In this ppt you'll learn about the packet delivery. How the Ip packet is delivered from transmitter to receiver when the Mobile node is in the Foreign network. Also you'll be able to learn all definitions like What is mobile node, correspondent node, Home agent, Foreign Agent, Tunneling, Encapsulation, COA(care of address) etc. After that you'll learn about the Agent advertisement and registering of care of address including different steps.
In this ppt you'll learn about the packet delivery. How the Ip packet is delivered from transmitter to receiver when the Mobile node is in the Foreign network. Also you'll be able to learn all definitions like What is mobile node, correspondent node, Home agent, Foreign Agent, Tunneling, Encapsulation, COA(care of address) etc. After that you'll learn about the Agent advertisement and registering of care of address including different steps.
SlideShare now has a player specifically designed for infographics. Upload your infographics now and see them take off! Need advice on creating infographics? This presentation includes tips for producing stand-out infographics. Read more about the new SlideShare infographics player here: http://wp.me/p24NNG-2ay
This infographic was designed by Column Five: http://columnfivemedia.com/
No need to wonder how the best on SlideShare do it. The Masters of SlideShare provides storytelling, design, customization and promotion tips from 13 experts of the form. Learn what it takes to master this type of content marketing yourself.
10 Ways to Win at SlideShare SEO & Presentation OptimizationOneupweb
Thank you, SlideShare, for teaching us that PowerPoint presentations don't have to be a total bore. But in order to tap SlideShare's 60 million global users, you must optimize. Here are 10 quick tips to make your next presentation highly engaging, shareable and well worth the effort.
For more content marketing tips: http://www.oneupweb.com/blog/
Are you new to SlideShare? Are you looking to fine tune your channel plan? Are you using SlideShare but are looking for ways to enhance what you're doing? How can you use SlideShare for content marketing tactics such as lead generation, calls-to-action to other pieces of your content, or thought leadership? Read more from the CMI team in their latest SlideShare presentation on SlideShare.
Each month, join us as we highlight and discuss hot topics ranging from the future of higher education to wearable technology, best productivity hacks and secrets to hiring top talent. Upload your SlideShares, and share your expertise with the world!
Not sure what to share on SlideShare?
SlideShares that inform, inspire and educate attract the most views. Beyond that, ideas for what you can upload are limitless. We’ve selected a few popular examples to get your creative juices flowing.
How to Make Awesome SlideShares: Tips & TricksSlideShare
Turbocharge your online presence with SlideShare. We provide the best tips and tricks for succeeding on SlideShare. Get ideas for what to upload, tips for designing your deck and more.
MOBILE IP_INTRODUCTION_OVERVIEW OF MOBILE IP_KEY MECHANISMS OF MOBILE IP_SCHEMATIC MODEL OF MOBILE IP_TUNNELLING_CARE OF ADDRESS-TCP_PACKET FORWARDING_TCP SLIDING WINDOWS
Peer-to-Peer Application Recognition Based on Signaling ActivityAcademia Sinica
Because of the enormous growth in the number of peer-to-peer (P2P) applications in recent years, P2P traffic now constitutes a substantial proportion of Internet traffic. The ability to accurately identify different P2P applications from the network traffic is essential for managing a number of network traffic issues, such as service differentiation and capacity planning. However, modern P2P applications often use proprietary protocols,dynamic port numbers, and packet encryptions, which make traditional identification approaches like port-based or signaturebased identification less effective.
In this paper, we propose an approach for accurately recognizing P2P applications running on monitored hosts based on signaling behavior, which is regulated by the underlying P2P protocol; therefore, each application possesses a distinguishing characteristic. We consider that the signaling behavior of each P2P application can serve as a unique signature for application identification. Our approach is particularly useful for three reasons: 1) it does not need to access the packet payload; 2) it recognizes applications based purely on their signaling behavior; and 3) it can identify particular P2P applications. The performance evaluation shows that 92% of a real-life traffic trace can be correctly recognized within a 5-minute monitoring period.
