SlideShare a Scribd company logo
The problem with IP ?     1.   An IP address is associated with a fixed network    location.      2.  When we go to office, university or workplace and access  the internet from a fixed IP address. This IP address may be for a desktop or laptop computer.      3. In IP, if we take computer to a different place, outside our usual network  we have to reconfigure  it with a new IP.
Why MOBILE IP is needed ?   1.Mobile IP is enhancement to IP which allows a computer to roam fully on the internet while still maintaining the same IP address.   2. The applications feel that the mobile computer is connected to its usual IP address even if it is far away from its home network.
 Two Addresses in Mobile IP 1.Home address-The host had its original address, called the Home Address.  It  is associated with the home network. 2.Care of address-The temporary  address  of the host is called as Care of Address. It is associated with the foreign network. The mobile node gets a new care-of address every time it connects to a new point ofattachment.
Home Agent & Home Network    1.The home network contains a network node called Home Agent. The home address of the mobile node is the IP address of the home agent.   2. The home agent is responsible for receiving all the packets sent to the mobile node when the mobile node is away.     3. It is the responsibility of the home agent to deliver the packets to the mobile node at its current point of attachment
Foreign Agent and Foreign Network 1.When a mobile node moves, it first connects to a foreign agent in a foreign network. 2.Next, the mobile node is assigned a care-ofaddress (an IP address) by the foreign network.  3.The  node now registers its care-of address with the home agent.
4.The foreign agent is usually a router attached to the foreign network. 5.The foreign agent recieves and delivers packets sent by the home agent to the mobile hosts.6.When the mobile host acts as a foreign agent the care -of address is called as co-located care of address
Correspondent  Node 1.A correspondent node is a computer that sends packets to the mobile node. A correspondent node is typically connected to its own home network 2. A correspondent node is aware of only the IP address of the mobile node in the home network of the mobile node 3.Any packet from the correspondent node is delivered to the home agent
A Schematic Diagram of Mobile IP Mobile node Foreign agent Correspondent Node Home agent
The Phases
1st phase:  Discovering the care-of Address 1.In mobile IP, both a foreign agent and a home agent periodically broadcast agent advertisement messages 2. A mobile host must discover(learn the address of) a home agent before it leaves the home agent. 3.A mobile host must also discover a foreign agent after it moved to a foreign network.
Agent Advertisement An agent advertisement has the functions  1.It allows mobile nodes to discover foreign agents and get care-of addresses. 2. It allows the mobile node to know the services provided by the foreign agent.  3. It allows the mobile node to determine whether an agent is its home agent or a foreign agent
Agent Advertisement
Solicitation from a Mobile Node 1.When an mobile host has moved to a new network and has not recieved agent advertisements,it can initiate an agent solicitation. 2. A mobile node can generate agent solicitationmessages when it is looking for a foreign agent.
 2nd phase:  Registration 1.When a mobile node receives a care-of address from a foreign agent, its home agent needs to be informed. 2. The mobile node sends a registration request to its home agent through the foreign agent who has provided the new care-of address. 3. When the home agent receives the request, it updates its routing table and sends a registration reply back to the foreign agent.
Registration Request and Reply
Registration request format
Registration  reply format
3rd phase:  Data Transfer 1. When a remote host wants to send a packet to the mobile host, it uses its address as the source address and the home address of the mobile host as the destination address .  2. After receiving the packet , the home agent sends  the packet to the foreign agent . The home agent encapsulates the whole IP packet inside another IP packet using its address as the source  and the foreign agent’s as the destination address.
4. When the foreign agent recieves the packet ,it   removes the original packet. Since  the destination    address is the home address  of the mobile host ,the foreign agent consults a registry table to find the care of address.5. When a mobile host wants to send a packet to a remote host,it sends as it done normally.The mobile host prepares a packet with its home address as the source and the address of the remote host as the destination.
Tunneling and IP within IP The transfer of the packet from the home agent to the care-of address is called tunneling. The home agent is the source of the tunnel. The home agent inserts a new tunnel header in front of the IP header of a packet addressed to the mobile agent and received by the home agent The tunnel header is the care-of IP address of the mobile node. The old header is preserved as it was in the original packet.
4. The foreign agent is the receiver of the tunnel 5 .When the foreign agent receives the tunneled     packet, it has to delete the tunnel header to recover the original packet.  6.The foreign agent delivers the packet to the mobile node after removing the tunnel header
INEFFICIENCY IN MOBILE IP ,[object Object],INEFFICIENCY IN MOBILE IP 1. Double Crossing  2.Triangle Routing
[object Object],[object Object],[object Object]
THANK YOU
Mobile ip np
Mobile ip np

