SlideShare a Scribd company logo
IP PACKET DELIVERY
SOURABH KUMAR
(ECE)
1
MOBILE IP TERMINOLOGY
 MOBILE NODE (MN): A mobile node is an end-system or router that can change its point of
attachment to the internet using mobile IP.
 The MN keeps its IP address and can continuously communicate with any other system in the
internet as long as link-layer connectivity is given.
 Correspondent Node (CN): communication partner
 Home Network: The home network is the subnet the MN belongs to with respect to its IP address.
No mobile IP support is needed within the home network.
2
MOBILE IP TERMINOLOGY
 Home Agent (HA): router in the home network of the MN, which registers the location of the MN,
tunnels IP datagrams to the COA when MN is away from home.
 Foreign Network: The foreign network is the current subnet the MN visits and which is not the home
network
 Foreign Agent (FA): router in the current visited network of the MN, which forwards the tunneled
datagrams to the MN, also acts as the default router for the registered MN.
 FA can also provide security services because they belong to the foreign network as opposed to the MN
which is only visiting.
3
MOBILE IP TERMINOLOGY
 Care Of Address (COA): The COA defines the current location of the MN from an IP point of view.
 Foreign Agent COA: The COA could be located at the FA, i.e., the COA is an IP address of the FA.
 The FA is the tunnel end-point and forwards packets to the MN.
 Many MN using the FA can share this COA as common COA.
 Co-LOCated COA: The COA is co-lOCated if the MN temporarily acquires an additional IP address
which acts as COA. CO-LOCATED ADDRESSES CAN BE ACQUIRED USING SERVICES LIKE DHCP
(DYNAMIC HOST CONFIGURATION PROTOCOL)
4
IP PACKET DELIVERY 5
IP PACKET DELIVERY(STEP1)
 One of the requirements of mobile IP was to support hiding the mobility of the MN. CN does not need to
know anything about the MN’s current location and sends the packet as usual to the IP address of MN. This
means that CN sends an IP packet with MN as a destination address and CN as a source address. The
internet, not having information on the current location of MN, routes the packet to the router responsible
for the home network of MN. This is done using the standard routing mechanisms of the internet.
6
IP PACKET DELIVERY(STEP2)
 The HA now intercepts the packet, knowing that MN is currently not in its home network. The packet is not
forwarded into the subnet as usual, but encapsulated and tunneled to the COA. A new header is put in front
of the old IP header showing the COA as new destination and HA as source of the encapsulated packet
7
IP PACKET DELIVERY(STEP3)
 The foreign agent now decapsulates packet, i.e., removes the additional header, and forwards the original
packet with CN as source and MN as destination to the MN. Again, for the MN mobility is not visible. It
receives the packet with the same sender and receiver address as it would have done in the home network.
8
IP PACKET DELIVERY(STEP4)
 The IP datagram from MN to CN travels directly across the network, using CN’s IP address as the
destination address AND MN’S ADDDRESS(FIXED IP ADDRESS) AS SOURCE ADDRESS AS
USUALLY IT DOES.
9
AGENT ADVERTISEMENT
 One initial problem of an MN after moving is how to find a foreign agent. How does the MN discover
that it has moved? For this purpose mobile IP describes two methods: agent advertisement and agent
solicitation.
 THERE ARE THREE MAIN STEPS TO DISCOVER AND REGISTER:
 Discovery - A mobile node uses a discovery procedure to identify prospective home agents and foreign
agents.
 Registration - A mobile node uses a registration procedure to inform its home agent of its care-of
address.
 Tunneling - Tunneling procedure is used to forward IP datagrams from a home address to a care of
address.
10
AGENT ADVERTISEMENT
 foreign agents and home agents advertise their presence periodically using special agent advertisement
messages.
 An agent advertisement message has one or more care-of-addresses and a flag indicating whether it is a
home agent or foreign agent.
 For these advertisements Internet control message protocol (ICMP) messages are used with some mobility
extensions.
 The agent advertisement packet with the extension for mobility is shown IN NEXT SLIDE. The upper part
represents the ICMP packet while the lower part is the extension needed for mobility.
11
AGENT ADVERTISEMENT 12
Mobile-IP extension
 Type = 16
 Length = number of COA provided with the message. It is equal to 6+4*(no. of addresses)
 Registration lifetime = maximum lifetime specified by the agent in seconds which the node can request
during registration.
 Sequence No. = total no. of advertisements sent during initialization.
 The flags after registration lifetime explain the features of advertisement. They are described as:
 R-bit: registration with this agent is required even when the mobile node uses a collocated COA.
13
Mobile-IP extension
 B-bit: The Foreign agent is busy to take any registrations
 H-bit: Agentis home agent
 F-bit: Agent is foreign agent
 M-bit: Minimal encapsulation is used for encapsulation
 G-bit: Generic routing encapsulation is used
 r-bit: was initially set to V in first version of mobile IP (RFC 2002) suggested use of header compression
and should be ignored.
 T-bit: reverse tunneling.
 The foreign agent should advertise at least one CoA.
14
Agent advertisement
 Allows for the detection of mobility agents
 Lists one or more available care-of addresses
 Informs the mobile node about special features
 Mobile node selects its care-of address
 Mobile node checks whether the agent is a home agent or foreign agent
 Once the care-of-address is achieved the mobile node registers it with its Home agent and informs
about the current location where the packets intended for it can be forwarded.
15
Registering the care-of-address
 If the mobile node travels to a foreign network, it registers with the foreign agent by sending a registration
request message which includes the permanent IP address of the mobile host and the IP address of its home
agent.
 The foreign agent in turn performs the registration process on behalf of the mobile host by sending a
registration request containing the permanent IP address of the mobile node and the IP address of the
foreign agent to the home agent.
 When the home agent receives the Registration Request, it updates the mobility binding by associating the
care-of-address of the mobile node with its home address.
16
Registering the care-of-address
 The home agent then sends an acknowledgement to the foreign agent.
 The foreign agent in turn updates its visitors list by inserting the entry for the mobile node and relays the
reply to the mobile node
17
Registering the care-of-address 18
THANK YOU
19