UNIT II MOBILE INTERNET PROTOCOL AND TRANSPORT LAYER
Overview of Mobile IP – Features of Mobile IP – Key Mechanism in Mobile IP – route Optimization. Overview of TCP/IP – Architecture of TCP/IP- Adaptation of TCP Window – Improvement in TCP Performance.
Presentation at Femtocell World Summit 2010 in London with featured speaker: Manish Singh, Vice President PLM, Continuous Computing
When: Tuesday, June 22, 2010
Time: 3:50- 4:15 p.m.
Topic: LTE Femtocells and Edge Offload
Q4. We used remote port forwarding in this scenario. How does local .pdfizabellejaeden956
Q4. We used remote port forwarding in this scenario. How does local port forwarding differ
from remote port forwarding?Q5. Discuss atleast two practical scenarios where port forwarding
can be used?
Solution
1)local forwarding: Specifies that the given port on the local (client) host is to be forwarded to
the given host and port on the remote side.
remote remote forwarding: Specifies that the given port on the remote (server) host is to be
forwarded to the given host and port on the local side.
2) practical scenarios:
Router:
internet service provider assigns one IP address to internet connection. All computers on the
internet need a unique IP address and those are diffrent from the ip address which assigned first
.Now based on the port forwarding the data can reach through the correct destionation.
Synthetic Fiber Construction in lab .pptxPavel ( NSTU)
Synthetic fiber production is a fascinating and complex field that blends chemistry, engineering, and environmental science. By understanding these aspects, students can gain a comprehensive view of synthetic fiber production, its impact on society and the environment, and the potential for future innovations. Synthetic fibers play a crucial role in modern society, impacting various aspects of daily life, industry, and the environment. ynthetic fibers are integral to modern life, offering a range of benefits from cost-effectiveness and versatility to innovative applications and performance characteristics. While they pose environmental challenges, ongoing research and development aim to create more sustainable and eco-friendly alternatives. Understanding the importance of synthetic fibers helps in appreciating their role in the economy, industry, and daily life, while also emphasizing the need for sustainable practices and innovation.
How to Make a Field invisible in Odoo 17Celine George
It is possible to hide or invisible some fields in odoo. Commonly using “invisible” attribute in the field definition to invisible the fields. This slide will show how to make a field invisible in odoo 17.
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdfTechSoup
In this webinar you will learn how your organization can access TechSoup's wide variety of product discount and donation programs. From hardware to software, we'll give you a tour of the tools available to help your nonprofit with productivity, collaboration, financial management, donor tracking, security, and more.
Instructions for Submissions thorugh G- Classroom.pptxJheel Barad
This presentation provides a briefing on how to upload submissions and documents in Google Classroom. It was prepared as part of an orientation for new Sainik School in-service teacher trainees. As a training officer, my goal is to ensure that you are comfortable and proficient with this essential tool for managing assignments and fostering student engagement.
Francesca Gottschalk - How can education support child empowerment.pptxEduSkills OECD
Francesca Gottschalk from the OECD’s Centre for Educational Research and Innovation presents at the Ask an Expert Webinar: How can education support child empowerment?
The Roman Empire A Historical Colossus.pdfkaushalkr1407
The Roman Empire, a vast and enduring power, stands as one of history's most remarkable civilizations, leaving an indelible imprint on the world. It emerged from the Roman Republic, transitioning into an imperial powerhouse under the leadership of Augustus Caesar in 27 BCE. This transformation marked the beginning of an era defined by unprecedented territorial expansion, architectural marvels, and profound cultural influence.
The empire's roots lie in the city of Rome, founded, according to legend, by Romulus in 753 BCE. Over centuries, Rome evolved from a small settlement to a formidable republic, characterized by a complex political system with elected officials and checks on power. However, internal strife, class conflicts, and military ambitions paved the way for the end of the Republic. Julius Caesar’s dictatorship and subsequent assassination in 44 BCE created a power vacuum, leading to a civil war. Octavian, later Augustus, emerged victorious, heralding the Roman Empire’s birth.
