SlideShare a Scribd company logo
Mobile IP:
1) Mobile IP(MIP) is an Internet Engineering Task Force(IETF) standard communications
protocol.
2) This is designed to allow mobile device users to move from one network to another while
maintaining a permanent IP address.
3) Mobile IP for IPv4 is described in IETF RFC 5944 and extensions are defined in IETF RFC
4721.
4) Mobile IPv6 the IP mobility implementation for the next generation of the Internet Protocol
IPv6 is described in RFC 6275.
Advantages of using Mobile IP
• It allows fast, continuous lowcost access to corporate networks in remote areas where there
is no public telephone system or cellular coverage.
• It supports a wide range of applications from Internet access and email to ecommerce.
• Users can be permanently connected to their Internet provider and charged only for the data
packets that are sent and received.
• Lower equipment and utilization costs for those requiring reliable highspeed data connections
in remote locations worldwide.
• A user can take a palmtop or laptop computer anywhere without losing the connection to the
home network.
• Mobile IP finds local IP routers and connects automatically. It is phonejack and wirefree.
• Other than mobile nodes/routers, the remaining routers and hosts will still use current IP.
Mobile IP leaves transport and higher protocols
unaffected.
• Authentication is performed to ensure that rights are being protected.
• Mobile IP can move from one type of medium to another without losing connectivity. It is
unique in its ability to accommodate heterogeneous
mobility in addition to homogenous mobility.
Disadvantage of Mobile IP
• There is a routing inefficiency problem caused by the “triangle routing” formed by the home
agent, correspondent host and the foreign agent.
• Security risks are the most important problem facing Mobile IP. Besides the traditional security
risks with
IP, one has to worry about faked careof addresses.
• Another issue related to the security is how to make Mobile IP coexist with the security
features coming in
use within the Internet.
Characteristics of Mobile IP (Baseline Requirements)
• Compatibility: A new standard cannot require changes for applications or network protocols
already in use.
• Transparency: Mobility should remain “invisible” for many higher layer protocols and
applications.
• Scalability and efficiency: Introducing a new mechanism into the Internet must not degrade the
efficiency of the network.
• Security: All messages used to transmit information to another node about the location of a
mobile node must be authenticated to protect against remote redirection attacks
The Mobile IP in Wireless Networks
• new proposed standard of the IETF designed to support mobile users .
• new Internet standard for the Web and private networks.
• currently two standards one to support the current IPv4 one for the upcoming IPv6.
• One of the big requirements on the new standard is that it should support both ordinary and
wireless network
• The big issue is to solve the overlapping between different networks—a user should be able to
move between different networks without packet losses.
• The solution proposed by a working group within the IETF suggests that the mobile node
should use two different IP addresses: a fixed home addressa careof address(COA),that changes
at each point of attachment.
• The solution requires two additional components
i) home agent (HA)
ii) foreign agent (FA)
Solution
Mobile IP:
1) Mobile IP(MIP) is an Internet Engineering Task Force(IETF) standard communications
protocol.
2) This is designed to allow mobile device users to move from one network to another while
maintaining a permanent IP address.
3) Mobile IP for IPv4 is described in IETF RFC 5944 and extensions are defined in IETF RFC
4721.
4) Mobile IPv6 the IP mobility implementation for the next generation of the Internet Protocol
IPv6 is described in RFC 6275.
Advantages of using Mobile IP
• It allows fast, continuous lowcost access to corporate networks in remote areas where there
is no public telephone system or cellular coverage.
• It supports a wide range of applications from Internet access and email to ecommerce.
• Users can be permanently connected to their Internet provider and charged only for the data
packets that are sent and received.
• Lower equipment and utilization costs for those requiring reliable highspeed data connections
in remote locations worldwide.
• A user can take a palmtop or laptop computer anywhere without losing the connection to the
home network.
• Mobile IP finds local IP routers and connects automatically. It is phonejack and wirefree.
• Other than mobile nodes/routers, the remaining routers and hosts will still use current IP.
Mobile IP leaves transport and higher protocols
unaffected.
• Authentication is performed to ensure that rights are being protected.
• Mobile IP can move from one type of medium to another without losing connectivity. It is
unique in its ability to accommodate heterogeneous
mobility in addition to homogenous mobility.
Disadvantage of Mobile IP
• There is a routing inefficiency problem caused by the “triangle routing” formed by the home
agent, correspondent host and the foreign agent.
• Security risks are the most important problem facing Mobile IP. Besides the traditional security
risks with
IP, one has to worry about faked careof addresses.
• Another issue related to the security is how to make Mobile IP coexist with the security
features coming in
use within the Internet.
Characteristics of Mobile IP (Baseline Requirements)
• Compatibility: A new standard cannot require changes for applications or network protocols
already in use.
• Transparency: Mobility should remain “invisible” for many higher layer protocols and
applications.
• Scalability and efficiency: Introducing a new mechanism into the Internet must not degrade the
efficiency of the network.
• Security: All messages used to transmit information to another node about the location of a
mobile node must be authenticated to protect against remote redirection attacks
The Mobile IP in Wireless Networks
• new proposed standard of the IETF designed to support mobile users .
• new Internet standard for the Web and private networks.
• currently two standards one to support the current IPv4 one for the upcoming IPv6.
• One of the big requirements on the new standard is that it should support both ordinary and
wireless network
• The big issue is to solve the overlapping between different networks—a user should be able to
move between different networks without packet losses.
• The solution proposed by a working group within the IETF suggests that the mobile node
should use two different IP addresses: a fixed home addressa careof address(COA),that changes
at each point of attachment.
• The solution requires two additional components
i) home agent (HA)
ii) foreign agent (FA)