More Related Content

What's hot

Lecture 15
Lecture 15Lecture 15
Lecture 15
Joe Christensen
 
Alternative metrics
Alternative metricsAlternative metrics
Alternative metrics
Parthipan Parthi
 
Mobile IP
Mobile IPMobile IP
Mobile IP
Mukesh Chinta
 
Agent discovery& registration
Agent discovery& registrationAgent discovery& registration
Agent discovery& registration
rajisri2
 
Mobile IP
Mobile IPMobile IP
Mobile IP
Nijo Job
 
Network software
Network softwareNetwork software
Network software
SakthiVinoth78
 
TELECOMMUNICATIONS SYSTEMS
TELECOMMUNICATIONS SYSTEMSTELECOMMUNICATIONS SYSTEMS
TELECOMMUNICATIONS SYSTEMS
junnubabu
 
HDLC
HDLCHDLC
Computer networks - Channelization
Computer networks - ChannelizationComputer networks - Channelization
Computer networks - Channelization
Elambaruthi Elambaruthi
 
Multiple Access in wireless communication
Multiple Access in wireless communicationMultiple Access in wireless communication
Multiple Access in wireless communication
Maulik Togadiya
 
Zone Routing Protocol
Zone Routing ProtocolZone Routing Protocol
Zone Routing Protocol
nitss007
 
Controlled Access Protocols
Controlled Access ProtocolsControlled Access Protocols
Controlled Access Protocols
Pruthviraj Konu
 
Gsm call routing
Gsm call routingGsm call routing
Gsm call routing
Ramakrishna Pulikonda
 
Multicast routing
Multicast routingMulticast routing
Multicast routing
Gunasekara Reddy
 