Under Augustus, the empire experienced the Pax Romana, a 200-year period of relative peace and stability. Augustus reformed the military, established efficient administrative systems, and initiated grand construction projects. The empire's borders expanded, encompassing territories from Britain to Egypt and from Spain to the Euphrates. Roman legions, renowned for their discipline and engineering prowess, secured and maintained these vast territories, building roads, fortifications, and cities that facilitated control and integration.
The Roman Empire’s society was hierarchical, with a rigid class system. At the top were the patricians, wealthy elites who held significant political power. Below them were the plebeians, free citizens with limited political influence, and the vast numbers of slaves who formed the backbone of the economy. The family unit was central, governed by the paterfamilias, the male head who held absolute authority.
Culturally, the Romans were eclectic, absorbing and adapting elements from the civilizations they encountered, particularly the Greeks. Roman art, literature, and philosophy reflected this synthesis, creating a rich cultural tapestry. Latin, the Roman language, became the lingua franca of the Western world, influencing numerous modern languages.
Roman architecture and engineering achievements were monumental. They perfected the arch, vault, and dome, constructing enduring structures like the Colosseum, Pantheon, and aqueducts. These engineering marvels not only showcased Roman ingenuity but also served practical purposes, from public entertainment to water supply.
The French Revolution, which began in 1789, was a period of radical social and political upheaval in France. It marked the decline of absolute monarchies, the rise of secular and democratic republics, and the eventual rise of Napoleon Bonaparte. This revolutionary period is crucial in understanding the transition from feudalism to modernity in Europe.
For more information, visit-www.vavaclasses.com
Biological screening of herbal drugs: Introduction and Need for
Phyto-Pharmacological Screening, New Strategies for evaluating
Natural Products, In vitro evaluation techniques for Antioxidants, Antimicrobial and Anticancer drugs. In vivo evaluation techniques
for Anti-inflammatory, Antiulcer, Anticancer, Wound healing, Antidiabetic, Hepatoprotective, Cardio protective, Diuretics and
Antifertility, Toxicity studies as per OECD guidelines
Unit 8 - Information and Communication Technology (Paper I).pdfThiyagu K
This slides describes the basic concepts of ICT, basics of Email, Emerging Technology and Digital Initiatives in Education. This presentations aligns with the UGC Paper I syllabus.
Operation “Blue Star” is the only event in the history of Independent India where the state went into war with its own people. Even after about 40 years it is not clear if it was culmination of states anger over people of the region, a political game of power or start of dictatorial chapter in the democratic setup.
The people of Punjab felt alienated from main stream due to denial of their just demands during a long democratic struggle since independence. As it happen all over the word, it led to militant struggle with great loss of lives of military, police and civilian personnel. Killing of Indira Gandhi and massacre of innocent Sikhs in Delhi and other India cities was also associated with this movement.
Acetabularia Information For Class 9 .docxvaibhavrinwa19
Acetabularia acetabulum is a single-celled green alga that in its vegetative state is morphologically differentiated into a basal rhizoid and an axially elongated stalk, which bears whorls of branching hairs. The single diploid nucleus resides in the rhizoid.
2. Background
• With new applications developing at a rapid
pace, and advancements in Mobile
Computing technology, the number of users
replacing their desktop PCs with super-
portable laptops is on the up.
3. Topics covered
• Simple overview : Mobile IP
• Tunneling
• TCP Comparison
• Route Optimization
• Mobile IP in IPv6
4. Design Goals : Mobile IP
• Make size and frequency of routing updates
as small as possible.
• Software level : Simplicity in
implementation
• Allow mobile nodes to operate with on one
IP address, instead of a spool of addresses.
5. Terminology
• Mobile Node
• Home Address, Home Link, and Home
Agent.
• Care-of Address, Foreign Link, and Foreign
Agent.
6. Components : Mobile IP
• Agent Discovery : Provides information
about home and foreign agents to the
mobile node.
• Registration : Mobile node requests services
from its foreign agent.
• Mobile IP defines the rules for routing any
type of packet - unicast, multicast, and
broadcast.
