SlideShare a Scribd company logo
1 of 43
Mobile IPv6
Why study Mobility in IPv6?
What is so different about Mobile IPv6 ?
Broadly we can say, ,[object Object],[object Object]
Problems with Mobile IPv4
Triangle Routing Problem Triangle routing problem delays the delivery of the datagrams and places an unnecessary burden on networks and routers
Firewalls  ,[object Object]
Ingress Filtering  ,[object Object]
Other Security Issues ,[object Object],[object Object],[object Object],[object Object],[object Object]
Is Mobile IPv6 the Solution?
Two Modes of Operation  ,[object Object],[object Object]
Basic Operation Data Path: Mobile Node to Correspondent Node in Basic Operation  Data Path: Correspondent Node to Mobile Node in Basic Operation
Route Optimization  Data Path: Mobile Node to Correspondent Node in Route Optimization   Data Path: Correspondent Node to Mobile Node in Route Optimization
Advantages of Route Optimization  ,[object Object],[object Object],[object Object]
Establishing Route Optimization
Messages supported by Mobility Header ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Return Routability Procedure Registration
Return Routability Procedure  ,[object Object],[object Object]
Return Routability Flow diagram Mobile Node  Home Agent Correspondent Node  |      | |  Home test Init       | |-------------------------------  |---------------------------------------  | |  Care of test init   | |-------------------------------------------------------------------------> | | home test   | |<----------------------------------|<------------------------------------ | |   Care of Test   | |  -------------------------------------------------------------------------|
Home Test init  ,[object Object],[object Object],[object Object]
Care-of Test Init  ,[object Object],[object Object],[object Object]
Home Test  ,[object Object],[object Object],[object Object],[object Object],[object Object]
Care-of Test  ,[object Object],[object Object],[object Object],[object Object],[object Object]
Binding Message Flow Diagram Mobile Node  Correspondent Node |  Binding Update | |-----------------------------------------------------------  | | (Seq no. , nonce indices , care of address) | | | | | | Binding ACK | |  ----------------------------------------------------------- | (Seq no. , status)
Binding Update  ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Binding Acknowledgement ,[object Object],[object Object],[object Object],[object Object]
Other Features and Functionality
Home Agent Option ,[object Object]
Prefix Discovery ,[object Object],[object Object]
Dynamic Home Agent Discovery ,[object Object],[object Object]
Returning Home and De-registering ,[object Object],[object Object]
Neighbor/Router Discovery ,[object Object],[object Object],[object Object],[object Object]
Stateless Autoconfiguration  ,[object Object],[object Object],[object Object],[object Object]
Performance Evaluation ,[object Object],[object Object],[object Object],[object Object],[object Object]
Major Differences from Mobile IPv4 ,[object Object],[object Object],[object Object],[object Object],[object Object]
[object Object],[object Object]
Vulnerabilities  in Mobile IPv6
Security – Still a Headache ,[object Object],[object Object],[object Object],[object Object]
Final Words – Mobile Ipv6
“ Communications should be much faster,&quot; Deering says. &quot;We also thought it was going to be more secure. But now it doesn't look like it's going to be more secure.&quot;
“ Backers of IPv6 have suffered another setback, as security experts punched holes in their planned strategy for supporting mobile IPv6 communications.”
[object Object]
[object Object]
Thank You!

