SlideShare a Scribd company logo
1 of 31
DISTRIBUTED MOBILITY
MANAGEMENT
DMM
Presented by:
Abeer Fathy
Aya Mahmoud
Rawan Ramzy
Sara Abdulatif
Agenda
 The Internet Area.
 Charter of the working group.
 DMM Draft.
 DMM RFC
 Contact Information
The InternetArea
The primary technical topics covered by the Internet Area
include IP layer (both IPv4 and IPv6), implications of IPv4
address depletion, co-existence between the IP versions,
DNS, host and router configuration, mobility, VPNs and
various link layer technologies.
Charter of The Working Group
Mobility
means the ability of a Host to overcome the location dependent
nature of IP addresses by a suitable translation mechanism, and
to send and receive data efficiently from any location. The user
should not be required to restart applications or in the worst-
case reboot, when visiting a new network.
Network A
Node 2 Node 1
Network B
IETF DMM working group creation
DMM protocol aims at distributing traffic in an optimal way
and not rely on centrally deployed mobility anchors to manage
IP mobility sessions.
The DMM WG will consider the latest developments in mobile
networking research and operational practice and will describe
how distributed mobility management addresses the new needs
in this area better than previously standardized solutions.
DMM solutions aim for transparency above the IP layer,
including maintenance of active transport level sessions when
mobile hosts or mobile networks change their point of
attachment to the Internet.
Mobile Node Identifier Draft
The Mobile Node Identifier Option for MIPv6
has proved to be a popular design tool for providing identifiers
for mobile nodes during authentication procedures with AAA
protocols (Authentication, Authorization and Accounting)
IETF DMM Working Group proposes adding some basic types
that are defined in various telecommunications standards.
Defining identifiers that are tied to the physical elements of the
device (RFID, MAC address etc.)
IP because in many cases such identifiers are the most natural
means for uniquely identifying the device.
The Tag Data standard promoted by Electronic Product
Code(TM) (abbreviated EPC) supports several encoding
systems or schemes including:
 RFID-GID (Global Identifier),
 RFID-SGTIN (Serialized Global Trade Item Number),
 RFID-SSCC (Serial Shipping Container),
 RFID-GLN (Global Location Number),
 RFID-GRAI (Global Returnable Asset Identifier),
 RFID-DOD (Department of Defense ID), and
 RFID-GIAI (Global Individual Asset Identifier).
The new mobile node identifier types should be assigned values
from the "Mobile Node Identifier Option Subtypes" registry.
Some identifiers are considered to be private information.
If used in the MNID extension, the packet including the MNID
extension should be encrypted so that personal information
would not be inadvertently disclosed to passive observers.
MNIDs containing sensitive identifiers might only be used for
signaling during initial network entry.
Requirements for Distributed Mobility
Management RFC
 Mobility management is needed because the IP address of a
mobile node may change as the node moves.
 At the IP (network) layer, mobility management can be
client-based or network-based.
 Session Identifier: the original IP address before the mobile
node moves.
 Forwarding Address: the new IP address of the mobile node
after the node has moved.
 Packets addressed to the session identifier will first route to
the original network, which redirects them using the
forwarding address to deliver to the session.
Centralized vs. Distributed Mobility
Management
Centralized Mobility Management:
The location information is kept at a single mobility anchor,
and packets destined to the session identifier are forwarded
via this anchor.
Mobility management systems are centralized in both the
control plane and the data plane.
Centralized mobility anchoring in a hierarchical network
architecture.
Distributed Mobility Management
Mobility management functions can be distributed in the data
plane to multiple networks, so that a mobile node in any of these
networks may be served by a nearby function with appropriate
forwarding management (FM) capability.
DMM is distributed in the data plane, whereas the
control plane may be either centralized or distributed.
It is not necessary for other functions such as
subscription management, subscription databases, and
network access authentication to be similarly
distributed.
Problem Statement
1. Non-Optimal Routes
Forwarding via a centralized anchor often results in non-optimal
routes, thereby increasing the end-to-end delay.
2. Divergence from other evolutionary trends in network
architectures such as distribution of content delivery
Mobile networks have generally been evolving towards a
flatter and flatter network. Centralized mobility
management, which is non-optimal with a flatter network