More Related Content

Similar to Mobile IP1) Mobile IP(MIP) is an Internet Engineering Task Force(.pdf

5 g
5 g5 g
5g Mobile Technology
5g Mobile Technology5g Mobile Technology
5g Mobile Technologyvineetkathan
 
IOT and its communication models and protocols.pdf
IOT and its communication models and protocols.pdfIOT and its communication models and protocols.pdf
IOT and its communication models and protocols.pdf
MD.ANISUR RAHMAN
 
5G
5G5G
Network Architecture of 5G Mobile Tecnology
Network Architecture of 5G Mobile TecnologyNetwork Architecture of 5G Mobile Tecnology
Network Architecture of 5G Mobile Tecnologyvineetkathan
 
5G tecnology
5G tecnology5G tecnology
5G tecnology
Abhishek Manwal
 
5G 2
5G 25G 2
5G 2
IGDTUW
 
Presentation1
Presentation1Presentation1
Presentation1
Avinash Kapse
 
Presentation1
Presentation1Presentation1
Presentation1
Avinash Kapse
 
5g technology
5g technology5g technology
5g technology
Rohit Lanjewar
 
Network technology in mobile
Network technology in mobileNetwork technology in mobile
Network technology in mobile
ajmal anbu
 
About 5G cellular network.pptx
About 5G cellular network.pptxAbout 5G cellular network.pptx
About 5G cellular network.pptx
ShifadShaji
 
4G
4G4G
5G Wireless
5G Wireless5G Wireless
5G Wireless
Rahulprasad Yadav
 
Nanotechnology in 5G Wireless Communication Network: An Approach
Nanotechnology in 5G Wireless Communication Network: An ApproachNanotechnology in 5G Wireless Communication Network: An Approach
Nanotechnology in 5G Wireless Communication Network: An Approach
IRJET Journal
 
1.pptx
1.pptx1.pptx

Similar to Mobile IP1) Mobile IP(MIP) is an Internet Engineering Task Force(.pdf (20)

4 g
4 g4 g
4 g
 
5 g
5 g5 g
5 g
 
5g Mobile Technology
5g Mobile Technology5g Mobile Technology
5g Mobile Technology
 
