SlideShare a Scribd company logo
1 of 20
ACN Seminar 
Mobile IP 
NIJO JOB 
CS-B S7 
54
Mobile IP 
- Mobile IP is a standard that allows users to move from one network 
to another without loosing connectivity. 
- It is a modification to IP that allows nodes to continue to receive 
datagrams no matter where they happen to be attached to the 
Internet 
- The network is updated with the new location every time the user 
changes the computer's point of attachment to the Internet. 
- Mobile IP basically adds mobility support to the Internet network 
layer protocol IP.
Requirement 
s Compactability:- A new standard cannot introduce changes for 
applications or network protocols already in use. Mobile IP has to 
remain compatible with all lower layers used for the standard, non-mobile, 
IP. End-systems enhanced with a mobile IP implementation 
should still be able to communicate with fixed systems without 
mobile IP. Mobile IP has to ensure that users can still access all the 
other servers and systems in the internet using the same address 
format and routing mechanisms.
Requirement 
s Transparency:- Mobility should remain ā€˜invisibleā€™ for many higher 
layer protocols and applications. Besides maybe noticing a lower 
bandwidth and some interruption in service, higher layers should 
continue to work even if the mobile computer has changed its point 
of attachment to the network. Many of todayā€™s applications have not 
been designed for use in mobile environments, so the only effects of 
mobility should be a higher delay and lower bandwidth. However, 
there are some applications for which it is better to be ā€˜mobility 
awareā€™. Examples are cost-based routing or video compression.
Requirement 
s Scalability and efficiency:- Introducing a new mechanism to the 
internet must not jeopardize its efficiency. Enhancing IP for mobility 
must not generate too many new messages flooding the whole 
network. Also, it is crucial for a mobile IP to be scalable over a large 
number of participants in the whole internet, worldwide. 
Security:- The minimum requirement is that of all the messages 
related to the management of Mobile IP are authenticated. The IP 
layer must be sure that if it forwards a packet to a mobile host that 
this host receives the packet.
Terminologie 
s Mobile node:- A mobile node is an end-system or router that can 
change its point of attachment to the internet using mobile IP. 
Home network:- The home network of a mobile device is the 
network within which the device receives its identifying IP address. 
Correspondent node:- At least one partner is needed for 
communication. The CN can be a fixed or mobile node. 
Home address:- The home address of a mobile device is the IP 
address assigned to the device within its home network. 
Foreign network:- A foreign network is the network in which a mobile 
node is operating when away from its home network.
Terminologie 
s Care-of address:- The care-of address of a mobile device is the 
network-native IP address of the device when operating in a foreign 
network. 
Home agent:- A home agent is a router on a mobile nodeā€™s home 
network which tunnels datagrams for delivery to the mobile node 
when it is away from home. It maintains current location information 
for the mobile node. It is used with one or more foreign agents. 
Foreign agent:- A foreign agent is a router that stores information 
about mobile nodes visiting its network. Foreign agents also 
advertise care-of-addresses which are used by Mobile IP.
Agent 
Discovery A mobile node discovers its foreign agents and home agents during 
agent discovery. 
In mobile IP, both a foreign agent and a home agent periodically 
broadcast agent advertisement messages. 
A mobile host must discover(learn the address of) a home agent 
before it leaves the home agent. 
A mobile host must also discover a foreign agent after it moved to a 
foreign network. 
It allows mobile nodes to discover foreign agents and get care-of 
addresses, to know the services provided by the foreign agent and to 
determine whether an agent is its home agent or a foreign agent
Agent Solicitation 
When an mobile host has moved to a new network and has not 
received agent advertisements,it can initiate an agent solicitation. 
A mobile node can generate agent solicitation messages when it is 
looking for a foreign agent.
Registration 
When a mobile node receives a care-of address from a foreign 
agent, its home agent needs to be informed. 
The mobile node sends a registration request to its home agent 
through the foreign agent who has provided the new care-of 
address. 
When the home agent receives the request, it updates its routing 
table and sends a registration reply back to the foreign agent.
Tunnelling 
The transfer of the packet from the home agent to the care-of 
address is called tunnelling 
The home agent is the source of the tunnel. The home agent inserts 
a new tunnel header in front of the IP header of a packet addressed 
to the mobile agent and received by the home agent 
The tunnel header is the care-of IP address of the mobile node. The 
old header is preserved as it was in the original packet. 
The foreign agent is the receiver of the tunnel 
When the foreign agent receives the tunnelled packet, it has to 
delete the tunnel header to recover the original packet. 
The foreign agent delivers the packet to the mobile node after 
removing the tunnel header
Data Transfer 
When a remote host wants to send a packet to the mobile host, it 
uses its address as the source address and the home address of 
the mobile host as the destination address . 
After receiving the packet, the home agent sends the packet to the 
foreign agent . The home agent encapsulates the whole IP packet 
inside another IP packet using its address as the source and the 
foreign agentā€™s as the destination address. 
When the foreign agent receives the packet, it removes the original 
packet. Since, the destination address is the home address of the 
mobile host, the foreign agent consults a registry table to find the 
CAO.
Sample network 
(current physical network 
ā€¢for the MN) 
ā€¢13 
ā€¢HA 
ā€¢home network 
ā€¢(physical home network 
ā€¢for the MN) 
ā€¢Internet 
ā€¢router 
ā€¢MN 
ā€¢router 
ā€¢FA foreign 
ā€¢network 
ā€¢CN 
ā€¢end-system ā€¢router
ā€¢14 
ā€¢Tunneling 
Data transfer to the mobile system 
ā€¢Internet 
ā€¢home network 
ā€¢foreign 
ā€¢network 
ā€¢FA 
ā€¢HA 
ā€¢MN 
ā€¢receiver 
ā€¢1 
ā€¢2 
ā€¢3 
ā€¢CN 
ā€¢sender 
ā€¢1. Sender sends to the IP address of MN, 
ā€¢ HA intercepts packet 
ā€¢2. HA tunnels packet to COA, here FA, 
ā€¢ by encapsulation 
ā€¢3. FA forwards the packet to the MN
ā€¢15 
ā€¢Tunneling 
ā€¢1 
ā€¢foreign 
ā€¢network 
Data transfer from the mobile system 
ā€¢home network 
ā€¢Internet 
ā€¢HA 
ā€¢MN 
ā€¢sender 
ā€¢receiver 
ā€¢CN 
ā€¢FA 
ā€¢1. Sender sends to the IP address 
ā€¢ of the receiver as usual, 
ā€¢ FA works as default router
Optimization 
An inefficient behavior of a non-optimized mobile IP is called 
triangular routing. The triangle is made of the three segments, CN 
to HA, HA to COA/MN, and MN back to CN.
Optimization 
The current location of the MN is informed to CN. The CN can learn 
the location by caching it in a binding cache which is a part of the 
local routing table for the CN. 
- Binding request: Any node that wants to know the current location 
of an MN can send a binding request to the HA. 
- Binding update: This message sent by the HA to CNs reveals the 
current location of an MN. 
- Binding acknowledgement: If requested, a node returns this 
acknowledgement after receiving a binding update message. 
- Binding warning: If a node decapsulates a packet for an MN, but it 
is not the current FA for this MN, this node sends a binding warning.
Reverse Tunneling 
The return path from the MN to the CN looks quite simple. The MN 
can directly send its packets to the CN as in any other standard IP 
situation. The destination address in the packets is that of CN. 
Quite often firewalls only allow packets with topologically correct 
addresses to pass. However, MN still sends packets with its fixed IP 
address as source which is not topologically correct in a foreign 
network. Firewalls often filter packets coming from outside 
containing a source address from computers of the internal network.
Reverse Tunneling 
ā€¢19 
ā€¢Internet 
ā€¢receiver 
ā€¢FA 
ā€¢HA 
ā€¢MN 
ā€¢home network 
ā€¢sender 
ā€¢foreign 
ā€¢network 
ā€¢3 
ā€¢2 
ā€¢1 
ā€¢1. MN sends to FA 
ā€¢2. FA tunnels packets to HA 
ā€¢ by encapsulation 
ā€¢3. HA forwards the packet to the 
ā€¢ receiver (standard case) 
ā€¢CN
THANK YOU