Mobile Computing UNIT-I TO III
Mobile Computing UNIT-I TO IIIMobile Computing UNIT-I TO III
Mobile Computing UNIT-I TO III
Ramesh Babu
 
Wireless Local Loop
Wireless Local LoopWireless Local Loop
Mobile Transport layer
Mobile Transport layerMobile Transport layer
Mobile Transport layer
Pallepati Vasavi
 
Mobile computing (Wireless) Medium Access Control (MAC)
Mobile computing (Wireless) Medium Access Control (MAC)Mobile computing (Wireless) Medium Access Control (MAC)
Mobile computing (Wireless) Medium Access Control (MAC)
Jyothishmathi Institute of Technology and Science Karimnagar
 

What's hot (20)

Lecture 15
Lecture 15Lecture 15
Lecture 15
 
Alternative metrics
Alternative metricsAlternative metrics
Alternative metrics
 
Imt 2000
Imt 2000Imt 2000
Imt 2000
 
Mobile IP
Mobile IPMobile IP
Mobile IP
 
Agent discovery& registration
Agent discovery& registrationAgent discovery& registration
Agent discovery& registration
 
Mobile IP
Mobile IPMobile IP
Mobile IP
 
Network software
Network softwareNetwork software
Network software
 
TELECOMMUNICATIONS SYSTEMS
TELECOMMUNICATIONS SYSTEMSTELECOMMUNICATIONS SYSTEMS
TELECOMMUNICATIONS SYSTEMS
 
HDLC
HDLCHDLC
HDLC
 
Computer networks - Channelization
Computer networks - ChannelizationComputer networks - Channelization
Computer networks - Channelization
 
Multiple Access in wireless communication
Multiple Access in wireless communicationMultiple Access in wireless communication
Multiple Access in wireless communication
 
Zone Routing Protocol
Zone Routing ProtocolZone Routing Protocol
Zone Routing Protocol
 
Controlled Access Protocols
Controlled Access ProtocolsControlled Access Protocols
Controlled Access Protocols
 
Gsm call routing
Gsm call routingGsm call routing
Gsm call routing
 
Arp and rarp
Arp and rarpArp and rarp
Arp and rarp
 
Multicast routing
Multicast routingMulticast routing
Multicast routing
 
Mobile Computing UNIT-I TO III
Mobile Computing UNIT-I TO IIIMobile Computing UNIT-I TO III
Mobile Computing UNIT-I TO III
 
Wireless Local Loop
Wireless Local LoopWireless Local Loop
Wireless Local Loop
 
Mobile Transport layer
Mobile Transport layerMobile Transport layer
Mobile Transport layer
 
Mobile computing (Wireless) Medium Access Control (MAC)
Mobile computing (Wireless) Medium Access Control (MAC)Mobile computing (Wireless) Medium Access Control (MAC)
Mobile computing (Wireless) Medium Access Control (MAC)
 

Similar to Ip packet delivery

Mobile internet protocol
Mobile internet protocolMobile internet protocol
Mobile internet protocol
SaranyaK68
 
IT8602 - Mobile Communication Unit IV
IT8602 - Mobile Communication   Unit IV IT8602 - Mobile Communication   Unit IV
IT8602 - Mobile Communication Unit IV
pkaviya
 
Mobile IP
Mobile IPMobile IP
Mobile IP
shankul07
 
Mobile IP
Mobile IP Mobile IP
Mobile IP
Er. Rahul Jain
 
Unit 2
Unit 2Unit 2
Unit 2
RadhikaM42
 
Mobility And Mobile I Pv4
Mobility And Mobile I Pv4Mobility And Mobile I Pv4
Mobility And Mobile I Pv4
Ram Dutt Shukla
 