IOT and its communication models and protocols.pdf
IOT and its communication models and protocols.pdfIOT and its communication models and protocols.pdf
IOT and its communication models and protocols.pdf
 
4 g networks
4 g networks4 g networks
4 g networks
 
Oacett 5 g_fayyaz_cet
Oacett  5 g_fayyaz_cetOacett  5 g_fayyaz_cet
Oacett 5 g_fayyaz_cet
 
5G
5G5G
5G
 
Network Architecture of 5G Mobile Tecnology
Network Architecture of 5G Mobile TecnologyNetwork Architecture of 5G Mobile Tecnology
Network Architecture of 5G Mobile Tecnology
 
5G tecnology
5G tecnology5G tecnology
5G tecnology
 
5G 2
5G 25G 2
5G 2
 
Presentation1
Presentation1Presentation1
Presentation1
 
Presentation1
Presentation1Presentation1
Presentation1
 
5g technology
5g technology5g technology
5g technology
 
Network technology in mobile
Network technology in mobileNetwork technology in mobile
Network technology in mobile
 
About 5G cellular network.pptx
About 5G cellular network.pptxAbout 5G cellular network.pptx
About 5G cellular network.pptx
 
4G
4G4G
4G
 
5G Wireless
5G Wireless5G Wireless
5G Wireless
 
Nanotechnology in 5G Wireless Communication Network: An Approach
Nanotechnology in 5G Wireless Communication Network: An ApproachNanotechnology in 5G Wireless Communication Network: An Approach
Nanotechnology in 5G Wireless Communication Network: An Approach
 
1.pptx
1.pptx1.pptx
1.pptx
 
final ppt.pptx
final ppt.pptxfinal ppt.pptx
final ppt.pptx
 

More from anandhomeneeds

Driver.java import java.util.Scanner; import java.text.Decimal.pdf
Driver.java import java.util.Scanner; import java.text.Decimal.pdfDriver.java import java.util.Scanner; import java.text.Decimal.pdf
Driver.java import java.util.Scanner; import java.text.Decimal.pdf
anandhomeneeds
 
Question 1,2,4 ------------------------------------Please check.pdf
Question 1,2,4 ------------------------------------Please check.pdfQuestion 1,2,4 ------------------------------------Please check.pdf
Question 1,2,4 ------------------------------------Please check.pdf
anandhomeneeds
 
The answer is C. securin.APC degrade securin to release separase .pdf
The answer is C. securin.APC degrade securin to release separase .pdfThe answer is C. securin.APC degrade securin to release separase .pdf
The answer is C. securin.APC degrade securin to release separase .pdf
anandhomeneeds
 
HiCan you please summarise the question. More information confuse .pdf
HiCan you please summarise the question. More information confuse .pdfHiCan you please summarise the question. More information confuse .pdf
HiCan you please summarise the question. More information confuse .pdf
anandhomeneeds
 
What property of proteins us used to separate them in HICHydrophob.pdf
What property of proteins us used to separate them in HICHydrophob.pdfWhat property of proteins us used to separate them in HICHydrophob.pdf
What property of proteins us used to separate them in HICHydrophob.pdf
anandhomeneeds
 
upload complete priblem somthing is missingSolutionupload comp.pdf
upload complete priblem somthing is missingSolutionupload comp.pdfupload complete priblem somthing is missingSolutionupload comp.pdf
upload complete priblem somthing is missingSolutionupload comp.pdf
anandhomeneeds
 
the phenomena responsible for this type of inheritancce is Epistasis.pdf
the phenomena responsible for this type of inheritancce is Epistasis.pdfthe phenomena responsible for this type of inheritancce is Epistasis.pdf
the phenomena responsible for this type of inheritancce is Epistasis.pdf
anandhomeneeds
 