More Related Content

What's hot

Gprs architecture ppt
Gprs architecture pptGprs architecture ppt
Gprs architecture pptArpita Sanghani
Ā 
Mac protocols for ad hoc wireless networks
Mac protocols for ad hoc wireless networks Mac protocols for ad hoc wireless networks
Mac protocols for ad hoc wireless networks Divya Tiwari
Ā 
Mac protocols
Mac protocolsMac protocols
Mac protocolsjuno susi
Ā 
UMTS, Introduction.
UMTS, Introduction.UMTS, Introduction.
UMTS, Introduction.Mateen Shahid
Ā 
Mobile Network Layer
Mobile Network LayerMobile Network Layer
Mobile Network LayerRahul Hada
Ā 
Mobile ip overview
Mobile ip overviewMobile ip overview
Mobile ip overviewpriya Nithya
Ā 
Security of ad hoc networks
Security of ad hoc networksSecurity of ad hoc networks
Security of ad hoc networksJayesh Rane
Ā 
Issues in routing protocol
Issues in routing protocolIssues in routing protocol
Issues in routing protocolPradeep Kumar TS
Ā 
Destination Sequenced Distance Vector Routing (DSDV)
Destination Sequenced Distance Vector Routing (DSDV)Destination Sequenced Distance Vector Routing (DSDV)
Destination Sequenced Distance Vector Routing (DSDV)ArunChokkalingam
Ā 
Classification of routing protocols
Classification of routing protocolsClassification of routing protocols
Classification of routing protocolsMenaga Selvaraj
Ā 
Location Aided Routing (LAR)
Location Aided Routing (LAR) Location Aided Routing (LAR)
Location Aided Routing (LAR) Pradeep Kumar TS
Ā 
Fisheye State Routing (FSR) - Protocol Overview
Fisheye State Routing (FSR) - Protocol OverviewFisheye State Routing (FSR) - Protocol Overview
Fisheye State Routing (FSR) - Protocol OverviewYoav Francis
Ā 
Features of mobile ip
Features of mobile ipFeatures of mobile ip
Features of mobile ippriya Nithya
Ā 
IT8602 - Mobile Communication Unit IV
IT8602 - Mobile Communication   Unit IV IT8602 - Mobile Communication   Unit IV
IT8602 - Mobile Communication Unit IV pkaviya
Ā 
Mobile Ad hoc Networks
Mobile Ad hoc NetworksMobile Ad hoc Networks
Mobile Ad hoc NetworksJagdeep Singh
Ā 
Umts system architecture
Umts system architectureUmts system architecture
Umts system architectureMidhun S
Ā 

What's hot (20)

