit IV
Mobile computing - SARASWATHI RAMALINGAM
Luxbg fringe
Mobile Layer with it's application & uses
Rpl telecom bretagne
It2402 mobile communication unit 4
Network mobility (NEMO)
Chapter4[one.]
C08-Network_Protocols.ppt

Recently uploaded (20)

PPTX
CHAPTER IV. MAN AND BIOSPHERE AND ITS TOTALITY.pptx
PDF
Black Hat USA 2025 - Micro ICS Summit - ICS/OT Threat Landscape
PPTX
Onco Emergencies - Spinal cord compression Superior vena cava syndrome Febr...
PDF
advance database management system book.pdf
PPTX
Chinmaya Tiranga Azadi Quiz (Class 7-8 )
PDF
IGGE1 Understanding the Self1234567891011
PDF
A GUIDE TO GENETICS FOR UNDERGRADUATE MEDICAL STUDENTS
PDF
1_English_Language_Set_2.pdf probationary
PDF
ChatGPT for Dummies - Pam Baker Ccesa007.pdf
PPTX
UNIT III MENTAL HEALTH NURSING ASSESSMENT
PPTX
Digestion and Absorption of Carbohydrates, Proteina and Fats
PDF
LDMMIA Reiki Yoga Finals Review Spring Summer
PDF
RMMM.pdf make it easy to upload and study
PPTX
Orientation - ARALprogram of Deped to the Parents.pptx
PDF
Classroom Observation Tools for Teachers
PPTX
History, Philosophy and sociology of education (1).pptx
PPTX
Final Presentation General Medicine 03-08-2024.pptx
PPTX
1st Inaugural Professorial Lecture held on 19th February 2020 (Governance and...
PDF
Chinmaya Tiranga quiz Grand Finale.pdf
PPTX
Tissue processing ( HISTOPATHOLOGICAL TECHNIQUE
CHAPTER IV. MAN AND BIOSPHERE AND ITS TOTALITY.pptx
Black Hat USA 2025 - Micro ICS Summit - ICS/OT Threat Landscape
Onco Emergencies - Spinal cord compression Superior vena cava syndrome Febr...
advance database management system book.pdf
Chinmaya Tiranga Azadi Quiz (Class 7-8 )
IGGE1 Understanding the Self1234567891011
A GUIDE TO GENETICS FOR UNDERGRADUATE MEDICAL STUDENTS
1_English_Language_Set_2.pdf probationary
ChatGPT for Dummies - Pam Baker Ccesa007.pdf
UNIT III MENTAL HEALTH NURSING ASSESSMENT
Digestion and Absorption of Carbohydrates, Proteina and Fats
LDMMIA Reiki Yoga Finals Review Spring Summer
RMMM.pdf make it easy to upload and study
Orientation - ARALprogram of Deped to the Parents.pptx
Classroom Observation Tools for Teachers
History, Philosophy and sociology of education (1).pptx
Final Presentation General Medicine 03-08-2024.pptx
1st Inaugural Professorial Lecture held on 19th February 2020 (Governance and...
Chinmaya Tiranga quiz Grand Finale.pdf
Tissue processing ( HISTOPATHOLOGICAL TECHNIQUE

Mobile IP 2

  • 2. Background • With new applications developing at a rapid pace, and advancements in Mobile Computing technology, the number of users replacing their desktop PCs with super- portable laptops is on the up.
  • 3. Topics covered • Simple overview : Mobile IP • Tunneling • TCP Comparison • Route Optimization • Mobile IP in IPv6
  • 4. Design Goals : Mobile IP • Make size and frequency of routing updates as small as possible. • Software level : Simplicity in implementation • Allow mobile nodes to operate with on one IP address, instead of a spool of addresses.
  • 5. Terminology • Mobile Node • Home Address, Home Link, and Home Agent. • Care-of Address, Foreign Link, and Foreign Agent.
  • 6. Components : Mobile IP • Agent Discovery : Provides information about home and foreign agents to the mobile node. • Registration : Mobile node requests services from its foreign agent. • Mobile IP defines the rules for routing any type of packet - unicast, multicast, and broadcast.