The substrate in urease test is urea.The end products in urease te.pdf
The substrate in urease test is urea.The end products in urease te.pdfThe substrate in urease test is urea.The end products in urease te.pdf
The substrate in urease test is urea.The end products in urease te.pdf
anandhomeneeds
 
later we create a specialstack class ,which inherits from stack cl.pdf
later we create a specialstack class ,which inherits from stack cl.pdflater we create a specialstack class ,which inherits from stack cl.pdf
later we create a specialstack class ,which inherits from stack cl.pdf
anandhomeneeds
 
I think that 34SolutionI think that 34.pdf
I think that 34SolutionI think that 34.pdfI think that 34SolutionI think that 34.pdf
I think that 34SolutionI think that 34.pdf
anandhomeneeds
 
D(ANSWER)Polycrystalline or multicrystalline materials, or polycry.pdf
D(ANSWER)Polycrystalline or multicrystalline materials, or polycry.pdfD(ANSWER)Polycrystalline or multicrystalline materials, or polycry.pdf
D(ANSWER)Polycrystalline or multicrystalline materials, or polycry.pdf
anandhomeneeds
 
1.It is the process of directing the television assistances are tran.pdf
1.It is the process of directing the television assistances are tran.pdf1.It is the process of directing the television assistances are tran.pdf
1.It is the process of directing the television assistances are tran.pdf
anandhomeneeds
 
Answer The major objective of implementing a health information man.pdf
Answer The major objective of implementing a health information man.pdfAnswer The major objective of implementing a health information man.pdf
Answer The major objective of implementing a health information man.pdf
anandhomeneeds
 
The key assumptions made by the Hadoop Distributed File System(HDFS).pdf
The key assumptions made by the Hadoop Distributed File System(HDFS).pdfThe key assumptions made by the Hadoop Distributed File System(HDFS).pdf
The key assumptions made by the Hadoop Distributed File System(HDFS).pdf
anandhomeneeds
 
Properties areMeanModeMedianQuartilesPercentilesRan.pdf
Properties areMeanModeMedianQuartilesPercentilesRan.pdfProperties areMeanModeMedianQuartilesPercentilesRan.pdf
Properties areMeanModeMedianQuartilesPercentilesRan.pdf
anandhomeneeds
 
MgCO3 Increasing acidity will cause the following reaction Mg.pdf
 MgCO3 Increasing acidity will cause the following reaction Mg.pdf MgCO3 Increasing acidity will cause the following reaction Mg.pdf
MgCO3 Increasing acidity will cause the following reaction Mg.pdf
anandhomeneeds
 
Environmental conditions play a key role in defining the function an.pdf
Environmental conditions play a key role in defining the function an.pdfEnvironmental conditions play a key role in defining the function an.pdf
Environmental conditions play a key role in defining the function an.pdf
anandhomeneeds
 
1. Autralopith is a known genus of hominids which is extinct today..pdf
1. Autralopith is a known genus of hominids which is extinct today..pdf1. Autralopith is a known genus of hominids which is extinct today..pdf
1. Autralopith is a known genus of hominids which is extinct today..pdf
anandhomeneeds
 
Answer1. Cells can generate many different tissue types endoderm,.pdf
Answer1. Cells can generate many different tissue types endoderm,.pdfAnswer1. Cells can generate many different tissue types endoderm,.pdf
Answer1. Cells can generate many different tissue types endoderm,.pdf
anandhomeneeds
 
3 a) The trace of an nSolution3 a) The trace of an n.pdf
3 a) The trace of an nSolution3 a) The trace of an n.pdf3 a) The trace of an nSolution3 a) The trace of an n.pdf
3 a) The trace of an nSolution3 a) The trace of an n.pdf
anandhomeneeds
 

More from anandhomeneeds (20)

Driver.java import java.util.Scanner; import java.text.Decimal.pdf
Driver.java import java.util.Scanner; import java.text.Decimal.pdfDriver.java import java.util.Scanner; import java.text.Decimal.pdf
Driver.java import java.util.Scanner; import java.text.Decimal.pdf
 
