SlideShare a Scribd company logo
“Mobile Networking Through Mobile IP”
Ashish Chandurkar
Seminar On
īƒ˜Introduction
īƒ˜Mobile IP Entities
īƒ˜Mobile IP Process
īƒ˜Security in Mobile IP
īƒ˜Problems with Mobile IP
īƒ˜Mobility in IPV6
īƒ˜Applications of Mobile IP
īƒ˜Conclusion
Outlines
īƒ˜Mobile IP was designed to allow mobile device users to move from
one network to another .
īƒ˜Enables hosts to stay connected to the Internet regardless of their
location.
īƒ˜Enables hosts to be tracked without needing to change their IP address.
īƒ˜Requires no changes to software of non-mobile hosts/routers.
īƒ˜Has no geographical limitations.
īƒ˜Supports security.
īƒ˜Standardized by IETF .
Introduction
1)Mobile Node (MN)
īƒ˜The entity that may change its point of attachment from network to
network in the Internet.
īƒ˜Detects it has moved and registers with “best” FA.
īƒ˜Assigned a permanent IP called its home address to which other
hosts send packets regardless of MN’s location.
īƒ˜Since this IP doesn’t change it can be used by long-lived
applications as MN’s location changes.
Mobile IP Entities
2)Home Agent (HA)
īƒ˜This is router with additional functionality
īƒ˜Located on home network of MN
īƒ˜Does mobility binding of MN’s IP with its COA
īƒ˜Forwards packets to appropriate network when MN is away
Home Network
īƒ˜The network within which the device receives its Home address
Mobile IP Entities Contd.
3)Foreign Agent (FA)
īƒ˜Another router with enhanced functionality
īƒ˜If MN is away from HA the it uses an FA to send/receive data
to/from HA
īƒ˜Advertises itself periodically
īƒ˜Forward’s MN’s registration request
Foreign Network
īƒ˜Network in which the Mobile Node is away from its Home network.
Mobile IP Entities Contd.
Mobile IP Entities Contd.
Care-of-address (COA)
īƒ˜Address which identifies MN’s current location
īƒ˜Sent by FA to HA when MN attaches
īƒ˜Usually the IP address of the FA
Correspondent Node (CN)
īƒ˜End host to which MN is corresponding (eg. a web server)
Mobile IP Entities Contd.
Home Address & Care of Address
The Mobile IP process has three main phases.
īƒ˜Agent Discovery - A mobile node discovers its foreign agents and
home agents during agent discovery.(Agent advertisement)
īƒ˜Registration - The mobile node registers its current location with
the foreign agent and home agent during registration.(Set up
routing mechanism for transporting packet)
īƒ˜Data Transfer- MN can communicate with CN
Mobile IP Process
How Mobile IP Works?
Data Transfer
1
2
3
4
īƒ˜ Authentication can be performed by all parties
īƒ˜ Only authentication between MN and HA is required
īƒ˜ Keyed MD5 is the default
īƒ˜ The hash-based message authentication code (HMAC)
īƒ˜ HA and FA do not have to share any security information.
Security in Mobile IP
īƒ˜ “Triangle” routing
īƒ˜ The Correspondent Node (CN) has to send packets to the Mobile Node
(MN) via the Home Agent (HA),while the MN sends packets directly to
the CN.
Problems with Mobile IP
īƒ˜Single HA model is easily broken
īƒ˜Frequent reports to HA if MN is moving
īƒ˜Security-Hijacking
Other Mobile IP Problems
īƒ˜ Route Optimization is a fundamental part of Mobile IPv6
īƒ˜ Mobile IPv4 it is an optional set of extensions that may not be
supported by all nodes
īƒ˜ Foreign Agents are not needed in Mobile IPv6
īƒ˜ MNs can function in any location without the services of any special
router in that location
īƒ˜ Security
īƒ˜ Nodes are expected to employ strong authentication and encryption
Mobility in IPv6
īƒ˜If route optimization is used, the MN and the CN can, after
performing the correspondent registration process, communicate with
each other directly without the need for sending data packets through
the HA and tunneling between the HA and the MN is not needed.
īƒ˜Here data packet sent from the MN to the CN using route
optimization.
Route Optimization
Route Optimization contd.
īƒ˜In many applications sudden changes in network connectivity and IP
address can cause problems.
īƒ˜Mobile IP was designed to support seamless and continuous Internet
connectivity.
īƒ˜Mobile IP is most often found in wired and wireless environments
where users need to carry their mobile devices across multiple LAN
subnets.
īƒ˜ Examples of use are in roaming between overlapping wireless
systems, e.g., IP over DVB, WLAN, WiMAX
Applications of Mobile IP
īƒ˜WiMAX (Worldwide Interoperability for Microwave Access) is a
wireless communications standard designed to provide 30 to 40
megabit per second data rates.
īƒ˜The bandwidth and range of WiMAX make it suitable for the
following potential applications:
īƒ˜Providing portable mobile broadband connectivity across cities and
countries through a variety of devices.
īƒ˜Providing a wireless alternative to cable and digital subscriber line
(DSL) for "last mile" broadband access.
īƒ˜WiMAX can provide at home or mobile Internet access across whole
cities or countries.
WIMAX
WIMAX Contd.
īƒ˜Mobile IP is the new generation technology to bring wireless data
communication in to common use.
īƒ˜Mobile IP will play an increasingly important part in the deployment
of future Internet mobile networking.
īƒ˜Mobile IPv6 is
īƒ˜An efficient protocol for handling mobility with IPv6
īƒ˜To minimize the control traffic needed to effect mobility
Conclusion