Unit 3
Unit 3Unit 3
It2402 mobile communication unit 4
It2402 mobile communication unit 4It2402 mobile communication unit 4
It2402 mobile communication unit 4
RMK ENGINEERING COLLEGE, CHENNAI
 
mobile ip, Mobile COmmunication Internet Protocol
mobile ip, Mobile COmmunication Internet Protocolmobile ip, Mobile COmmunication Internet Protocol
mobile ip, Mobile COmmunication Internet Protocol
Gaurav Dwivedi
 
Mobile computing - SARASWATHI RAMALINGAM
Mobile computing - SARASWATHI RAMALINGAMMobile computing - SARASWATHI RAMALINGAM
Mobile computing - SARASWATHI RAMALINGAM
SaraswathiRamalingam
 
Unit 4 MC QA.pdf
Unit 4 MC  QA.pdfUnit 4 MC  QA.pdf
Unit 4 MC QA.pdf
CSEHOD11
 
Performance of Various Mobile IP Protocols and Security Considerations
Performance of Various Mobile IP Protocols and Security ConsiderationsPerformance of Various Mobile IP Protocols and Security Considerations
Performance of Various Mobile IP Protocols and Security Considerations
CSCJournals
 
IT6601 MOBILE COMPUTING
IT6601 MOBILE COMPUTINGIT6601 MOBILE COMPUTING
IT6601 MOBILE COMPUTING
Kathirvel Ayyaswamy
 
Mobile computing Mobile Transport Layer
Mobile computing Mobile Transport LayerMobile computing Mobile Transport Layer
Mobile computing Mobile Transport Layer
Jyothishmathi Institute of Technology and Science Karimnagar
 

Similar to Ip packet delivery (20)

Mobile ip group_3
Mobile ip group_3Mobile ip group_3
Mobile ip group_3
 
Mobile internet protocol
Mobile internet protocolMobile internet protocol
Mobile internet protocol
 
IT8602 - Mobile Communication Unit IV
IT8602 - Mobile Communication   Unit IV IT8602 - Mobile Communication   Unit IV
IT8602 - Mobile Communication Unit IV
 
Mobileip 161105154557
Mobileip 161105154557Mobileip 161105154557
Mobileip 161105154557
 
Mobileip 161105154557
Mobileip 161105154557Mobileip 161105154557
Mobileip 161105154557
 
Mobile IP
Mobile IPMobile IP
Mobile IP
 
Mobile IP
Mobile IP Mobile IP
Mobile IP
 
Unit 2
Unit 2Unit 2
Unit 2
 
Report
ReportReport
Report
 
Mobility And Mobile I Pv4
Mobility And Mobile I Pv4Mobility And Mobile I Pv4
Mobility And Mobile I Pv4
 
Unit 3
Unit 3Unit 3
Unit 3
 
Mobile network layer (mobile comm.)
Mobile network layer (mobile comm.)Mobile network layer (mobile comm.)
Mobile network layer (mobile comm.)
 
Mobile computing Unit III MANET Notes
Mobile computing Unit III MANET NotesMobile computing Unit III MANET Notes
Mobile computing Unit III MANET Notes
 
It2402 mobile communication unit 4
It2402 mobile communication unit 4It2402 mobile communication unit 4
It2402 mobile communication unit 4
 
mobile ip, Mobile COmmunication Internet Protocol
mobile ip, Mobile COmmunication Internet Protocolmobile ip, Mobile COmmunication Internet Protocol
mobile ip, Mobile COmmunication Internet Protocol
 
Mobile computing - SARASWATHI RAMALINGAM
Mobile computing - SARASWATHI RAMALINGAMMobile computing - SARASWATHI RAMALINGAM
Mobile computing - SARASWATHI RAMALINGAM
 
Unit 4 MC QA.pdf
Unit 4 MC  QA.pdfUnit 4 MC  QA.pdf
Unit 4 MC QA.pdf
 
Performance of Various Mobile IP Protocols and Security Considerations
Performance of Various Mobile IP Protocols and Security ConsiderationsPerformance of Various Mobile IP Protocols and Security Considerations
Performance of Various Mobile IP Protocols and Security Considerations
 