architecture, does not support this evolution.
3. Lack of scalability of centralized tunnel management and
mobility context maintenance:
Setting up tunnels through a central anchor and maintaining
mobility context for each MN usually requires more concentrated
resources in a centralized design, thus reducing scalability.
4. Single point of failure and attack:
The impact of a successful attack on a system with centralized
mobility management can be far greater than a distributed
mobility system.
Solution (Req1)
 Servers are distributed so that each user in any location can
be close to one of the servers.
Solution Cont.
 Single points of failure are avoided in a distributed system and
threats against centrally deployed anchors.
 DMM solutions (IP mobility, network access solutions, and
forwarding solutions) MUST enable traffic to avoid traversing a
single mobility anchor far from the optimal route.
5. Unnecessary mobility support to clients that do not need it:
IP mobility support is usually provided to all MNs. However, it
is not always required, and not every parameter of mobility
context is always used.
• some applications/nodes do not need a stable IP address during
a handover to maintain session continuity.
• Sometimes, the entire application session runs while the MN
does not change the point of attachment.
• Some sessions can handle mobility at the application layer. (do
not need IP mobility support)
It is then unnecessary to provide IP mobility support for such
sessions.
6. Mobility signaling overhead with peer-to-peer
communication:
Resources may be wasted when mobility signaling is not turned
off for peer-to-peer communication.
Solution (Req2)
 Selecting an IP address or prefix according to whether mobility
support is needed and by not maintaining context at the mobility
anchor when there is no such need.
 DMM solutions MUST provide the possibility of independent
handling for each application session of a user or mobile device.
7. Deployment with multiple mobility solutions
There are already many variants, extensions, and mobility
solutions of MIP at other layers. Deployment of new mobility
management solutions can be challenging, and debugging
difficult, when they coexist with solutions already deployed in
the field.
Solution (Req3)
DMM implementations MUST be able to coexist with
existing network deployments, end hosts, and routers
that may or may not implement existing mobility
protocols.
8. Duplicate multicast traffic
IP multicast distribution over architectures using IP mobility
solutions may lead to convergence of duplicated multicast
subscriptions towards the downstream tunnel entity.
Concretely, when multicast subscription for individual
mobile nodes is coupled with mobility tunnels, duplicate
multicast subscription(s) is prone to be received through
different upstream paths.
Solution (Req4)
• Existing multicast and non-optimal forwarding for the multicast
traffic deployments have been introduced after completing the
design of the reference mobility protocol, often leading to
network inefficiency
• DMM should instead consider multicast early in the process, so
that the multicast solutions can better consider the efficient
nature of multicast traffic delivery .
Requirements
REQ5: IPv6 deployment:
DMM solutions SHOULD target IPv6 as the primary
deployment environment and SHOULD NOT be tailored
specifically to support IPv4.
REQ6: Existing mobility protocols:
DMM solution MUST first consider reusing and extending
IETF standard protocols before specifying new protocols.
REQ7: Operation and management considerations:
DMM solution:
• MUST support mechanisms to test whether the DMM
solution is working properly.
• SHOULD expose the operational state of DMM to the
administrators of the DMM entities.
• SHOULD support means to correlate the mobility flow
routing policies and the observed forwarding actions.
• SHOULD support mechanisms to check the liveness of a
forwarding path.
• MUST provide fault management and monitoring mechanisms
to manage situations where an update of the mobility session
or the data path fails.
• SHOULD be able to monitor usage of the DMM protocol, and
provide means to measure its signaling cost.
• SHOULD
o Be able to monitor the number of mobility sessions per
user, as well as their average duration.
o provide an indication of DMM performance (Handover
delay, Protocol reactivity).
REQ8: Security considerations
DMM solution:
MUST support any security protocols and mechanisms
needed to secure the network and to make continuous
security improvements.
MUST NOT introduce new security risks or amplify
existing security risks that cannot be mitigated by existing
security protocols and mechanisms.
Contact Information
Name E-mail
Abeer Fathy abeerswelam93@gmail.com
Aya Mahmoud ayamahmoud1193@gmail.com
Rawan Ramzy RawanRamzy11@gmail.com
Sara Abdulatif Sabdullatife@gmail.com

