SlideShare a Scribd company logo
1 of 36
Mobile IP and
Wireless Application
Protocol
Chapter 12
Mobile IP Uses
 Enable computers to maintain Internet
connectivity while moving from one
Internet attachment point to another
 Mobile – user's point of attachment changes
dynamically and all connections are
automatically maintained despite the
change
 Nomadic - user's Internet connection is
terminated each time the user moves and a
new connection is initiated when the user
dials back in
 New, temporary IP address is assigned
Operation of Mobile IP
 Mobil node is assigned to a particular
network – home network
 IP address on home network is static –
home address
 Mobile node can move to another network
– foreign network
 Mobile node registers with network node
on foreign network – foreign agent
 Mobile node gives care-of address to agent
on home network – home agent
Capabilities of Mobile IP
 Discovery – mobile node uses discovery procedure to identify
prospective home and foreign agents
 Registration – mobile node uses an authenticated registration
procedure to inform home agent of its care-of address
 Tunneling – used to forward IP datagrams from a home
address to a care-of address
Discovery
 Mobile node is responsible for ongoing
discovery process
 Must determine if it is attached to its home
network or a foreign network
 Transition from home network to foreign
network can occur at any time without
notification to the network layer
 Mobile node listens for agent advertisement
messages
 Compares network portion of the router's IP
address with the network portion of home
address
Agent Solicitation
 Foreign agents are expected to issue agent advertisement
messages periodically
 If a mobile node needs agent information immediately, it can
issue ICMP router solicitation message
 Any agent receiving this message will then issue an agent
advertisement
Move Detection
 Mobile node may move from one network
to another due to some handoff mechanism
without IP level being aware
 Agent discovery process is intended to enable
the agent to detect such a move
 Algorithms to detect move:
 Use of lifetime field – mobile node uses lifetime
field as a timer for agent advertisements
 Use of network prefix – mobile node checks if
any newly received agent advertisement
messages are on the same network as the node's
current care-of address
Co-Located Addresses
 If mobile node moves to a network that has no
foreign agents, or all foreign agents are busy, it
can act as its own foreign agent
 Mobile agent uses co-located care-of address
 IP address obtained by mobile node associated with
mobile node's current network interface
 Means to acquire co-located address:
 Temporary IP address through an Internet service,
such as DHCP
 May be owned by the mobile node as a long-term
address for use while visiting a given foreign
network
Registration Process
 Mobile node sends registration request to foreign agent
requesting forwarding service
 Foreign agent relays request to home agent
 Home agent accepts or denies request and sends registration
reply to foreign agent
 Foreign agent relays reply to mobile node
Registration Operation Messages
 Registration request message
 Fields = type, S, B, D, M, V, G, lifetime, home address, home
agent, care-of-address, identification, extensions
 Registration reply message
 Fields = type, code, lifetime, home address, home agent,
identification, extensions
Registration Procedure Security
 Mobile IP designed to resist attacks
 Node pretending to be a foreign agent sends
registration request to a home agent to divert
mobile node traffic to itself
 Agent replays old registration messages to cut
mobile node from network
 For message authentication, registration
request and reply contain authentication
extension
 Fields = type, length, security parameter index
(SPI), authenticator
Types of Authentication
Extensions
 Mobile-home – provides for authentication
of registration messages between mobile
node and home agent; must be present
 Mobile-foreign – may be present when a
security association exists between mobile
node and foreign agent
 Foreign-home – may be present when a
security association exists between foreign
agent and home agent
Tunneling
 Home agent intercepts IP datagrams sent to mobile node's
home address
 Home agent informs other nodes on home network that datagrams
to mobile node should be delivered to home agent
 Datagrams forwarded to care-of address via tunneling
 Datagram encapsulated in outer IP datagram
Mobile IP Encapsulation Options
 IP-within-IP – entire IP datagram becomes payload in
new IP datagram
 Original, inner IP header unchanged except TTL
decremented by 1
 Outer header is a full IP header
 Minimal encapsulation – new header is inserted
between original IP header and original IP payload
 Original IP header modified to form new outer IP header
 Generic routing encapsulation (GRE) – developed
prior to development of Mobile IP
Wireless Application Protocol
(WAP)
 Open standard providing mobile users of
wireless terminals access to telephony and
information services
 Wireless terminals include wireless phones,
pagers and personal digital assistants (PDAs)
 Designed to work with all wireless network
technologies such as GSM, CDMA, and TDMA
 Based on existing Internet standards such as IP,
XML, HTML, and HTTP