More Related Content

What's hot

77232345 cours-ip-mobile
77232345 cours-ip-mobile77232345 cours-ip-mobile
77232345 cours-ip-mobilezan
 
Mobile internet protocol
Mobile internet protocolMobile internet protocol
Mobile internet protocolSaranyaK68
 
ENCAPSULATION AND TUNNELING
ENCAPSULATION AND TUNNELINGENCAPSULATION AND TUNNELING
ENCAPSULATION AND TUNNELINGMohammad Adil
 
Mobile ip presentation
Mobile ip presentationMobile ip presentation
Mobile ip presentationSifat Hossain
 
CCNA v6.0 ITN - Chapter 01
CCNA v6.0 ITN - Chapter 01CCNA v6.0 ITN - Chapter 01
CCNA v6.0 ITN - Chapter 01Irsandi Hasan
 
Mobile computing
Mobile computingMobile computing
Mobile computingSaranyaK68
 
IWAN Lab Guide
IWAN Lab GuideIWAN Lab Guide
IWAN Lab Guidejww330015
 
VPN presentation
VPN presentationVPN presentation
VPN presentationRiazehri
 
IT6601 Mobile Computing Unit II
IT6601 Mobile Computing Unit IIIT6601 Mobile Computing Unit II
IT6601 Mobile Computing Unit IIpkaviya
 
VPN - Virtual Private Network
VPN - Virtual Private NetworkVPN - Virtual Private Network
VPN - Virtual Private NetworkPeter R. Egli
 
Vpn " Virtual Private Network "
Vpn " Virtual Private Network "Vpn " Virtual Private Network "
Vpn " Virtual Private Network "Muhammad Usman
 
Cloud Traffic Engineer – Google Espresso Project by Shaowen Ma
Cloud Traffic Engineer – Google Espresso Project  by Shaowen MaCloud Traffic Engineer – Google Espresso Project  by Shaowen Ma
Cloud Traffic Engineer – Google Espresso Project by Shaowen MaMyNOG
 

What's hot (20)

77232345 cours-ip-mobile
77232345 cours-ip-mobile77232345 cours-ip-mobile
77232345 cours-ip-mobile
 
Mobile IP 1
Mobile IP 1Mobile IP 1
Mobile IP 1
 
31, Get more from your IPv4 resources
31, Get more from your IPv4 resources31, Get more from your IPv4 resources
31, Get more from your IPv4 resources
 
Mobile internet protocol
Mobile internet protocolMobile internet protocol
Mobile internet protocol
 
Mobile IP
Mobile IPMobile IP
Mobile IP
 
ENCAPSULATION AND TUNNELING
ENCAPSULATION AND TUNNELINGENCAPSULATION AND TUNNELING
ENCAPSULATION AND TUNNELING
 
Mobile ip presentation
Mobile ip presentationMobile ip presentation
Mobile ip presentation
 
Mobile IP
Mobile IPMobile IP
Mobile IP
 
Mobile IP
Mobile IPMobile IP
Mobile IP
 
VPN Theory
VPN TheoryVPN Theory
VPN Theory
 
Mobile ip group_3
Mobile ip group_3Mobile ip group_3
Mobile ip group_3
 
CCNA v6.0 ITN - Chapter 01
CCNA v6.0 ITN - Chapter 01CCNA v6.0 ITN - Chapter 01
CCNA v6.0 ITN - Chapter 01
 
Mobile computing
Mobile computingMobile computing
Mobile computing
 
IWAN Lab Guide
IWAN Lab GuideIWAN Lab Guide
IWAN Lab Guide
 
VPN presentation
VPN presentationVPN presentation
VPN presentation
 
Mobile network layer (mobile comm.)
Mobile network layer (mobile comm.)Mobile network layer (mobile comm.)
Mobile network layer (mobile comm.)
 
IT6601 Mobile Computing Unit II
IT6601 Mobile Computing Unit IIIT6601 Mobile Computing Unit II
IT6601 Mobile Computing Unit II
 
VPN - Virtual Private Network
VPN - Virtual Private NetworkVPN - Virtual Private Network
VPN - Virtual Private Network
 
Vpn " Virtual Private Network "
Vpn " Virtual Private Network "Vpn " Virtual Private Network "
Vpn " Virtual Private Network "
 
Cloud Traffic Engineer – Google Espresso Project by Shaowen Ma
Cloud Traffic Engineer – Google Espresso Project  by Shaowen MaCloud Traffic Engineer – Google Espresso Project  by Shaowen Ma
Cloud Traffic Engineer – Google Espresso Project by Shaowen Ma
 

