Mobileip
Mobileip
Mobileip
The problem occurs when a device roams away from its home network and is
no longer reachable using normal IP routing. This results in the active
sessions of the device being terminated. Mobile IP was created to enable
users to keep the same IP address while traveling to a different network
(which may even be on a different wireless operator), thus ensuring that a
roaming individual could continue communication without sessions or
connections being dropped.
Mobile IP is an open standard, defined by the Internet Engineering
Task Force (IETF) RFC 2002, that allows users to keep the same IP
address, stay connected, and maintain ongoing applications while
roaming between IP networks. Mobile IP is scalable for the Internet
because it is based on IP—any media that can support IP can support
Mobile IP.
Mobile IP’ signifies that, while a user is connected to applications
across the Internet and the user’s point of attachment changes
dynamically, all connections are maintained despite the change in
underlying network properties
Similar to the handoff/roaming situation in cellular network
Mobile IP allows the mobile node to use two IP addresses called
home address and care of address
The home address is static and known to everybody as the identity
of the host
The care of address changes at each new point of attachment and
can be thought of as the mobile node’s location specific address
Mobile Node (MN)
system (node) that can change the point of connection to the network
without changing its IP address
Home Agent (HA)
router in the home network of the MN, which registers the location of
the MN, tunnels IP datagrams to the COA when MN is away from home.
Foreign Agent (FA)
router in the current visited network of the MN, which forwards the
tunneled datagrams to the MN, also acts as the default router for the
registered MN
Care-of Address (COA)
address of the current tunnel end-point for the MN (at FA or MN) actual
location of the MN from an IP point of view can be chosen, e.g., via DHCP
Correspondent Node (CN)
communication partner
Let’s take the case of mobile node (A) and another host (server X). The
following steps take place:
Server X wants to transmit an IP datagram to node A. The home address of
A is advertised and known to X. X does not know whether A is in the home
network or somewhere else. Therefore, X sends the packet to A with A’s
home address as the destination IP address in the IP header. The IP
datagram is routed to A’s home network.
At the A’s home network, the incoming IP datagram is intercepted by the
home agent. The home agent discovers that A is in a foreign network. A care
of address has been allocated to A by this foreign network and available
with the home agent. The home agent encapsulates the entire datagram
inside a new IP datagram, with A’s care of address in the IP header. This new
datagram with the care of address as the destination address is
retransmitted by the home agent.
At the foreign network, the incoming IP datagram is intercepted by the
foreign agent. The foreign agent is the counterpart of the home agent in the
foreign network. The foreign agent strips off the outer IP header, and
delivers the original datagram to A.
A intends to respond to this message and sends traffic to X. In this
example, X is not mobile; therefore X has a fixed IP address. For
routing A’s IP datagram to X, each datagram is sent to some router
in the foreign network. Typically, this router is the foreign agent. A
uses X’s IP static address as the destination address in the IP header.
The IP datagram from A to X travels directly across the network,
using X’s IP address as the destination address.
optional. Allows
packets of a different protocol suite to be encapsulated by
another protocol suite.
• Type of tunneling/encapsulation supported is indicated
in registration.
tunneling in its simplest form has all
packets go to home network (HA) and then sent to MN via
a tunnel.
– This involves two IP routes that need to be set-up, one original
and the second the tunnel route.
– Causes unnecessary network overhead and adds to the latency.
Route optimization adds four new UDP-messages to the Mobile IPv4 protocol:
Binding update, binding acknowledgement, binding request and binding warning.
Mobile IP represents a simple & scalable global mobility solution, but
is not appropriate in support of fast & seamless handoff control.
Cellular IP is a new robust protocol that is optimized to support local
mobility but efficiently interworks with Mobile IP to provide wide area
mobility
Cellular IP shows great benefit in comparison to existing host mobility
protocols for environments where mobile hosts migrate frequently.
This is very much valid as wireless internet becomes widespread.
CIP can accommodate large no of users by maintaining distributed
Paging and Routing caches
Also CIP requires no new packet formats, encapsulations, or address
space allocations beyond what is present in IP.
Two parallel structures of mappings (PC &RC)
1 - idle MH keeps PC upto-date
2 - PC mappings used to find the location of idle MH
3 - maintains RC mappings until actively connected
4 - routing of data packets to MH
3FFE:85B:1F1F::A9:1234
destination address
Expanded
• address 32 to 128 bits
IPv6
There are global addresses and local addresses
Global addresses are used for routing of global Internet
Link local addresses are available within a subnet
IPv6 uses hierarchical addressing with three level of addresses
Includes a Public Topology (the 48 bit external routing prefix)
Site Topology (typically a 16 bit subnet number)
Interface Identifier (typically an automatically generated 64 bit
number unique on the local LAN segment)
IPv6 Comes native with a security protocol called IP Security (IPSec),
which is a standards-based method of providing privacy, integrity
and authenticity to information transferred across IP networks
Diffie-Hellman key exchange mechanism for deriving key between
peers on a public network
Public key cryptography to guarantee the identity of the two parties
and avoid man-in-the-middle attacks
Bulk encryption algorithms, such as 3DES, for encrypting the data
Keyed hash algorithms, such as HMAC, combined with traditional
hash algorithms such as MD5 or SHA for providing packet
authentication
Digital certificates signed by a certificate authority to act as digital
ID cards
IPSec provides IP network layer encryption
Migration of the network components to be able to support
IPv6 packets. Using IP tunneling, IPv6 packets can propagate
over an IPv4 envelope. Existing routers can support IP
tunneling.
3.Mobile IPv6 route optimization can operate securely even without pre-arranged security associations.
4. Support is also integrated into Mobile IPv6 for allowing route optimization to coexist efficiently with
routers that perform "ingress filtering".
5. The IPv6 Neighbor Unreachability Detection assures symmetric reachability between the mobile node
and its default router in the current location.
6. Most packets sent to a mobile node while away from home in Mobile IPv6 are sent using an IPv6
routing header rather than IP encapsulation, reducing the amount of resulting overhead compared
to Mobile IPv4.
7. Mobile IPv6 is decoupled from any particular link layer, as it uses IPv6 Neighbor Discovery instead of
ARP. This also improves the robustness of the protocol.
8. The use of IPv6 encapsulation (and the routing header) removes the need in Mobile IPv6 to manage
"tunnel soft state".
9. The dynamic home agent address discovery mechanism in Mobile IPv6 returns a single reply to the
mobile node. The directed broadcast approach used in IPv4 returns separate replies from each
home agent.