 Includes security facilities
WAP Protocol Stack
WAP Programming Model
Wireless Markup Language
(WML) Features
 Text and image support – formatting and
layout commands
 Deck/card organizational metaphor – WML
documents subdivided into cards, which
specify one or more units of interaction
 Support for navigation among cards and
decks – includes provisions for event
handling; used for navigation or executing
scripts
WMLScript
 Scripting language for defining script-type programs in a user
device with limited processing power and memory
 WMLScript capabilities:
 Check validity of user input before it’s sent
 Access device facilities and peripherals
 Interact with user without introducing round trips to origin server
WMLScript
 WMLScript features:
 JavaScript-based scripting language
 Procedural logic
 Event-based
 Compiled implementation
 Integrated into WAE
Wireless Application
Environment (WAE) WAE specifies an application framework for wireless
devices
 WAE elements:
 WAE User agents – software that executes in the wireless
device
 Content generators – applications that produce standard
content formats in response to requests from user agents in
the mobile terminal
 Standard content encoding – defined to allow a WAE user
agent to navigate Web content
 Wireless telephony applications (WTA) – collection of
telephony-specific extensions for call and feature control
mechanisms
WAE Client Components
Wireless Session Protocol (WSP)
 Transaction-oriented protocol based on the concept of a
request and a reply
 Provides applications with interface for two session services:
 Connection-oriented session service – operates above reliable
transport protocol WTP
 Connectionless session service – operates above unreliable
transport protocol WDP
Connection-mode WSP Services
 Establish reliable session from client to
server and release
 Agree on common level of protocol
functionality using capability negotiation
 Exchange content between client and server
using compact encoding
 Suspend and resume a session
 Push content from server to client in an
unsynchronized manner
WSP Transaction Types
 Session establishment – client WSP user requests
session with server WSP user
 Session termination – client WSP user initiates
termination
 Session suspend and resume – initiated with
suspend and resume requests
 Transaction – exchange of data between a client
and server
 Nonconfirmed data push – used to send
unsolicited information from server to client
 Confirmed data push – server receives delivery
confirmation from client
Wireless Transaction Protocol
(WTP)
 Lightweight protocol suitable for "thin"
clients and over low-bandwidth wireless
links
 WTP features
 Three classes of transaction service
 Optional user-to-user reliability: WTP user
triggers confirmation of each received
message
 Optional out-of-band data on
acknowledgments
 PDU concatenation and delayed
WTP Transaction Classes
 Class 0: Unreliable invoke message with no result message
 Class 1: Reliable invoke message with no result message
 Class 2: Unreliable invoke message with one reliable result
message
WTP PDU Types
 Invoke PDU – used to convey a request from an
initiator to a responder
 ACK PDU – used to acknowledge an Invoke or
Result PDU
 Result PDU – used to convey response of the
server to the client
 Abort PDU – used to abort a transaction
 Segmented invoke PDU and segmented result
PDU – used for segmentation and reassembly
 Negative acknowledgment PDU – used to indicate
that some packets did not arrive
Examples of WTP Operation
Wireless Transport Layer
Security (WTLS) Features
 Data integrity – ensures that data sent
between client and gateway are not
modified, using message authentication
 Privacy – ensures that the data cannot be
read by a third party, using encryption
 Authentication – establishes
authentication of the two parties, using
digital certificates
 Denial-of-service protection – detects
and rejects messages that are replayed or
not successfully verified
WTLS Protocol Stack
 WTLS consists of two layers of protocols
 WTLS Record Protocol – provides basic security services to
various higher-layer protocols
 Higher-layer protocols:
 The Handshake Protocol
 The Change Cipher Spec Protocol
 The Alert Protocol
WTLS Protocol Stack
WTLS Record Protocol
Operation
Phases of the Handshake
Protocol Exchange
 First phase – used to initiate a logical
connection and establish security
capabilities
 Second phase – used for server
authentication and key exchange
 Third phase – used for client
authentication and key exchange
 Forth phase – completes the setting up
of a secure connection
Wireless Datagram Protocol
(WDP)
 Used to adapt higher-layer WAP
protocol to the communication
mechanism used between mobile node
and WAP gateway
 WDP hides details of the various bearer
networks from the other layers of WAP
 Adaptation may include:
 Partitioning data into segments of
appropriate size for the bearer
 Interfacing with the bearer network
Wireless Control Message
Protocol (WCMP)
 Performs the same support function for
WDP as ICMP does for IP
 Used in environments that don’t provide
IP bearer and don’t lend themselves to
the use of ICMP
 Used by wireless nodes and WAP
gateways to report errors encountered in
processing WDP datagrams
 Can also be used for informational and
diagnostic purposes

