SlideShare a Scribd company logo
1 of 23
Contents:
 Introduction To Mobile IP
 Requirements to Mobile IP
 Entities and Terminology
 IP Packet Delivery
 Agent Discovery
 Registration
 Mobile IP is an open standard, defined by the
 Internet Engineering Task Force (IETF) RFC 3220.
 By using Mobile IP, you can keep the same IP
 address, stay connected, and maintain ongoing
 applications while roaming between IP networks.
 Mobile IP is scalable for the Internet because it is
 based on IP—any media that can support IP can
 support Mobile IP.
 Compatibility
   support of the same layer 2 protocols as IP
   does
  no changes to current end-systems and
   routers required
  Mobile end-systems can communicate with
   fixed systems

 Transparency
   mobile end-systems keep their IP address
   continuation of communication after
   interruption of link possible
 Security
  authentication of all registration messages


 Efficiency and scalability
  only little additional messages to the
   mobile system required (connection
   typically via a low bandwidth radio link)
  world-wide support of a large number of
   mobile systems in the whole Internet
 Mobile Node (MN)
   A mobile node is an end-system or router that can
    change its point of attachment to the internet using
    mobile IP.
   The MN keeps its IP address and can continuously
    communicate with any other system in the internet
    as long as link-layer connectivity is given.
 Correspondent Node (CN)
   At least one partner is needed for communication.
   In the following the CN represents this partner for
    the MN. The CN can be a fixed or mobile node.
 Home Network
    The home network is the subnet the MN
     belongs to with respect to its IP address.
    No mobile IP support is needed within the
     home network.

 Foreign Network
   The foreign network is the current subnet the MN
   visits and which is not the home network.
 Foreign Agent (FA)
   The FA can provide several services to the MN
    during its visit to the foreign network.
   The FA can have the COA (defined below),
    acting as tunnel endpoint and forwarding
    packets to the MN.
   The FA can be the default router for the MN.
    FAs can also provide security services because
    they belong to the foreign network as opposed
    to the MN which is only visiting.
 Care Of Address (COA)
  The COA defines the current location of the MN
  from an IP point of view.
  All IP packets sent to the MN are delivered to
  the COA, not directly to the IP address of the
  MN. Packet delivery toward the MN is done
  using a tunnel, as explained later.
 Care Of Address (contd…)
  There are two different possibilities for the location of
   the COA:
     I. Foreign Agent COA:
              The COA could be located at the FA, i.e., the COA
               is an IP address of the FA.
              The FA is the tunnel end-point and forwards packets
               to the MN.
              Many MN using the FA can share this COA as
               common COA.
    II.       Co-Lated COA:
               The COA is co-lated if the MN temporarily acquires
                an additional IP address which acts as COA.
              This address is now topologically correct, and the
               tunnel endpoint is at the MN.
 Home Agent (HA)
  The HA provides several services for the MN and is
   located in the home network. The tunnel for packets
   toward the MN starts at the HA.
  The HA can be implemented on a router that is
   responsible for the home network. This is obviously the
   best position, because without optimizations to mobile
   IP, all packets for the MN have to go through the router
   anyway.
  If changing the router’s software is not possible, the HA
   could also be implemented on an arbitrary node in the
   subnet. One disadvantage of this solution is the double
   crossing of the router by the packet if the MN is in a
   foreign network. A packet for the MN comes in via the
   router; the HA sends it through the tunnel which again
   crosses the router.
 One of the requirements of mobile IP was to support hiding the
  mobility of the MN. CN does not need to know anything about the MN’s
  current location and sends the packet as usual to the IP address of MN
  (step 1). This means that CN sends an IP packet with MN as a
  destination address and CN as a source address. The internet, not
  having information on the current location of MN, routes the packet to
  the router responsible for the home network of MN. This is done using
  the standard routing mechanisms of the internet.
 The HA now intercepts the packet, knowing that MN is currently not in
  its home network. The packet is not forwarded into the subnet as usual,
  but encapsulated and tunneled to the COA. A new header is put in front
  of the old IP header showing the COA as new destination and HA as
  source of the encapsulated packet (step 2). The foreign agent now
  decapsulates packet, i.e., removes the additional header, and forwards
  the original packet with CN as source and MN as destination to the MN
  (step 3). Again, for the MN mobility is not visible. It receives the packet
  with the same sender and receiver address as it would have done in the
  home network.
 One initial problem of an MN after moving is how to
 find a foreign agent. How does the MN discover that
 it has moved? For this purpose mobile IP describes
 two methods: agent advertisement and agent
 solicitation, which are in fact router discovery
 methods plus extensions.
 Agent Advertisement:

  For the first method, foreign agents and home
   agents advertise their presence periodically using
   special agent advertisement messages. These
   advertisement messages can be seen as a beacon
   broadcast into the subnet. For these advertisements
   Internet control message protocol (ICMP)
   messages according to RFC 1256 (Deering, 1991)
   are used with some mobility extensions.

  The agent advertisement packet according to RFC
   1256 with the extension for mobility is shown in
   Figure 8.3. The upper part represents the ICMP
   packet while the lower part is the extension needed
   for mobility. The fields necessary on lower layers for
   the agent advertisement are not shown in this
   figure. Clearly, mobile nodes must be reached with
0              7 8                15 16    23 24      31


     Type             code                checksum

    #address         addr. size            lifetime
       es
                      router address 1
                     preference level 1

                     router address 2
                     preference level 2
                            ….
Type = 16     length            Sequence number

Registration lifetime     R B H F MG r T   reversed

                        COA 1

                        COA 2

                         …
 Agent solicitation:
   If no agent advertisements are present or the inter-
    arrival time is too high, and an MN has not received
    a COA by other means, e.g., DHCP, the mobile
    node must send agent solicitations. These
    solicitations are again based on RFC 1256 for
    router solicitations. Care must be taken to ensure
    that these solicitation messages do not flood the
    network, but basically an MN can search for an FA
    endlessly sending out solicitation messages.
    Typically, a mobile node can send out three
    solicitations, one per second, as soon as it enters a
    new network.
 Agent solicitation (contd…):
   If a node does not receive an answer to its solicitations it
    must decrease the rate of solicitations exponentially to
    avoid flooding the network until it reaches a maximum
    interval between solicitations (typically one minute).
    Discovering a new agent can be done anytime, not just if
    the MN is not connected to one. Consider the case that
    an MN is looking for a better connection while still
    sending via the old path. This is the case while moving
    through several cells of different wireless networks.
   After these steps of advertisements or solicitations the
    MN can now receive a COA, either one for an FA or a
    co-located COA. The MN knows its location (home
    network or foreign network) and the capabilities of the
    agent (if needed).
 Having received a COA, the MN has to register with
 the HA. The main purpose of the registration is to
 inform the HA of the current location for correct
 forwarding of packets. Registration can be done in
 two different ways depending on the location of the
 COA.
MN                  FA                  HA


     Registration                            MN                        HA
                         Registration
       Request
                           Request                   Registration
                                                       Request

                         Registration
                            Reply                 Registration Reply
     Registration
        Reply
0            7 8                15 16   23 24      31


    Type 1    S B D M G r   T   x       lifetime
                    Home Address

                     Home Agent

                        COA
                     Identification

                     Extensions….
Mobile network layer (mobile comm.)

More Related Content

What's hot

Routing in Manet
Routing in ManetRouting in Manet
Routing in Manetshiujinghan
 
Localization in WSN
Localization in WSNLocalization in WSN
Localization in WSNYara Ali
 
Chap 1&2(history and intro) wireless communication
Chap 1&2(history and intro) wireless communicationChap 1&2(history and intro) wireless communication
Chap 1&2(history and intro) wireless communicationasadkhan1327
 
WIRELESS TRANSMISSION
WIRELESS TRANSMISSIONWIRELESS TRANSMISSION
WIRELESS TRANSMISSIONjunnubabu
 
Mobile computing : Indirect TCP
Mobile computing : Indirect TCPMobile computing : Indirect TCP
Mobile computing : Indirect TCPSushant Kushwaha
 