Question 1,2,4 ------------------------------------Please check.pdf
Question 1,2,4 ------------------------------------Please check.pdfQuestion 1,2,4 ------------------------------------Please check.pdf
Question 1,2,4 ------------------------------------Please check.pdf
 
The answer is C. securin.APC degrade securin to release separase .pdf
The answer is C. securin.APC degrade securin to release separase .pdfThe answer is C. securin.APC degrade securin to release separase .pdf
The answer is C. securin.APC degrade securin to release separase .pdf
 
HiCan you please summarise the question. More information confuse .pdf
HiCan you please summarise the question. More information confuse .pdfHiCan you please summarise the question. More information confuse .pdf
HiCan you please summarise the question. More information confuse .pdf
 
What property of proteins us used to separate them in HICHydrophob.pdf
What property of proteins us used to separate them in HICHydrophob.pdfWhat property of proteins us used to separate them in HICHydrophob.pdf
What property of proteins us used to separate them in HICHydrophob.pdf
 
upload complete priblem somthing is missingSolutionupload comp.pdf
upload complete priblem somthing is missingSolutionupload comp.pdfupload complete priblem somthing is missingSolutionupload comp.pdf
upload complete priblem somthing is missingSolutionupload comp.pdf
 
the phenomena responsible for this type of inheritancce is Epistasis.pdf
the phenomena responsible for this type of inheritancce is Epistasis.pdfthe phenomena responsible for this type of inheritancce is Epistasis.pdf
the phenomena responsible for this type of inheritancce is Epistasis.pdf
 
The substrate in urease test is urea.The end products in urease te.pdf
The substrate in urease test is urea.The end products in urease te.pdfThe substrate in urease test is urea.The end products in urease te.pdf
The substrate in urease test is urea.The end products in urease te.pdf
 
later we create a specialstack class ,which inherits from stack cl.pdf
later we create a specialstack class ,which inherits from stack cl.pdflater we create a specialstack class ,which inherits from stack cl.pdf
later we create a specialstack class ,which inherits from stack cl.pdf
 
I think that 34SolutionI think that 34.pdf
I think that 34SolutionI think that 34.pdfI think that 34SolutionI think that 34.pdf
I think that 34SolutionI think that 34.pdf
 
D(ANSWER)Polycrystalline or multicrystalline materials, or polycry.pdf
D(ANSWER)Polycrystalline or multicrystalline materials, or polycry.pdfD(ANSWER)Polycrystalline or multicrystalline materials, or polycry.pdf
D(ANSWER)Polycrystalline or multicrystalline materials, or polycry.pdf
 
1.It is the process of directing the television assistances are tran.pdf
1.It is the process of directing the television assistances are tran.pdf1.It is the process of directing the television assistances are tran.pdf
1.It is the process of directing the television assistances are tran.pdf
 
Answer The major objective of implementing a health information man.pdf
Answer The major objective of implementing a health information man.pdfAnswer The major objective of implementing a health information man.pdf
Answer The major objective of implementing a health information man.pdf
 
The key assumptions made by the Hadoop Distributed File System(HDFS).pdf
The key assumptions made by the Hadoop Distributed File System(HDFS).pdfThe key assumptions made by the Hadoop Distributed File System(HDFS).pdf
The key assumptions made by the Hadoop Distributed File System(HDFS).pdf
 
Properties areMeanModeMedianQuartilesPercentilesRan.pdf
Properties areMeanModeMedianQuartilesPercentilesRan.pdfProperties areMeanModeMedianQuartilesPercentilesRan.pdf
Properties areMeanModeMedianQuartilesPercentilesRan.pdf
 
MgCO3 Increasing acidity will cause the following reaction Mg.pdf
 MgCO3 Increasing acidity will cause the following reaction Mg.pdf MgCO3 Increasing acidity will cause the following reaction Mg.pdf
MgCO3 Increasing acidity will cause the following reaction Mg.pdf
 
Environmental conditions play a key role in defining the function an.pdf
Environmental conditions play a key role in defining the function an.pdfEnvironmental conditions play a key role in defining the function an.pdf
Environmental conditions play a key role in defining the function an.pdf
 