More Related Content

What's hot

Virtual Private Network
Virtual Private NetworkVirtual Private Network
Virtual Private NetworkRicha Singh
 
Vpn " Virtual Private Network "
Vpn " Virtual Private Network "Vpn " Virtual Private Network "
Vpn " Virtual Private Network "Muhammad Usman
 
Virtual private network(vpn)
Virtual private network(vpn)Virtual private network(vpn)
Virtual private network(vpn)sonalikasingh15
 
VPN (virtual private network)
VPN (virtual private network) VPN (virtual private network)
VPN (virtual private network) Netwax Lab
 
Mobility Management Approaches for Mobile IP Networks
Mobility Management Approaches for Mobile IP NetworksMobility Management Approaches for Mobile IP Networks
Mobility Management Approaches for Mobile IP NetworksWSO2
 
DPI BOX: deep packet inspection for ISP traffic management
DPI BOX: deep packet inspection for ISP traffic managementDPI BOX: deep packet inspection for ISP traffic management
DPI BOX: deep packet inspection for ISP traffic managementIlya Mikov
 
VPN (virtual Private Network)
VPN (virtual Private Network)VPN (virtual Private Network)
VPN (virtual Private Network)Chandan Jha
 
19.) security pivot (policy byod nac)
19.) security pivot (policy byod nac)19.) security pivot (policy byod nac)
19.) security pivot (policy byod nac)Jeff Green
 
Virtual Private Network- VPN
Virtual Private Network- VPNVirtual Private Network- VPN
Virtual Private Network- VPNNikhil Kumar
 
Defend Your DHCP Infrastructure Against Cyber Attacks - Network Security Feat...
Defend Your DHCP Infrastructure Against Cyber Attacks - Network Security Feat...Defend Your DHCP Infrastructure Against Cyber Attacks - Network Security Feat...
Defend Your DHCP Infrastructure Against Cyber Attacks - Network Security Feat...Jiunn-Jer Sun
 
MAF ICIMS™ Monitoring, Analytics & Reporting for Microsoft Teams and UC - glo...
MAF ICIMS™ Monitoring, Analytics & Reporting for Microsoft Teams and UC - glo...MAF ICIMS™ Monitoring, Analytics & Reporting for Microsoft Teams and UC - glo...
MAF ICIMS™ Monitoring, Analytics & Reporting for Microsoft Teams and UC - glo...MAF InfoCom
 

What's hot (20)

Virtual Private Network
Virtual Private NetworkVirtual Private Network
Virtual Private Network
 
Vpn " Virtual Private Network "
Vpn " Virtual Private Network "Vpn " Virtual Private Network "
Vpn " Virtual Private Network "
 
Virtual private network(vpn)
Virtual private network(vpn)Virtual private network(vpn)
Virtual private network(vpn)
 
Vp npresentation
Vp npresentationVp npresentation
Vp npresentation
 
VPN (virtual private network)
VPN (virtual private network) VPN (virtual private network)
VPN (virtual private network)
 
Vpn
Vpn Vpn
Vpn
 
Mobility Management Approaches for Mobile IP Networks
Mobility Management Approaches for Mobile IP NetworksMobility Management Approaches for Mobile IP Networks
Mobility Management Approaches for Mobile IP Networks
 