AODV (adhoc ondemand distance vector routing)
AODV (adhoc ondemand distance vector routing) AODV (adhoc ondemand distance vector routing)
AODV (adhoc ondemand distance vector routing) ArunChokkalingam
 
Adhoc and Sensor Networks - Chapter 07
Adhoc and Sensor Networks - Chapter 07Adhoc and Sensor Networks - Chapter 07
Adhoc and Sensor Networks - Chapter 07Ali Habeeb
 
MANET in Mobile Computing
MANET in Mobile ComputingMANET in Mobile Computing
MANET in Mobile ComputingKABILESH RAMAR
 
Lecture 19 22. transport protocol for ad-hoc
Lecture 19 22. transport protocol for ad-hoc Lecture 19 22. transport protocol for ad-hoc
Lecture 19 22. transport protocol for ad-hoc Chandra Meena
 
Mobile computing unit2,SDMA,FDMA,CDMA,TDMA Space Division Multi Access,Frequ...
Mobile computing unit2,SDMA,FDMA,CDMA,TDMA  Space Division Multi Access,Frequ...Mobile computing unit2,SDMA,FDMA,CDMA,TDMA  Space Division Multi Access,Frequ...
Mobile computing unit2,SDMA,FDMA,CDMA,TDMA Space Division Multi Access,Frequ...Pallepati Vasavi
 
Network Layer,Computer Networks
Network Layer,Computer NetworksNetwork Layer,Computer Networks
Network Layer,Computer Networksguesta81d4b
 
WIRELESS ATM BY SAIKIRAN PANJALA
WIRELESS ATM BY SAIKIRAN PANJALAWIRELESS ATM BY SAIKIRAN PANJALA
WIRELESS ATM BY SAIKIRAN PANJALASaikiran Panjala
 
Multiplexing in mobile computing
Multiplexing in mobile computingMultiplexing in mobile computing
Multiplexing in mobile computingZituSahu
 
cellular concepts in wireless communication
cellular concepts in wireless communicationcellular concepts in wireless communication
cellular concepts in wireless communicationasadkhan1327
 
MANET routing protocols Issues and Classifications
 MANET routing protocols Issues and Classifications MANET routing protocols Issues and Classifications
MANET routing protocols Issues and ClassificationsArunChokkalingam
 
Geographical routing presentation
Geographical routing presentationGeographical routing presentation
Geographical routing presentationApoorva Nagaraj
 
Lecture 5 6 .ad hoc network
Lecture 5 6 .ad hoc networkLecture 5 6 .ad hoc network
Lecture 5 6 .ad hoc networkChandra Meena
 

What's hot (20)

Routing in Manet
Routing in ManetRouting in Manet
Routing in Manet
 
Localization in WSN
Localization in WSNLocalization in WSN
Localization in WSN
 
Chap 1&2(history and intro) wireless communication
Chap 1&2(history and intro) wireless communicationChap 1&2(history and intro) wireless communication
Chap 1&2(history and intro) wireless communication
 
Mobile IP
Mobile IPMobile IP
Mobile IP
 
WIRELESS TRANSMISSION
WIRELESS TRANSMISSIONWIRELESS TRANSMISSION
WIRELESS TRANSMISSION
 
Mobile computing : Indirect TCP
Mobile computing : Indirect TCPMobile computing : Indirect TCP
Mobile computing : Indirect TCP
 
AODV (adhoc ondemand distance vector routing)
AODV (adhoc ondemand distance vector routing) AODV (adhoc ondemand distance vector routing)
AODV (adhoc ondemand distance vector routing)
 
Adhoc and Sensor Networks - Chapter 07
Adhoc and Sensor Networks - Chapter 07Adhoc and Sensor Networks - Chapter 07
Adhoc and Sensor Networks - Chapter 07
 
MANET in Mobile Computing
MANET in Mobile ComputingMANET in Mobile Computing
MANET in Mobile Computing
 
Lecture 19 22. transport protocol for ad-hoc
Lecture 19 22. transport protocol for ad-hoc Lecture 19 22. transport protocol for ad-hoc
Lecture 19 22. transport protocol for ad-hoc
 
Mobile computing unit2,SDMA,FDMA,CDMA,TDMA Space Division Multi Access,Frequ...
Mobile computing unit2,SDMA,FDMA,CDMA,TDMA  Space Division Multi Access,Frequ...Mobile computing unit2,SDMA,FDMA,CDMA,TDMA  Space Division Multi Access,Frequ...
Mobile computing unit2,SDMA,FDMA,CDMA,TDMA Space Division Multi Access,Frequ...
 