IT6601 MOBILE COMPUTING
IT6601 MOBILE COMPUTINGIT6601 MOBILE COMPUTING
IT6601 MOBILE COMPUTING
 
Mobile computing Mobile Transport Layer
Mobile computing Mobile Transport LayerMobile computing Mobile Transport Layer
Mobile computing Mobile Transport Layer
 

More from SOURABH KUMAR

Instruction scheduling
Instruction schedulingInstruction scheduling
Instruction scheduling
SOURABH KUMAR
 
How to give feedback
How to give feedbackHow to give feedback
How to give feedback
SOURABH KUMAR
 
What to do in interview
What to do in interviewWhat to do in interview
What to do in interview
SOURABH KUMAR
 
Common questions for Interview
Common questions for InterviewCommon questions for Interview
Common questions for Interview
SOURABH KUMAR
 
Job design
Job designJob design
Job design
SOURABH KUMAR
 
Job Analysis
Job AnalysisJob Analysis
Job Analysis
SOURABH KUMAR
 
Human resources management and planning
Human resources management and planningHuman resources management and planning
Human resources management and planning
SOURABH KUMAR
 
Rf module
Rf moduleRf module
Rf module
SOURABH KUMAR
 

More from SOURABH KUMAR (8)

Instruction scheduling
Instruction schedulingInstruction scheduling
Instruction scheduling
 
How to give feedback
How to give feedbackHow to give feedback
How to give feedback
 
What to do in interview
What to do in interviewWhat to do in interview
What to do in interview
 
Common questions for Interview
Common questions for InterviewCommon questions for Interview
Common questions for Interview
 
Job design
Job designJob design
Job design
 
Job Analysis
Job AnalysisJob Analysis
Job Analysis
 
Human resources management and planning
Human resources management and planningHuman resources management and planning
Human resources management and planning
 
Rf module
Rf moduleRf module
Rf module
 

Recently uploaded

Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...
Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...
Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...
AJAYKUMARPUND1
 
ethical hacking-mobile hacking methods.ppt
ethical hacking-mobile hacking methods.pptethical hacking-mobile hacking methods.ppt
ethical hacking-mobile hacking methods.ppt
Jayaprasanna4
 
WATER CRISIS and its solutions-pptx 1234
WATER CRISIS and its solutions-pptx 1234WATER CRISIS and its solutions-pptx 1234
WATER CRISIS and its solutions-pptx 1234
AafreenAbuthahir2
 
road safety engineering r s e unit 3.pdf
road safety engineering  r s e unit 3.pdfroad safety engineering  r s e unit 3.pdf
road safety engineering r s e unit 3.pdf
VENKATESHvenky89705
 
一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理
一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理
一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理
bakpo1
 
ethical hacking in wireless-hacking1.ppt
ethical hacking in wireless-hacking1.pptethical hacking in wireless-hacking1.ppt
ethical hacking in wireless-hacking1.ppt
Jayaprasanna4
 
ML for identifying fraud using open blockchain data.pptx
ML for identifying fraud using open blockchain data.pptxML for identifying fraud using open blockchain data.pptx
ML for identifying fraud using open blockchain data.pptx
Vijay Dialani, PhD
 
Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)
Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)
Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)
MdTanvirMahtab2
 
Nuclear Power Economics and Structuring 2024
Nuclear Power Economics and Structuring 2024Nuclear Power Economics and Structuring 2024
Nuclear Power Economics and Structuring 2024
Massimo Talia
 
ASME IX(9) 2007 Full Version .pdf
ASME IX(9)  2007 Full Version       .pdfASME IX(9)  2007 Full Version       .pdf
ASME IX(9) 2007 Full Version .pdf
AhmedHussein950959
 
一比一原版(UofT毕业证)多伦多大学毕业证成绩单如何办理
一比一原版(UofT毕业证)多伦多大学毕业证成绩单如何办理一比一原版(UofT毕业证)多伦多大学毕业证成绩单如何办理
一比一原版(UofT毕业证)多伦多大学毕业证成绩单如何办理
ydteq
 