7. Overview of Operation
• When a mobile host moves out of its home
site, it contacts the closest foreign agent.
• Registration takes place.
• Previous foreign(local) agent if any are
notified regarding the change.
• Communication starts. (also known as
triangle routing).
8. Overview of Operation
Figure 1 :CN sending data to MN at home
Correspondent node
bulk data
acknowledgements
Home agent Foreign agent
bulk
adv
acknowledgements
Scenario A:
Mobile node No tunnelling
No fragmentation
No dogleg route
9. Overview of Operation
Figure 2:MN sending data to CN from home
Correspondent node
acknowledgements
bulk data
Home agent Foreign agent
acknowledgements
adv
Scenario B:
bulk
No tunnelling
Mobile node No fragmentation
No dogleg route
10. Overview of Operation
Figure 3:CN sending data to MN through Foreign Agent
Correspondent node
bulk data acknowledgements
tunnelled bulk data
Home agent Foreign agent
bulk data
Scenario C: adv
MTU is 1500 bytes acknowledgements
Tunnelling of bulk data
Fragmentation Mobile node
Dogleg route
11. Overview of Operation
Figure 4:MN sending data to CN via Foreign Agent
Correspondent node
acknowledgements bulk data
tunnelled acknowledgements
Foreign agent
Home agent
acknowledgements
Scenario D: adv
No tunnelling of data bulk data
Tunnelling of acks
No fragmentation Mobile node
Dogleg route
13. Scenario 1:
Correspondent node
bulk data
acknowledgements
Home agent Foreign agent
bulk
adv
acknowledgements
Scenario A:
Mobile node No tunnelling
No fragmentation
No dogleg route
Fig. 1 - Mobile node is receiving bulk data from the
correspondent node while the mobile node is at home. MTU
is 1500 bytes
14. Scenario 2:
Correspondent node
acknowledgements
bulk data
Home agent Foreign agent
acknowledgements
adv
Scenario B:
bulk
No tunnelling
Mobile node No fragmentation
No dogleg route
Fig. 2 - Mobile node is sending bulk data to the
correspondent node while the mobile node is at home. MTU
is 1500 bytes
15. Scenario 3:
Correspondent node
bulk data acknowledgements
tunnelled bulk data
Home agent Foreign agent
bulk data
Scenario C: adv
MTU is 1500 bytes acknowledgements
Tunnelling of bulk data
Fragmentation Mobile node
Dogleg route
Fig. 3 - Mobile node is receiving bulk data from the
correspondent node while the mobile node is at a foreign
network. MTU is 1500 bytes
16. Scenario 4:
Correspondent node
acknowledgements bulk data
tunnelled acknowledgements
Foreign agent
Home agent
acknowledgements
Scenario D: adv
No tunnelling of data bulk data
Tunnelling of acks
No fragmentation Mobile node
Dogleg route
Fig. 4 - Mobile node is sending bulk data to the
correspondent node while the mobile node is at a foreign
network. MTU is 1500 bytes
17. Scenario 5:
Correspondent node
bulk data acknowledgements
tunnelled bulk data
Home agent Foreign agent
bulk data
adv
acknowledgements
Scenario E:
MTU is 1450 bytes Mobile node
Tunnelling of bulk data
No fragmentation
Dogleg route
Fig. 5 - Mobile node is receiving bulk data from the
correspondent node while the mobile node is at a foreign
network. MTU is 1450 bytes
18. Comparisons: Differences in Setup
Scenario : Sender of the Location of MTU (in
file mobile node bytes)
A CN At home 1500
B MN At home 1500
C CN At foreign 1500
D MN At foreign 1500
E CN At foreign 1450
Table 1 - Differences in setup between the five different scenario
19. Comparisons: Presence of tunneling, fragmentation
and dogleg route
Scenario : Tunnelling Fragmentation Dogleg route
overhead overhead overhead
present? present? present?
A No No No
B No No No
C Yes Yes Yes
D Yes No No
E Yes No Yes
20. Test Details
• MTU in scenario 5 was reduced solely to
prevent fragmentation.