Gprs architecture ppt
Gprs architecture pptGprs architecture ppt
Gprs architecture ppt
Ā 
Mac protocols for ad hoc wireless networks
Mac protocols for ad hoc wireless networks Mac protocols for ad hoc wireless networks
Mac protocols for ad hoc wireless networks
Ā 
Gprs architecture
Gprs architectureGprs architecture
Gprs architecture
Ā 
Mac protocols
Mac protocolsMac protocols
Mac protocols
Ā 
Mobile IP
Mobile IPMobile IP
Mobile IP
Ā 
UMTS, Introduction.
UMTS, Introduction.UMTS, Introduction.
UMTS, Introduction.
Ā 
Mobile Network Layer
Mobile Network LayerMobile Network Layer
Mobile Network Layer
Ā 
Mobile ip overview
Mobile ip overviewMobile ip overview
Mobile ip overview
Ā 
Security of ad hoc networks
Security of ad hoc networksSecurity of ad hoc networks
Security of ad hoc networks
Ā 
Issues in routing protocol
Issues in routing protocolIssues in routing protocol
Issues in routing protocol
Ā 
Destination Sequenced Distance Vector Routing (DSDV)
Destination Sequenced Distance Vector Routing (DSDV)Destination Sequenced Distance Vector Routing (DSDV)
Destination Sequenced Distance Vector Routing (DSDV)
Ā 
Classification of routing protocols
Classification of routing protocolsClassification of routing protocols
Classification of routing protocols
Ā 
Location Aided Routing (LAR)
Location Aided Routing (LAR) Location Aided Routing (LAR)
Location Aided Routing (LAR)
Ā 
AODV protocol
AODV protocolAODV protocol
AODV protocol
Ā 
Fisheye State Routing (FSR) - Protocol Overview
Fisheye State Routing (FSR) - Protocol OverviewFisheye State Routing (FSR) - Protocol Overview
Fisheye State Routing (FSR) - Protocol Overview
Ā 
Features of mobile ip
Features of mobile ipFeatures of mobile ip
Features of mobile ip
Ā 
IT8602 - Mobile Communication Unit IV
IT8602 - Mobile Communication   Unit IV IT8602 - Mobile Communication   Unit IV
IT8602 - Mobile Communication Unit IV
Ā 
Mobile Ad hoc Networks
Mobile Ad hoc NetworksMobile Ad hoc Networks
Mobile Ad hoc Networks
Ā 
Umts system architecture
Umts system architectureUmts system architecture
Umts system architecture
Ā 
Hiperlan
HiperlanHiperlan
Hiperlan
Ā 

Viewers also liked

Mobile IP Presentation
Mobile IP Presentation Mobile IP Presentation
Mobile IP Presentation Er. Rahul Jain
Ā 
mobile ip, Mobile COmmunication Internet Protocol
mobile ip, Mobile COmmunication Internet Protocolmobile ip, Mobile COmmunication Internet Protocol
mobile ip, Mobile COmmunication Internet ProtocolGaurav Dwivedi
Ā 
Mobile IP - pavankumar_912
Mobile IP - pavankumar_912Mobile IP - pavankumar_912
Mobile IP - pavankumar_912Pavan Kumar Sindgi
Ā 
Infrared and radio transmission
Infrared and radio transmissionInfrared and radio transmission
Infrared and radio transmissionAnuj Rajput
Ā 
Types of waves with compressional waves
Types of waves with compressional wavesTypes of waves with compressional waves
Types of waves with compressional wavesRick Turner
Ā 
ENCAPSULATION AND TUNNELING
ENCAPSULATION AND TUNNELINGENCAPSULATION AND TUNNELING
ENCAPSULATION AND TUNNELINGMohammad Adil
Ā 
WiMAX (IEEE 802.16)
WiMAX (IEEE 802.16)WiMAX (IEEE 802.16)
WiMAX (IEEE 802.16)Sajid Marwat
Ā 
Wimax / ieee 802.16
Wimax / ieee 802.16Wimax / ieee 802.16
Wimax / ieee 802.16ankita pandey
Ā 
wireless network IEEE 802.11
 wireless network IEEE 802.11 wireless network IEEE 802.11
wireless network IEEE 802.11Shreejan Acharya
Ā 

Viewers also liked (12)

Mobile ip
Mobile ipMobile ip
Mobile ip
Ā 
Mobile IP Presentation
Mobile IP Presentation Mobile IP Presentation
Mobile IP Presentation
Ā 
mobile ip, Mobile COmmunication Internet Protocol
mobile ip, Mobile COmmunication Internet Protocolmobile ip, Mobile COmmunication Internet Protocol
mobile ip, Mobile COmmunication Internet Protocol
Ā 
Mobile IP - pavankumar_912
Mobile IP - pavankumar_912Mobile IP - pavankumar_912
Mobile IP - pavankumar_912
Ā 
Infrared and radio transmission
Infrared and radio transmissionInfrared and radio transmission
Infrared and radio transmission
Ā 
Types of waves with compressional waves
Types of waves with compressional wavesTypes of waves with compressional waves
Types of waves with compressional waves
Ā 
Dhcp ppt
Dhcp pptDhcp ppt
Dhcp ppt
Ā 
ENCAPSULATION AND TUNNELING
ENCAPSULATION AND TUNNELINGENCAPSULATION AND TUNNELING
ENCAPSULATION AND TUNNELING
Ā 
WiMAX (IEEE 802.16)
WiMAX (IEEE 802.16)WiMAX (IEEE 802.16)
WiMAX (IEEE 802.16)
Ā 
Wimax / ieee 802.16
Wimax / ieee 802.16Wimax / ieee 802.16
Wimax / ieee 802.16
Ā 
wireless network IEEE 802.11
 wireless network IEEE 802.11 wireless network IEEE 802.11
wireless network IEEE 802.11
Ā 
Ad-Hoc Networks
Ad-Hoc NetworksAd-Hoc Networks
Ad-Hoc Networks
Ā 

Similar to Mobile IP Seminar Explains Key Concepts Like Home Agents, Foreign Agents and Tunneling