1. Autralopith is a known genus of hominids which is extinct today..pdf
1. Autralopith is a known genus of hominids which is extinct today..pdf1. Autralopith is a known genus of hominids which is extinct today..pdf
1. Autralopith is a known genus of hominids which is extinct today..pdf
 
Answer1. Cells can generate many different tissue types endoderm,.pdf
Answer1. Cells can generate many different tissue types endoderm,.pdfAnswer1. Cells can generate many different tissue types endoderm,.pdf
Answer1. Cells can generate many different tissue types endoderm,.pdf
 
3 a) The trace of an nSolution3 a) The trace of an n.pdf
3 a) The trace of an nSolution3 a) The trace of an n.pdf3 a) The trace of an nSolution3 a) The trace of an n.pdf
3 a) The trace of an nSolution3 a) The trace of an n.pdf
 

Recently uploaded

Supporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptxSupporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptx
Jisc
 
Language Across the Curriculm LAC B.Ed.
Language Across the  Curriculm LAC B.Ed.Language Across the  Curriculm LAC B.Ed.
Language Across the Curriculm LAC B.Ed.
Atul Kumar Singh
 
The Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official PublicationThe Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official Publication
Delapenabediema
 
"Protectable subject matters, Protection in biotechnology, Protection of othe...
"Protectable subject matters, Protection in biotechnology, Protection of othe..."Protectable subject matters, Protection in biotechnology, Protection of othe...
"Protectable subject matters, Protection in biotechnology, Protection of othe...
SACHIN R KONDAGURI
 
Unit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdfUnit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdf
Thiyagu K
 
CLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCE
CLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCECLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCE
CLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCE
BhavyaRajput3
 
Additional Benefits for Employee Website.pdf
Additional Benefits for Employee Website.pdfAdditional Benefits for Employee Website.pdf
Additional Benefits for Employee Website.pdf
joachimlavalley1
 
Model Attribute Check Company Auto Property
Model Attribute  Check Company Auto PropertyModel Attribute  Check Company Auto Property
Model Attribute Check Company Auto Property
Celine George
 
Overview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with MechanismOverview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with Mechanism
DeeptiGupta154
 
special B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdfspecial B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdf
Special education needs
 
Thesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.pptThesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.ppt
EverAndrsGuerraGuerr
 
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdf
Welcome to TechSoup   New Member Orientation and Q&A (May 2024).pdfWelcome to TechSoup   New Member Orientation and Q&A (May 2024).pdf
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdf
TechSoup
 
The Accursed House by Émile Gaboriau.pptx
The Accursed House by Émile Gaboriau.pptxThe Accursed House by Émile Gaboriau.pptx
The Accursed House by Émile Gaboriau.pptx
DhatriParmar
 
The Roman Empire A Historical Colossus.pdf
The Roman Empire A Historical Colossus.pdfThe Roman Empire A Historical Colossus.pdf
The Roman Empire A Historical Colossus.pdf
kaushalkr1407
 
The basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptxThe basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptx
heathfieldcps1
 
How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17
Celine George
 
Adversarial Attention Modeling for Multi-dimensional Emotion Regression.pdf
Adversarial Attention Modeling for Multi-dimensional Emotion Regression.pdfAdversarial Attention Modeling for Multi-dimensional Emotion Regression.pdf
Adversarial Attention Modeling for Multi-dimensional Emotion Regression.pdf
Po-Chuan Chen
 
Digital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and ResearchDigital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and Research
Vikramjit Singh
 
Palestine last event orientationfvgnh .pptx
Palestine last event orientationfvgnh .pptxPalestine last event orientationfvgnh .pptx
Palestine last event orientationfvgnh .pptx
RaedMohamed3
 
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
Nguyen Thanh Tu Collection
 

Recently uploaded (20)

Supporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptxSupporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptx
 
Language Across the Curriculm LAC B.Ed.
Language Across the  Curriculm LAC B.Ed.Language Across the  Curriculm LAC B.Ed.
Language Across the Curriculm LAC B.Ed.
 
The Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official PublicationThe Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official Publication
 
"Protectable subject matters, Protection in biotechnology, Protection of othe...
"Protectable subject matters, Protection in biotechnology, Protection of othe..."Protectable subject matters, Protection in biotechnology, Protection of othe...
"Protectable subject matters, Protection in biotechnology, Protection of othe...
 
Unit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdfUnit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdf
 
CLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCE
CLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCECLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCE
CLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCE
 
Additional Benefits for Employee Website.pdf
Additional Benefits for Employee Website.pdfAdditional Benefits for Employee Website.pdf
Additional Benefits for Employee Website.pdf
 
Model Attribute Check Company Auto Property
Model Attribute  Check Company Auto PropertyModel Attribute  Check Company Auto Property
Model Attribute Check Company Auto Property
 
Overview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with MechanismOverview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with Mechanism
 
special B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdfspecial B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdf
 
Thesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.pptThesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.ppt
 
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdf
Welcome to TechSoup   New Member Orientation and Q&A (May 2024).pdfWelcome to TechSoup   New Member Orientation and Q&A (May 2024).pdf
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdf
 
The Accursed House by Émile Gaboriau.pptx
The Accursed House by Émile Gaboriau.pptxThe Accursed House by Émile Gaboriau.pptx
The Accursed House by Émile Gaboriau.pptx
 
The Roman Empire A Historical Colossus.pdf
The Roman Empire A Historical Colossus.pdfThe Roman Empire A Historical Colossus.pdf
The Roman Empire A Historical Colossus.pdf
 
The basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptxThe basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptx
 
How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17
 
Adversarial Attention Modeling for Multi-dimensional Emotion Regression.pdf
Adversarial Attention Modeling for Multi-dimensional Emotion Regression.pdfAdversarial Attention Modeling for Multi-dimensional Emotion Regression.pdf
Adversarial Attention Modeling for Multi-dimensional Emotion Regression.pdf
 
Digital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and ResearchDigital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and Research
 
Palestine last event orientationfvgnh .pptx
Palestine last event orientationfvgnh .pptxPalestine last event orientationfvgnh .pptx
Palestine last event orientationfvgnh .pptx
 
