1 / 20

A Study of Mobile IP

A Study of Mobile IP. Kunal Ganguly Wichita State University CS843 – Distributed Computing. Outline. Introduction How Mobile IP works Protocols of Mobile IP Next Generation Mobility – Mobile IPv6 Conclusion. OUTLINE 1/19. Introduction.

laith-grant
Download Presentation

A Study of Mobile IP

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. A Study of Mobile IP Kunal Ganguly Wichita State University CS843 – Distributed Computing

  2. Outline • Introduction • How Mobile IP works • Protocols of Mobile IP • Next Generation Mobility – Mobile IPv6 • Conclusion OUTLINE 1/19

  3. Introduction • IP addresses are usually associated with a fixed point of access to the network/Internet. • The IP protocol does not support mobility • The Problem: • Current network models insist on assigning a new IP address every time a node changes its point of attachment. • For mobile nodes, receiving data in a reliable fashion would be impossible if its IP address changes from time to time. INTRODUCTION 2/19

  4. Introduction Solving the Problem Mobile IP (RFC 3344) uses 2 IP addresses to help a mobile node receive uninterrupted service: • Home Address • Static • Makes the mobile node appear logically connected to the home network • Allows the mobile node to remain addressable via the home address • Care-of Address • Changes at every new point of attachment • Identifies the mobile node’s point of attachment with respect to the network topology INTRODUCTION 3/19

  5. How does Mobile IP manage 2 IP addresses? Agents of Mobile IP • Home Agent • Gets packets intended for the mobile node and delivers them transparently to the mobile node’s current point of attachment • Foreign Agent • Comes into play only if node is on a foreign network • Receives encapsulated packets from the Home Agent, decapsulates them, and sends them to the intended mobile node INTRODUCTION 4/19

  6. What does Mobile IP offer? INTRODUCTION 5/19

  7. How does Mobile IP work? • Successful cooperation between 3 mechanisms: • Discovering the care-of address • Registering the care-of address • Tunneling to the care-of address HOW DOES 6/19

  8. Discovering the Care-of Address • The Home and Foreign Agents announce their presence using Agent advertisements at regular intervals • Agent advertisements: • Same as Router Advertisements, except that some extra information is added about the care-of addresses • Informs of alternative encapsulation techniques • Lets mobile node know whether it is on a Home or Foreign network HOW DOES 7/19

  9. Discovering the Care-of AddressContd. • The mobile node listens for the Home Agent advertisement to get its address. • Once on a foreign network, the mobile node listens for a Foreign Agent advertisement and registers itself, and informs the Foreign Agent of its Home Address. • The Foreign Agent contacts the Home Agent and registers the care-of address. HOW DOES 8/19

  10. Registering the Care-of Address • When the Home Agent receives a registration request for the care-of address, its adds the necessary information to its routing table. • It then sends a registration reply back to the Foreign Agent. • Registration requests: • Contain a binding – Home address, care-of address and Registration Lifetime (how long may the agent use the binding). • Allow the Home Agent to associate the care-of address with the home address of the mobile node. • Define parameters and flags which characterize the tunnel to be used. HOW DOES 9/19

  11. Tunneling to the Care-of Address The Home Agent and the Foreign Agent use a tunnel to communicate. • A tunnel defines the end-points of the route to be followed by a IP packet. • Start point is the Encapsulator (done by Home Agent) • End point is the Decapsulator (done by Foreign Agent) HOW DOES 10/19

  12. Tunneling to the Care-of Address Contd.Encapsulation The default Encapsulation mechanism that must be supported by all mobility agents using Mobile IP is IP-within-IP. The original IP packet is made the payload of a new IP packet (encapsulated) whose destination field in the header shows the care-of address. HOW DOES 11/19

  13. Tunneling to the Care-of Address Contd.Decapsulation At the end-point of the tunnel, the packet is Decapsulated, where the Foreign Agent extracts the payload and sends the packet to the mobile node identified by its hardware address. HOW DOES 12/19

  14. Tunneling to the Care-of Address Contd.2 kinds of Tunneling Triangular Routing Reverse Tunneling HOW DOES 13/19

  15. Protocols of Mobile IP The Physical layer and Data-link layers support: • Signal Modulation • Encryption • Compression • Interference control • Channel Access/Selection • Modifications to allow Gratuitous or Proxy ARP PROTOCOLS 14/19

  16. Protocols of Mobile IP Contd. At the Network layer, Mobile IP offers: • Addressing • Routing • Location Management • Authentication PROTOCOLS 15/19

  17. Protocols of Mobile IP Contd. • Since Mobile IP is implemented at the Network layer, no major changes are required on the layers above (transport, session, presentation, & application). • However, services such as Congestion control, Flow control and Quality of Service are introduced at the Transport layer, and Resource discovery and Link adaptation layer are introduced at the application layer. PROTOCOLS 16/19

  18. Mobile IPv6 • Great deal of improvements over Mobile IPv4 • Stateless Address Autoconfiguration, Neighbor Discovery mechanisms – no need for DHCP, Foreign Agents or ARP • Mobile IPv6 can use IPsec (IP Security Protocol) for all actions which require security, such as authentication and data integrity protection • Route optimization is greatly improved in Mobile IPv6. • Mobile IPv6 does not have a problem with ingress filtering by routers, hence the wasteful technique of Reverse Tunneling is not required. • Mobile IPv6 has a special routing header, doing away with the need for encapsulation. IPv6 17/19

  19. Conclusion • Increased user acceptance of mobile devices fuels the need for developers to provide wireless connectivity to network services from these devices. • Mobile IP, already a reality with some implementations, commercial and in academic institutions, is definitely going to be a standard in the devices of tomorrow. CONCLUSION 18/19

  20. QUESTIONS? QUESTIONS 19/19

More Related