IT6601 Mobile Computing Unit II
IT6601 Mobile Computing Unit IIIT6601 Mobile Computing Unit II
IT6601 Mobile Computing Unit IIpkaviya
Ā 
Mobile IP
Mobile IPMobile IP
Mobile IPshankul07
Ā 
MOBILE IP,DHCP,ADHOC ROUTING PROTOCOLS
MOBILE IP,DHCP,ADHOC ROUTING PROTOCOLSMOBILE IP,DHCP,ADHOC ROUTING PROTOCOLS
MOBILE IP,DHCP,ADHOC ROUTING PROTOCOLSManju La
Ā 
Mobile computing - SARASWATHI RAMALINGAM
Mobile computing - SARASWATHI RAMALINGAMMobile computing - SARASWATHI RAMALINGAM
Mobile computing - SARASWATHI RAMALINGAMSaraswathiRamalingam
Ā 
Mobile internet protocol
Mobile internet protocolMobile internet protocol
Mobile internet protocolSaranyaK68
Ā 
Ip packet delivery
Ip packet deliveryIp packet delivery
Ip packet deliverySOURABH KUMAR
Ā 
MOBILE COMPUTING Unit 2.pptx
MOBILE COMPUTING Unit 2.pptxMOBILE COMPUTING Unit 2.pptx
MOBILE COMPUTING Unit 2.pptxkarthiksmart21
Ā 
Mobility And Mobile I Pv4
Mobility And Mobile I Pv4Mobility And Mobile I Pv4
Mobility And Mobile I Pv4Ram Dutt Shukla
Ā 
ipgoals,assumption requirements
ipgoals,assumption requirementsipgoals,assumption requirements
ipgoals,assumption requirementsrajisri2
Ā 
Mobile ip presentation
Mobile ip presentationMobile ip presentation
Mobile ip presentationSifat Hossain
Ā 
Ip packet delivery
Ip packet deliveryIp packet delivery
Ip packet deliveryrajisri2
Ā 
Computer networks final presentation
Computer networks final presentationComputer networks final presentation
Computer networks final presentationJosephLiddell
Ā 

Similar to Mobile IP Seminar Explains Key Concepts Like Home Agents, Foreign Agents and Tunneling (20)

IT6601 Mobile Computing Unit II
IT6601 Mobile Computing Unit IIIT6601 Mobile Computing Unit II
IT6601 Mobile Computing Unit II
Ā 
Mobileip 161105154557
Mobileip 161105154557Mobileip 161105154557
Mobileip 161105154557
Ā 
Mobileip 161105154557
Mobileip 161105154557Mobileip 161105154557
Mobileip 161105154557
Ā 
Mobile IP
Mobile IPMobile IP
Mobile IP
Ā 
MOBILE IP,DHCP,ADHOC ROUTING PROTOCOLS
MOBILE IP,DHCP,ADHOC ROUTING PROTOCOLSMOBILE IP,DHCP,ADHOC ROUTING PROTOCOLS
MOBILE IP,DHCP,ADHOC ROUTING PROTOCOLS
Ā 
Mobile computing - SARASWATHI RAMALINGAM
Mobile computing - SARASWATHI RAMALINGAMMobile computing - SARASWATHI RAMALINGAM
Mobile computing - SARASWATHI RAMALINGAM
Ā 
Mobile internet protocol
Mobile internet protocolMobile internet protocol
Mobile internet protocol
Ā 
Ip packet delivery
Ip packet deliveryIp packet delivery
Ip packet delivery
Ā 
MOBILE COMPUTING Unit 2.pptx
MOBILE COMPUTING Unit 2.pptxMOBILE COMPUTING Unit 2.pptx
MOBILE COMPUTING Unit 2.pptx
Ā 
Mobility And Mobile I Pv4
Mobility And Mobile I Pv4Mobility And Mobile I Pv4
Mobility And Mobile I Pv4
Ā 
Unit 3
Unit 3Unit 3
Unit 3
Ā 
Mobile computing Unit III MANET Notes
Mobile computing Unit III MANET NotesMobile computing Unit III MANET Notes
Mobile computing Unit III MANET Notes
Ā 
ipgoals,assumption requirements
ipgoals,assumption requirementsipgoals,assumption requirements
ipgoals,assumption requirements
Ā 
IT6601 MOBILE COMPUTING
IT6601 MOBILE COMPUTINGIT6601 MOBILE COMPUTING
IT6601 MOBILE COMPUTING
Ā 
It2402 mobile communication unit 4
It2402 mobile communication unit 4It2402 mobile communication unit 4
It2402 mobile communication unit 4
Ā 
Mobile ip presentation
Mobile ip presentationMobile ip presentation
Mobile ip presentation
Ā 
Ip packet delivery
Ip packet deliveryIp packet delivery
Ip packet delivery
Ā 
Computer networks final presentation
Computer networks final presentationComputer networks final presentation
Computer networks final presentation
Ā 
Mobile IP
Mobile IPMobile IP
Mobile IP
Ā 
Report
ReportReport
Report
Ā 