Network Layer,Computer Networks
Network Layer,Computer NetworksNetwork Layer,Computer Networks
Network Layer,Computer Networks
 
Dsdv
DsdvDsdv
Dsdv
 
WIRELESS ATM BY SAIKIRAN PANJALA
WIRELESS ATM BY SAIKIRAN PANJALAWIRELESS ATM BY SAIKIRAN PANJALA
WIRELESS ATM BY SAIKIRAN PANJALA
 
Multiplexing in mobile computing
Multiplexing in mobile computingMultiplexing in mobile computing
Multiplexing in mobile computing
 
cellular concepts in wireless communication
cellular concepts in wireless communicationcellular concepts in wireless communication
cellular concepts in wireless communication
 
MANET routing protocols Issues and Classifications
 MANET routing protocols Issues and Classifications MANET routing protocols Issues and Classifications
MANET routing protocols Issues and Classifications
 
Geographical routing presentation
Geographical routing presentationGeographical routing presentation
Geographical routing presentation
 
Routing Protocols in WSN
Routing Protocols in WSNRouting Protocols in WSN
Routing Protocols in WSN
 
Lecture 5 6 .ad hoc network
Lecture 5 6 .ad hoc networkLecture 5 6 .ad hoc network
Lecture 5 6 .ad hoc network
 

Viewers also liked

Mobile transportlayer
Mobile transportlayerMobile transportlayer
Mobile transportlayerRahul Hada
 
Cdma ppt for ECE
Cdma ppt for ECECdma ppt for ECE
Cdma ppt for ECEajitece
 
Medium Access Control
Medium Access ControlMedium Access Control
Medium Access Controlanishgoel
 
Satellites presentation
Satellites presentationSatellites presentation
Satellites presentationVikas Sharma
 
Satellite communication
Satellite communicationSatellite communication
Satellite communicationMannu Khani
 
CELLULAR COMMUNICATION SYSTEM
CELLULAR COMMUNICATION SYSTEMCELLULAR COMMUNICATION SYSTEM
CELLULAR COMMUNICATION SYSTEMSuryani Ilias
 
Code division multiple access
Code division multiple accessCode division multiple access
Code division multiple accessmangal das
 
Bluetooth Presentation
Bluetooth PresentationBluetooth Presentation
Bluetooth Presentationguest664c3f
 
The cellular concept
The cellular conceptThe cellular concept
The cellular conceptZunAib Ali
 
Satellite communications
Satellite communicationsSatellite communications
Satellite communicationsSARITHA REDDY
 
Code Division Multiple Access- CDMA
Code Division Multiple Access- CDMA Code Division Multiple Access- CDMA
Code Division Multiple Access- CDMA ViVek Patel
 
Multiple access control protocol
Multiple access control protocol Multiple access control protocol
Multiple access control protocol meenamunesh
 

Viewers also liked (13)

Basic WDM Optical Network
Basic WDM Optical NetworkBasic WDM Optical Network
Basic WDM Optical Network
 
Mobile transportlayer
Mobile transportlayerMobile transportlayer
Mobile transportlayer
 
Cdma ppt for ECE
Cdma ppt for ECECdma ppt for ECE
Cdma ppt for ECE
 
Medium Access Control
Medium Access ControlMedium Access Control
Medium Access Control
 
Satellites presentation
Satellites presentationSatellites presentation
Satellites presentation
 
Satellite communication
Satellite communicationSatellite communication
Satellite communication
 