  • 7. Overview of Operation • When a mobile host moves out of its home site, it contacts the closest foreign agent. • Registration takes place. • Previous foreign(local) agent if any are notified regarding the change. • Communication starts. (also known as triangle routing).
  • 8. Overview of Operation Figure 1 :CN sending data to MN at home Correspondent node bulk data acknowledgements Home agent Foreign agent bulk adv acknowledgements Scenario A: Mobile node No tunnelling No fragmentation No dogleg route
  • 9. Overview of Operation Figure 2:MN sending data to CN from home Correspondent node acknowledgements bulk data Home agent Foreign agent acknowledgements adv Scenario B: bulk No tunnelling Mobile node No fragmentation No dogleg route
  • 10. Overview of Operation Figure 3:CN sending data to MN through Foreign Agent Correspondent node bulk data acknowledgements tunnelled bulk data Home agent Foreign agent bulk data Scenario C: adv MTU is 1500 bytes acknowledgements Tunnelling of bulk data Fragmentation Mobile node Dogleg route
  • 11. Overview of Operation Figure 4:MN sending data to CN via Foreign Agent Correspondent node acknowledgements bulk data tunnelled acknowledgements Foreign agent Home agent acknowledgements Scenario D: adv No tunnelling of data bulk data Tunnelling of acks No fragmentation Mobile node Dogleg route
  • 12. TCP Performance in Mobile-IP • Factors affecting TCP performance – Tunneling overhead – Dogleg route overhead – Fragmentation overhead – Handover overhead
  • 13. Scenario 1: Correspondent node bulk data acknowledgements Home agent Foreign agent bulk adv acknowledgements Scenario A: Mobile node No tunnelling No fragmentation No dogleg route Fig. 1 - Mobile node is receiving bulk data from the correspondent node while the mobile node is at home. MTU is 1500 bytes
  • 14. Scenario 2: Correspondent node acknowledgements bulk data Home agent Foreign agent acknowledgements adv Scenario B: bulk No tunnelling Mobile node No fragmentation No dogleg route Fig. 2 - Mobile node is sending bulk data to the correspondent node while the mobile node is at home. MTU is 1500 bytes
  • 15. Scenario 3: Correspondent node bulk data acknowledgements tunnelled bulk data Home agent Foreign agent bulk data Scenario C: adv MTU is 1500 bytes acknowledgements Tunnelling of bulk data Fragmentation Mobile node Dogleg route Fig. 3 - Mobile node is receiving bulk data from the correspondent node while the mobile node is at a foreign network. MTU is 1500 bytes
  • 16. Scenario 4: Correspondent node acknowledgements bulk data tunnelled acknowledgements Foreign agent Home agent acknowledgements Scenario D: adv No tunnelling of data bulk data Tunnelling of acks No fragmentation Mobile node Dogleg route Fig. 4 - Mobile node is sending bulk data to the correspondent node while the mobile node is at a foreign network. MTU is 1500 bytes
  • 17. Scenario 5: Correspondent node bulk data acknowledgements tunnelled bulk data Home agent Foreign agent bulk data adv acknowledgements Scenario E: MTU is 1450 bytes Mobile node Tunnelling of bulk data No fragmentation Dogleg route Fig. 5 - Mobile node is receiving bulk data from the correspondent node while the mobile node is at a foreign network. MTU is 1450 bytes
  • 18. Comparisons: Differences in Setup Scenario : Sender of the Location of MTU (in file mobile node bytes) A CN At home 1500 B MN At home 1500 C CN At foreign 1500 D MN At foreign 1500 E CN At foreign 1450 Table 1 - Differences in setup between the five different scenario
  • 19. Comparisons: Presence of tunneling, fragmentation and dogleg route Scenario : Tunnelling Fragmentation Dogleg route overhead overhead overhead present? present? present? A No No No B No No No C Yes Yes Yes D Yes No No E Yes No Yes
  • 20. Test Details • MTU in scenario 5 was reduced solely to prevent fragmentation. • Comparison using FTP file transfer, 30.2 MB file ≈ 241.6 Mbits • Repeated 20 times • Throughput = file size / mean transfer time • % throughput = throughput / maximum capacity of link
  • 21. Comparisons: Mean transfer time and standard deviation for FTP file transfer Scenario : Mean transfer Standard Throughput time (s) deviation (s) (Mbit/s) A 41.21 1.81 5.86 B 43.30 1.04 5.58 C 78.22 1.43 3.09 D 46.17 1.14 5.23 E 75.62 1.33 3.19