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdf
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdfHybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdf
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdf
fxintegritypublishin
 
Standard Reomte Control Interface - Neometrix
Standard Reomte Control Interface - NeometrixStandard Reomte Control Interface - Neometrix
Standard Reomte Control Interface - Neometrix
Neometrix_Engineering_Pvt_Ltd
 
Final project report on grocery store management system..pdf
Final project report on grocery store management system..pdfFinal project report on grocery store management system..pdf
Final project report on grocery store management system..pdf
Kamal Acharya
 
block diagram and signal flow graph representation
block diagram and signal flow graph representationblock diagram and signal flow graph representation
block diagram and signal flow graph representation
Divya Somashekar
 
Design and Analysis of Algorithms-DP,Backtracking,Graphs,B&B
Design and Analysis of Algorithms-DP,Backtracking,Graphs,B&BDesign and Analysis of Algorithms-DP,Backtracking,Graphs,B&B
Design and Analysis of Algorithms-DP,Backtracking,Graphs,B&B
Sreedhar Chowdam
 
H.Seo, ICLR 2024, MLILAB, KAIST AI.pdf
H.Seo,  ICLR 2024, MLILAB,  KAIST AI.pdfH.Seo,  ICLR 2024, MLILAB,  KAIST AI.pdf
H.Seo, ICLR 2024, MLILAB, KAIST AI.pdf
MLILAB
 
J.Yang, ICLR 2024, MLILAB, KAIST AI.pdf
J.Yang,  ICLR 2024, MLILAB, KAIST AI.pdfJ.Yang,  ICLR 2024, MLILAB, KAIST AI.pdf
J.Yang, ICLR 2024, MLILAB, KAIST AI.pdf
MLILAB
 
RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...
RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...
RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...
thanhdowork
 
Gen AI Study Jams _ For the GDSC Leads in India.pdf
Gen AI Study Jams _ For the GDSC Leads in India.pdfGen AI Study Jams _ For the GDSC Leads in India.pdf
Gen AI Study Jams _ For the GDSC Leads in India.pdf
gdsczhcet
 

Recently uploaded (20)

Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...
Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...
Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...
 
ethical hacking-mobile hacking methods.ppt
ethical hacking-mobile hacking methods.pptethical hacking-mobile hacking methods.ppt
ethical hacking-mobile hacking methods.ppt
 
WATER CRISIS and its solutions-pptx 1234
WATER CRISIS and its solutions-pptx 1234WATER CRISIS and its solutions-pptx 1234
WATER CRISIS and its solutions-pptx 1234
 
road safety engineering r s e unit 3.pdf
road safety engineering  r s e unit 3.pdfroad safety engineering  r s e unit 3.pdf
road safety engineering r s e unit 3.pdf
 
一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理
一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理
一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理
 
ethical hacking in wireless-hacking1.ppt
ethical hacking in wireless-hacking1.pptethical hacking in wireless-hacking1.ppt
ethical hacking in wireless-hacking1.ppt
 
ML for identifying fraud using open blockchain data.pptx
ML for identifying fraud using open blockchain data.pptxML for identifying fraud using open blockchain data.pptx
ML for identifying fraud using open blockchain data.pptx
 
Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)
Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)
Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)
 
Nuclear Power Economics and Structuring 2024
Nuclear Power Economics and Structuring 2024Nuclear Power Economics and Structuring 2024
Nuclear Power Economics and Structuring 2024
 
ASME IX(9) 2007 Full Version .pdf
ASME IX(9)  2007 Full Version       .pdfASME IX(9)  2007 Full Version       .pdf
ASME IX(9) 2007 Full Version .pdf
 
一比一原版(UofT毕业证)多伦多大学毕业证成绩单如何办理
一比一原版(UofT毕业证)多伦多大学毕业证成绩单如何办理一比一原版(UofT毕业证)多伦多大学毕业证成绩单如何办理
一比一原版(UofT毕业证)多伦多大学毕业证成绩单如何办理
 
