0% found this document useful (0 votes)
7 views

Optimized Mobile IP

Uploaded by

vaidehi1713
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
7 views

Optimized Mobile IP

Uploaded by

vaidehi1713
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 18

Optimized Mobile IP

The optimized mobile IP protocol needs four additional messages.


● Binding request: Any node that wants to know the current location of an MN
can send a binding request to the HA. The HA can check if the MN has allowed
dissemination of its current location. If the HA is allowed to reveal the location
it sends back a binding update.
● Binding update: This message sent by the HA to CNs reveals the current
location of an MN. The message contains the fixed IP address of the MN and
the COA. The binding update can request an acknowledgement.
● Binding acknowledgement: If requested, a node returns this
acknowledgement after receiving a binding update message.
● Binding warning: If a node decapsulates a packet for an MN, but it is not the
current FA for this MN, this node sends a binding warning. The warning
contains MN’s home address and a target node address, i.e., the address of the
node that has tried to send the packet to this MN. The recipient of the warning
then knows that the target node could benefit from obtaining a fresh binding
for the MN. The recipient can be the HA, so the HA should now send a binding
update to the node that obviously has a wrong COA for the MN.
Optimized Mobile IP
Cellular IP (Basic Architecture)

• Micro-mobility
management
protocol
• Provides local
handovers
• Cellular IP
gateway (CIPGW)
for each domain
Cellular IP

Advantage
• Manageability: Cellular IP is mostly self-configuring, and integration of the
CIPGW into a firewall would facilitate administration of mobility-related
functionality.

Disadvantages
• Efficiency: Additional network load is induced by forwarding packets on
multiple paths.
• Transparency: Changes to MNs are required.
• Security: Routing tables are changed based on messages sent by mobile
nodes. Additionally, all systems in the network can easily obtain a copy of
all packets destined for an MN by sending packets with the MN’s source
address to the CIPGW.
HAWAII (Basic Architecture)
• HAWAII (Handoff-
Aware Wireless
Access Internet
Infrastructure)
• Micro-mobility
support transparent as
possible for both
home agents and
mobile nodes.
• The goals are
performance and
reliability
improvements and
support for quality of
service mechanisms.
HAWAII (Basic Architecture)
Step 1 : On entering an
HAWAII domain, a mobile
node obtains a co-located
COA.

Step 2: A mobile node


registers with the HA.

Step 3: When moving to


another cell inside the
foreign domain, the MN
sends a registration request
to the new base station as
to a foreign agent thus
mixing the concepts of co-
located COA and foreign
agent COA.
HAWAII (Basic Architecture)
Step 4: The base station
intercepts the registration
request and sends out a
handoff update message,
which reconfigures all
routers on the paths from
the old and new base
station to the so-called
crossover router.
When routing has
been reconfigured
successfully, the base
station sends a registration
reply to the mobile node,
again as if it were a foreign
agent.
HAWAII (Basic Architecture)
• The use of challenge-
response extensions for
authenticating a mobile
node is mandatory.
• In contrast to cellular IP,
routing changes are always
initiated by the foreign
domain’s infrastructure, and
the corresponding messages
could be authenticated, e.g.,
by means of an IPSec
authentication header
reducing the risk of
malicious rerouting of
traffic initiated by bogus
mobile hosts.
HAWAII
Advantages

• Security: Challenge-response extensions are mandatory. In contrast to


Cellular IP, routing changes are always initiated by the foreign domain’s
infrastructure.
• Transparency: HAWAII is mostly transparent to mobile nodes.

Disadvantages

• Security: There are no provisions regarding the setup of IPSec tunnels.


• Implementation: No private address support is possible because of co-
located COAs.
Fast Mobile IPV6

• Drawback in MIPV6 is
handoff delays.
• FMIPV6 proposes the
mechanisms to
reduce the handoff
delay
• There are two types
of handover, namely
predictive and
reactive
Fast MobileIPV6: Call Flow for Predictive Handoff
Fast MobileIPV6: Call Flow for Reactive Handoff
HMIPV6 (Basic Architecture)
• Micro-mobility management
protocol
• Introduces hierarchies for
handling micro-mobility
issues.
• HMIPv6 provides micro-
mobility support by installing
a mobility anchor point
(MAP), which is responsible
for a certain domain and acts
as a local HA within this
domain for visiting MNs.
HMIPV6 (Basic Architecture)

• Mobility Anchor Point


• A MAP domain’s
boundaries are defined by
the access routers (AR)
advertising the MAP
information to the attached
MNs.
• Local handovers
• Binding update.
• RCOA stays unchanged
• Support smooth handovers
• Limited location privacy
HMIPV6
Advantages
• Security: MNs can have (limited) location privacy because
LCOAs can
be hidden.
• Efficiency: Direct routing between CNs sharing the same link is
possible

Disadvantages
• Transparency: Additional infrastructure component (MAP).
• Security: Routing tables are changed based on messages sent by
mobile nodes. This requires strong authentication and protection
against denial of service attacks. Additional security functions
might be necessary in MAPs.
IPV6

• Every IPv6 node masters address autoconfiguration


• Neighbor discovery
• A soft handover is possible with IPv6
• The FA is not needed any more
Mobile IPV6

• Route optimization
• No need for the CH
to be equipped with
additional software
like MIP-RO (Mobile
IP with route
optimization.
IPv4 (Internet Protocol Version 4)
IPV4 Vs IPV6 IPv6 (Internet Protocol Version 6)

Encryption and authentication is not provided in IPv4 (Internet Encryption and authentication is provided in IPv6 (Internet Protocol
Protocol Version 4). Version 6)

Header of IPv4 is 20 – 60 bytes. Header of IPv6 is fixed at 40 bytes


Checksumfield is available in IPv4. Checksumfield is not available in IPv6.

Packet flow identification is not available in IPv4 (Internet Protocol Packet flow identification is available in IPv6. Flow label field is available in
Version 4). the header.

IPv4 addresses are usually represented in dot-decimal notation, An IPv6 address is represented as eight groups of four hexadecimal digits,
consisting of four decimal numbers, each ranging from 0 to 255, each group representing 16 bits.
separated by dots.

Sender and forwarding routers performs fragmentation in IPv4 Fragmentation is performed only by the sender in IPv6.

In IPv4, security features relies on application In IPv6, there is an inbuilt security feature named IPSEC.

End to end connection integrity cannot be achieved in IPv4. End to end connection integrity can be done in IPv6.

IPv4 supports DHCP and Manual address configuration IPv6 supports renumbering and auto address configuration.

IPv4 addresses are 32-bit long IPv6 addresses are 128 bits long.

The address space in IPv4 is 4.29 ×109 The address space in IPv6 is 3.4 ×1038

IPv4 has a broadcast message transmission scheme. Multicast and Anycast message transmission scheme is available in IPv6.

You might also like