More Related Content

What's hot

Voice in 4G: CSFB, VoIP & VoLTE
Voice in 4G: CSFB, VoIP & VoLTEVoice in 4G: CSFB, VoIP & VoLTE
Voice in 4G: CSFB, VoIP & VoLTE
3G4G
 
Fttx fiber-count-planning-calculation
Fttx fiber-count-planning-calculationFttx fiber-count-planning-calculation
Fttx fiber-count-planning-calculation
Karthik Govin
 
Fundamentals of Mobile Network Sharing
Fundamentals of Mobile Network SharingFundamentals of Mobile Network Sharing
Fundamentals of Mobile Network Sharing
Dr. Kim (Kyllesbech Larsen)
 
LI Solutions
LI SolutionsLI Solutions
SGSN- serving gprs support node - Platform - HW, SW and CLI
SGSN- serving gprs support node  - Platform - HW, SW and CLI SGSN- serving gprs support node  - Platform - HW, SW and CLI
SGSN- serving gprs support node - Platform - HW, SW and CLI
Mustafa Golam
 
Synchronization for 5G Deployments
Synchronization for 5G DeploymentsSynchronization for 5G Deployments
Synchronization for 5G Deployments
Dhiman Chowdhury
 
3GPP LTE Detailed explanation 5 (S1 Handover)
3GPP LTE Detailed explanation 5 (S1 Handover)3GPP LTE Detailed explanation 5 (S1 Handover)
3GPP LTE Detailed explanation 5 (S1 Handover)
Ryuichi Yasunaga
 
EC8004 wireless networks unit 1 IEEE802.11
EC8004 wireless networks unit 1 IEEE802.11EC8004 wireless networks unit 1 IEEE802.11
EC8004 wireless networks unit 1 IEEE802.11
HemalathaR31
 
Redes - VoIP Teoria
Redes - VoIP TeoriaRedes - VoIP Teoria
Redes - VoIP Teoria
Luiz Arthur
 
CS-Core Mobile Network (General)
CS-Core Mobile Network (General)CS-Core Mobile Network (General)
CS-Core Mobile Network (General)
Hamidreza Bolhasani
 
Phân biện TCP và UDP
Phân biện TCP và UDPPhân biện TCP và UDP
Phân biện TCP và UDP
PhamTuanKhiem
 
How Can CoMP Extend 5G NR to High Capacity & Ultra-Reliable Communications?
 How Can CoMP Extend 5G NR to High Capacity & Ultra-Reliable Communications? How Can CoMP Extend 5G NR to High Capacity & Ultra-Reliable Communications?
How Can CoMP Extend 5G NR to High Capacity & Ultra-Reliable Communications?
Qualcomm Research
 
Mobile internet protocol
Mobile internet protocolMobile internet protocol
Mobile internet protocol
SaranyaK68
 
Gb over ip
Gb over ipGb over ip
Gb over ip
sriwijayamataram
 
Best practices-lte-call-flow-guide
Best practices-lte-call-flow-guideBest practices-lte-call-flow-guide
Best practices-lte-call-flow-guide
Morg
 
LTE Dimensioning
LTE DimensioningLTE Dimensioning
LTE Dimensioning
Denmark Wilson
 