Viewers also liked

IPv6 in Mobile Networks
IPv6 in Mobile NetworksIPv6 in Mobile Networks
IPv6 in Mobile NetworksAPNIC
 
Java ring
Java ringJava ring
Java ringEtty94
 
Presentation on Embedded system using micro controller by PARAS JHA
Presentation on Embedded system using micro controller  by PARAS JHAPresentation on Embedded system using micro controller  by PARAS JHA
Presentation on Embedded system using micro controller by PARAS JHAParas Jha
 
GSM Based wireless energy meter/sanjeet-1308143
GSM Based wireless energy meter/sanjeet-1308143GSM Based wireless energy meter/sanjeet-1308143
GSM Based wireless energy meter/sanjeet-1308143sanjeet kumar
 
Optical communication and Equipments
Optical communication and EquipmentsOptical communication and Equipments
Optical communication and EquipmentsRavi Bhasker
 
Body Adapted Wearable Bio Sensor
Body Adapted Wearable Bio SensorBody Adapted Wearable Bio Sensor
Body Adapted Wearable Bio Sensorkavindrakrishna
 
Animatronics PPT
Animatronics PPTAnimatronics PPT
Animatronics PPTAbishek Sam
 
Animatronics-ppt
 Animatronics-ppt Animatronics-ppt
Animatronics-pptRam B
 
IPv4 to IPv6
IPv4 to IPv6IPv4 to IPv6
IPv4 to IPv6mithilak
 
iMouse
iMouseiMouse
iMouseeeshak
 
Wearable Biosensors Presentation
Wearable Biosensors PresentationWearable Biosensors Presentation
Wearable Biosensors Presentationraj7
 

Viewers also liked (20)

IPv6 in Mobile Networks
IPv6 in Mobile NetworksIPv6 in Mobile Networks
IPv6 in Mobile Networks
 
java-ring
 java-ring java-ring
java-ring
 
Java ring
Java ringJava ring
Java ring
 
Java ring Engg SEMINAR
Java ring Engg SEMINARJava ring Engg SEMINAR
Java ring Engg SEMINAR
 
Java Ring
Java RingJava Ring
Java Ring
 
Bluetooth and mobile ip
Bluetooth and mobile ipBluetooth and mobile ip
Bluetooth and mobile ip
 
Presentation on Embedded system using micro controller by PARAS JHA
Presentation on Embedded system using micro controller  by PARAS JHAPresentation on Embedded system using micro controller  by PARAS JHA
Presentation on Embedded system using micro controller by PARAS JHA
 
GSM Based wireless energy meter/sanjeet-1308143
GSM Based wireless energy meter/sanjeet-1308143GSM Based wireless energy meter/sanjeet-1308143
GSM Based wireless energy meter/sanjeet-1308143
 
Java ring
Java ringJava ring
Java ring
 
IT6601 MOBILE COMPUTING
IT6601 MOBILE COMPUTINGIT6601 MOBILE COMPUTING
IT6601 MOBILE COMPUTING
 
Optical communication and Equipments
Optical communication and EquipmentsOptical communication and Equipments
Optical communication and Equipments
 
Body Adapted Wearable Bio Sensor
Body Adapted Wearable Bio SensorBody Adapted Wearable Bio Sensor
Body Adapted Wearable Bio Sensor
 