DPI BOX: deep packet inspection for ISP traffic management
DPI BOX: deep packet inspection for ISP traffic managementDPI BOX: deep packet inspection for ISP traffic management
DPI BOX: deep packet inspection for ISP traffic management
 
Profile_Prateek
Profile_PrateekProfile_Prateek
Profile_Prateek
 
Vp npresentation (1)
Vp npresentation (1)Vp npresentation (1)
Vp npresentation (1)
 
VPN (virtual Private Network)
VPN (virtual Private Network)VPN (virtual Private Network)
VPN (virtual Private Network)
 
Vpn-Virtual Private Network
Vpn-Virtual Private NetworkVpn-Virtual Private Network
Vpn-Virtual Private Network
 
Vpn
VpnVpn
Vpn
 
Mobile IP 1
Mobile IP 1Mobile IP 1
Mobile IP 1
 
19.) security pivot (policy byod nac)
19.) security pivot (policy byod nac)19.) security pivot (policy byod nac)
19.) security pivot (policy byod nac)
 
Virtual Private Network- VPN
Virtual Private Network- VPNVirtual Private Network- VPN
Virtual Private Network- VPN
 
Defend Your DHCP Infrastructure Against Cyber Attacks - Network Security Feat...
Defend Your DHCP Infrastructure Against Cyber Attacks - Network Security Feat...Defend Your DHCP Infrastructure Against Cyber Attacks - Network Security Feat...
Defend Your DHCP Infrastructure Against Cyber Attacks - Network Security Feat...
 
MAF ICIMS™ Monitoring, Analytics & Reporting for Microsoft Teams and UC - glo...
MAF ICIMS™ Monitoring, Analytics & Reporting for Microsoft Teams and UC - glo...MAF ICIMS™ Monitoring, Analytics & Reporting for Microsoft Teams and UC - glo...
MAF ICIMS™ Monitoring, Analytics & Reporting for Microsoft Teams and UC - glo...
 
Mobile IP
Mobile IP Mobile IP
Mobile IP
 
Wireless lan security(10.8)
Wireless lan security(10.8)Wireless lan security(10.8)
Wireless lan security(10.8)
 

Viewers also liked (8)

Mobile Computing
Mobile ComputingMobile Computing
Mobile Computing
 
Mobile ip
Mobile ipMobile ip
Mobile ip
 
Infrared lan's
Infrared lan'sInfrared lan's
Infrared lan's
 
ENCAPSULATION AND TUNNELING
ENCAPSULATION AND TUNNELINGENCAPSULATION AND TUNNELING
ENCAPSULATION AND TUNNELING
 
Ch4
Ch4Ch4
Ch4
 
Mobile IP
Mobile IPMobile IP
Mobile IP
 
Wireless networking
Wireless networkingWireless networking
Wireless networking
 
Transmission Media
Transmission MediaTransmission Media
Transmission Media
 

Similar to Chapter#12

Virtual Private Network
Virtual Private NetworkVirtual Private Network
Virtual Private NetworkRajan Kumar
 
Virtual private network
Virtual private networkVirtual private network
Virtual private networkSowmia Sathyan
 
Unit iii - mobile ip and wireless access protocol
Unit iii - mobile ip and wireless access protocolUnit iii - mobile ip and wireless access protocol
Unit iii - mobile ip and wireless access protocolRamannagariKeerthana
 
Remote access connection
Remote access connection Remote access connection
Remote access connection Ah Fawad Saiq
 
Fundamentals of Virtual Private Networks (VPNs)
Fundamentals of Virtual Private Networks (VPNs)Fundamentals of Virtual Private Networks (VPNs)
Fundamentals of Virtual Private Networks (VPNs)ssusera07323
 
Vvirtualnet-basic.ppt
Vvirtualnet-basic.pptVvirtualnet-basic.ppt
Vvirtualnet-basic.pptssusera1b6c7
 
Unit 2.design mobile computing architecture
Unit 2.design mobile computing architectureUnit 2.design mobile computing architecture
Unit 2.design mobile computing architectureSwapnali Pawar
 
A secure protocol for Spontaneous Wireless Ad Hoc Networks Creation
A secure protocol for Spontaneous Wireless Ad Hoc Networks CreationA secure protocol for Spontaneous Wireless Ad Hoc Networks Creation
A secure protocol for Spontaneous Wireless Ad Hoc Networks CreationSahil Bajaj
 