More Related Content

What's hot

Release 5 arch and beyond v06
Release 5 arch and beyond v06Release 5 arch and beyond v06
Release 5 arch and beyond v06reza-nasrollah
 
RCN Network Management Service
RCN Network Management ServiceRCN Network Management Service
RCN Network Management ServiceScott_Blake
 
nokia_netact_brochure
nokia_netact_brochurenokia_netact_brochure
nokia_netact_brochureAna Sousa
 
Introduction to Intelligent Network
Introduction to Intelligent NetworkIntroduction to Intelligent Network
Introduction to Intelligent NetworkRiswan
 
Mobility Management Approaches for Mobile IP Networks
Mobility Management Approaches for Mobile IP NetworksMobility Management Approaches for Mobile IP Networks
Mobility Management Approaches for Mobile IP NetworksWSO2
 
2016 06-10-ieee-sdn (1)
2016 06-10-ieee-sdn (1)2016 06-10-ieee-sdn (1)
2016 06-10-ieee-sdn (1)ICT PRISTINE
 
Software-Defined Networking SDN - A Brief Introduction
Software-Defined Networking SDN - A Brief IntroductionSoftware-Defined Networking SDN - A Brief Introduction
Software-Defined Networking SDN - A Brief IntroductionJason TC HOU (侯宗成)
 
Systems and network architectures
Systems and network architecturesSystems and network architectures
Systems and network architecturescsk selva
 
Towards an Open Data Cente with an Interoperable Network (ODIN) Volume 5: WAN...
Towards an Open Data Cente with an Interoperable Network (ODIN) Volume 5: WAN...Towards an Open Data Cente with an Interoperable Network (ODIN) Volume 5: WAN...
Towards an Open Data Cente with an Interoperable Network (ODIN) Volume 5: WAN...IBM India Smarter Computing
 
5.2 qos priority_preemption-alu
5.2 qos priority_preemption-alu5.2 qos priority_preemption-alu
5.2 qos priority_preemption-aluMilind Gunjan
 
Pristine glif 2015
Pristine glif 2015Pristine glif 2015
Pristine glif 2015ICT PRISTINE
 
Network architecture
Network architectureNetwork architecture
Network architecturecsk selva
 
Software Defined Networks
Software Defined NetworksSoftware Defined Networks
Software Defined NetworksShreeya Shah
 

What's hot (19)

Release 5 arch and beyond v06
Release 5 arch and beyond v06Release 5 arch and beyond v06
Release 5 arch and beyond v06
 
RCN Network Management Service
RCN Network Management ServiceRCN Network Management Service
RCN Network Management Service
 
nokia_netact_brochure
nokia_netact_brochurenokia_netact_brochure
nokia_netact_brochure
 
Introduction to Intelligent Network
Introduction to Intelligent NetworkIntroduction to Intelligent Network
Introduction to Intelligent Network
 
Mobility Management Approaches for Mobile IP Networks
Mobility Management Approaches for Mobile IP NetworksMobility Management Approaches for Mobile IP Networks
Mobility Management Approaches for Mobile IP Networks
 
2016 06-10-ieee-sdn (1)
2016 06-10-ieee-sdn (1)2016 06-10-ieee-sdn (1)
2016 06-10-ieee-sdn (1)
 
TERM PAPER
TERM PAPERTERM PAPER
TERM PAPER
 
[브로셔]NGN
[브로셔]NGN[브로셔]NGN
[브로셔]NGN
 
Software-Defined Networking SDN - A Brief Introduction
Software-Defined Networking SDN - A Brief IntroductionSoftware-Defined Networking SDN - A Brief Introduction
Software-Defined Networking SDN - A Brief Introduction
 
Systems and network architectures
Systems and network architecturesSystems and network architectures
Systems and network architectures
 
Towards an Open Data Cente with an Interoperable Network (ODIN) Volume 5: WAN...
Towards an Open Data Cente with an Interoperable Network (ODIN) Volume 5: WAN...Towards an Open Data Cente with an Interoperable Network (ODIN) Volume 5: WAN...
Towards an Open Data Cente with an Interoperable Network (ODIN) Volume 5: WAN...
 
5.2 qos priority_preemption-alu
5.2 qos priority_preemption-alu5.2 qos priority_preemption-alu
5.2 qos priority_preemption-alu
 
Pristine glif 2015
Pristine glif 2015Pristine glif 2015
Pristine glif 2015
 
Network architecture
Network architectureNetwork architecture
Network architecture
 
SDN Research Projects Guidance
SDN Research Projects GuidanceSDN Research Projects Guidance
SDN Research Projects Guidance
 
QoS in an LTE network
QoS in an LTE networkQoS in an LTE network
QoS in an LTE network
 
wp244
wp244wp244
wp244
 
Software Defined Networks
Software Defined NetworksSoftware Defined Networks
Software Defined Networks
 
N
NN
N
 

Viewers also liked

Blackholing from a_providers_perspektive_theo_voss
Blackholing from a_providers_perspektive_theo_vossBlackholing from a_providers_perspektive_theo_voss
Blackholing from a_providers_perspektive_theo_vossPavel Odintsov
 
Ue introduction
Ue introductionUe introduction
Ue introductionJamesFun
 
S1 dcn - l10 - gsm-introduction
S1   dcn - l10 - gsm-introductionS1   dcn - l10 - gsm-introduction
S1 dcn - l10 - gsm-introductionasadsbbu
 
Lte air-interface
Lte  air-interfaceLte  air-interface
Lte air-interfaceArshad Alam
 
Ch18 "Case Study 3: DC-DC Power Converter"
Ch18 "Case Study 3: DC-DC Power Converter"Ch18 "Case Study 3: DC-DC Power Converter"
Ch18 "Case Study 3: DC-DC Power Converter"Aya Mahmoud
 