More Related Content

What's hot

What is Bluetooth Smart? - Technical Version
What is Bluetooth Smart? - Technical VersionWhat is Bluetooth Smart? - Technical Version
What is Bluetooth Smart? - Technical Version
Veacon
 
Bluetooth Slides
Bluetooth SlidesBluetooth Slides
Bluetooth Slides
Aniruddha Gupta
 
Ip packet delivery
Ip packet deliveryIp packet delivery
Ip packet delivery
rajisri2
 
Bluetooth
BluetoothBluetooth
Bluetooth
Samraiz Tejani
 
Bluetooth Technology
Bluetooth TechnologyBluetooth Technology
Bluetooth TechnologyManish Sharma
 
Wi-Fi vs Bluetooth
Wi-Fi vs BluetoothWi-Fi vs Bluetooth
Wi-Fi vs Bluetooth
Arun ACE
 
Bluetooth technology
Bluetooth technologyBluetooth technology
Bluetooth technology
AdityaMishrarollno2
 
wifi-technology
 wifi-technology wifi-technology
wifi-technologytardeep
 
Bluetooth
Bluetooth Bluetooth
Bluetooth
sateesh vysyaraju
 
Bluetooth presentation
Bluetooth presentationBluetooth presentation
Bluetooth presentation
Sushil Thapa
 
Bluetooth Technology -- detailed explanation
Bluetooth Technology -- detailed explanation Bluetooth Technology -- detailed explanation
Bluetooth Technology -- detailed explanation Siva Pradeep Bolisetti
 
Module 6 Wireless Network security
Module 6  Wireless Network securityModule 6  Wireless Network security
Module 6 Wireless Network security
nikshaikh786
 
Bluetooth technology presentation
Bluetooth technology presentationBluetooth technology presentation
Bluetooth technology presentation
Krishna Kumari
 
Wi fi technology
Wi fi technologyWi fi technology
Wi fi technologySubodh Sutar
 
Bluetooth
BluetoothBluetooth
Bluetooth
Anamika Garg
 
The Differences Between Bluetooth, ZigBee and WiFi
The Differences Between Bluetooth, ZigBee and WiFiThe Differences Between Bluetooth, ZigBee and WiFi
The Differences Between Bluetooth, ZigBee and WiFi
Mostafa Ali
 

What's hot (19)

What is Bluetooth Smart? - Technical Version
What is Bluetooth Smart? - Technical VersionWhat is Bluetooth Smart? - Technical Version
What is Bluetooth Smart? - Technical Version
 
Bluetooth Slides
Bluetooth SlidesBluetooth Slides
Bluetooth Slides
 
Ip packet delivery
Ip packet deliveryIp packet delivery
Ip packet delivery
 
Bluetooth
BluetoothBluetooth
Bluetooth
 
Blue1
Blue1Blue1
Blue1
 
Report
ReportReport
Report
 
Bluetooth Technology
Bluetooth TechnologyBluetooth Technology
Bluetooth Technology
 
Wi-Fi vs Bluetooth
Wi-Fi vs BluetoothWi-Fi vs Bluetooth
Wi-Fi vs Bluetooth
 
Bluetooth technology
Bluetooth technologyBluetooth technology
Bluetooth technology
 
wifi-technology
 wifi-technology wifi-technology
wifi-technology
 
Bluetooth
Bluetooth Bluetooth
Bluetooth
 
Bluetooth presentation
Bluetooth presentationBluetooth presentation
Bluetooth presentation
 