VirtualPrivateNetwork.ppt
VirtualPrivateNetwork.pptVirtualPrivateNetwork.ppt
VirtualPrivateNetwork.ppttahaniali27
 
About vpn network .ppt
About vpn network .pptAbout vpn network .ppt
About vpn network .pptshanbelayayu
 
Virtual Private Network Presentation.ppt
Virtual Private Network Presentation.pptVirtual Private Network Presentation.ppt
Virtual Private Network Presentation.pptmocec17097
 
data communication and networking.pptx
data communication and networking.pptxdata communication and networking.pptx
data communication and networking.pptxAreebaAhmad24
 

Similar to Chapter#12 (20)

Virtual Private Network
Virtual Private NetworkVirtual Private Network
Virtual Private Network
 
Virtual private network
Virtual private networkVirtual private network
Virtual private network
 
vpn
vpnvpn
vpn
 
Unit iii - mobile ip and wireless access protocol
Unit iii - mobile ip and wireless access protocolUnit iii - mobile ip and wireless access protocol
Unit iii - mobile ip and wireless access protocol
 
VPN_ppt.ppt
VPN_ppt.pptVPN_ppt.ppt
VPN_ppt.ppt
 
Mobile ip group_3
Mobile ip group_3Mobile ip group_3
Mobile ip group_3
 
Remote access connection
Remote access connection Remote access connection
Remote access connection
 
Fundamentals of Virtual Private Networks (VPNs)
Fundamentals of Virtual Private Networks (VPNs)Fundamentals of Virtual Private Networks (VPNs)
Fundamentals of Virtual Private Networks (VPNs)
 
Vvirtualnet-basic.ppt
Vvirtualnet-basic.pptVvirtualnet-basic.ppt
Vvirtualnet-basic.ppt
 
Unit 2.design mobile computing architecture
Unit 2.design mobile computing architectureUnit 2.design mobile computing architecture
Unit 2.design mobile computing architecture
 
A secure protocol for Spontaneous Wireless Ad Hoc Networks Creation
A secure protocol for Spontaneous Wireless Ad Hoc Networks CreationA secure protocol for Spontaneous Wireless Ad Hoc Networks Creation
A secure protocol for Spontaneous Wireless Ad Hoc Networks Creation
 
VirtualPrivateNetwork.ppt
VirtualPrivateNetwork.pptVirtualPrivateNetwork.ppt
VirtualPrivateNetwork.ppt
 
About vpn network .ppt
About vpn network .pptAbout vpn network .ppt
About vpn network .ppt
 
VPN mean .ppt
VPN mean .pptVPN mean .ppt
VPN mean .ppt
 
Virtual Private Network Presentation.ppt
Virtual Private Network Presentation.pptVirtual Private Network Presentation.ppt
Virtual Private Network Presentation.ppt
 
Insights of vpn
Insights of vpnInsights of vpn
Insights of vpn
 
data communication and networking.pptx
data communication and networking.pptxdata communication and networking.pptx
data communication and networking.pptx
 
Mobileip 161105154557
Mobileip 161105154557Mobileip 161105154557
Mobileip 161105154557
 
Mobileip 161105154557
Mobileip 161105154557Mobileip 161105154557
Mobileip 161105154557
 
Managed IP solution
Managed IP solutionManaged IP solution
Managed IP solution
 

More from Syed Muhammad ALi Shah (20)