Animatronics PPT
Animatronics PPTAnimatronics PPT
Animatronics PPT
 
IPV6 INTRODUCTION
IPV6 INTRODUCTIONIPV6 INTRODUCTION
IPV6 INTRODUCTION
 
Animatronics-ppt
 Animatronics-ppt Animatronics-ppt
Animatronics-ppt
 
IPv4 to IPv6
IPv4 to IPv6IPv4 to IPv6
IPv4 to IPv6
 
iMouse
iMouseiMouse
iMouse
 
Animatronics
AnimatronicsAnimatronics
Animatronics
 
WEARABLE BIOSENSORS
WEARABLE BIOSENSORSWEARABLE BIOSENSORS
WEARABLE BIOSENSORS
 
Wearable Biosensors Presentation
Wearable Biosensors PresentationWearable Biosensors Presentation
Wearable Biosensors Presentation
 

Similar to Mobile IPv6 route optimization and its advantages over Mobile IPv4

Banking and ATM networking reports
Banking and ATM networking reportsBanking and ATM networking reports
Banking and ATM networking reportsShakib Ansaar
 
Ccna 3 chapter 7 v4.0 answers 2011
Ccna 3 chapter 7 v4.0 answers 2011Ccna 3 chapter 7 v4.0 answers 2011
Ccna 3 chapter 7 v4.0 answers 2011Dân Chơi
 
Auto default gateway settings for virtual
Auto default gateway settings for virtualAuto default gateway settings for virtual
Auto default gateway settings for virtualijwmn
 
IRJET- Overview of Hole Punching: ICMP Hole Punching, TCP Hole Punching, UDP ...
IRJET- Overview of Hole Punching: ICMP Hole Punching, TCP Hole Punching, UDP ...IRJET- Overview of Hole Punching: ICMP Hole Punching, TCP Hole Punching, UDP ...
IRJET- Overview of Hole Punching: ICMP Hole Punching, TCP Hole Punching, UDP ...IRJET Journal
 
IRJET - Overview of Hole Punching: ICMP Hole Punching, TCP Hole Punching, UDP...
IRJET - Overview of Hole Punching: ICMP Hole Punching, TCP Hole Punching, UDP...IRJET - Overview of Hole Punching: ICMP Hole Punching, TCP Hole Punching, UDP...
IRJET - Overview of Hole Punching: ICMP Hole Punching, TCP Hole Punching, UDP...IRJET Journal
 
Ccnav5.org ccna 3-chapter_4_v50_2014_exam_answers
Ccnav5.org ccna 3-chapter_4_v50_2014_exam_answersCcnav5.org ccna 3-chapter_4_v50_2014_exam_answers
Ccnav5.org ccna 3-chapter_4_v50_2014_exam_answersĐồng Quốc Vương
 
IRJET- Tracking of Vehicle’s Location using Probe Request
IRJET- Tracking of Vehicle’s Location using Probe RequestIRJET- Tracking of Vehicle’s Location using Probe Request
IRJET- Tracking of Vehicle’s Location using Probe RequestIRJET Journal
 
GaryVanGuelpenResume-20161202
GaryVanGuelpenResume-20161202GaryVanGuelpenResume-20161202
GaryVanGuelpenResume-20161202Gary Van Guelpen
 
Software Based Traffic Separation at the Access Layer
Software Based Traffic Separation at the Access LayerSoftware Based Traffic Separation at the Access Layer
Software Based Traffic Separation at the Access LayerIJERA Editor
 
IT Essentials (Version 7.0) - ITE Chapter 5 Exam Answers
IT Essentials (Version 7.0) - ITE Chapter 5 Exam AnswersIT Essentials (Version 7.0) - ITE Chapter 5 Exam Answers
IT Essentials (Version 7.0) - ITE Chapter 5 Exam AnswersITExamAnswers.net
 
Novel Method to Overcome Vulnerability in Wi-Fi Network
Novel Method to Overcome Vulnerability in Wi-Fi NetworkNovel Method to Overcome Vulnerability in Wi-Fi Network
Novel Method to Overcome Vulnerability in Wi-Fi NetworkIRJET Journal
 
IRJET- Implementation of Dynamic Internetworking in the Real World it Domain
IRJET-  	  Implementation of Dynamic Internetworking in the Real World it DomainIRJET-  	  Implementation of Dynamic Internetworking in the Real World it Domain
IRJET- Implementation of Dynamic Internetworking in the Real World it DomainIRJET Journal
 