Company and Marketing Strategy Partnering to Build Customer Relationships - C...
Company and Marketing Strategy Partnering to Build Customer Relationships - C...Company and Marketing Strategy Partnering to Build Customer Relationships - C...
Company and Marketing Strategy Partnering to Build Customer Relationships - C...Aya Mahmoud
 
Inter-Process Communication in distributed systems
Inter-Process Communication in distributed systemsInter-Process Communication in distributed systems
Inter-Process Communication in distributed systemsAya Mahmoud
 

Viewers also liked (8)

Blackholing from a_providers_perspektive_theo_voss
Blackholing from a_providers_perspektive_theo_vossBlackholing from a_providers_perspektive_theo_voss
Blackholing from a_providers_perspektive_theo_voss
 
Ue introduction
Ue introductionUe introduction
Ue introduction
 
S1 dcn - l10 - gsm-introduction
S1   dcn - l10 - gsm-introductionS1   dcn - l10 - gsm-introduction
S1 dcn - l10 - gsm-introduction
 
Lte air-interface
Lte  air-interfaceLte  air-interface
Lte air-interface
 
Ch18 "Case Study 3: DC-DC Power Converter"
Ch18 "Case Study 3: DC-DC Power Converter"Ch18 "Case Study 3: DC-DC Power Converter"
Ch18 "Case Study 3: DC-DC Power Converter"
 
Company and Marketing Strategy Partnering to Build Customer Relationships - C...
Company and Marketing Strategy Partnering to Build Customer Relationships - C...Company and Marketing Strategy Partnering to Build Customer Relationships - C...
Company and Marketing Strategy Partnering to Build Customer Relationships - C...
 
Inter-Process Communication in distributed systems
Inter-Process Communication in distributed systemsInter-Process Communication in distributed systems
Inter-Process Communication in distributed systems
 
It101 lect2
It101 lect2It101 lect2
It101 lect2
 

Similar to Distributed Mobility Management (DMM)

5G in Brownfield how SDN makes 5G Deployments Work
5G in Brownfield how SDN makes 5G Deployments Work5G in Brownfield how SDN makes 5G Deployments Work
5G in Brownfield how SDN makes 5G Deployments WorkLumina Networks
 
A Literature Survey of MANET.pdf
A Literature Survey of MANET.pdfA Literature Survey of MANET.pdf
A Literature Survey of MANET.pdfLaurie Smith
 
A Literature Survey of MANET
A Literature Survey of MANETA Literature Survey of MANET
A Literature Survey of MANETIRJET Journal
 
Improvements for DMM in SDN and Virtualization-Based Mobile Network Architecture
Improvements for DMM in SDN and Virtualization-Based Mobile Network ArchitectureImprovements for DMM in SDN and Virtualization-Based Mobile Network Architecture
Improvements for DMM in SDN and Virtualization-Based Mobile Network Architectureijmnct
 
IMPROVEMENTS FOR DMM IN SDN AND VIRTUALIZATION-BASED MOBILE NETWORK ARCHITECTURE
IMPROVEMENTS FOR DMM IN SDN AND VIRTUALIZATION-BASED MOBILE NETWORK ARCHITECTUREIMPROVEMENTS FOR DMM IN SDN AND VIRTUALIZATION-BASED MOBILE NETWORK ARCHITECTURE
IMPROVEMENTS FOR DMM IN SDN AND VIRTUALIZATION-BASED MOBILE NETWORK ARCHITECTUREijmnct
 
IMPROVEMENTS FOR DMM IN SDN AND VIRTUALIZATION-BASED MOBILE NETWORK ARCHITECTURE
IMPROVEMENTS FOR DMM IN SDN AND VIRTUALIZATION-BASED MOBILE NETWORK ARCHITECTUREIMPROVEMENTS FOR DMM IN SDN AND VIRTUALIZATION-BASED MOBILE NETWORK ARCHITECTURE
IMPROVEMENTS FOR DMM IN SDN AND VIRTUALIZATION-BASED MOBILE NETWORK ARCHITECTUREijmnct
 
Edge virtualisation for Carrier Networks
Edge virtualisation for Carrier NetworksEdge virtualisation for Carrier Networks
Edge virtualisation for Carrier NetworksMyNOG
 
Analysis Of Wireless Sensor Network Routing Protocols
Analysis Of Wireless Sensor Network Routing ProtocolsAnalysis Of Wireless Sensor Network Routing Protocols
Analysis Of Wireless Sensor Network Routing ProtocolsAmanda Brady
 
Hierarchical Network Controller
Hierarchical Network ControllerHierarchical Network Controller
Hierarchical Network ControllerMyNOG
 
Network architecture - part-I
Network architecture - part-INetwork architecture - part-I
Network architecture - part-Icsk selva
 