Recently uploaded

VIP Kolkata Call Girl Alambazar šŸ‘‰ 8250192130 Available With Room
VIP Kolkata Call Girl Alambazar šŸ‘‰ 8250192130  Available With RoomVIP Kolkata Call Girl Alambazar šŸ‘‰ 8250192130  Available With Room
VIP Kolkata Call Girl Alambazar šŸ‘‰ 8250192130 Available With Roomdivyansh0kumar0
Ā 
Call Girls South Delhi Delhi reach out to us at ā˜Ž 9711199012
Call Girls South Delhi Delhi reach out to us at ā˜Ž 9711199012Call Girls South Delhi Delhi reach out to us at ā˜Ž 9711199012
Call Girls South Delhi Delhi reach out to us at ā˜Ž 9711199012rehmti665
Ā 
Blepharitis inflammation of eyelid symptoms cause everything included along w...
Blepharitis inflammation of eyelid symptoms cause everything included along w...Blepharitis inflammation of eyelid symptoms cause everything included along w...
Blepharitis inflammation of eyelid symptoms cause everything included along w...Excelmac1
Ā 
Contact Rya Baby for Call Girls New Delhi
Contact Rya Baby for Call Girls New DelhiContact Rya Baby for Call Girls New Delhi
Contact Rya Baby for Call Girls New Delhimiss dipika
Ā 
Magic exist by Marta Loveguard - presentation.pptx
Magic exist by Marta Loveguard - presentation.pptxMagic exist by Marta Loveguard - presentation.pptx
Magic exist by Marta Loveguard - presentation.pptxMartaLoveguard
Ā 
定制(UAL学位čƁ)č‹±å›½ä¼¦ę•¦č‰ŗęœÆ大学ęƕäøščÆęˆē»©å•åŽŸē‰ˆäø€ęƔäø€
定制(UAL学位čƁ)č‹±å›½ä¼¦ę•¦č‰ŗęœÆ大学ęƕäøščÆęˆē»©å•åŽŸē‰ˆäø€ęƔäø€å®šåˆ¶(UAL学位čƁ)č‹±å›½ä¼¦ę•¦č‰ŗęœÆ大学ęƕäøščÆęˆē»©å•åŽŸē‰ˆäø€ęƔäø€
定制(UAL学位čƁ)č‹±å›½ä¼¦ę•¦č‰ŗęœÆ大学ęƕäøščÆęˆē»©å•åŽŸē‰ˆäø€ęƔäø€Fs
Ā 
VIP Kolkata Call Girl Salt Lake šŸ‘‰ 8250192130 Available With Room
VIP Kolkata Call Girl Salt Lake šŸ‘‰ 8250192130  Available With RoomVIP Kolkata Call Girl Salt Lake šŸ‘‰ 8250192130  Available With Room
VIP Kolkata Call Girl Salt Lake šŸ‘‰ 8250192130 Available With Roomishabajaj13
Ā 
Git and Github workshop GDSC MLRITM
Git and Github  workshop GDSC MLRITMGit and Github  workshop GDSC MLRITM
Git and Github workshop GDSC MLRITMgdsc13
Ā 
Packaging the Monolith - PHP Tek 2024 (Breaking it down one bite at a time)
Packaging the Monolith - PHP Tek 2024 (Breaking it down one bite at a time)Packaging the Monolith - PHP Tek 2024 (Breaking it down one bite at a time)
Packaging the Monolith - PHP Tek 2024 (Breaking it down one bite at a time)Dana Luther
Ā 
定制(CCęƕäøščƁ书)ē¾Žå›½ē¾Žå›½ē¤¾åŒŗ大学ęƕäøščÆęˆē»©å•åŽŸē‰ˆäø€ęƔäø€
定制(CCęƕäøščƁ书)ē¾Žå›½ē¾Žå›½ē¤¾åŒŗ大学ęƕäøščÆęˆē»©å•åŽŸē‰ˆäø€ęƔäø€å®šåˆ¶(CCęƕäøščƁ书)ē¾Žå›½ē¾Žå›½ē¤¾åŒŗ大学ęƕäøščÆęˆē»©å•åŽŸē‰ˆäø€ęƔäø€
定制(CCęƕäøščƁ书)ē¾Žå›½ē¾Žå›½ē¤¾åŒŗ大学ęƕäøščÆęˆē»©å•åŽŸē‰ˆäø€ęƔäø€3sw2qly1
Ā 
办ē†(UofRęƕäøščƁ书)ē½—切ę–Æē‰¹å¤§å­¦ęƕäøščÆęˆē»©å•åŽŸē‰ˆäø€ęƔäø€
办ē†(UofRęƕäøščƁ书)ē½—切ę–Æē‰¹å¤§å­¦ęƕäøščÆęˆē»©å•åŽŸē‰ˆäø€ęƔäø€åŠžē†(UofRęƕäøščƁ书)ē½—切ę–Æē‰¹å¤§å­¦ęƕäøščÆęˆē»©å•åŽŸē‰ˆäø€ęƔäø€
办ē†(UofRęƕäøščƁ书)ē½—切ę–Æē‰¹å¤§å­¦ęƕäøščÆęˆē»©å•åŽŸē‰ˆäø€ęƔäø€z xss
Ā 
Complet Documnetation for Smart Assistant Application for Disabled Person
Complet Documnetation   for Smart Assistant Application for Disabled PersonComplet Documnetation   for Smart Assistant Application for Disabled Person
Complet Documnetation for Smart Assistant Application for Disabled Personfurqan222004
Ā 
定制(AUTęƕäøščƁ书)ꖰč„æå…°å„„å…‹å…°ē†å·„大学ęƕäøščÆęˆē»©å•åŽŸē‰ˆäø€ęƔäø€
定制(AUTęƕäøščƁ书)ꖰč„æå…°å„„å…‹å…°ē†å·„大学ęƕäøščÆęˆē»©å•åŽŸē‰ˆäø€ęƔäø€å®šåˆ¶(AUTęƕäøščƁ书)ꖰč„æå…°å„„å…‹å…°ē†å·„大学ęƕäøščÆęˆē»©å•åŽŸē‰ˆäø€ęƔäø€
定制(AUTęƕäøščƁ书)ꖰč„æå…°å„„å…‹å…°ē†å·„大学ęƕäøščÆęˆē»©å•åŽŸē‰ˆäø€ęƔäø€Fs
Ā 
Potsdam FH学位čƁ,ę³¢čŒØ坦åŗ”ē”ØꊀęœÆ大学ęƕäøščƁ书1:1制作
Potsdam FH学位čƁ,ę³¢čŒØ坦åŗ”ē”ØꊀęœÆ大学ęƕäøščƁ书1:1制作Potsdam FH学位čƁ,ę³¢čŒØ坦åŗ”ē”ØꊀęœÆ大学ęƕäøščƁ书1:1制作
Potsdam FH学位čƁ,ę³¢čŒØ坦åŗ”ē”ØꊀęœÆ大学ęƕäøščƁ书1:1制作ys8omjxb
Ā 
Font Performance - NYC WebPerf Meetup April '24
Font Performance - NYC WebPerf Meetup April '24Font Performance - NYC WebPerf Meetup April '24
Font Performance - NYC WebPerf Meetup April '24Paul Calvano
Ā 
A Good Girl's Guide to Murder (A Good Girl's Guide to Murder, #1)
A Good Girl's Guide to Murder (A Good Girl's Guide to Murder, #1)A Good Girl's Guide to Murder (A Good Girl's Guide to Murder, #1)
A Good Girl's Guide to Murder (A Good Girl's Guide to Murder, #1)Christopher H Felton
Ā 
Chennai Call Girls Alwarpet Phone šŸ† 8250192130 šŸ‘… celebrity escorts service
Chennai Call Girls Alwarpet Phone šŸ† 8250192130 šŸ‘… celebrity escorts serviceChennai Call Girls Alwarpet Phone šŸ† 8250192130 šŸ‘… celebrity escorts service
Chennai Call Girls Alwarpet Phone šŸ† 8250192130 šŸ‘… celebrity escorts servicevipmodelshub1
Ā 
Call Girls In The Ocean Pearl Retreat Hotel New Delhi 9873777170
Call Girls In The Ocean Pearl Retreat Hotel New Delhi 9873777170Call Girls In The Ocean Pearl Retreat Hotel New Delhi 9873777170
Call Girls In The Ocean Pearl Retreat Hotel New Delhi 9873777170Sonam Pathan
Ā 

