Unit-2-Mobile IP
Unit-2-Mobile IP
Compatibility
• Mobile IP has to compatible with all lower layers used in for non-
mobile IP
• support of the same layer 2 protocols as IP
• no changes to current end-systems and routers required
• mobile end-systems can communicate with fixed systems
Transparency
• mobile end-systems keep their IP address
• continuation of communication after interruption of link possible
• point of connection to the fixed network can be changed
Security
• authentication of all registration messages
Efficiency and scalability
• only little additional messages to the mobile system required
(connection typically via a low bandwidth radio link)
• world-wide support of a large number of mobile systems in the whole
Internet
Example network
HA
MN
router
end-system router
Entities and
Terminology
●
Mobile Nodes – a host or router that changes its point of attachment from
one network or subnetwork to another.
– Mobile node change its location without changing its IP
●
Homeaddress.
Agent – a router on a mobile node's home network which
tunnels datagrams for delivery to the mobile node when it is away
from home.
– Also, maintain current location information for the mobile
HA
2
MN
FA foreign
network
HA
1 MN
FA foreign
network
receiver
IP packet delivery
mobility extensions.
● • Upper part represent ICMP while lower part
• Type – 9
• Code – 0 (includes non-mobile traffic also) or 16 (route only
mobile traffic)
• #addresses – no. of addresses advertised with this packet
• Lifetime – length of time this advr. is valid
• Preference level– helps to choose a router,which is most eager
router to get new node
Extension part – for mobility
• type = 16
• length = depends on no.of COAs provided, 6 + 4 * #COAs
• Seq.number: no.of advertisement
• Registration lifetime: max.life time,a node can request during
registration.
• R: registration required
• B: busy, no more registrations
• H: home agent
• F: foreign agent
• M: minimal encapsulation
• G: Generic Routing encapsulation
• r: =0, ignored (in first version this bit is V-specifies the use of header
compression)
• T: FA supports reverse tunneling
• reserved: =0, ignored
Agent
Solicitation
● No agent advertisement
● Mobile node must send agent solicitations.
● Should not flood the network
●
MN can send three solicitations msgs. , one
per sec. , as soon as enter in new network.
●
Discovery of new agent can be done
anytime.
Registratio
n
●
Objective – is to inform the HA of the current
location for correct forwarding of packets
●
After receving COA address the MN has to
register with the HA.
●
Registration can be done in two ways:-
– Registration of mobile node via the FA
– Or , directly with the HA
Registration (COA is the FA)
●
If the COA is at the FAthen,
– MN sends its registration request containing the
COA to the FA which then forward the request to the
HA.
– Now HA will do the mobility binding containing the
mobile node's home IP adress with the current
COA.
Registration (COA is co-
locted)
● If the COA is co-located.
●
MN send the request directly to the
HA and vice versa.
●
Also , a registration procedure for MNs
returning to their home network.
Registration
request
● Type – 3
● code – result of the registration request
● lifetime – validity of the registration ,
● Home IP address
● Home Agent address
●
64-bit identification used to match the registration request with reply
Tunneling &
Encpsulation
DHCPDISCOVER
server client
client relay
DHCP - protocol mechanisms
client
server server
(not selected) initialization (selected)
DHCPDISCOVER DHCPDISCOVER
determine the determine the
configuration configuration
DHCPOFFER DHCPOFFER
collection of replies
selection of configuration
DHCPREQUEST DHCPREQUEST
(reject) (options) confirmation of
configuration
DHCPACK
initialization completed
release
DHCPRELEASE delete context
Reverse tunneling (RFC 3024, was:
2344)
HA
2
MN
FA foreign
network
1. MN sends to FA
2. FA tunnels packets to HA
3 by encapsulation
CN
3. HA forwards the packet to the
receiver (standard case)
receiver
Mobile IP with reverse tunneling
• Router accept often only “topological correct“ addresses (firewall!)
– a packet from the MN encapsulated by the FA is now topological
correct
– furthermore multicast and TTL problems solved (TTL in the home
network correct, but MN is to far away from the receiver)
• Reverse tunneling does not solve
– problems with firewalls, the reverse tunnel can be abused to
circumvent security mechanisms (tunnel hijacking)
– optimization of data paths, i.e. packets will be forwarded through
the tunnel via the HA to a sender (double triangular routing)
• The standard is backwards compatible
– the extensions can be implemented easily and cooperate with
current implementations without these extensions
– Agent Advertisements can carry requests for reverse tunneling
IPv6
• Mobile IP was originally designed for IPv4
• Mobility support come free in IPv6.
• No add-ons are needed for securing mobile IP
registration.
• Every IPV6 node, masters address auto-configuration.
• Neighbor discovery mechanism is also specified.
• Every IPv6 node can send binding updates to another
node.
• So MN can send its current COA directly to CN and HA.
IPv6 Packet Format
0 4 8 16 24 31
SourceAddr (4 words)
DestinationAddr (4 words)
Data
CS 640 33
Mobile Ad-hoc
networks
● Till now mobility of the nodes is supported by the at least
some infrastructure.(home agent, tunnel etc.)
● Their are situations where their no infrastructure.
● Mobiles nodes in an ad-hoc scenario comprise routing and
end system functionality.
● Under those conditions we use multi-hop ad-hoc network
when describing ad-hoc networking.
● Use of such network
– Instant
– infrastructure
– Disaster relief
Remote areas
Routin
g
Differences between wired n/w and ad-hoc n/w
●
Asymmetric link – signal quality uneven in both direction
of the link.
●
Redundant links – wired n/w have few redundant links
while ad-hoc will have many redundant links.
●
Interference – it is very high in case of wireless ad-hoc
n/w
●
Dynamic topology – change in topology is very frequent
which affects the routing table and routing methods.
DSDV Routing
●
Destination Sequence Distance Vector is an enhancement
to ditance vector routing for ad-hoc network.
●
Distance Vector – exchange distance vector to its
neighbors for all destination.
● Problem with DV is the cout-to-infinity.
● DSDV adds two things to the DV
– Sequence No. - each routing adv. comes with a seq. no. Seq.
no. help to apply the advertisement in correct order.
– Damping – Transient change in topology that re of
short duration should not destabilize the routing
mechanisms.
DSDV Routing
● • If the sequence number of one node in the
newly received same as the corresponding
sequence number in the routing table , then
the metric will be compared and the route
with the smallest metric will be used.
DSDV Example
DSDV Example
DSR
● Dynamic Source Routing
Problem associated with DSDV
●
Previous routing exchange routing information with all nodes ,
although currently their may be no data to exchange.
● Cause unnecessary traffic and consumes more battery power.
● DSR , divides the task into two :-
– Route discovery – a node only discover route to a destination
want to send somthing to this destination.
– Route maintenance – if a node is continuously sending packet
via a route, it has to make sure that the route is held upright.
● DSR eliminates all periodic routing updates.
DSR
● If the node receive a route request:-
– If the node has already received the request (which is
identified using the unique identifier) , it drops the request
packet.
– If node recognizes its own address as the destination , the
request has reached its target.
– Otherwise, the node appends its own address to a list of
traversed hops in the packets and broadcast this update
request.
● Destination may receive several list containing different paths
from the initiator.It could return the best path, the first path or
several path.
AODV