Service Provider Architectures for Tomorrow by Chow Khay Kid
Service Provider Architectures for Tomorrow by Chow Khay KidService Provider Architectures for Tomorrow by Chow Khay Kid
Service Provider Architectures for Tomorrow by Chow Khay KidMyNOG
 
PRABA_GLOBAL_NOC
PRABA_GLOBAL_NOCPRABA_GLOBAL_NOC
PRABA_GLOBAL_NOCpraba karan
 

Similar to Mobile IPv6 route optimization and its advantages over Mobile IPv4 (20)

Jvvnl 071108
Jvvnl 071108Jvvnl 071108
Jvvnl 071108
 
Virtual Branch Networks
Virtual Branch NetworksVirtual Branch Networks
Virtual Branch Networks
 
Banking and ATM networking reports
Banking and ATM networking reportsBanking and ATM networking reports
Banking and ATM networking reports
 
Ccna 3 chapter 7 v4.0 answers 2011
Ccna 3 chapter 7 v4.0 answers 2011Ccna 3 chapter 7 v4.0 answers 2011
Ccna 3 chapter 7 v4.0 answers 2011
 
Giri - Resume 6+exp
Giri - Resume 6+expGiri - Resume 6+exp
Giri - Resume 6+exp
 
Auto default gateway settings for virtual
Auto default gateway settings for virtualAuto default gateway settings for virtual
Auto default gateway settings for virtual
 
Giri - Resume 6+exp
Giri - Resume 6+expGiri - Resume 6+exp
Giri - Resume 6+exp
 
IRJET- Overview of Hole Punching: ICMP Hole Punching, TCP Hole Punching, UDP ...
IRJET- Overview of Hole Punching: ICMP Hole Punching, TCP Hole Punching, UDP ...IRJET- Overview of Hole Punching: ICMP Hole Punching, TCP Hole Punching, UDP ...
IRJET- Overview of Hole Punching: ICMP Hole Punching, TCP Hole Punching, UDP ...
 
IRJET - Overview of Hole Punching: ICMP Hole Punching, TCP Hole Punching, UDP...
IRJET - Overview of Hole Punching: ICMP Hole Punching, TCP Hole Punching, UDP...IRJET - Overview of Hole Punching: ICMP Hole Punching, TCP Hole Punching, UDP...
IRJET - Overview of Hole Punching: ICMP Hole Punching, TCP Hole Punching, UDP...
 
Ccnav5.org ccna 3-chapter_4_v50_2014_exam_answers
Ccnav5.org ccna 3-chapter_4_v50_2014_exam_answersCcnav5.org ccna 3-chapter_4_v50_2014_exam_answers
Ccnav5.org ccna 3-chapter_4_v50_2014_exam_answers
 
Mobile IP
Mobile IPMobile IP
Mobile IP
 
IRJET- Tracking of Vehicle’s Location using Probe Request
IRJET- Tracking of Vehicle’s Location using Probe RequestIRJET- Tracking of Vehicle’s Location using Probe Request
IRJET- Tracking of Vehicle’s Location using Probe Request
 
GaryVanGuelpenResume-20161202
GaryVanGuelpenResume-20161202GaryVanGuelpenResume-20161202
GaryVanGuelpenResume-20161202
 
Software Based Traffic Separation at the Access Layer
Software Based Traffic Separation at the Access LayerSoftware Based Traffic Separation at the Access Layer
Software Based Traffic Separation at the Access Layer
 
IT Essentials (Version 7.0) - ITE Chapter 5 Exam Answers
IT Essentials (Version 7.0) - ITE Chapter 5 Exam AnswersIT Essentials (Version 7.0) - ITE Chapter 5 Exam Answers
IT Essentials (Version 7.0) - ITE Chapter 5 Exam Answers
 