Recently uploaded (20)

VIP Kolkata Call Girl Alambazar šŸ‘‰ 8250192130 Available With Room
VIP Kolkata Call Girl Alambazar šŸ‘‰ 8250192130  Available With RoomVIP Kolkata Call Girl Alambazar šŸ‘‰ 8250192130  Available With Room
VIP Kolkata Call Girl Alambazar šŸ‘‰ 8250192130 Available With Room
Ā 
Call Girls South Delhi Delhi reach out to us at ā˜Ž 9711199012
Call Girls South Delhi Delhi reach out to us at ā˜Ž 9711199012Call Girls South Delhi Delhi reach out to us at ā˜Ž 9711199012
Call Girls South Delhi Delhi reach out to us at ā˜Ž 9711199012
Ā 
Blepharitis inflammation of eyelid symptoms cause everything included along w...
Blepharitis inflammation of eyelid symptoms cause everything included along w...Blepharitis inflammation of eyelid symptoms cause everything included along w...
Blepharitis inflammation of eyelid symptoms cause everything included along w...
Ā 
Contact Rya Baby for Call Girls New Delhi
Contact Rya Baby for Call Girls New DelhiContact Rya Baby for Call Girls New Delhi
Contact Rya Baby for Call Girls New Delhi
Ā 
Magic exist by Marta Loveguard - presentation.pptx
Magic exist by Marta Loveguard - presentation.pptxMagic exist by Marta Loveguard - presentation.pptx
Magic exist by Marta Loveguard - presentation.pptx
Ā 
定制(UAL学位čƁ)č‹±å›½ä¼¦ę•¦č‰ŗęœÆ大学ęƕäøščÆęˆē»©å•åŽŸē‰ˆäø€ęƔäø€
定制(UAL学位čƁ)č‹±å›½ä¼¦ę•¦č‰ŗęœÆ大学ęƕäøščÆęˆē»©å•åŽŸē‰ˆäø€ęƔäø€å®šåˆ¶(UAL学位čƁ)č‹±å›½ä¼¦ę•¦č‰ŗęœÆ大学ęƕäøščÆęˆē»©å•åŽŸē‰ˆäø€ęƔäø€
定制(UAL学位čƁ)č‹±å›½ä¼¦ę•¦č‰ŗęœÆ大学ęƕäøščÆęˆē»©å•åŽŸē‰ˆäø€ęƔäø€
Ā 
VIP Kolkata Call Girl Salt Lake šŸ‘‰ 8250192130 Available With Room
VIP Kolkata Call Girl Salt Lake šŸ‘‰ 8250192130  Available With RoomVIP Kolkata Call Girl Salt Lake šŸ‘‰ 8250192130  Available With Room
VIP Kolkata Call Girl Salt Lake šŸ‘‰ 8250192130 Available With Room
Ā 
Git and Github workshop GDSC MLRITM
Git and Github  workshop GDSC MLRITMGit and Github  workshop GDSC MLRITM
Git and Github workshop GDSC MLRITM
Ā 
Packaging the Monolith - PHP Tek 2024 (Breaking it down one bite at a time)
Packaging the Monolith - PHP Tek 2024 (Breaking it down one bite at a time)Packaging the Monolith - PHP Tek 2024 (Breaking it down one bite at a time)
Packaging the Monolith - PHP Tek 2024 (Breaking it down one bite at a time)
Ā 
定制(CCęƕäøščƁ书)ē¾Žå›½ē¾Žå›½ē¤¾åŒŗ大学ęƕäøščÆęˆē»©å•åŽŸē‰ˆäø€ęƔäø€
定制(CCęƕäøščƁ书)ē¾Žå›½ē¾Žå›½ē¤¾åŒŗ大学ęƕäøščÆęˆē»©å•åŽŸē‰ˆäø€ęƔäø€å®šåˆ¶(CCęƕäøščƁ书)ē¾Žå›½ē¾Žå›½ē¤¾åŒŗ大学ęƕäøščÆęˆē»©å•åŽŸē‰ˆäø€ęƔäø€
定制(CCęƕäøščƁ书)ē¾Žå›½ē¾Žå›½ē¤¾åŒŗ大学ęƕäøščÆęˆē»©å•åŽŸē‰ˆäø€ęƔäø€
Ā 
办ē†(UofRęƕäøščƁ书)ē½—切ę–Æē‰¹å¤§å­¦ęƕäøščÆęˆē»©å•åŽŸē‰ˆäø€ęƔäø€