CELLULAR COMMUNICATION SYSTEM
CELLULAR COMMUNICATION SYSTEMCELLULAR COMMUNICATION SYSTEM
CELLULAR COMMUNICATION SYSTEM
 
Code division multiple access
Code division multiple accessCode division multiple access
Code division multiple access
 
Bluetooth Presentation
Bluetooth PresentationBluetooth Presentation
Bluetooth Presentation
 
The cellular concept
The cellular conceptThe cellular concept
The cellular concept
 
Satellite communications
Satellite communicationsSatellite communications
Satellite communications
 
Code Division Multiple Access- CDMA
Code Division Multiple Access- CDMA Code Division Multiple Access- CDMA
Code Division Multiple Access- CDMA
 
Multiple access control protocol
Multiple access control protocol Multiple access control protocol
Multiple access control protocol
 

Similar to Mobile network layer (mobile comm.)

Similar to Mobile network layer (mobile comm.) (20)

Lecture 15
Lecture 15Lecture 15
Lecture 15
 
Unit 3
Unit 3Unit 3
Unit 3
 
Ip packet delivery
Ip packet deliveryIp packet delivery
Ip packet delivery
 
Mobile Communication
Mobile CommunicationMobile Communication
Mobile Communication
 
Unit 4 MC QA.pdf
Unit 4 MC  QA.pdfUnit 4 MC  QA.pdf
Unit 4 MC QA.pdf
 
Mobileip 161105154557
Mobileip 161105154557Mobileip 161105154557
Mobileip 161105154557
 
Mobileip 161105154557
Mobileip 161105154557Mobileip 161105154557
Mobileip 161105154557
 
Mobile IP
Mobile IPMobile IP
Mobile IP
 
entities terminology
entities terminologyentities terminology
entities terminology
 
IT6601 MOBILE COMPUTING
IT6601 MOBILE COMPUTINGIT6601 MOBILE COMPUTING
IT6601 MOBILE COMPUTING
 
Unit 3
Unit 3Unit 3
Unit 3
 
Unit 3
Unit 3Unit 3
Unit 3
 
Mobile internet protocol
Mobile internet protocolMobile internet protocol
Mobile internet protocol
 
Mobile IP 1
Mobile IP 1Mobile IP 1
Mobile IP 1
 
mobile ip, Mobile COmmunication Internet Protocol
mobile ip, Mobile COmmunication Internet Protocolmobile ip, Mobile COmmunication Internet Protocol
mobile ip, Mobile COmmunication Internet Protocol
 
Mobile computing Unit III MANET Notes
Mobile computing Unit III MANET NotesMobile computing Unit III MANET Notes
Mobile computing Unit III MANET Notes
 
NetworkProtocols.ppt
NetworkProtocols.pptNetworkProtocols.ppt
NetworkProtocols.ppt
 
A review study of handover performance in mobile ip
A review study of handover performance in mobile ipA review study of handover performance in mobile ip
A review study of handover performance in mobile ip
 
Mobile IP
Mobile IPMobile IP
Mobile IP
 
PERFORMANCE EVALUATION OF MOBILE IP ON MOBILE AD HOC NETWORKS USING NS2
PERFORMANCE EVALUATION OF MOBILE IP ON MOBILE AD HOC NETWORKS USING NS2PERFORMANCE EVALUATION OF MOBILE IP ON MOBILE AD HOC NETWORKS USING NS2
PERFORMANCE EVALUATION OF MOBILE IP ON MOBILE AD HOC NETWORKS USING NS2
 

More from ReachLocal Services India (12)

Excel ppt
Excel pptExcel ppt
Excel ppt
 
Virtual reality
Virtual realityVirtual reality
Virtual reality
 
Digital signatures
Digital signaturesDigital signatures
Digital signatures
 
System security
System securitySystem security
System security
 
Artificial intelligence
Artificial intelligenceArtificial intelligence
Artificial intelligence
 
Distributed database
Distributed databaseDistributed database
Distributed database
 
Loop invariant computation
Loop invariant computationLoop invariant computation
Loop invariant computation
 