Bluetooth
BluetoothBluetooth
Bluetooth
 
Bluetooth Technology -- detailed explanation
Bluetooth Technology -- detailed explanation Bluetooth Technology -- detailed explanation
Bluetooth Technology -- detailed explanation
 
Module 6 Wireless Network security
Module 6  Wireless Network securityModule 6  Wireless Network security
Module 6 Wireless Network security
 
Bluetooth technology presentation
Bluetooth technology presentationBluetooth technology presentation
Bluetooth technology presentation
 
Wi fi technology
Wi fi technologyWi fi technology
Wi fi technology
 
Bluetooth
BluetoothBluetooth
Bluetooth
 
The Differences Between Bluetooth, ZigBee and WiFi
The Differences Between Bluetooth, ZigBee and WiFiThe Differences Between Bluetooth, ZigBee and WiFi
The Differences Between Bluetooth, ZigBee and WiFi
 

Similar to Seminar technical

D0362035
D0362035D0362035
D0362035
iosrjournals
 
Mobile IP 1
Mobile IP 1Mobile IP 1
Mobile IP 1
NULL CREATION
 
Mobile
MobileMobile
MobileLE RUE
 
Speed adaptive mobile ip over wireless
Speed adaptive mobile ip over wirelessSpeed adaptive mobile ip over wireless
Speed adaptive mobile ip over wirelessiaemedu
 
Extended Study on the Performance Evaluation of ISP MBG based Route Optimiza...
Extended Study on the Performance Evaluation of ISP MBG  based Route Optimiza...Extended Study on the Performance Evaluation of ISP MBG  based Route Optimiza...
Extended Study on the Performance Evaluation of ISP MBG based Route Optimiza...
IOSR Journals
 
A Proposed Technique For Solving The Triangle Routing Problem In Mobile IP
A Proposed Technique For Solving The Triangle Routing Problem In Mobile IPA Proposed Technique For Solving The Triangle Routing Problem In Mobile IP
A Proposed Technique For Solving The Triangle Routing Problem In Mobile IP
Martha Brown
 
Mobile ip overview
Mobile ip overviewMobile ip overview
Mobile ip overview
priya Nithya
 
Ec8004 wireless networks unit 2 mobile ip
Ec8004 wireless networks unit 2 mobile ipEc8004 wireless networks unit 2 mobile ip
Ec8004 wireless networks unit 2 mobile ip
HemalathaR31
 
Mobile IP
Mobile IPMobile IP
Mobile IP
shankul07
 
Unit 3
Unit 3Unit 3
Unit 3
SwamiKankipati
 
Unit 3
Unit 3Unit 3
Mobile IP
Mobile IPMobile IP
Mobile IP
Mukesh Chinta
 
Mobile IP - pavankumar_912
Mobile IP - pavankumar_912Mobile IP - pavankumar_912
Mobile IP - pavankumar_912
Pavan Kumar Sindgi
 
A review study of handover performance in mobile ip
A review study of handover performance in mobile ipA review study of handover performance in mobile ip
A review study of handover performance in mobile ip
IJCNCJournal
 
A lthough the Internet offers access to information sources worldwid.pdf
A lthough the Internet offers access to information sources worldwid.pdfA lthough the Internet offers access to information sources worldwid.pdf
A lthough the Internet offers access to information sources worldwid.pdf
ANGELMARKETINGJAIPUR
 

Similar to Seminar technical (20)

D0362035
D0362035D0362035
D0362035
 
Mobile IP 1
Mobile IP 1Mobile IP 1
Mobile IP 1
 
Mobile
MobileMobile
Mobile
 
Speed adaptive mobile ip over wireless
Speed adaptive mobile ip over wirelessSpeed adaptive mobile ip over wireless
Speed adaptive mobile ip over wireless
 
Extended Study on the Performance Evaluation of ISP MBG based Route Optimiza...
Extended Study on the Performance Evaluation of ISP MBG  based Route Optimiza...Extended Study on the Performance Evaluation of ISP MBG  based Route Optimiza...
Extended Study on the Performance Evaluation of ISP MBG based Route Optimiza...
 
