DOC-20250414-WA0037.
DOC-20250414-WA0037.
● Later Mobile IPV6 (MIPV6) was developed as an update to IPV6 protocols to supports IP
mobility.
● IPV6 header has some new features and options that supports IP mobility.
● IP mobility refers to the set of mechanisms that allow an IP mobile node
to move freely between different IP networks while maintaining IP
connectivity in a transparent way.
● Current versions of the Internet Protocol (IPV4) assume that the point at
which a computer attaches to the Internet or a network is fixed and its IP
address identifies the network to which it is attached.
● Thus, under the current Internet Protocol (IPV4) , if the mobile node moves
without changing its address, it loses routing; and if it does change its
address, it loses connections.
● Every host will have a "Home Address (Permanent IP)" within a "Home Network" A
home network has a Agent that provides several services for the mobile node.
● Traffic destined to the "Home Address" of mobile node (MN) will always he routed
to the "Home Agent”. If the mobile node is in its "Home Network", traffic will be
forwarded directly the mobile node.
● If the mobile node has moved to some other network called 'Foreign
Network", traffic will be IP tunneled by the "Home Agent" to a "Care-of-
Address", The Care- of address defines the current location of the
mobile node.
● Every Foreign network has 'Foreign agent (FA) '. The foreign agent can
provide several services to the mobile node during its visit to the
foreign network.
● The FA can have the COA (care or address) acting as a tunnel endpoint
when forwarding packets to the MN.
Optimization
Optimization
● Triangular routing, with Mobile IPv4 there is always a triangular traffic
pattern.
● If the Corresponding Node (CN)and MN are very near, then also the IP
packet has to travel a long way to reach the MN. This inefficient behavior
of a non optimized mobile IP is called Triangular Routing.
● The optimized mobile IP protocol needs four additional messages; these are
● 1. Binding request
● 2. Binding update
● 3. Binding acknowledgement
● 4. Binding warnings
● 1. Binding request
• 4. Binding warnings
avoid triangular agent FA old. FA old now forwards these data to MN.
●
routing
The MN might now change its location and register with
an new foreign agent FA new.
● The FA old notices packets destined to MN but also knows MN currently not in
current FA.
● FA old might now forward these se packets to the new COA of MN which is new
foreign agent.
● Thus the packets that are in transit are not lost. This behavior is another
optimization to basic mobile IP and provides smooth handover.
• FA old sends binding warning message to CN. CN then requests a binding update.
• The HA sends an update to inform the CN about the new location, which is
acknowledged Now CN cans end data directly to FAnew and avoid triangular
binding.
• However, the optimization will not work if the MN does not want to reveal its
current location to the CN because of security.
● To overcome these problems, IPv6 also known as 'Png (Internet
Protocol next generation) was proposed.
IPv6 ● Related protocols such as ICMP were also modified Other protocols
in the network layer, such as ARP, RARP, 1GMP were either deleted
or included in ICMPv6 protocol.
● The fast spreading use of Internet and new services such as mobile
IP, IP telephony. IP-capable mobile telephony, may require the total
replacement of IPv4 by IPv6.
1. Larger address space : An IPv6 address is 128 bit long.
Compared with the 32 bit long IPv4 address, this is huge
increase in address space.
IPv6
upper layer data.
5. Support for resource allocation : In lPv6 the type-of-service field has been removed, but mechanism
called Flow label has been added to enable the source to request special handling of packet.
This mechanism can be used to support traffic such as real-time audio and video.
6. Support for more security : The encryption and authentication options in IPv6 provide confidentiality
and integrity of the packet.
● No special mechanisms are needed for securing
mobile IP registration.
support mobility
and neighbour discovery enables every IPv6 mobile
node to obtain a topologically correct address or the
current point of attachment.
• Limitation of Ipv6
• It does not solve any firewall or privacy problems.
Additional mechanisms on higher layers are needed
for this.
IPv6 Header
Internet Protocol Version 6
IPv6 Header
1. Version : 4 bits -IPv6 version number.
2. Traffic Class : 8 bits - Used to specify different
classes or priorities of IPv6 packets.
● Routing mechanisms rely on the assumption that each network node will always have
the same point of attachment to the Internet, and that each node's IP address
identifies the network link where it is connected.
● In this routing scheme, if you disconnect a mobile device from the Internet and want
to reconnect through a different network, you have to configure the device with a new
IP address, and the appropriate netmask and default router.
● Otherwise, routing protocols have no means of delivering packets, because the device's network
address doesn't contain the necessary information about the node's network point of attachment to
the Internet.
● Mobile IPv6 allows a mobile node to transparently maintain connections while moving from one
subnet to another.
● Each device is identified by its home address although it may be connecting to through another
network.
● When connecting through a foreign network, a mobile device sends its location information to a home
agent, which intercepts packets intended for the device and tunnels them to the current location.
● Mobile IPv6 (MIPv6) enables a Mobile Node (MN)
to maintain its connectivity to the Internet when
moving from one Access point to another.
Mobile IPv6) new care-of address at the new link while still
connected to the previous link, thus reducing
handover delay.
● Imagine a large number of mobile devices changing networks quite frequently ; a high load on
the home agents as well as on the networks is generated by registration and binding update
messages.
● IP micro-mobility protocols can complement mobile IP by offering fast and almost seamless
handover control in limited geographical areas.
Cellular IP
● Mobile IP exhibits several problems when there is
a large number of mobile devices changing
network frequently and moving very fast.
● For such idle hosts, their downlink soft state routes timeout
and are removed from the routing cache.
● In addition, active mobile hosts will have mappings in both routing as well as paging cache.
● Packets addressed to a mobile host are normally routed by routing cache mappings.
● Paging occurs when a packet is addressed to an idle mobile host and the gateway or base stations find
no valid routing cache mapping for destination.
● The paging cache is used to avoid broadcast search procedures found in cellular systems.
● if there is no entry in the paging cache, then the packet addressed to an idle mobile host is broadcast in
the network.
● This may happen when transmitting first packet to the any host.
● Idle mobile hosts that receive a packet, move from idle to active state and immediately transmit a route
update packet.
● CIP implements MCHO (Mobile controlled handover)
thus, in CIP, handoff is initiated by Mobile Host.
● The mappings associated with the old base stations are not cleared at handover,
rather, they timeout as the associated soft-state timers expire.
● The mappings associated with the old BS are cleared after the expiry of a timer.
● Before the timeout, both the old and new downlink routes remain valid and packets
are delivered through both the BSs.
● Flexible Handoff
HAWAII
Internet Infrastructure) tries to keep micro-
mobility support as transparent as possible for both
home agent and MN.
HAWAII Step 1: On entering an HAWAII domain, a mobile
node obtains a co-located COA.
Step 4 : The base station interprets the registration request and sends out a handoff update
message, which reconfigures all routers on the paths from the old and new base station to the
crossover router. When the routing has been reconfigure successfully, the base station sends a
registration reply to the MN, again as if it were a foreign agent.
Basic architecture of HAWAII
● Security : Challenge response extensions are
mandatory.
HAWAII
● In contrast to cellular IP, routing changes are
always initiate by the foreign domain's
Advantages infrastructure.
•
HAWAII
Authentication of HAWAII protocol messages unspecified
(potential attackers: stationary nodes in foreign network)