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
 

Mobile IP1) Mobile IP(MIP) is an Internet Engineering Task Force(.pdf

  • 1. Mobile IP: 1) Mobile IP(MIP) is an Internet Engineering Task Force(IETF) standard communications protocol. 2) This is designed to allow mobile device users to move from one network to another while maintaining a permanent IP address. 3) Mobile IP for IPv4 is described in IETF RFC 5944 and extensions are defined in IETF RFC 4721. 4) Mobile IPv6 the IP mobility implementation for the next generation of the Internet Protocol IPv6 is described in RFC 6275. Advantages of using Mobile IP • It allows fast, continuous lowcost access to corporate networks in remote areas where there is no public telephone system or cellular coverage. • It supports a wide range of applications from Internet access and email to ecommerce. • Users can be permanently connected to their Internet provider and charged only for the data packets that are sent and received. • Lower equipment and utilization costs for those requiring reliable highspeed data connections in remote locations worldwide. • A user can take a palmtop or laptop computer anywhere without losing the connection to the home network. • Mobile IP finds local IP routers and connects automatically. It is phonejack and wirefree. • Other than mobile nodes/routers, the remaining routers and hosts will still use current IP. Mobile IP leaves transport and higher protocols unaffected. • Authentication is performed to ensure that rights are being protected. • Mobile IP can move from one type of medium to another without losing connectivity. It is unique in its ability to accommodate heterogeneous mobility in addition to homogenous mobility. Disadvantage of Mobile IP • There is a routing inefficiency problem caused by the “triangle routing” formed by the home agent, correspondent host and the foreign agent. • Security risks are the most important problem facing Mobile IP. Besides the traditional security risks with IP, one has to worry about faked careof addresses.
  • 2. • Another issue related to the security is how to make Mobile IP coexist with the security features coming in use within the Internet. Characteristics of Mobile IP (Baseline Requirements) • Compatibility: A new standard cannot require changes for applications or network protocols already in use. • Transparency: Mobility should remain “invisible” for many higher layer protocols and applications. • Scalability and efficiency: Introducing a new mechanism into the Internet must not degrade the efficiency of the network. • Security: All messages used to transmit information to another node about the location of a mobile node must be authenticated to protect against remote redirection attacks The Mobile IP in Wireless Networks • new proposed standard of the IETF designed to support mobile users . • new Internet standard for the Web and private networks. • currently two standards one to support the current IPv4 one for the upcoming IPv6. • One of the big requirements on the new standard is that it should support both ordinary and wireless network • The big issue is to solve the overlapping between different networks—a user should be able to move between different networks without packet losses. • The solution proposed by a working group within the IETF suggests that the mobile node should use two different IP addresses: a fixed home addressa careof address(COA),that changes at each point of attachment. • The solution requires two additional components i) home agent (HA) ii) foreign agent (FA) Solution Mobile IP: 1) Mobile IP(MIP) is an Internet Engineering Task Force(IETF) standard communications protocol. 2) This is designed to allow mobile device users to move from one network to another while maintaining a permanent IP address. 3) Mobile IP for IPv4 is described in IETF RFC 5944 and extensions are defined in IETF RFC 4721.
  • 3. 4) Mobile IPv6 the IP mobility implementation for the next generation of the Internet Protocol IPv6 is described in RFC 6275. Advantages of using Mobile IP • It allows fast, continuous lowcost access to corporate networks in remote areas where there is no public telephone system or cellular coverage. • It supports a wide range of applications from Internet access and email to ecommerce. • Users can be permanently connected to their Internet provider and charged only for the data packets that are sent and received. • Lower equipment and utilization costs for those requiring reliable highspeed data connections in remote locations worldwide. • A user can take a palmtop or laptop computer anywhere without losing the connection to the home network. • Mobile IP finds local IP routers and connects automatically. It is phonejack and wirefree. • Other than mobile nodes/routers, the remaining routers and hosts will still use current IP. Mobile IP leaves transport and higher protocols unaffected. • Authentication is performed to ensure that rights are being protected. • Mobile IP can move from one type of medium to another without losing connectivity. It is unique in its ability to accommodate heterogeneous mobility in addition to homogenous mobility. Disadvantage of Mobile IP • There is a routing inefficiency problem caused by the “triangle routing” formed by the home agent, correspondent host and the foreign agent. • Security risks are the most important problem facing Mobile IP. Besides the traditional security risks with IP, one has to worry about faked careof addresses. • Another issue related to the security is how to make Mobile IP coexist with the security features coming in use within the Internet. Characteristics of Mobile IP (Baseline Requirements) • Compatibility: A new standard cannot require changes for applications or network protocols already in use. • Transparency: Mobility should remain “invisible” for many higher layer protocols and applications.
  • 4. • Scalability and efficiency: Introducing a new mechanism into the Internet must not degrade the efficiency of the network. • Security: All messages used to transmit information to another node about the location of a mobile node must be authenticated to protect against remote redirection attacks The Mobile IP in Wireless Networks • new proposed standard of the IETF designed to support mobile users . • new Internet standard for the Web and private networks. • currently two standards one to support the current IPv4 one for the upcoming IPv6. • One of the big requirements on the new standard is that it should support both ordinary and wireless network • The big issue is to solve the overlapping between different networks—a user should be able to move between different networks without packet losses. • The solution proposed by a working group within the IETF suggests that the mobile node should use two different IP addresses: a fixed home addressa careof address(COA),that changes at each point of attachment. • The solution requires two additional components i) home agent (HA) ii) foreign agent (FA)