MOBILE IP - PowerPoint PPT Presentation

About This Presentation
Title:

MOBILE IP

Description:

Mobile Node (MN), Home Agent (HA), Foreign Agent (FA), Care-of-address (COA) ... Poor reliability due to single home agent model. SOLUTION TO MOBILE IP PROBLEMS ... – PowerPoint PPT presentation

Number of Views:84
Avg rating:3.0/5.0
Slides: 14
Provided by: Vic102
Category:
Tags: mobile

less

Transcript and Presenter's Notes

Title: MOBILE IP


1
MOBILE IP IP MICRO-MOBILITY SUPPORT
  • Presented by
  • Maheshwarnath Behary
  • Assisted by
  • Vishwanee Raghoonundun
  • Koti Choudary
  • MSc Computer Networks
  • Middlesex University

2
OVERVIEW OF PRESENTATION
  • Definition of Mobile IP
  • Entities Terminology
  • Services supported with Mobile IP
  • Drawbacks of Mobile IP
  • Solution to mobile IP problems
  • Cellular IP protocol
  • Hawaii protocol
  • Hierarchical mobile IPv6
  • Conclusion
  • Reference

3
INTRODUCTION TO MOBILE IP
  • Support the mobility of hosts while still
    remaining connected to the internet.
  • Mobile IP is able to track a mobile host without
    needing to change the mobile host's long-term IP
    address.
  • Proposed with the objective of supporting mobile
    users with application Layer transparency and the
    possibility of seamless roaming,
  • Mobile IP has to support security as
    authentication is performed to ensure that rights
    are being protected. .

4
ENTITIES AND TERMINOLOGY
  • Entities involved with Mobile IP

Mobile Node (MN), Home Agent (HA),
Foreign Agent (FA), Care-of-address (COA),
Correspondent Node (CN), Home Address, Mobility
Agent, Tunnel.
5
SERVICES SUPPORTED IN MOBILE IP
  • Agent Discovery Newly arrived mobile nodes get
    registered to the foreign agents by either agent
    solicitation or agent advertisement.
  • Registration The mobile node registers its
    care-of-address with its home agent so that the
    home agent knows where to forward its packets.
  • Encapsulation The process of enclosing an IP
    datagram within another IP header which contains
    the care-of-address of the mobile node. This is
    defined as the tunnel originated from the Home
    agent to the Foreign agent.
  • Decapsulation The reverse process of
    encapsulation.

6
DRAWBACKS OF MOBILE IP
  • Triangular routing problem due to indirect
    routing mechanism.
  • The mobile IP is more suitable for
    macro-mobility, but not suitable to the
    micro-mobility as it induces high load on network
    when dealing with highly mobile users.
  • Poor QoS in mobile IP is due to latency of
    handover and transmission caused by overheads in
    IP- in-IP encapsulation.
  • Poor reliability due to single home agent model.

7
SOLUTION TO MOBILE IP PROBLEMS
  • Main target To keep the frequent updates
    generated by local changes of MN away from the
    home network and only inform the HA about major
    changes. Thus leading to the minimisation of
    traffic delay within the network.
  • The above is supported by the use of
    micro-mobility protocols like Cellular IP,
    Hawaii, Hierarchical mobile IPv6.

8
CELLULAR IP PROTOCOL
  • Advantage
  • Cellular IP is mostly self configuring and easily
    manageable.
  • Disadvantages
  • Poor efficiency since multiple paths used for
    packet forwarding
  • Changes required from Mobile IP
  • Poor security as other user can easily give
    different source address to get copy of
    information addressed to other Mobile node from
    the CIPGW.

9
HANDOFF-AWARE WIRELESS ACESS INTERNET
INFRASTRUCTURE (HAWAII) PROTOCOL
  • Advantages
  • Routing changes are initiated by the foreign
    domains infrastructure
  • Mostly transparent to mobile node
  • Disadvantages
  • No provisions regarding the set up of IP tunnels
  • No private address is supported because of
    co-located COA

10
HIERARCHICAL MOBILE IPv6 (HMIPv6)
  • Advantages
  • Mobile nodes can have limited location privacy
    since LCOA can be hidden
  • Direct routing between the CNs sharing the same
    link is possible
  • Disadvantages
  • Additional infrastructure component required
    (MAP)
  • Routing tables are changed based on messages
    sent by the mobile nodes. Hence these require
    strong authentication against denial of service
    attacks.

11
CONCLUSION
  • Centralization of security-critical
    functionality
  • -this is the main security benefit of a
    firewall architecture and should be preserved
  • Mutual authentication of all instances involved
  • -prevent attacks using forged control messages.
  • Transparency to mobile nodes and correspondent
    nodes
  • -any necessary extensions of mobile IP standard
    are hidden from mobile nodes as well as
    correspondent nodes.

12
References
  • 1 Jochen Schiller, Mobile Communications,
    Second Edition, 2003
  • 2 http//www.cse.ohio-state.edu/jain/cis788-
  • 95/ftp/mobile_ip/index.htmlEntitie
    s
  • 3 A. Lasebae, Mobile and Wireless Networks.
    PEARSONCustom Publishing

13
END OF PRESENTATION
  • THANK YOU FOR YOUR KIND ATTENTION
Write a Comment
User Comments (0)
About PowerShow.com