WNF_U4 (1)
WNF_U4 (1)
• Mobile node is connected to a home network and possesses an IP • Instant Infrastructure: For unplanned, instantaneous
address called home address, which is static. inter personal communication
• When mobile node shifts point of reattachment to foreign network, • Disaster relief: Due to infrastructures being destroyed
registration occurs with a network node called foreign agent. • Remote areas: Infrastructure cannot be immediately
• Mobile node has a similar agent in the home network called home obtained
agent. • Effectiveness: In case of infrequent transmission of
• External IP address sends data to the home address, and the data is data, ad hoc networks are more cost effective
handed over by the home agent to the mobile node via the foreign
network. (IX) DIFFICULTIES FACED:
• No base station
(II) MOBILE IP DATAGRAM EXCHANGE: • Destination node may be out of range
• Dynamic network
• Server X transmits data intended for node A with its home address (XI) CONCERNS OF AD HOC ROUTING:
in the IP header of the datagram
• The home agent intercepts this datagram and encapsulates it within • Traditional routing does not work
another datagram with the destination address (care of address) • Centralized approaches are not effective
[This is called tunneling] and is routed to the foreign agent • Flooding works but is not effective
(III) THREE BASIC CAPABILITIES: • Sequence numbers: Sequence numbers for every
routing advertisement
• Damping: Routing algorithms are not destabilized by
small transient changes in topology
ADVANTAGES:
• Does not require changes in TCP as used by hosts
(IV) CONCERNS WITH SECURITY: • Transmission errors in the wireless link does not get propagate
into the wired link
Malicious agents can resend old registration requests causing
mobile node to lose connection with home network DISADVANTAGES:
Foreign agents can send registration requests to the home agent • Increased handover latency
in order to redirect IP traffic from the mobile node to • In case of end to end encryption, the foreign agent should be
themselves integrated in all the security mechanisms
• Loss of end to end semantics in TCP
(V) SECURING REGISTRATION PROCEDURE:
Security parameter Index (SPI): Contains info about the (XVIII) SNOOPING TCP:
context of security between a pair of nodes
Authenticator: Authenticates message received ADVANTAGES:
• End to end semantics preserved
• Mobile-home: Extension must be present and authenticates • Immediate handover state is unnecessary
registration messages exchanged between mobile node and home • Foreign agent does not require enhancement
agent
• Mobile-foreign: Extension may be present for the security DISADVANTAGES:
association present between the mobile node and foreign agent • Snooping does not work if encryption schemes are used
• Foreign-home: Extension may be present for the security association • Using negative ACKs assumes additional mechanism
present between the home agent and foreign agent