Adoption of Next-Generation 5G Wireless Technology for “Smarter” Grid Design;...
Adoption of Next-Generation 5G Wireless Technology for “Smarter” Grid Design;...Adoption of Next-Generation 5G Wireless Technology for “Smarter” Grid Design;...
Adoption of Next-Generation 5G Wireless Technology for “Smarter” Grid Design;...Alidu Abubakari
 
Mobility Management For Next Generation Networks
Mobility Management For Next Generation NetworksMobility Management For Next Generation Networks
Mobility Management For Next Generation NetworksGreen Packet
 
Aalto University Mobile Management in SDN
Aalto University Mobile Management in SDNAalto University Mobile Management in SDN
Aalto University Mobile Management in SDNHector Fuentes
 
Centralized System in MANET with GRP Protocol
Centralized System in MANET with GRP ProtocolCentralized System in MANET with GRP Protocol
Centralized System in MANET with GRP Protocolijceronline
 
FIWARE Tech Summit - OpenMTC – OneM2M Middleware
FIWARE Tech Summit - OpenMTC – OneM2M MiddlewareFIWARE Tech Summit - OpenMTC – OneM2M Middleware
FIWARE Tech Summit - OpenMTC – OneM2M MiddlewareFIWARE
 
Mobile ad hoc networks (MANET) for KTU
Mobile ad hoc networks (MANET) for KTUMobile ad hoc networks (MANET) for KTU
Mobile ad hoc networks (MANET) for KTUVinish Alikkal
 
Mobile ad hoc networks (manet)
Mobile ad hoc networks (manet)Mobile ad hoc networks (manet)
Mobile ad hoc networks (manet)Vinish Alikkal
 
IRJET-A Review Paper on Secure Routing Technique for MANETS
IRJET-A Review Paper on Secure Routing Technique for MANETSIRJET-A Review Paper on Secure Routing Technique for MANETS
IRJET-A Review Paper on Secure Routing Technique for MANETSIRJET Journal
 

Similar to Distributed Mobility Management (DMM) (20)

Netsoft 2020 S4SI Workshop Panel
Netsoft 2020 S4SI Workshop PanelNetsoft 2020 S4SI Workshop Panel
Netsoft 2020 S4SI Workshop Panel
 
5G in Brownfield how SDN makes 5G Deployments Work
5G in Brownfield how SDN makes 5G Deployments Work5G in Brownfield how SDN makes 5G Deployments Work
5G in Brownfield how SDN makes 5G Deployments Work
 
A Literature Survey of MANET.pdf
A Literature Survey of MANET.pdfA Literature Survey of MANET.pdf
A Literature Survey of MANET.pdf
 
A Literature Survey of MANET
A Literature Survey of MANETA Literature Survey of MANET
A Literature Survey of MANET
 
Improvements for DMM in SDN and Virtualization-Based Mobile Network Architecture
Improvements for DMM in SDN and Virtualization-Based Mobile Network ArchitectureImprovements for DMM in SDN and Virtualization-Based Mobile Network Architecture
Improvements for DMM in SDN and Virtualization-Based Mobile Network Architecture
 
IMPROVEMENTS FOR DMM IN SDN AND VIRTUALIZATION-BASED MOBILE NETWORK ARCHITECTURE
IMPROVEMENTS FOR DMM IN SDN AND VIRTUALIZATION-BASED MOBILE NETWORK ARCHITECTUREIMPROVEMENTS FOR DMM IN SDN AND VIRTUALIZATION-BASED MOBILE NETWORK ARCHITECTURE
IMPROVEMENTS FOR DMM IN SDN AND VIRTUALIZATION-BASED MOBILE NETWORK ARCHITECTURE
 
IMPROVEMENTS FOR DMM IN SDN AND VIRTUALIZATION-BASED MOBILE NETWORK ARCHITECTURE
IMPROVEMENTS FOR DMM IN SDN AND VIRTUALIZATION-BASED MOBILE NETWORK ARCHITECTUREIMPROVEMENTS FOR DMM IN SDN AND VIRTUALIZATION-BASED MOBILE NETWORK ARCHITECTURE
IMPROVEMENTS FOR DMM IN SDN AND VIRTUALIZATION-BASED MOBILE NETWORK ARCHITECTURE
 
Edge virtualisation for Carrier Networks
Edge virtualisation for Carrier NetworksEdge virtualisation for Carrier Networks
Edge virtualisation for Carrier Networks
 
Analysis Of Wireless Sensor Network Routing Protocols
Analysis Of Wireless Sensor Network Routing ProtocolsAnalysis Of Wireless Sensor Network Routing Protocols
Analysis Of Wireless Sensor Network Routing Protocols
 
Hierarchical Network Controller
Hierarchical Network ControllerHierarchical Network Controller
Hierarchical Network Controller
 
Network architecture - part-I
Network architecture - part-INetwork architecture - part-I
Network architecture - part-I
 
Adoption of Next-Generation 5G Wireless Technology for “Smarter” Grid Design;...
Adoption of Next-Generation 5G Wireless Technology for “Smarter” Grid Design;...Adoption of Next-Generation 5G Wireless Technology for “Smarter” Grid Design;...
Adoption of Next-Generation 5G Wireless Technology for “Smarter” Grid Design;...
 