High-level architecture of Mobile Cellular Networks from 2G to 5G
High-level architecture of Mobile Cellular Networks from 2G to 5GHigh-level architecture of Mobile Cellular Networks from 2G to 5G
High-level architecture of Mobile Cellular Networks from 2G to 5G
3G4G
 
5G Network Architecture Options
5G Network Architecture Options5G Network Architecture Options
5G Network Architecture Options
3G4G
 
Mobile IP
Mobile IPMobile IP
Mobile IP
shankul07
 
Lte ue initial attach & detach from networkx
Lte ue initial attach & detach from networkxLte ue initial attach & detach from networkx
Lte ue initial attach & detach from networkx
tharinduwije
 

What's hot (20)

Voice in 4G: CSFB, VoIP & VoLTE
Voice in 4G: CSFB, VoIP & VoLTEVoice in 4G: CSFB, VoIP & VoLTE
Voice in 4G: CSFB, VoIP & VoLTE
 
Fttx fiber-count-planning-calculation
Fttx fiber-count-planning-calculationFttx fiber-count-planning-calculation
Fttx fiber-count-planning-calculation
 
Fundamentals of Mobile Network Sharing
Fundamentals of Mobile Network SharingFundamentals of Mobile Network Sharing
Fundamentals of Mobile Network Sharing
 
LI Solutions
LI SolutionsLI Solutions
LI Solutions
 
SGSN- serving gprs support node - Platform - HW, SW and CLI
SGSN- serving gprs support node  - Platform - HW, SW and CLI SGSN- serving gprs support node  - Platform - HW, SW and CLI
SGSN- serving gprs support node - Platform - HW, SW and CLI
 
Synchronization for 5G Deployments
Synchronization for 5G DeploymentsSynchronization for 5G Deployments
Synchronization for 5G Deployments
 
3GPP LTE Detailed explanation 5 (S1 Handover)
3GPP LTE Detailed explanation 5 (S1 Handover)3GPP LTE Detailed explanation 5 (S1 Handover)
3GPP LTE Detailed explanation 5 (S1 Handover)
 
EC8004 wireless networks unit 1 IEEE802.11
EC8004 wireless networks unit 1 IEEE802.11EC8004 wireless networks unit 1 IEEE802.11
EC8004 wireless networks unit 1 IEEE802.11
 
Redes - VoIP Teoria
Redes - VoIP TeoriaRedes - VoIP Teoria
Redes - VoIP Teoria
 
CS-Core Mobile Network (General)
CS-Core Mobile Network (General)CS-Core Mobile Network (General)
CS-Core Mobile Network (General)
 
Phân biện TCP và UDP
Phân biện TCP và UDPPhân biện TCP và UDP
Phân biện TCP và UDP
 
How Can CoMP Extend 5G NR to High Capacity & Ultra-Reliable Communications?
 How Can CoMP Extend 5G NR to High Capacity & Ultra-Reliable Communications? How Can CoMP Extend 5G NR to High Capacity & Ultra-Reliable Communications?
How Can CoMP Extend 5G NR to High Capacity & Ultra-Reliable Communications?
 
Mobile internet protocol
Mobile internet protocolMobile internet protocol
Mobile internet protocol
 
Gb over ip
Gb over ipGb over ip
Gb over ip
 
Best practices-lte-call-flow-guide
Best practices-lte-call-flow-guideBest practices-lte-call-flow-guide
Best practices-lte-call-flow-guide
 
LTE Dimensioning
LTE DimensioningLTE Dimensioning
LTE Dimensioning
 
High-level architecture of Mobile Cellular Networks from 2G to 5G
High-level architecture of Mobile Cellular Networks from 2G to 5GHigh-level architecture of Mobile Cellular Networks from 2G to 5G
High-level architecture of Mobile Cellular Networks from 2G to 5G
 
5G Network Architecture Options
5G Network Architecture Options5G Network Architecture Options
5G Network Architecture Options
 
Mobile IP
Mobile IPMobile IP
Mobile IP
 
Lte ue initial attach & detach from networkx
Lte ue initial attach & detach from networkxLte ue initial attach & detach from networkx
Lte ue initial attach & detach from networkx
 