办ē†(UofRęƕäøščƁ书)ē½—切ę–Æē‰¹å¤§å­¦ęƕäøščÆęˆē»©å•åŽŸē‰ˆäø€ęƔäø€åŠžē†(UofRęƕäøščƁ书)ē½—切ę–Æē‰¹å¤§å­¦ęƕäøščÆęˆē»©å•åŽŸē‰ˆäø€ęƔäø€
办ē†(UofRęƕäøščƁ书)ē½—切ę–Æē‰¹å¤§å­¦ęƕäøščÆęˆē»©å•åŽŸē‰ˆäø€ęƔäø€
Ā 
Complet Documnetation for Smart Assistant Application for Disabled Person
Complet Documnetation   for Smart Assistant Application for Disabled PersonComplet Documnetation   for Smart Assistant Application for Disabled Person
Complet Documnetation for Smart Assistant Application for Disabled Person
Ā 
定制(AUTęƕäøščƁ书)ꖰč„æå…°å„„å…‹å…°ē†å·„大学ęƕäøščÆęˆē»©å•åŽŸē‰ˆäø€ęƔäø€
定制(AUTęƕäøščƁ书)ꖰč„æå…°å„„å…‹å…°ē†å·„大学ęƕäøščÆęˆē»©å•åŽŸē‰ˆäø€ęƔäø€å®šåˆ¶(AUTęƕäøščƁ书)ꖰč„æå…°å„„å…‹å…°ē†å·„大学ęƕäøščÆęˆē»©å•åŽŸē‰ˆäø€ęƔäø€
定制(AUTęƕäøščƁ书)ꖰč„æå…°å„„å…‹å…°ē†å·„大学ęƕäøščÆęˆē»©å•åŽŸē‰ˆäø€ęƔäø€
Ā 
Potsdam FH学位čƁ,ę³¢čŒØ坦åŗ”ē”ØꊀęœÆ大学ęƕäøščƁ书1:1制作
Potsdam FH学位čƁ,ę³¢čŒØ坦åŗ”ē”ØꊀęœÆ大学ęƕäøščƁ书1:1制作Potsdam FH学位čƁ,ę³¢čŒØ坦åŗ”ē”ØꊀęœÆ大学ęƕäøščƁ书1:1制作
Potsdam FH学位čƁ,ę³¢čŒØ坦åŗ”ē”ØꊀęœÆ大学ęƕäøščƁ书1:1制作
Ā 
Font Performance - NYC WebPerf Meetup April '24
Font Performance - NYC WebPerf Meetup April '24Font Performance - NYC WebPerf Meetup April '24
Font Performance - NYC WebPerf Meetup April '24
Ā 
Hot Sexy call girls in Rk Puram šŸ” 9953056974 šŸ” Delhi escort Service
Hot Sexy call girls in  Rk Puram šŸ” 9953056974 šŸ” Delhi escort ServiceHot Sexy call girls in  Rk Puram šŸ” 9953056974 šŸ” Delhi escort Service
Hot Sexy call girls in Rk Puram šŸ” 9953056974 šŸ” Delhi escort Service
Ā 
Model Call Girl in Jamuna Vihar Delhi reach out to us at šŸ”9953056974šŸ”
Model Call Girl in  Jamuna Vihar Delhi reach out to us at šŸ”9953056974šŸ”Model Call Girl in  Jamuna Vihar Delhi reach out to us at šŸ”9953056974šŸ”
Model Call Girl in Jamuna Vihar Delhi reach out to us at šŸ”9953056974šŸ”
Ā 
A Good Girl's Guide to Murder (A Good Girl's Guide to Murder, #1)
A Good Girl's Guide to Murder (A Good Girl's Guide to Murder, #1)A Good Girl's Guide to Murder (A Good Girl's Guide to Murder, #1)
A Good Girl's Guide to Murder (A Good Girl's Guide to Murder, #1)
Ā 
Chennai Call Girls Alwarpet Phone šŸ† 8250192130 šŸ‘… celebrity escorts service
Chennai Call Girls Alwarpet Phone šŸ† 8250192130 šŸ‘… celebrity escorts serviceChennai Call Girls Alwarpet Phone šŸ† 8250192130 šŸ‘… celebrity escorts service
Chennai Call Girls Alwarpet Phone šŸ† 8250192130 šŸ‘… celebrity escorts service
Ā 
Call Girls In The Ocean Pearl Retreat Hotel New Delhi 9873777170
Call Girls In The Ocean Pearl Retreat Hotel New Delhi 9873777170Call Girls In The Ocean Pearl Retreat Hotel New Delhi 9873777170
Call Girls In The Ocean Pearl Retreat Hotel New Delhi 9873777170
Ā 