Mobility Management For Next Generation Networks
Mobility Management For Next Generation NetworksMobility Management For Next Generation Networks
Mobility Management For Next Generation Networks
 
Aalto University Mobile Management in SDN
Aalto University Mobile Management in SDNAalto University Mobile Management in SDN
Aalto University Mobile Management in SDN
 
Centralized System in MANET with GRP Protocol
Centralized System in MANET with GRP ProtocolCentralized System in MANET with GRP Protocol
Centralized System in MANET with GRP Protocol
 
Unit 4 for PG PAWSN
Unit 4 for PG PAWSNUnit 4 for PG PAWSN
Unit 4 for PG PAWSN
 
FIWARE Tech Summit - OpenMTC – OneM2M Middleware
FIWARE Tech Summit - OpenMTC – OneM2M MiddlewareFIWARE Tech Summit - OpenMTC – OneM2M Middleware
FIWARE Tech Summit - OpenMTC – OneM2M Middleware
 
Mobile ad hoc networks (MANET) for KTU
Mobile ad hoc networks (MANET) for KTUMobile ad hoc networks (MANET) for KTU
Mobile ad hoc networks (MANET) for KTU
 
Mobile ad hoc networks (manet)
Mobile ad hoc networks (manet)Mobile ad hoc networks (manet)
Mobile ad hoc networks (manet)
 
IRJET-A Review Paper on Secure Routing Technique for MANETS
IRJET-A Review Paper on Secure Routing Technique for MANETSIRJET-A Review Paper on Secure Routing Technique for MANETS
IRJET-A Review Paper on Secure Routing Technique for MANETS
 

Recently uploaded

Application of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptxApplication of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptx959SahilShah
 
Artificial-Intelligence-in-Electronics (K).pptx
Artificial-Intelligence-in-Electronics (K).pptxArtificial-Intelligence-in-Electronics (K).pptx
Artificial-Intelligence-in-Electronics (K).pptxbritheesh05
 
Biology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptxBiology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptxDeepakSakkari2
 
Call Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile serviceCall Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile servicerehmti665
 
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSAPPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSKurinjimalarL3
 
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝soniya singh
 
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdfCCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdfAsst.prof M.Gokilavani
 
Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024hassan khalil
 
Heart Disease Prediction using machine learning.pptx
Heart Disease Prediction using machine learning.pptxHeart Disease Prediction using machine learning.pptx
Heart Disease Prediction using machine learning.pptxPoojaBan
 
SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )Tsuyoshi Horigome
 
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort serviceGurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort servicejennyeacort
 
Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...VICTOR MAESTRE RAMIREZ
 
microprocessor 8085 and its interfacing
microprocessor 8085  and its interfacingmicroprocessor 8085  and its interfacing
microprocessor 8085 and its interfacingjaychoudhary37
 
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escortsranjana rawat
 
Internship report on mechanical engineering
Internship report on mechanical engineeringInternship report on mechanical engineering
Internship report on mechanical engineeringmalavadedarshan25
 
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130Suhani Kapoor
 
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 
chaitra-1.pptx fake news detection using machine learning
chaitra-1.pptx  fake news detection using machine learningchaitra-1.pptx  fake news detection using machine learning
chaitra-1.pptx fake news detection using machine learningmisbanausheenparvam
 

Recently uploaded (20)

Application of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptxApplication of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptx
 
Artificial-Intelligence-in-Electronics (K).pptx
Artificial-Intelligence-in-Electronics (K).pptxArtificial-Intelligence-in-Electronics (K).pptx
Artificial-Intelligence-in-Electronics (K).pptx
 
Biology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptxBiology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptx
 
Call Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile serviceCall Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile service
 
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSAPPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
 
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
 
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdfCCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
 
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCRCall Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
 
Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024
 
Heart Disease Prediction using machine learning.pptx
Heart Disease Prediction using machine learning.pptxHeart Disease Prediction using machine learning.pptx
Heart Disease Prediction using machine learning.pptx
 
SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )
 
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort serviceGurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
 
Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...
 
microprocessor 8085 and its interfacing
microprocessor 8085  and its interfacingmicroprocessor 8085  and its interfacing
microprocessor 8085 and its interfacing
 
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
 
Internship report on mechanical engineering
Internship report on mechanical engineeringInternship report on mechanical engineering
Internship report on mechanical engineering
 