Similar to Mobile ip np

Mobile IP
Mobile IPMobile IP
Mobile IP
Nijo Job
 
IT6601 Mobile Computing Unit II
IT6601 Mobile Computing Unit IIIT6601 Mobile Computing Unit II
IT6601 Mobile Computing Unit II
pkaviya
 
Ip packet delivery
Ip packet deliveryIp packet delivery
Ip packet delivery
SOURABH KUMAR
 
IT8602 - Mobile Communication Unit IV
IT8602 - Mobile Communication   Unit IV IT8602 - Mobile Communication   Unit IV
IT8602 - Mobile Communication Unit IV
pkaviya
 
Mobile ip group_3
Mobile ip group_3Mobile ip group_3
Mobile ip group_3
Maulik Patel
 
Mobility And Mobile I Pv4
Mobility And Mobile I Pv4Mobility And Mobile I Pv4
Mobility And Mobile I Pv4
Ram Dutt Shukla
 
Report
ReportReport
Computer networks final presentation
Computer networks final presentationComputer networks final presentation
Computer networks final presentation
JosephLiddell
 
Mobile IP
Mobile IP Mobile IP
Mobile IP
Er. Rahul Jain
 
Key mechanism of mobile ip
Key mechanism of mobile ip Key mechanism of mobile ip
Key mechanism of mobile ip
priya Nithya
 
Mobile IP
Mobile IPMobile IP
Mobile IP
DanielaSalazar3
 
Mobile ip
Mobile ipMobile ip
Mobile ip
Keya Kundu
 
Unit 2
Unit 2Unit 2
Unit 2
RadhikaM42
 
Mobile ip presented by nafiz
Mobile ip   presented by nafizMobile ip   presented by nafiz
Mobile ip presented by nafiz
Nafiz Ishtiaque Ahmed
 
Unit 3
Unit 3Unit 3
Mobile ip presentation
Mobile ip presentationMobile ip presentation
Mobile ip presentation
Sifat Hossain
 
Mobile computing Unit III MANET Notes
Mobile computing Unit III MANET NotesMobile computing Unit III MANET Notes
Mobileip 161105154557
Mobileip 161105154557Mobileip 161105154557
Mobileip 161105154557
balaji raja rajan Venkatachalam
 
Mobile IP
Mobile IPMobile IP
Mobile IP
Mukesh Chinta
 
Mobileip 161105154557
Mobileip 161105154557Mobileip 161105154557
Mobileip 161105154557
balaji raja rajan Venkatachalam
 

Similar to Mobile ip np (20)

Mobile IP
Mobile IPMobile IP
Mobile IP
 
IT6601 Mobile Computing Unit II
IT6601 Mobile Computing Unit IIIT6601 Mobile Computing Unit II
IT6601 Mobile Computing Unit II
 
Ip packet delivery
Ip packet deliveryIp packet delivery
Ip packet delivery
 
IT8602 - Mobile Communication Unit IV
IT8602 - Mobile Communication   Unit IV IT8602 - Mobile Communication   Unit IV
IT8602 - Mobile Communication Unit IV
 
Mobile ip group_3
Mobile ip group_3Mobile ip group_3
Mobile ip group_3
 
Mobility And Mobile I Pv4
Mobility And Mobile I Pv4Mobility And Mobile I Pv4
Mobility And Mobile I Pv4
 
Report
ReportReport
Report
 
Computer networks final presentation
Computer networks final presentationComputer networks final presentation
Computer networks final presentation
 
Mobile IP
Mobile IP Mobile IP
Mobile IP
 
Key mechanism of mobile ip
Key mechanism of mobile ip Key mechanism of mobile ip
Key mechanism of mobile ip
 
Mobile IP
Mobile IPMobile IP
Mobile IP
 
Mobile ip
Mobile ipMobile ip
Mobile ip
 
Unit 2
Unit 2Unit 2
Unit 2
 
Mobile ip presented by nafiz
Mobile ip   presented by nafizMobile ip   presented by nafiz
Mobile ip presented by nafiz
 