  • 22. Evaluations • File transfer takes 90% more time to complete, with all 3 overheads. • Encapsulation and Decapsulation of bulk data or acknowledgments takes the same time • The longer route results in a higher delay before the packets reach the mobile node • Link usage will increase if the IP packet and its encapsulated form both use the same link while being routed to the destination • The tunneling overhead causes the file transfer to take about 7% more time to complete
  • 23. Evaluations • Fragmentation overhead causes the file transfer to take about 6% more time to complete • The dogleg route overhead obtained using this method causes the file transfer to take about 80% more time to complete • The handover overhead will depend on the TCP handover latency, the frequency of handoffs, the duration of the TCP connection and the agent advertisement interval • The TCP handover latency is about 60% more than the MIP network handover latency
  • 24. Evaluations • The handover overhead is about 13%. • Two ways of reducing the handover overhead: – reduce the retransmission timer value – reduce the agent advertisement interval. • Tradeoff: bandwidth consumption
  • 25. Route Optimization and Authentication • The paper describes the Internet Mobile Host Protocol with the following features: – route optimization – authentication of management packets – performance and operational transparency to the user.
  • 26. IMHP Architecture Entities • Mobile host – unique home address • Local Agent – helps mobile host register, provides care- off address – maintains a visitor list • lists all the mobile hosts • needs to be refreshed
  • 27. IMHP Architecture Entities • Cache Agent – Maintains the location cache – using cache entry the data packet is “tunneled” to the mobile host. • Done by including a small IMHP header • adds 8 or 12 bytes of overhead to each packet
  • 28. IMHP Architecture Entities • Home Agent – maintains a home list – special case: home agent maintains a visitor entry for mobile host – must also be a cache agent for its mobile hosts
  • 29. Authentication • Basically required to authenticate binding and management packets. • MH to HA : by including an authenticator based on a shared secret • General Authentication: node sends a request for binding with random number and gets reply with the same number.
  • 30. Authentication • Use of route flag in management packet to enforce normal IP routing of packet. • Local agent authenticates visitor list entries from the home agent. • All entries into lists are timer based.
  • 31. Optimization • special tunnel packet - destination of tunnel is same as destination of packet. • Specified as a set of forwarding rules for the IMHP entities.
  • 32. Rules for forwarding • Node receives tunneled packet with its own destination address. • Node receives a non-tunneled packet with its own destination address
  • 33. Rules: Home Agent • HA receives an IMHP management packet with route flag set. • HA receives a special tunnel packet. • HA receives packet for one of its mobile hosts – HA has a visitor entry for the host. – HA does not have a visitor entry.
  • 34. Rules: Home Agent • HA never tunnels a packet back to a node that has just tunneled the packet to it.
  • 35. Rules: Other Agents • Receives special tunnel packet with route flag set. • LA receives a tunneled packet for host in visitor list. • LA receives a regular packet for host in visitor list • CA receives a packet and has an entry in its location cache.
  • 36. Rules: Other Agents • Receives packet that was tunneled directly to this node, and the agent is unable to forward it further. – Solution : special tunnel
  • 37. Bindings • Binding notifications: – MH notifies HA and previous LA about “change of address”. – Any node can notify any other node about wrong binding information stored by it. – Notification Back-off
  • 38. IMHP : Other Issues • restrictions on advertising bindings - use of private flag. • MH in Popup Mode – requires facilities such as DHCP – acts as its own local agent. – Binding should be kept private • Performance of MH at home should be like a stationary host.