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdf
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdfHybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdf
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdf
 
Standard Reomte Control Interface - Neometrix
Standard Reomte Control Interface - NeometrixStandard Reomte Control Interface - Neometrix
Standard Reomte Control Interface - Neometrix
 
Final project report on grocery store management system..pdf
Final project report on grocery store management system..pdfFinal project report on grocery store management system..pdf
Final project report on grocery store management system..pdf
 
block diagram and signal flow graph representation
block diagram and signal flow graph representationblock diagram and signal flow graph representation
block diagram and signal flow graph representation
 
Design and Analysis of Algorithms-DP,Backtracking,Graphs,B&B
Design and Analysis of Algorithms-DP,Backtracking,Graphs,B&BDesign and Analysis of Algorithms-DP,Backtracking,Graphs,B&B
Design and Analysis of Algorithms-DP,Backtracking,Graphs,B&B
 
H.Seo, ICLR 2024, MLILAB, KAIST AI.pdf
H.Seo,  ICLR 2024, MLILAB,  KAIST AI.pdfH.Seo,  ICLR 2024, MLILAB,  KAIST AI.pdf
H.Seo, ICLR 2024, MLILAB, KAIST AI.pdf
 
J.Yang, ICLR 2024, MLILAB, KAIST AI.pdf
J.Yang,  ICLR 2024, MLILAB, KAIST AI.pdfJ.Yang,  ICLR 2024, MLILAB, KAIST AI.pdf
J.Yang, ICLR 2024, MLILAB, KAIST AI.pdf
 
RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...
RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...
RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...
 
Gen AI Study Jams _ For the GDSC Leads in India.pdf
Gen AI Study Jams _ For the GDSC Leads in India.pdfGen AI Study Jams _ For the GDSC Leads in India.pdf
Gen AI Study Jams _ For the GDSC Leads in India.pdf
 