• Comparison using FTP file transfer, 30.2
MB file ≈ 241.6 Mbits
• Repeated 20 times
• Throughput = file size / mean transfer time
• % throughput = throughput / maximum
capacity of link
21. Comparisons: Mean transfer time and standard
deviation for FTP file transfer
Scenario : Mean transfer Standard Throughput
time (s) deviation (s) (Mbit/s)
A 41.21 1.81 5.86
B 43.30 1.04 5.58
C 78.22 1.43 3.09
D 46.17 1.14 5.23
E 75.62 1.33 3.19
22. Evaluations
• File transfer takes 90% more time to complete, with all 3
overheads.
• Encapsulation and Decapsulation of bulk data or
acknowledgments takes the same time
• The longer route results in a higher delay before the
packets reach the mobile node
• Link usage will increase if the IP packet and its
encapsulated form both use the same link while being
routed to the destination
• The tunneling overhead causes the file transfer to take
about 7% more time to complete
23. Evaluations
• Fragmentation overhead causes the file transfer to take
about 6% more time to complete
• The dogleg route overhead obtained using this method
causes the file transfer to take about 80% more time to
complete
• The handover overhead will depend on the TCP handover
latency, the frequency of handoffs, the duration of the TCP
connection and the agent advertisement interval
• The TCP handover latency is about 60% more than the
MIP network handover latency
24. Evaluations
• The handover overhead is about 13%.
• Two ways of reducing the handover overhead:
– reduce the retransmission timer value
– reduce the agent advertisement interval.
• Tradeoff: bandwidth consumption
25. Route Optimization and
Authentication
• The paper describes the Internet Mobile
Host Protocol with the following features:
– route optimization
– authentication of management packets
– performance and operational
transparency to the user.
26. IMHP Architecture Entities
• Mobile host
– unique home address
• Local Agent
– helps mobile host register, provides care-
off address
– maintains a visitor list
• lists all the mobile hosts
• needs to be refreshed
27. IMHP Architecture Entities
• Cache Agent
– Maintains the location cache
– using cache entry the data packet is
“tunneled” to the mobile host.
• Done by including a small IMHP header
• adds 8 or 12 bytes of overhead to each
packet
28. IMHP Architecture Entities
• Home Agent
– maintains a home list
– special case: home agent maintains a
visitor entry for mobile host
– must also be a cache agent for its mobile
hosts
29. Authentication
• Basically required to authenticate
binding and management packets.
• MH to HA : by including an
authenticator based on a shared secret
• General Authentication: node sends a
request for binding with random
number and gets reply with the same
number.
30. Authentication
• Use of route flag in management packet to
enforce normal IP routing of packet.
• Local agent authenticates visitor list entries
from the home agent.
• All entries into lists are timer based.
31. Optimization
• special tunnel packet - destination of
tunnel is same as destination of packet.
• Specified as a set of forwarding rules
for the IMHP entities.
32. Rules for forwarding
• Node receives tunneled packet with its
own destination address.
• Node receives a non-tunneled packet
with its own destination address
33. Rules: Home Agent
• HA receives an IMHP management
packet with route flag set.
• HA receives a special tunnel packet.
• HA receives packet for one of its
mobile hosts
– HA has a visitor entry for the host.
– HA does not have a visitor entry.
34. Rules: Home Agent
• HA never tunnels a packet back to a
node that has just tunneled the packet
to it.
35. Rules: Other Agents
• Receives special tunnel packet with route
flag set.
• LA receives a tunneled packet for host in
visitor list.
• LA receives a regular packet for host in
visitor list
• CA receives a packet and has an entry in its
location cache.
36. Rules: Other Agents
• Receives packet that was tunneled directly
to this node, and the agent is unable to
forward it further.
– Solution : special tunnel
37. Bindings
• Binding notifications:
– MH notifies HA and previous LA about
“change of address”.
– Any node can notify any other node
about wrong binding information stored
by it.
– Notification Back-off
38. IMHP : Other Issues
• restrictions on advertising bindings - use of
private flag.