Distributed dbms
Distributed dbmsDistributed dbms
Distributed dbms
 
Sexual harresment on women
Sexual harresment on womenSexual harresment on women
Sexual harresment on women
 
Digital signal processing
Digital signal processingDigital signal processing
Digital signal processing
 
Regular expression (compiler)
Regular expression (compiler)Regular expression (compiler)
Regular expression (compiler)
 
Temporal data mining
Temporal data miningTemporal data mining
Temporal data mining
 

Recently uploaded

Next-generation AAM aircraft unveiled by Supernal, S-A2
Next-generation AAM aircraft unveiled by Supernal, S-A2Next-generation AAM aircraft unveiled by Supernal, S-A2
Next-generation AAM aircraft unveiled by Supernal, S-A2Hyundai Motor Group
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Scott Keck-Warren
 
How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?XfilesPro
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxOnBoard
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhisoniya singh
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptxLBM Solutions
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphNeo4j
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Patryk Bandurski
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Alan Dix
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):comworks
 

Recently uploaded (20)

Next-generation AAM aircraft unveiled by Supernal, S-A2
Next-generation AAM aircraft unveiled by Supernal, S-A2Next-generation AAM aircraft unveiled by Supernal, S-A2
Next-generation AAM aircraft unveiled by Supernal, S-A2
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024
 
How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptx
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptx
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping Elbows
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
 
Vulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptxVulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptx
 

Mobile network layer (mobile comm.)