A Proposed Technique For Solving The Triangle Routing Problem In Mobile IP
A Proposed Technique For Solving The Triangle Routing Problem In Mobile IPA Proposed Technique For Solving The Triangle Routing Problem In Mobile IP
A Proposed Technique For Solving The Triangle Routing Problem In Mobile IP
 
Mobile ip overview
Mobile ip overviewMobile ip overview
Mobile ip overview
 
Ec8004 wireless networks unit 2 mobile ip
Ec8004 wireless networks unit 2 mobile ipEc8004 wireless networks unit 2 mobile ip
Ec8004 wireless networks unit 2 mobile ip
 
Mobile IP
Mobile IPMobile IP
Mobile IP
 
Unit 3
Unit 3Unit 3
Unit 3
 
NEMO
NEMONEMO
NEMO
 
Unit 3
Unit 3Unit 3
Unit 3
 
Unit 3
Unit 3Unit 3
Unit 3
 
Mobileip 161105154557
Mobileip 161105154557Mobileip 161105154557
Mobileip 161105154557
 
Mobile IP
Mobile IPMobile IP
Mobile IP
 
Mobileip 161105154557
Mobileip 161105154557Mobileip 161105154557
Mobileip 161105154557
 
Mobile IP - pavankumar_912
Mobile IP - pavankumar_912Mobile IP - pavankumar_912
Mobile IP - pavankumar_912
 
A review study of handover performance in mobile ip
A review study of handover performance in mobile ipA review study of handover performance in mobile ip
A review study of handover performance in mobile ip
 
Mobility in network
Mobility in networkMobility in network
Mobility in network
 
A lthough the Internet offers access to information sources worldwid.pdf
A lthough the Internet offers access to information sources worldwid.pdfA lthough the Internet offers access to information sources worldwid.pdf
A lthough the Internet offers access to information sources worldwid.pdf
 

Recently uploaded

Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Jeffrey Haguewood
 
Knowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and backKnowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and back
Elena Simperl
 
ODC, Data Fabric and Architecture User Group
ODC, Data Fabric and Architecture User GroupODC, Data Fabric and Architecture User Group
ODC, Data Fabric and Architecture User Group
CatarinaPereira64715
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
Thijs Feryn
 
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Product School
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance
 
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
Product School
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
Guy Korland
 
UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3
DianaGray10
 
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
Product School
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
Jemma Hussein Allen
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
DianaGray10
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance
 
Key Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfKey Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdf
Cheryl Hung
 
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
Sri Ambati
 
"Impact of front-end architecture on development cost", Viktor Turskyi
"Impact of front-end architecture on development cost", Viktor Turskyi"Impact of front-end architecture on development cost", Viktor Turskyi
"Impact of front-end architecture on development cost", Viktor Turskyi
Fwdays
 
Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
OnBoard
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
BookNet Canada
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
DanBrown980551
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
Prayukth K V
 

Recently uploaded (20)

Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
 
Knowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and backKnowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and back
 
ODC, Data Fabric and Architecture User Group
ODC, Data Fabric and Architecture User GroupODC, Data Fabric and Architecture User Group
ODC, Data Fabric and Architecture User Group
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
 
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
 
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
 
UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3
 
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
 
Key Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfKey Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdf
 
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
 
"Impact of front-end architecture on development cost", Viktor Turskyi
"Impact of front-end architecture on development cost", Viktor Turskyi"Impact of front-end architecture on development cost", Viktor Turskyi
"Impact of front-end architecture on development cost", Viktor Turskyi
 
Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
 

Seminar technical

  • 1. “Mobile Networking Through Mobile IP” Ashish Chandurkar Seminar On
  • 2. īƒ˜Introduction īƒ˜Mobile IP Entities īƒ˜Mobile IP Process īƒ˜Security in Mobile IP īƒ˜Problems with Mobile IP īƒ˜Mobility in IPV6 īƒ˜Applications of Mobile IP īƒ˜Conclusion Outlines
  • 3. īƒ˜Mobile IP was designed to allow mobile device users to move from one network to another . īƒ˜Enables hosts to stay connected to the Internet regardless of their location. īƒ˜Enables hosts to be tracked without needing to change their IP address. īƒ˜Requires no changes to software of non-mobile hosts/routers. īƒ˜Has no geographical limitations. īƒ˜Supports security. īƒ˜Standardized by IETF . Introduction
  • 4. 1)Mobile Node (MN) īƒ˜The entity that may change its point of attachment from network to network in the Internet. īƒ˜Detects it has moved and registers with “best” FA. īƒ˜Assigned a permanent IP called its home address to which other hosts send packets regardless of MN’s location. īƒ˜Since this IP doesn’t change it can be used by long-lived applications as MN’s location changes. Mobile IP Entities
  • 5. 2)Home Agent (HA) īƒ˜This is router with additional functionality īƒ˜Located on home network of MN īƒ˜Does mobility binding of MN’s IP with its COA īƒ˜Forwards packets to appropriate network when MN is away Home Network īƒ˜The network within which the device receives its Home address Mobile IP Entities Contd.
  • 6. 3)Foreign Agent (FA) īƒ˜Another router with enhanced functionality īƒ˜If MN is away from HA the it uses an FA to send/receive data to/from HA īƒ˜Advertises itself periodically īƒ˜Forward’s MN’s registration request Foreign Network īƒ˜Network in which the Mobile Node is away from its Home network. Mobile IP Entities Contd.
  • 8. Care-of-address (COA) īƒ˜Address which identifies MN’s current location īƒ˜Sent by FA to HA when MN attaches īƒ˜Usually the IP address of the FA Correspondent Node (CN) īƒ˜End host to which MN is corresponding (eg. a web server) Mobile IP Entities Contd.
  • 9. Home Address & Care of Address
  • 10. The Mobile IP process has three main phases. īƒ˜Agent Discovery - A mobile node discovers its foreign agents and home agents during agent discovery.(Agent advertisement) īƒ˜Registration - The mobile node registers its current location with the foreign agent and home agent during registration.(Set up routing mechanism for transporting packet) īƒ˜Data Transfer- MN can communicate with CN Mobile IP Process
  • 11. How Mobile IP Works?
  • 13. īƒ˜ Authentication can be performed by all parties īƒ˜ Only authentication between MN and HA is required īƒ˜ Keyed MD5 is the default īƒ˜ The hash-based message authentication code (HMAC) īƒ˜ HA and FA do not have to share any security information. Security in Mobile IP
  • 14. īƒ˜ “Triangle” routing īƒ˜ The Correspondent Node (CN) has to send packets to the Mobile Node (MN) via the Home Agent (HA),while the MN sends packets directly to the CN. Problems with Mobile IP
  • 15. īƒ˜Single HA model is easily broken īƒ˜Frequent reports to HA if MN is moving īƒ˜Security-Hijacking Other Mobile IP Problems
  • 16. īƒ˜ Route Optimization is a fundamental part of Mobile IPv6 īƒ˜ Mobile IPv4 it is an optional set of extensions that may not be supported by all nodes īƒ˜ Foreign Agents are not needed in Mobile IPv6 īƒ˜ MNs can function in any location without the services of any special router in that location īƒ˜ Security īƒ˜ Nodes are expected to employ strong authentication and encryption Mobility in IPv6
  • 17. īƒ˜If route optimization is used, the MN and the CN can, after performing the correspondent registration process, communicate with each other directly without the need for sending data packets through the HA and tunneling between the HA and the MN is not needed. īƒ˜Here data packet sent from the MN to the CN using route optimization. Route Optimization
  • 19. īƒ˜In many applications sudden changes in network connectivity and IP address can cause problems. īƒ˜Mobile IP was designed to support seamless and continuous Internet connectivity. īƒ˜Mobile IP is most often found in wired and wireless environments where users need to carry their mobile devices across multiple LAN subnets. īƒ˜ Examples of use are in roaming between overlapping wireless systems, e.g., IP over DVB, WLAN, WiMAX Applications of Mobile IP
  • 20. īƒ˜WiMAX (Worldwide Interoperability for Microwave Access) is a wireless communications standard designed to provide 30 to 40 megabit per second data rates. īƒ˜The bandwidth and range of WiMAX make it suitable for the following potential applications: īƒ˜Providing portable mobile broadband connectivity across cities and countries through a variety of devices. īƒ˜Providing a wireless alternative to cable and digital subscriber line (DSL) for "last mile" broadband access. īƒ˜WiMAX can provide at home or mobile Internet access across whole cities or countries. WIMAX
  • 22. īƒ˜Mobile IP is the new generation technology to bring wireless data communication in to common use. īƒ˜Mobile IP will play an increasingly important part in the deployment of future Internet mobile networking. īƒ˜Mobile IPv6 is īƒ˜An efficient protocol for handling mobility with IPv6 īƒ˜To minimize the control traffic needed to effect mobility Conclusion