Novel Method to Overcome Vulnerability in Wi-Fi Network
Novel Method to Overcome Vulnerability in Wi-Fi NetworkNovel Method to Overcome Vulnerability in Wi-Fi Network
Novel Method to Overcome Vulnerability in Wi-Fi Network
 
IRJET- Implementation of Dynamic Internetworking in the Real World it Domain
IRJET-  	  Implementation of Dynamic Internetworking in the Real World it DomainIRJET-  	  Implementation of Dynamic Internetworking in the Real World it Domain
IRJET- Implementation of Dynamic Internetworking in the Real World it Domain
 
Service Provider Architectures for Tomorrow by Chow Khay Kid
Service Provider Architectures for Tomorrow by Chow Khay KidService Provider Architectures for Tomorrow by Chow Khay Kid
Service Provider Architectures for Tomorrow by Chow Khay Kid
 
CV Ritesh Dubai
CV Ritesh DubaiCV Ritesh Dubai
CV Ritesh Dubai
 
PRABA_GLOBAL_NOC
PRABA_GLOBAL_NOCPRABA_GLOBAL_NOC
PRABA_GLOBAL_NOC
 

More from Ram Dutt Shukla (20)

Ip Sec Rev1
Ip Sec Rev1Ip Sec Rev1
Ip Sec Rev1
 
Message Authentication
Message AuthenticationMessage Authentication
Message Authentication
 
Shttp
ShttpShttp
Shttp
 
Web Security
Web SecurityWeb Security
Web Security
 
I Pv6 Addressing
I Pv6 AddressingI Pv6 Addressing
I Pv6 Addressing
 
Anycast & Multicast
Anycast & MulticastAnycast & Multicast
Anycast & Multicast
 
Congestion Control
Congestion ControlCongestion Control
Congestion Control
 
Congestion Control
Congestion ControlCongestion Control
Congestion Control
 
Retransmission Tcp
Retransmission TcpRetransmission Tcp
Retransmission Tcp
 
Tcp Congestion Avoidance
Tcp Congestion AvoidanceTcp Congestion Avoidance
Tcp Congestion Avoidance
 
Tcp Immediate Data Transfer
Tcp Immediate Data TransferTcp Immediate Data Transfer
Tcp Immediate Data Transfer
 
Tcp Reliability Flow Control
Tcp Reliability Flow ControlTcp Reliability Flow Control
Tcp Reliability Flow Control
 
Tcp Udp Notes
Tcp Udp NotesTcp Udp Notes
Tcp Udp Notes
 
Transport Layer [Autosaved]
Transport Layer [Autosaved]Transport Layer [Autosaved]
Transport Layer [Autosaved]
 
Transport Layer
Transport LayerTransport Layer
Transport Layer
 
T Tcp
T TcpT Tcp
T Tcp
 
Anycast & Multicast
Anycast & MulticastAnycast & Multicast
Anycast & Multicast
 
Igmp
IgmpIgmp
Igmp
 
Mobile I Pv6
Mobile I Pv6Mobile I Pv6
Mobile I Pv6
 
Mld
MldMld
Mld
 

Recently uploaded

Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better StrongerModern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better Strongerpanagenda
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .Alan Dix
 
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Mark Goldstein
 
Decarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityDecarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityIES VE
 
Data governance with Unity Catalog Presentation
Data governance with Unity Catalog PresentationData governance with Unity Catalog Presentation
Data governance with Unity Catalog PresentationKnoldus Inc.
 
Connecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfConnecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfNeo4j
 
Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...
Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...
Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...Scott Andery
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxLoriGlavin3
 
A Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersA Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersNicole Novielli
 
Testing tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesTesting tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesKari Kakkonen
 
Assure Ecommerce and Retail Operations Uptime with ThousandEyes
Assure Ecommerce and Retail Operations Uptime with ThousandEyesAssure Ecommerce and Retail Operations Uptime with ThousandEyes
Assure Ecommerce and Retail Operations Uptime with ThousandEyesThousandEyes
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxLoriGlavin3
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxLoriGlavin3
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfLoriGlavin3
 
What is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfWhat is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfMounikaPolabathina
 
2024 April Patch Tuesday
2024 April Patch Tuesday2024 April Patch Tuesday
2024 April Patch TuesdayIvanti
 
A Framework for Development in the AI Age
A Framework for Development in the AI AgeA Framework for Development in the AI Age
A Framework for Development in the AI AgeCprime
 
UiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPathCommunity
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxLoriGlavin3
 
Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024Hiroshi SHIBATA
 

Recently uploaded (20)

Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better StrongerModern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .
 
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
 
Decarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityDecarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a reality
 
Data governance with Unity Catalog Presentation
Data governance with Unity Catalog PresentationData governance with Unity Catalog Presentation
Data governance with Unity Catalog Presentation
 
Connecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfConnecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdf
 
Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...
Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...
Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptx
 
A Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersA Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software Developers
 
Testing tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesTesting tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examples
 
Assure Ecommerce and Retail Operations Uptime with ThousandEyes
Assure Ecommerce and Retail Operations Uptime with ThousandEyesAssure Ecommerce and Retail Operations Uptime with ThousandEyes
Assure Ecommerce and Retail Operations Uptime with ThousandEyes
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdf
 
What is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfWhat is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdf
 
2024 April Patch Tuesday
2024 April Patch Tuesday2024 April Patch Tuesday
2024 April Patch Tuesday
 
A Framework for Development in the AI Age
A Framework for Development in the AI AgeA Framework for Development in the AI Age
A Framework for Development in the AI Age
 
UiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to Hero
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
 
Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024
 

Mobile IPv6 route optimization and its advantages over Mobile IPv4

  • 3. What is so different about Mobile IPv6 ?
  • 4.
  • 6. Triangle Routing Problem Triangle routing problem delays the delivery of the datagrams and places an unnecessary burden on networks and routers
  • 7.
  • 8.
  • 9.
  • 10. Is Mobile IPv6 the Solution?
  • 11.
  • 12. Basic Operation Data Path: Mobile Node to Correspondent Node in Basic Operation Data Path: Correspondent Node to Mobile Node in Basic Operation
  • 13. Route Optimization Data Path: Mobile Node to Correspondent Node in Route Optimization Data Path: Correspondent Node to Mobile Node in Route Optimization
  • 14.
  • 16.
  • 17.
  • 18. Return Routability Flow diagram Mobile Node Home Agent Correspondent Node | | | Home test Init | |-------------------------------  |---------------------------------------  | | Care of test init | |-------------------------------------------------------------------------> | | home test | |<----------------------------------|<------------------------------------ | | Care of Test | |  -------------------------------------------------------------------------|
  • 19.
  • 20.
  • 21.
  • 22.
  • 23. Binding Message Flow Diagram Mobile Node Correspondent Node | Binding Update | |-----------------------------------------------------------  | | (Seq no. , nonce indices , care of address) | | | | | | Binding ACK | |  ----------------------------------------------------------- | (Seq no. , status)
  • 24.
  • 25.
  • 26. Other Features and Functionality
  • 27.
  • 28.
  • 29.
  • 30.
  • 31.
  • 32.
  • 33.
  • 34.
  • 35.
  • 36. Vulnerabilities in Mobile IPv6
  • 37.
  • 38. Final Words – Mobile Ipv6
  • 39. “ Communications should be much faster,&quot; Deering says. &quot;We also thought it was going to be more secure. But now it doesn't look like it's going to be more secure.&quot;
  • 40. “ Backers of IPv6 have suffered another setback, as security experts punched holes in their planned strategy for supporting mobile IPv6 communications.”
  • 41.
  • 42.