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
 
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
 
chaitra-1.pptx fake news detection using machine learning
chaitra-1.pptx  fake news detection using machine learningchaitra-1.pptx  fake news detection using machine learning
chaitra-1.pptx fake news detection using machine learning
 
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
 

Distributed Mobility Management (DMM)

  • 1. DISTRIBUTED MOBILITY MANAGEMENT DMM Presented by: Abeer Fathy Aya Mahmoud Rawan Ramzy Sara Abdulatif
  • 2. Agenda  The Internet Area.  Charter of the working group.  DMM Draft.  DMM RFC  Contact Information
  • 3. The InternetArea The primary technical topics covered by the Internet Area include IP layer (both IPv4 and IPv6), implications of IPv4 address depletion, co-existence between the IP versions, DNS, host and router configuration, mobility, VPNs and various link layer technologies.
  • 4. Charter of The Working Group Mobility means the ability of a Host to overcome the location dependent nature of IP addresses by a suitable translation mechanism, and to send and receive data efficiently from any location. The user should not be required to restart applications or in the worst- case reboot, when visiting a new network. Network A Node 2 Node 1 Network B
  • 5. IETF DMM working group creation DMM protocol aims at distributing traffic in an optimal way and not rely on centrally deployed mobility anchors to manage IP mobility sessions. The DMM WG will consider the latest developments in mobile networking research and operational practice and will describe how distributed mobility management addresses the new needs in this area better than previously standardized solutions. DMM solutions aim for transparency above the IP layer, including maintenance of active transport level sessions when mobile hosts or mobile networks change their point of attachment to the Internet.
  • 6. Mobile Node Identifier Draft The Mobile Node Identifier Option for MIPv6 has proved to be a popular design tool for providing identifiers for mobile nodes during authentication procedures with AAA protocols (Authentication, Authorization and Accounting) IETF DMM Working Group proposes adding some basic types that are defined in various telecommunications standards.
  • 7. Defining identifiers that are tied to the physical elements of the device (RFID, MAC address etc.) IP because in many cases such identifiers are the most natural means for uniquely identifying the device.
  • 8. The Tag Data standard promoted by Electronic Product Code(TM) (abbreviated EPC) supports several encoding systems or schemes including:  RFID-GID (Global Identifier),  RFID-SGTIN (Serialized Global Trade Item Number),  RFID-SSCC (Serial Shipping Container),  RFID-GLN (Global Location Number),  RFID-GRAI (Global Returnable Asset Identifier),  RFID-DOD (Department of Defense ID), and  RFID-GIAI (Global Individual Asset Identifier).
  • 9. The new mobile node identifier types should be assigned values from the "Mobile Node Identifier Option Subtypes" registry. Some identifiers are considered to be private information. If used in the MNID extension, the packet including the MNID extension should be encrypted so that personal information would not be inadvertently disclosed to passive observers. MNIDs containing sensitive identifiers might only be used for signaling during initial network entry.
  • 10. Requirements for Distributed Mobility Management RFC  Mobility management is needed because the IP address of a mobile node may change as the node moves.  At the IP (network) layer, mobility management can be client-based or network-based.  Session Identifier: the original IP address before the mobile node moves.  Forwarding Address: the new IP address of the mobile node after the node has moved.  Packets addressed to the session identifier will first route to the original network, which redirects them using the forwarding address to deliver to the session.
  • 11. Centralized vs. Distributed Mobility Management Centralized Mobility Management: The location information is kept at a single mobility anchor, and packets destined to the session identifier are forwarded via this anchor. Mobility management systems are centralized in both the control plane and the data plane.
  • 12. Centralized mobility anchoring in a hierarchical network architecture.
  • 13. Distributed Mobility Management Mobility management functions can be distributed in the data plane to multiple networks, so that a mobile node in any of these networks may be served by a nearby function with appropriate forwarding management (FM) capability.
  • 14. DMM is distributed in the data plane, whereas the control plane may be either centralized or distributed. It is not necessary for other functions such as subscription management, subscription databases, and network access authentication to be similarly distributed.
  • 15. Problem Statement 1. Non-Optimal Routes Forwarding via a centralized anchor often results in non-optimal routes, thereby increasing the end-to-end delay.
  • 16. 2. Divergence from other evolutionary trends in network architectures such as distribution of content delivery Mobile networks have generally been evolving towards a flatter and flatter network. Centralized mobility management, which is non-optimal with a flatter network architecture, does not support this evolution.
  • 17. 3. Lack of scalability of centralized tunnel management and mobility context maintenance: Setting up tunnels through a central anchor and maintaining mobility context for each MN usually requires more concentrated resources in a centralized design, thus reducing scalability. 4. Single point of failure and attack: The impact of a successful attack on a system with centralized mobility management can be far greater than a distributed mobility system.