Unit 3
Unit 3Unit 3
Unit 3
 
Mobile ip presentation
Mobile ip presentationMobile ip presentation
Mobile ip presentation
 
Mobile computing Unit III MANET Notes
Mobile computing Unit III MANET NotesMobile computing Unit III MANET Notes
Mobile computing Unit III MANET Notes
 
Mobileip 161105154557
Mobileip 161105154557Mobileip 161105154557
Mobileip 161105154557
 
Mobile IP
Mobile IPMobile IP
Mobile IP
 
Mobileip 161105154557
Mobileip 161105154557Mobileip 161105154557
Mobileip 161105154557
 

Recently uploaded

Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Speck&Tech
 
Building RAG with self-deployed Milvus vector database and Snowpark Container...
Building RAG with self-deployed Milvus vector database and Snowpark Container...Building RAG with self-deployed Milvus vector database and Snowpark Container...
Building RAG with self-deployed Milvus vector database and Snowpark Container...
Zilliz
 
Pushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 daysPushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 days
Adtran
 
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
Neo4j
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
Ana-Maria Mihalceanu
 
Artificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopmentArtificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopment
Octavian Nadolu
 
Mind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AIMind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AI
Kumud Singh
 
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy SurveyTrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
ControlCase
 
Large Language Model (LLM) and it’s Geospatial Applications
Large Language Model (LLM) and it’s Geospatial ApplicationsLarge Language Model (LLM) and it’s Geospatial Applications
Large Language Model (LLM) and it’s Geospatial Applications
Rohit Gautam
 
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdfUnlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Malak Abu Hammad
 
Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
Alpen-Adria-Universität
 
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdfUni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems S.M.S.A.
 
20 Comprehensive Checklist of Designing and Developing a Website
20 Comprehensive Checklist of Designing and Developing a Website20 Comprehensive Checklist of Designing and Developing a Website
20 Comprehensive Checklist of Designing and Developing a Website
Pixlogix Infotech
 
UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6
DianaGray10
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
Quotidiano Piemontese
 
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AIEnchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Vladimir Iglovikov, Ph.D.
 
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
Neo4j
 
How to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptxHow to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptx
danishmna97
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
Aftab Hussain
 

Recently uploaded (20)

Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
 
Building RAG with self-deployed Milvus vector database and Snowpark Container...
Building RAG with self-deployed Milvus vector database and Snowpark Container...Building RAG with self-deployed Milvus vector database and Snowpark Container...
Building RAG with self-deployed Milvus vector database and Snowpark Container...
 
Pushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 daysPushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 days
 
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
 
Artificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopmentArtificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopment
 
Mind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AIMind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AI
 
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy SurveyTrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy Survey
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
 
Large Language Model (LLM) and it’s Geospatial Applications
Large Language Model (LLM) and it’s Geospatial ApplicationsLarge Language Model (LLM) and it’s Geospatial Applications
Large Language Model (LLM) and it’s Geospatial Applications
 
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdfUnlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
 
Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
 
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdfUni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdf
 
20 Comprehensive Checklist of Designing and Developing a Website
20 Comprehensive Checklist of Designing and Developing a Website20 Comprehensive Checklist of Designing and Developing a Website
20 Comprehensive Checklist of Designing and Developing a Website
 
UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
 
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AIEnchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AI
 
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
 
How to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptxHow to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptx
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
 