  • 39. Mobility Support in IPv6 • IPv6: – 128 bit address space – link local addresses • Extension headers : Destination Options header, hop-by-hop header, routing header and an authentication header.
  • 40. Overview of Mobile IPv6 • All packets carrying information must be authenticated. • Avoid “remote redirection” attacks • Allows MH to allow more than one care-of addresses at a time, but registers only one of its bindings. • Allows CH to dynamically learn the MH’s binding. In this case it uses the Routing header but does not encapsulate.
  • 41. Overview of Mobile IPv6 • Reasonable to expect all the IPv6 nodes to have caching capabilities. • Implementation of the Binding Updates and Binding Acknowledgments - the key to reliability and optimization.
  • 42. Binding Update Option • Provides optimization and performance in IPv6 • Used by mobile host to: – notify home agent of its primary care-of address – notify correspondent nodes of its current binding • Binding Updates should always be authenticated.
  • 44. Binding Update Format • Lifetime:time duration for which the binding remains valid. • Identification: To ensure in order processing of updates. • Care-of address: Holds the current care of address
  • 45. Binding Update Format • Flags: – H: Destination requested to serve as home agent. – A: Acknowledgment expected – L:Link Local address present • Updates could be retransmitted if there is no acknowledgment.
  • 47. Binding Acknowledgment Format • Code: indicates whether binding update was accepted or rejected. – < 128 update accepted – >= 128 update rejected • Lifetime: during for which node will retain the binding. • Refresh: time interval for sending updates • Identification: Same number as the update.
  • 48. Sending Updates • First update sent to home agent to register the new care-of address. – From another foreign network – From the home network • Can be included in a regular packet or sent alone. • Only the mobile node can send its own binding updates.
  • 49. Movement detection • Neighbor Discovery protocol including Router Discovery and Neighbor Unreachability Detection to create list • Selects the default router from the list • configures its care-off address
  • 50. Unreachability • detecting unreachability – using the Neighbor Unreachability detection – using the higher layers – using the lower layers. – When not receiving packets
  • 51. Smooth Handoffs • Using overlapping cells - accept packets at multiple addresses for a short while. • Router Assisted - Previous router can forward packets to new local router. • Renumbering the home network
  • 52. CH & HA Operations • Sending packet to MH • Handling ICMP error messages • Home agent discovery
  • 53. More information on Mobile IP • National University of Singapore • Carnegie Mellon University • Columbia University
  • 54. • Presentation based on the reading list sent out earlier. All diagrams and tables have been included from the reading list research papers.
  • 55. Mobile IP Prashant Bhargava CS 599 : Wireless Communications and Mobile Computing 602 08 8857

Editor's Notes

  • #2: 06/11/12
  • #3: 06/11/12 With the Internet explosion, everyone wants to or has to be connected. Mobile IP provides the required solution for hosts to stay mobile.
  • #4: 06/11/12
  • #5: 06/11/12
  • #6: 06/11/12 mobile host/node : A node that can change its link-level point of attachment from one IP subnet to another, while still being reachable via its home address. home address : An IP address assigned to a mobile node within its home subnet. The network prefix in a mobile node&apos;s home address is equal to the network prefix of the home subnet. home net (subnet) : The IP subnet indicated by a mobile node&apos;s home address. Standard IP routing mechanisms will deliver packets destined for a mobile node&apos;s home address to its home subnet. home agent : A router on a mobile node&apos;s home subnet with which the mobile node has registered its current care-of address. While the mobile node is away from home, the home agent intercepts packets on the home subnet destined to the mobile node&apos;s home address, encapsulates them, and tunnels them to the mobile node&apos;s registered care-of address. care-of address : An IP address associated with a mobile node while visiting a foreign subnet, which uses the network prefix of that foreign subnet. Among the multiple care-of addresses that a mobile node may have at a time (e.g., with different network prefixes), the one registered with the mobile node&apos;s home agent is called its &amp;quot;primary” care-of address.
  • #7: 06/11/12
  • #56: 06/11/12