  • 18. Solution (Req1)  Servers are distributed so that each user in any location can be close to one of the servers.
  • 19. Solution Cont.  Single points of failure are avoided in a distributed system and threats against centrally deployed anchors.  DMM solutions (IP mobility, network access solutions, and forwarding solutions) MUST enable traffic to avoid traversing a single mobility anchor far from the optimal route.
  • 20. 5. Unnecessary mobility support to clients that do not need it: IP mobility support is usually provided to all MNs. However, it is not always required, and not every parameter of mobility context is always used. • some applications/nodes do not need a stable IP address during a handover to maintain session continuity. • Sometimes, the entire application session runs while the MN does not change the point of attachment. • Some sessions can handle mobility at the application layer. (do not need IP mobility support) It is then unnecessary to provide IP mobility support for such sessions.
  • 21. 6. Mobility signaling overhead with peer-to-peer communication: Resources may be wasted when mobility signaling is not turned off for peer-to-peer communication.
  • 22. Solution (Req2)  Selecting an IP address or prefix according to whether mobility support is needed and by not maintaining context at the mobility anchor when there is no such need.  DMM solutions MUST provide the possibility of independent handling for each application session of a user or mobile device.
  • 23. 7. Deployment with multiple mobility solutions There are already many variants, extensions, and mobility solutions of MIP at other layers. Deployment of new mobility management solutions can be challenging, and debugging difficult, when they coexist with solutions already deployed in the field.
  • 24. Solution (Req3) DMM implementations MUST be able to coexist with existing network deployments, end hosts, and routers that may or may not implement existing mobility protocols.
  • 25. 8. Duplicate multicast traffic IP multicast distribution over architectures using IP mobility solutions may lead to convergence of duplicated multicast subscriptions towards the downstream tunnel entity. Concretely, when multicast subscription for individual mobile nodes is coupled with mobility tunnels, duplicate multicast subscription(s) is prone to be received through different upstream paths.
  • 26. Solution (Req4) • Existing multicast and non-optimal forwarding for the multicast traffic deployments have been introduced after completing the design of the reference mobility protocol, often leading to network inefficiency • DMM should instead consider multicast early in the process, so that the multicast solutions can better consider the efficient nature of multicast traffic delivery .
  • 27. Requirements REQ5: IPv6 deployment: DMM solutions SHOULD target IPv6 as the primary deployment environment and SHOULD NOT be tailored specifically to support IPv4. REQ6: Existing mobility protocols: DMM solution MUST first consider reusing and extending IETF standard protocols before specifying new protocols.
  • 28. REQ7: Operation and management considerations: DMM solution: • MUST support mechanisms to test whether the DMM solution is working properly. • SHOULD expose the operational state of DMM to the administrators of the DMM entities. • SHOULD support means to correlate the mobility flow routing policies and the observed forwarding actions. • SHOULD support mechanisms to check the liveness of a forwarding path.
  • 29. • MUST provide fault management and monitoring mechanisms to manage situations where an update of the mobility session or the data path fails. • SHOULD be able to monitor usage of the DMM protocol, and provide means to measure its signaling cost. • SHOULD o Be able to monitor the number of mobility sessions per user, as well as their average duration. o provide an indication of DMM performance (Handover delay, Protocol reactivity).
  • 30. REQ8: Security considerations DMM solution: MUST support any security protocols and mechanisms needed to secure the network and to make continuous security improvements. MUST NOT introduce new security risks or amplify existing security risks that cannot be mitigated by existing security protocols and mechanisms.
  • 31. Contact Information Name E-mail Abeer Fathy abeerswelam93@gmail.com Aya Mahmoud ayamahmoud1193@gmail.com Rawan Ramzy RawanRamzy11@gmail.com Sara Abdulatif Sabdullatife@gmail.com

Editor's Notes

  1. Accounting  amount of system time Diameter 
  2. , as shown. Home Agent Local Mobility Agent Mobile Node Mobile Access Gateway 3GPP General Packet Radio System 3GPP Evolved Packet System Gateway GPRS Support Node (GGSN) Serving GPRS Support Node (SGSN) Radio Network Controller Packet Data Network Gateway (P-GW) Serving Gateway (S-GW)
  3. Peer-to-peer communications have particular traffic patterns that often do not benefit from mobility support from the network. Thus, the associated mobility support signaling (e.g., maintenance of the tunnel, keep alives, etc.) wastes network resources for no application gain. In such a case, it is better to enable mobility support selectively enable mobility support selectively.
  4. If the DMM solution sends periodic update refresh messages to configure the forwarding path, the refresh period SHOULD be configurable and a reasonable default configuration value proposed.
  5. When a DMM solution uses an existing protocol, the techniques already defined for that protocol SHOULD be used to monitor the DMM operation. When these techniques are inadequate, new techniques MUST be developed.