• MH in Popup Mode
– requires facilities such as DHCP
– acts as its own local agent.
– Binding should be kept private
• Performance of MH at home should be like
a stationary host.
39. Mobility Support in IPv6
• IPv6:
– 128 bit address space
– link local addresses
• Extension headers : Destination
Options header, hop-by-hop header,
routing header and an authentication
header.
40. Overview of Mobile IPv6
• All packets carrying information must be
authenticated.
• Avoid “remote redirection” attacks
• Allows MH to allow more than one care-of
addresses at a time, but registers only one of
its bindings.
• Allows CH to dynamically learn the MH’s
binding. In this case it uses the Routing
header but does not encapsulate.
41. Overview of Mobile IPv6
• Reasonable to expect all the IPv6 nodes to
have caching capabilities.
• Implementation of the Binding Updates and
Binding Acknowledgments - the key to
reliability and optimization.
42. Binding Update Option
• Provides optimization and performance in
IPv6
• Used by mobile host to:
– notify home agent of its primary care-of
address
– notify correspondent nodes of its current
binding
• Binding Updates should always be
authenticated.
44. Binding Update Format
• Lifetime:time duration for which the
binding remains valid.
• Identification: To ensure in order
processing of updates.
• Care-of address: Holds the current care of
address
45. Binding Update Format
• Flags:
– H: Destination requested to serve as home
agent.
– A: Acknowledgment expected
– L:Link Local address present
• Updates could be retransmitted if there is no
acknowledgment.
47. Binding Acknowledgment Format
• Code: indicates whether binding update
was accepted or rejected.
– < 128 update accepted
– >= 128 update rejected
• Lifetime: during for which node will retain
the binding.
• Refresh: time interval for sending updates
• Identification: Same number as the update.
48. Sending Updates
• First update sent to home agent to register
the new care-of address.
– From another foreign network
– From the home network
• Can be included in a regular packet or sent
alone.
• Only the mobile node can send its own
binding updates.
49. Movement detection
• Neighbor Discovery protocol including
Router Discovery and Neighbor
Unreachability Detection to create list
• Selects the default router from the list
• configures its care-off address
50. Unreachability
• detecting unreachability
– using the Neighbor Unreachability detection
– using the higher layers
– using the lower layers.
– When not receiving packets
51. Smooth Handoffs
• Using overlapping cells - accept packets at
multiple addresses for a short while.
• Router Assisted - Previous router can
forward packets to new local router.
• Renumbering the home network
52. CH & HA Operations
• Sending packet to MH
• Handling ICMP error messages
• Home agent discovery
53. More information on Mobile IP
• National University of Singapore
• Carnegie Mellon University
• Columbia University
54. • Presentation based on the reading
list sent out earlier.
All diagrams and tables have been included
from the reading list research papers.
55. Mobile IP
Prashant Bhargava
CS 599 : Wireless Communications
and Mobile Computing
602 08 8857
Editor's Notes
06/11/12
06/11/12 With the Internet explosion, everyone wants to or has to be connected. Mobile IP provides the required solution for hosts to stay mobile.
06/11/12
06/11/12
06/11/12 mobile host/node : A node that can change its link-level point of attachment from one IP subnet to another, while still being reachable via its home address. home address : An IP address assigned to a mobile node within its home subnet. The network prefix in a mobile node's home address is equal to the network prefix of the home subnet. home net (subnet) : The IP subnet indicated by a mobile node's home address. Standard IP routing mechanisms will deliver packets destined for a mobile node's home address to its home subnet. home agent : A router on a mobile node's home subnet with which the mobile node has registered its current care-of address. While the mobile node is away from home, the home agent intercepts packets on the home subnet destined to the mobile node's home address, encapsulates them, and tunnels them to the mobile node's registered care-of address. care-of address : An IP address associated with a mobile node while visiting a foreign subnet, which uses the network prefix of that foreign subnet. Among the multiple care-of addresses that a mobile node may have at a time (e.g., with different network prefixes), the one registered with the mobile node's home agent is called its &quot;primary” care-of address.