Mobile ip np

  • 1. The problem with IP ? 1. An IP address is associated with a fixed network location. 2. When we go to office, university or workplace and access the internet from a fixed IP address. This IP address may be for a desktop or laptop computer. 3. In IP, if we take computer to a different place, outside our usual network we have to reconfigure it with a new IP.
  • 2. Why MOBILE IP is needed ? 1.Mobile IP is enhancement to IP which allows a computer to roam fully on the internet while still maintaining the same IP address. 2. The applications feel that the mobile computer is connected to its usual IP address even if it is far away from its home network.
  • 3. Two Addresses in Mobile IP 1.Home address-The host had its original address, called the Home Address. It is associated with the home network. 2.Care of address-The temporary address of the host is called as Care of Address. It is associated with the foreign network. The mobile node gets a new care-of address every time it connects to a new point ofattachment.
  • 4. Home Agent & Home Network 1.The home network contains a network node called Home Agent. The home address of the mobile node is the IP address of the home agent. 2. The home agent is responsible for receiving all the packets sent to the mobile node when the mobile node is away. 3. It is the responsibility of the home agent to deliver the packets to the mobile node at its current point of attachment
  • 5. Foreign Agent and Foreign Network 1.When a mobile node moves, it first connects to a foreign agent in a foreign network. 2.Next, the mobile node is assigned a care-ofaddress (an IP address) by the foreign network. 3.The node now registers its care-of address with the home agent.
  • 6. 4.The foreign agent is usually a router attached to the foreign network. 5.The foreign agent recieves and delivers packets sent by the home agent to the mobile hosts.6.When the mobile host acts as a foreign agent the care -of address is called as co-located care of address
  • 7. Correspondent Node 1.A correspondent node is a computer that sends packets to the mobile node. A correspondent node is typically connected to its own home network 2. A correspondent node is aware of only the IP address of the mobile node in the home network of the mobile node 3.Any packet from the correspondent node is delivered to the home agent
  • 8. A Schematic Diagram of Mobile IP Mobile node Foreign agent Correspondent Node Home agent
  • 10. 1st phase: Discovering the care-of Address 1.In mobile IP, both a foreign agent and a home agent periodically broadcast agent advertisement messages 2. A mobile host must discover(learn the address of) a home agent before it leaves the home agent. 3.A mobile host must also discover a foreign agent after it moved to a foreign network.
  • 11. Agent Advertisement An agent advertisement has the functions 1.It allows mobile nodes to discover foreign agents and get care-of addresses. 2. It allows the mobile node to know the services provided by the foreign agent. 3. It allows the mobile node to determine whether an agent is its home agent or a foreign agent
  • 13. Solicitation from a Mobile Node 1.When an mobile host has moved to a new network and has not recieved agent advertisements,it can initiate an agent solicitation. 2. A mobile node can generate agent solicitationmessages when it is looking for a foreign agent.
  • 14. 2nd phase: Registration 1.When a mobile node receives a care-of address from a foreign agent, its home agent needs to be informed. 2. The mobile node sends a registration request to its home agent through the foreign agent who has provided the new care-of address. 3. When the home agent receives the request, it updates its routing table and sends a registration reply back to the foreign agent.
  • 18. 3rd phase: Data Transfer 1. When a remote host wants to send a packet to the mobile host, it uses its address as the source address and the home address of the mobile host as the destination address . 2. After receiving the packet , the home agent sends the packet to the foreign agent . The home agent encapsulates the whole IP packet inside another IP packet using its address as the source and the foreign agent’s as the destination address.
  • 19. 4. When the foreign agent recieves the packet ,it removes the original packet. Since the destination address is the home address of the mobile host ,the foreign agent consults a registry table to find the care of address.5. When a mobile host wants to send a packet to a remote host,it sends as it done normally.The mobile host prepares a packet with its home address as the source and the address of the remote host as the destination.
  • 20. Tunneling and IP within IP The transfer of the packet from the home agent to the care-of address is called tunneling. The home agent is the source of the tunnel. The home agent inserts a new tunnel header in front of the IP header of a packet addressed to the mobile agent and received by the home agent The tunnel header is the care-of IP address of the mobile node. The old header is preserved as it was in the original packet.
  • 21. 4. The foreign agent is the receiver of the tunnel 5 .When the foreign agent receives the tunneled packet, it has to delete the tunnel header to recover the original packet. 6.The foreign agent delivers the packet to the mobile node after removing the tunnel header
  • 22.
  • 23.

Editor's Notes

  1. Correspondent NodeCorrespondent Node