Chapter # 7
Chapter # 7Chapter # 7
Chapter # 7
 
Chapter # 9
Chapter # 9Chapter # 9
Chapter # 9
 
Chapter # 6
Chapter # 6Chapter # 6
Chapter # 6
 
Chapter # 5
Chapter # 5Chapter # 5
Chapter # 5
 
Chapter # 8
Chapter # 8Chapter # 8
Chapter # 8
 
Chapter # 4
Chapter # 4Chapter # 4
Chapter # 4
 
Chapter # 10
Chapter # 10Chapter # 10
Chapter # 10
 
Chapter # 3
Chapter # 3Chapter # 3
Chapter # 3
 
Chapter # 2
Chapter # 2Chapter # 2
Chapter # 2
 
Chapter # 1
Chapter # 1Chapter # 1
Chapter # 1
 
Chapter#18
Chapter#18Chapter#18
Chapter#18
 
Chapter#17
Chapter#17Chapter#17
Chapter#17
 
Chapter#16
Chapter#16Chapter#16
Chapter#16
 
Chapter#15
Chapter#15Chapter#15
Chapter#15
 
Chapter#14
Chapter#14Chapter#14
Chapter#14
 
Chapter#13
Chapter#13Chapter#13
Chapter#13
 
Chapter#9
Chapter#9Chapter#9
Chapter#9
 
Chapter#14
Chapter#14Chapter#14
Chapter#14
 
Chapter#13
Chapter#13Chapter#13
Chapter#13
 
Chapter#11
Chapter#11Chapter#11
Chapter#11
 

Recently uploaded

HARMONY IN THE HUMAN BEING - Unit-II UHV-2
HARMONY IN THE HUMAN BEING - Unit-II UHV-2HARMONY IN THE HUMAN BEING - Unit-II UHV-2
HARMONY IN THE HUMAN BEING - Unit-II UHV-2RajaP95
 
main PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfidmain PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfidNikhilNagaraju
 
Current Transformer Drawing and GTP for MSETCL
Current Transformer Drawing and GTP for MSETCLCurrent Transformer Drawing and GTP for MSETCL
Current Transformer Drawing and GTP for MSETCLDeelipZope
 
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130Suhani Kapoor
 
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort serviceGurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort servicejennyeacort
 
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSAPPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSKurinjimalarL3
 
Oxy acetylene welding presentation note.
Oxy acetylene welding presentation note.Oxy acetylene welding presentation note.
Oxy acetylene welding presentation note.eptoze12
 
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Dr.Costas Sachpazis
 
Call Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile serviceCall Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile servicerehmti665
 
Introduction to Microprocesso programming and interfacing.pptx
Introduction to Microprocesso programming and interfacing.pptxIntroduction to Microprocesso programming and interfacing.pptx
Introduction to Microprocesso programming and interfacing.pptxvipinkmenon1
 
Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...VICTOR MAESTRE RAMIREZ
 
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVHARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVRajaP95
 
IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024Mark Billinghurst
 
Sachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective IntroductionSachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective IntroductionDr.Costas Sachpazis
 
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdfCCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdfAsst.prof M.Gokilavani
 

Recently uploaded (20)

HARMONY IN THE HUMAN BEING - Unit-II UHV-2
HARMONY IN THE HUMAN BEING - Unit-II UHV-2HARMONY IN THE HUMAN BEING - Unit-II UHV-2
HARMONY IN THE HUMAN BEING - Unit-II UHV-2
 
main PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfidmain PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfid
 
Current Transformer Drawing and GTP for MSETCL
Current Transformer Drawing and GTP for MSETCLCurrent Transformer Drawing and GTP for MSETCL
Current Transformer Drawing and GTP for MSETCL
 
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
 
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
 
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
 
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort serviceGurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
 
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSAPPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
 
Oxy acetylene welding presentation note.
Oxy acetylene welding presentation note.Oxy acetylene welding presentation note.
Oxy acetylene welding presentation note.
 
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
 
Call Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile serviceCall Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile service
 
Introduction to Microprocesso programming and interfacing.pptx
Introduction to Microprocesso programming and interfacing.pptxIntroduction to Microprocesso programming and interfacing.pptx
Introduction to Microprocesso programming and interfacing.pptx
 
🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...
🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...
🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...
 
Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...
 
young call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Service
young call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Serviceyoung call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Service
young call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Service
 
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCRCall Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
 
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVHARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
 
IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024
 
Sachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective IntroductionSachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
 
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdfCCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
 

Chapter#12

  • 1. Mobile IP and Wireless Application Protocol Chapter 12
  • 2. Mobile IP Uses  Enable computers to maintain Internet connectivity while moving from one Internet attachment point to another  Mobile – user's point of attachment changes dynamically and all connections are automatically maintained despite the change  Nomadic - user's Internet connection is terminated each time the user moves and a new connection is initiated when the user dials back in  New, temporary IP address is assigned
  • 3. Operation of Mobile IP  Mobil node is assigned to a particular network – home network  IP address on home network is static – home address  Mobile node can move to another network – foreign network  Mobile node registers with network node on foreign network – foreign agent  Mobile node gives care-of address to agent on home network – home agent
  • 4. Capabilities of Mobile IP  Discovery – mobile node uses discovery procedure to identify prospective home and foreign agents  Registration – mobile node uses an authenticated registration procedure to inform home agent of its care-of address  Tunneling – used to forward IP datagrams from a home address to a care-of address
  • 5. Discovery  Mobile node is responsible for ongoing discovery process  Must determine if it is attached to its home network or a foreign network  Transition from home network to foreign network can occur at any time without notification to the network layer  Mobile node listens for agent advertisement messages  Compares network portion of the router's IP address with the network portion of home address
  • 6. Agent Solicitation  Foreign agents are expected to issue agent advertisement messages periodically  If a mobile node needs agent information immediately, it can issue ICMP router solicitation message  Any agent receiving this message will then issue an agent advertisement
  • 7. Move Detection  Mobile node may move from one network to another due to some handoff mechanism without IP level being aware  Agent discovery process is intended to enable the agent to detect such a move  Algorithms to detect move:  Use of lifetime field – mobile node uses lifetime field as a timer for agent advertisements  Use of network prefix – mobile node checks if any newly received agent advertisement messages are on the same network as the node's current care-of address
  • 8. Co-Located Addresses  If mobile node moves to a network that has no foreign agents, or all foreign agents are busy, it can act as its own foreign agent  Mobile agent uses co-located care-of address  IP address obtained by mobile node associated with mobile node's current network interface  Means to acquire co-located address:  Temporary IP address through an Internet service, such as DHCP  May be owned by the mobile node as a long-term address for use while visiting a given foreign network
  • 9. Registration Process  Mobile node sends registration request to foreign agent requesting forwarding service  Foreign agent relays request to home agent  Home agent accepts or denies request and sends registration reply to foreign agent  Foreign agent relays reply to mobile node
  • 10. Registration Operation Messages  Registration request message  Fields = type, S, B, D, M, V, G, lifetime, home address, home agent, care-of-address, identification, extensions  Registration reply message  Fields = type, code, lifetime, home address, home agent, identification, extensions
  • 11. Registration Procedure Security  Mobile IP designed to resist attacks  Node pretending to be a foreign agent sends registration request to a home agent to divert mobile node traffic to itself  Agent replays old registration messages to cut mobile node from network  For message authentication, registration request and reply contain authentication extension  Fields = type, length, security parameter index (SPI), authenticator
  • 12. Types of Authentication Extensions  Mobile-home – provides for authentication of registration messages between mobile node and home agent; must be present  Mobile-foreign – may be present when a security association exists between mobile node and foreign agent  Foreign-home – may be present when a security association exists between foreign agent and home agent
  • 13. Tunneling  Home agent intercepts IP datagrams sent to mobile node's home address  Home agent informs other nodes on home network that datagrams to mobile node should be delivered to home agent  Datagrams forwarded to care-of address via tunneling  Datagram encapsulated in outer IP datagram
  • 14. Mobile IP Encapsulation Options  IP-within-IP – entire IP datagram becomes payload in new IP datagram  Original, inner IP header unchanged except TTL decremented by 1  Outer header is a full IP header  Minimal encapsulation – new header is inserted between original IP header and original IP payload  Original IP header modified to form new outer IP header  Generic routing encapsulation (GRE) – developed prior to development of Mobile IP