Ip packet delivery

  • 2. MOBILE IP TERMINOLOGY  MOBILE NODE (MN): A mobile node is an end-system or router that can change its point of attachment to the internet using mobile IP.  The MN keeps its IP address and can continuously communicate with any other system in the internet as long as link-layer connectivity is given.  Correspondent Node (CN): communication partner  Home Network: The home network is the subnet the MN belongs to with respect to its IP address. No mobile IP support is needed within the home network. 2
  • 3. MOBILE IP TERMINOLOGY  Home Agent (HA): router in the home network of the MN, which registers the location of the MN, tunnels IP datagrams to the COA when MN is away from home.  Foreign Network: The foreign network is the current subnet the MN visits and which is not the home network  Foreign Agent (FA): router in the current visited network of the MN, which forwards the tunneled datagrams to the MN, also acts as the default router for the registered MN.  FA can also provide security services because they belong to the foreign network as opposed to the MN which is only visiting. 3
  • 4. MOBILE IP TERMINOLOGY  Care Of Address (COA): The COA defines the current location of the MN from an IP point of view.  Foreign Agent COA: The COA could be located at the FA, i.e., the COA is an IP address of the FA.  The FA is the tunnel end-point and forwards packets to the MN.  Many MN using the FA can share this COA as common COA.  Co-LOCated COA: The COA is co-lOCated if the MN temporarily acquires an additional IP address which acts as COA. CO-LOCATED ADDRESSES CAN BE ACQUIRED USING SERVICES LIKE DHCP (DYNAMIC HOST CONFIGURATION PROTOCOL) 4
  • 6. IP PACKET DELIVERY(STEP1)  One of the requirements of mobile IP was to support hiding the mobility of the MN. CN does not need to know anything about the MN’s current location and sends the packet as usual to the IP address of MN. This means that CN sends an IP packet with MN as a destination address and CN as a source address. The internet, not having information on the current location of MN, routes the packet to the router responsible for the home network of MN. This is done using the standard routing mechanisms of the internet. 6
  • 7. IP PACKET DELIVERY(STEP2)  The HA now intercepts the packet, knowing that MN is currently not in its home network. The packet is not forwarded into the subnet as usual, but encapsulated and tunneled to the COA. A new header is put in front of the old IP header showing the COA as new destination and HA as source of the encapsulated packet 7
  • 8. IP PACKET DELIVERY(STEP3)  The foreign agent now decapsulates packet, i.e., removes the additional header, and forwards the original packet with CN as source and MN as destination to the MN. Again, for the MN mobility is not visible. It receives the packet with the same sender and receiver address as it would have done in the home network. 8
  • 9. IP PACKET DELIVERY(STEP4)  The IP datagram from MN to CN travels directly across the network, using CN’s IP address as the destination address AND MN’S ADDDRESS(FIXED IP ADDRESS) AS SOURCE ADDRESS AS USUALLY IT DOES. 9
  • 10. AGENT ADVERTISEMENT  One initial problem of an MN after moving is how to find a foreign agent. How does the MN discover that it has moved? For this purpose mobile IP describes two methods: agent advertisement and agent solicitation.  THERE ARE THREE MAIN STEPS TO DISCOVER AND REGISTER:  Discovery - A mobile node uses a discovery procedure to identify prospective home agents and foreign agents.  Registration - A mobile node uses a registration procedure to inform its home agent of its care-of address.  Tunneling - Tunneling procedure is used to forward IP datagrams from a home address to a care of address. 10
  • 11. AGENT ADVERTISEMENT  foreign agents and home agents advertise their presence periodically using special agent advertisement messages.  An agent advertisement message has one or more care-of-addresses and a flag indicating whether it is a home agent or foreign agent.  For these advertisements Internet control message protocol (ICMP) messages are used with some mobility extensions.  The agent advertisement packet with the extension for mobility is shown IN NEXT SLIDE. The upper part represents the ICMP packet while the lower part is the extension needed for mobility. 11
  • 13. Mobile-IP extension  Type = 16  Length = number of COA provided with the message. It is equal to 6+4*(no. of addresses)  Registration lifetime = maximum lifetime specified by the agent in seconds which the node can request during registration.  Sequence No. = total no. of advertisements sent during initialization.  The flags after registration lifetime explain the features of advertisement. They are described as:  R-bit: registration with this agent is required even when the mobile node uses a collocated COA. 13
  • 14. Mobile-IP extension  B-bit: The Foreign agent is busy to take any registrations  H-bit: Agentis home agent  F-bit: Agent is foreign agent  M-bit: Minimal encapsulation is used for encapsulation  G-bit: Generic routing encapsulation is used  r-bit: was initially set to V in first version of mobile IP (RFC 2002) suggested use of header compression and should be ignored.  T-bit: reverse tunneling.  The foreign agent should advertise at least one CoA. 14
  • 15. Agent advertisement  Allows for the detection of mobility agents  Lists one or more available care-of addresses  Informs the mobile node about special features  Mobile node selects its care-of address  Mobile node checks whether the agent is a home agent or foreign agent  Once the care-of-address is achieved the mobile node registers it with its Home agent and informs about the current location where the packets intended for it can be forwarded. 15
  • 16. Registering the care-of-address  If the mobile node travels to a foreign network, it registers with the foreign agent by sending a registration request message which includes the permanent IP address of the mobile host and the IP address of its home agent.  The foreign agent in turn performs the registration process on behalf of the mobile host by sending a registration request containing the permanent IP address of the mobile node and the IP address of the foreign agent to the home agent.  When the home agent receives the Registration Request, it updates the mobility binding by associating the care-of-address of the mobile node with its home address. 16
  • 17. Registering the care-of-address  The home agent then sends an acknowledgement to the foreign agent.  The foreign agent in turn updates its visitors list by inserting the entry for the mobile node and relays the reply to the mobile node 17