Mobile IP Seminar Explains Key Concepts Like Home Agents, Foreign Agents and Tunneling

  • 1. ACN Seminar Mobile IP NIJO JOB CS-B S7 54
  • 2. Mobile IP - Mobile IP is a standard that allows users to move from one network to another without loosing connectivity. - It is a modification to IP that allows nodes to continue to receive datagrams no matter where they happen to be attached to the Internet - The network is updated with the new location every time the user changes the computer's point of attachment to the Internet. - Mobile IP basically adds mobility support to the Internet network layer protocol IP.
  • 3. Requirement s Compactability:- A new standard cannot introduce changes for applications or network protocols already in use. Mobile IP has to remain compatible with all lower layers used for the standard, non-mobile, IP. End-systems enhanced with a mobile IP implementation should still be able to communicate with fixed systems without mobile IP. Mobile IP has to ensure that users can still access all the other servers and systems in the internet using the same address format and routing mechanisms.
  • 4. Requirement s Transparency:- Mobility should remain ā€˜invisibleā€™ for many higher layer protocols and applications. Besides maybe noticing a lower bandwidth and some interruption in service, higher layers should continue to work even if the mobile computer has changed its point of attachment to the network. Many of todayā€™s applications have not been designed for use in mobile environments, so the only effects of mobility should be a higher delay and lower bandwidth. However, there are some applications for which it is better to be ā€˜mobility awareā€™. Examples are cost-based routing or video compression.
  • 5. Requirement s Scalability and efficiency:- Introducing a new mechanism to the internet must not jeopardize its efficiency. Enhancing IP for mobility must not generate too many new messages flooding the whole network. Also, it is crucial for a mobile IP to be scalable over a large number of participants in the whole internet, worldwide. Security:- The minimum requirement is that of all the messages related to the management of Mobile IP are authenticated. The IP layer must be sure that if it forwards a packet to a mobile host that this host receives the packet.
  • 6. Terminologie s Mobile node:- A mobile node is an end-system or router that can change its point of attachment to the internet using mobile IP. Home network:- The home network of a mobile device is the network within which the device receives its identifying IP address. Correspondent node:- At least one partner is needed for communication. The CN can be a fixed or mobile node. Home address:- The home address of a mobile device is the IP address assigned to the device within its home network. Foreign network:- A foreign network is the network in which a mobile node is operating when away from its home network.
  • 7. Terminologie s Care-of address:- The care-of address of a mobile device is the network-native IP address of the device when operating in a foreign network. Home agent:- A home agent is a router on a mobile nodeā€™s home network which tunnels datagrams for delivery to the mobile node when it is away from home. It maintains current location information for the mobile node. It is used with one or more foreign agents. Foreign agent:- A foreign agent is a router that stores information about mobile nodes visiting its network. Foreign agents also advertise care-of-addresses which are used by Mobile IP.
  • 8. Agent Discovery A mobile node discovers its foreign agents and home agents during agent discovery. In mobile IP, both a foreign agent and a home agent periodically broadcast agent advertisement messages. A mobile host must discover(learn the address of) a home agent before it leaves the home agent. A mobile host must also discover a foreign agent after it moved to a foreign network. It allows mobile nodes to discover foreign agents and get care-of addresses, to know the services provided by the foreign agent and to determine whether an agent is its home agent or a foreign agent
  • 9. Agent Solicitation When an mobile host has moved to a new network and has not received agent advertisements,it can initiate an agent solicitation. A mobile node can generate agent solicitation messages when it is looking for a foreign agent.
  • 10. Registration When a mobile node receives a care-of address from a foreign agent, its home agent needs to be informed. The mobile node sends a registration request to its home agent through the foreign agent who has provided the new care-of address. When the home agent receives the request, it updates its routing table and sends a registration reply back to the foreign agent.
  • 11. Tunnelling The transfer of the packet from the home agent to the care-of address is called tunnelling The home agent is the source of the tunnel. The home agent inserts a new tunnel header in front of the IP header of a packet addressed to the mobile agent and received by the home agent The tunnel header is the care-of IP address of the mobile node. The old header is preserved as it was in the original packet. The foreign agent is the receiver of the tunnel When the foreign agent receives the tunnelled packet, it has to delete the tunnel header to recover the original packet. The foreign agent delivers the packet to the mobile node after removing the tunnel header
  • 12. Data Transfer When a remote host wants to send a packet to the mobile host, it uses its address as the source address and the home address of the mobile host as the destination address . After receiving the packet, the home agent sends the packet to the foreign agent . The home agent encapsulates the whole IP packet inside another IP packet using its address as the source and the foreign agentā€™s as the destination address. When the foreign agent receives the packet, it removes the original packet. Since, the destination address is the home address of the mobile host, the foreign agent consults a registry table to find the CAO.
  • 13. Sample network (current physical network ā€¢for the MN) ā€¢13 ā€¢HA ā€¢home network ā€¢(physical home network ā€¢for the MN) ā€¢Internet ā€¢router ā€¢MN ā€¢router ā€¢FA foreign ā€¢network ā€¢CN ā€¢end-system ā€¢router
  • 14. ā€¢14 ā€¢Tunneling Data transfer to the mobile system ā€¢Internet ā€¢home network ā€¢foreign ā€¢network ā€¢FA ā€¢HA ā€¢MN ā€¢receiver ā€¢1 ā€¢2 ā€¢3 ā€¢CN ā€¢sender ā€¢1. Sender sends to the IP address of MN, ā€¢ HA intercepts packet ā€¢2. HA tunnels packet to COA, here FA, ā€¢ by encapsulation ā€¢3. FA forwards the packet to the MN
  • 15. ā€¢15 ā€¢Tunneling ā€¢1 ā€¢foreign ā€¢network Data transfer from the mobile system ā€¢home network ā€¢Internet ā€¢HA ā€¢MN ā€¢sender ā€¢receiver ā€¢CN ā€¢FA ā€¢1. Sender sends to the IP address ā€¢ of the receiver as usual, ā€¢ FA works as default router
  • 16. Optimization An inefficient behavior of a non-optimized mobile IP is called triangular routing. The triangle is made of the three segments, CN to HA, HA to COA/MN, and MN back to CN.
  • 17. Optimization The current location of the MN is informed to CN. The CN can learn the location by caching it in a binding cache which is a part of the local routing table for the CN. - Binding request: Any node that wants to know the current location of an MN can send a binding request to the HA. - Binding update: This message sent by the HA to CNs reveals the current location of an MN. - Binding acknowledgement: If requested, a node returns this acknowledgement after receiving a binding update message. - Binding warning: If a node decapsulates a packet for an MN, but it is not the current FA for this MN, this node sends a binding warning.
  • 18. Reverse Tunneling The return path from the MN to the CN looks quite simple. The MN can directly send its packets to the CN as in any other standard IP situation. The destination address in the packets is that of CN. Quite often firewalls only allow packets with topologically correct addresses to pass. However, MN still sends packets with its fixed IP address as source which is not topologically correct in a foreign network. Firewalls often filter packets coming from outside containing a source address from computers of the internal network.
  • 19. Reverse Tunneling ā€¢19 ā€¢Internet ā€¢receiver ā€¢FA ā€¢HA ā€¢MN ā€¢home network ā€¢sender ā€¢foreign ā€¢network ā€¢3 ā€¢2 ā€¢1 ā€¢1. MN sends to FA ā€¢2. FA tunnels packets to HA ā€¢ by encapsulation ā€¢3. HA forwards the packet to the ā€¢ receiver (standard case) ā€¢CN