  • 15. Wireless Application Protocol (WAP)  Open standard providing mobile users of wireless terminals access to telephony and information services  Wireless terminals include wireless phones, pagers and personal digital assistants (PDAs)  Designed to work with all wireless network technologies such as GSM, CDMA, and TDMA  Based on existing Internet standards such as IP, XML, HTML, and HTTP  Includes security facilities
  • 18. Wireless Markup Language (WML) Features  Text and image support – formatting and layout commands  Deck/card organizational metaphor – WML documents subdivided into cards, which specify one or more units of interaction  Support for navigation among cards and decks – includes provisions for event handling; used for navigation or executing scripts
  • 19. WMLScript  Scripting language for defining script-type programs in a user device with limited processing power and memory  WMLScript capabilities:  Check validity of user input before it’s sent  Access device facilities and peripherals  Interact with user without introducing round trips to origin server
  • 20. WMLScript  WMLScript features:  JavaScript-based scripting language  Procedural logic  Event-based  Compiled implementation  Integrated into WAE
  • 21. Wireless Application Environment (WAE) WAE specifies an application framework for wireless devices  WAE elements:  WAE User agents – software that executes in the wireless device  Content generators – applications that produce standard content formats in response to requests from user agents in the mobile terminal  Standard content encoding – defined to allow a WAE user agent to navigate Web content  Wireless telephony applications (WTA) – collection of telephony-specific extensions for call and feature control mechanisms
  • 23. Wireless Session Protocol (WSP)  Transaction-oriented protocol based on the concept of a request and a reply  Provides applications with interface for two session services:  Connection-oriented session service – operates above reliable transport protocol WTP  Connectionless session service – operates above unreliable transport protocol WDP
  • 24. Connection-mode WSP Services  Establish reliable session from client to server and release  Agree on common level of protocol functionality using capability negotiation  Exchange content between client and server using compact encoding  Suspend and resume a session  Push content from server to client in an unsynchronized manner
  • 25. WSP Transaction Types  Session establishment – client WSP user requests session with server WSP user  Session termination – client WSP user initiates termination  Session suspend and resume – initiated with suspend and resume requests  Transaction – exchange of data between a client and server  Nonconfirmed data push – used to send unsolicited information from server to client  Confirmed data push – server receives delivery confirmation from client
  • 26. Wireless Transaction Protocol (WTP)  Lightweight protocol suitable for "thin" clients and over low-bandwidth wireless links  WTP features  Three classes of transaction service  Optional user-to-user reliability: WTP user triggers confirmation of each received message  Optional out-of-band data on acknowledgments  PDU concatenation and delayed
  • 27. WTP Transaction Classes  Class 0: Unreliable invoke message with no result message  Class 1: Reliable invoke message with no result message  Class 2: Unreliable invoke message with one reliable result message
  • 28. WTP PDU Types  Invoke PDU – used to convey a request from an initiator to a responder  ACK PDU – used to acknowledge an Invoke or Result PDU  Result PDU – used to convey response of the server to the client  Abort PDU – used to abort a transaction  Segmented invoke PDU and segmented result PDU – used for segmentation and reassembly  Negative acknowledgment PDU – used to indicate that some packets did not arrive
  • 29. Examples of WTP Operation
  • 30. Wireless Transport Layer Security (WTLS) Features  Data integrity – ensures that data sent between client and gateway are not modified, using message authentication  Privacy – ensures that the data cannot be read by a third party, using encryption  Authentication – establishes authentication of the two parties, using digital certificates  Denial-of-service protection – detects and rejects messages that are replayed or not successfully verified
  • 31. WTLS Protocol Stack  WTLS consists of two layers of protocols  WTLS Record Protocol – provides basic security services to various higher-layer protocols  Higher-layer protocols:  The Handshake Protocol  The Change Cipher Spec Protocol  The Alert Protocol
  • 34. Phases of the Handshake Protocol Exchange  First phase – used to initiate a logical connection and establish security capabilities  Second phase – used for server authentication and key exchange  Third phase – used for client authentication and key exchange  Forth phase – completes the setting up of a secure connection
  • 35. Wireless Datagram Protocol (WDP)  Used to adapt higher-layer WAP protocol to the communication mechanism used between mobile node and WAP gateway  WDP hides details of the various bearer networks from the other layers of WAP  Adaptation may include:  Partitioning data into segments of appropriate size for the bearer  Interfacing with the bearer network
  • 36. Wireless Control Message Protocol (WCMP)  Performs the same support function for WDP as ICMP does for IP  Used in environments that don’t provide IP bearer and don’t lend themselves to the use of ICMP  Used by wireless nodes and WAP gateways to report errors encountered in processing WDP datagrams  Can also be used for informational and diagnostic purposes