  • 1.
  • 2. Contents:  Introduction To Mobile IP  Requirements to Mobile IP  Entities and Terminology  IP Packet Delivery  Agent Discovery  Registration
  • 3.  Mobile IP is an open standard, defined by the Internet Engineering Task Force (IETF) RFC 3220. By using Mobile IP, you can keep the same IP address, stay connected, and maintain ongoing applications while roaming between IP networks. Mobile IP is scalable for the Internet because it is based on IP—any media that can support IP can support Mobile IP.
  • 4.  Compatibility  support of the same layer 2 protocols as IP does  no changes to current end-systems and routers required  Mobile end-systems can communicate with fixed systems  Transparency  mobile end-systems keep their IP address  continuation of communication after interruption of link possible
  • 5.  Security  authentication of all registration messages  Efficiency and scalability  only little additional messages to the mobile system required (connection typically via a low bandwidth radio link)  world-wide support of a large number of mobile systems in the whole Internet
  • 6.  Mobile Node (MN)  A mobile node is an end-system or router that can change its point of attachment to the internet using mobile IP.  The MN keeps its IP address and can continuously communicate with any other system in the internet as long as link-layer connectivity is given.  Correspondent Node (CN)  At least one partner is needed for communication.  In the following the CN represents this partner for the MN. The CN can be a fixed or mobile node.
  • 7.  Home Network  The home network is the subnet the MN belongs to with respect to its IP address.  No mobile IP support is needed within the home network.  Foreign Network  The foreign network is the current subnet the MN visits and which is not the home network.
  • 8.  Foreign Agent (FA)  The FA can provide several services to the MN during its visit to the foreign network.  The FA can have the COA (defined below), acting as tunnel endpoint and forwarding packets to the MN.  The FA can be the default router for the MN. FAs can also provide security services because they belong to the foreign network as opposed to the MN which is only visiting.
  • 9.  Care Of Address (COA)  The COA defines the current location of the MN from an IP point of view.  All IP packets sent to the MN are delivered to the COA, not directly to the IP address of the MN. Packet delivery toward the MN is done using a tunnel, as explained later.
  • 10.  Care Of Address (contd…)  There are two different possibilities for the location of the COA: I. Foreign Agent COA:  The COA could be located at the FA, i.e., the COA is an IP address of the FA.  The FA is the tunnel end-point and forwards packets to the MN.  Many MN using the FA can share this COA as common COA. II. Co-Lated COA:  The COA is co-lated if the MN temporarily acquires an additional IP address which acts as COA.  This address is now topologically correct, and the tunnel endpoint is at the MN.
  • 11.  Home Agent (HA)  The HA provides several services for the MN and is located in the home network. The tunnel for packets toward the MN starts at the HA.  The HA can be implemented on a router that is responsible for the home network. This is obviously the best position, because without optimizations to mobile IP, all packets for the MN have to go through the router anyway.  If changing the router’s software is not possible, the HA could also be implemented on an arbitrary node in the subnet. One disadvantage of this solution is the double crossing of the router by the packet if the MN is in a foreign network. A packet for the MN comes in via the router; the HA sends it through the tunnel which again crosses the router.
  • 12.  One of the requirements of mobile IP was to support hiding the mobility of the MN. CN does not need to know anything about the MN’s current location and sends the packet as usual to the IP address of MN (step 1). This means that CN sends an IP packet with MN as a destination address and CN as a source address. The internet, not having information on the current location of MN, routes the packet to the router responsible for the home network of MN. This is done using the standard routing mechanisms of the internet.  The HA now intercepts the packet, knowing that MN is currently not in its home network. The packet is not forwarded into the subnet as usual, but encapsulated and tunneled to the COA. A new header is put in front of the old IP header showing the COA as new destination and HA as source of the encapsulated packet (step 2). The foreign agent now decapsulates packet, i.e., removes the additional header, and forwards the original packet with CN as source and MN as destination to the MN (step 3). Again, for the MN mobility is not visible. It receives the packet with the same sender and receiver address as it would have done in the home network.
  • 13.
  • 14.  One initial problem of an MN after moving is how to find a foreign agent. How does the MN discover that it has moved? For this purpose mobile IP describes two methods: agent advertisement and agent solicitation, which are in fact router discovery methods plus extensions.
  • 15.  Agent Advertisement:  For the first method, foreign agents and home agents advertise their presence periodically using special agent advertisement messages. These advertisement messages can be seen as a beacon broadcast into the subnet. For these advertisements Internet control message protocol (ICMP) messages according to RFC 1256 (Deering, 1991) are used with some mobility extensions.  The agent advertisement packet according to RFC 1256 with the extension for mobility is shown in Figure 8.3. The upper part represents the ICMP packet while the lower part is the extension needed for mobility. The fields necessary on lower layers for the agent advertisement are not shown in this figure. Clearly, mobile nodes must be reached with
  • 16. 0 7 8 15 16 23 24 31 Type code checksum #address addr. size lifetime es router address 1 preference level 1 router address 2 preference level 2 ….
  • 17. Type = 16 length Sequence number Registration lifetime R B H F MG r T reversed COA 1 COA 2 …
  • 18.  Agent solicitation:  If no agent advertisements are present or the inter- arrival time is too high, and an MN has not received a COA by other means, e.g., DHCP, the mobile node must send agent solicitations. These solicitations are again based on RFC 1256 for router solicitations. Care must be taken to ensure that these solicitation messages do not flood the network, but basically an MN can search for an FA endlessly sending out solicitation messages. Typically, a mobile node can send out three solicitations, one per second, as soon as it enters a new network.
  • 19.  Agent solicitation (contd…):  If a node does not receive an answer to its solicitations it must decrease the rate of solicitations exponentially to avoid flooding the network until it reaches a maximum interval between solicitations (typically one minute). Discovering a new agent can be done anytime, not just if the MN is not connected to one. Consider the case that an MN is looking for a better connection while still sending via the old path. This is the case while moving through several cells of different wireless networks.  After these steps of advertisements or solicitations the MN can now receive a COA, either one for an FA or a co-located COA. The MN knows its location (home network or foreign network) and the capabilities of the agent (if needed).
  • 20.  Having received a COA, the MN has to register with the HA. The main purpose of the registration is to inform the HA of the current location for correct forwarding of packets. Registration can be done in two different ways depending on the location of the COA.
  • 21. MN FA HA Registration MN HA Registration Request Request Registration Request Registration Reply Registration Reply Registration Reply
  • 22. 0 7 8 15 16 23 24 31 Type 1 S B D M G r T x lifetime Home Address Home Agent COA Identification Extensions….