SlideShare ist ein Scribd-Unternehmen logo
1 von 25
Downloaden Sie, um offline zu lesen
© Peter R. Egli 2015
1/25
Rev. 1.50
PMIPv6 – Proxy Mobile IPv6 indigoo.com
Peter R. Egli
INDIGOO.COM
OVERVIEW OF PMIPV6, A PROXY-BASED
MOBILITY PROTOCOL FOR IPV6 HOSTS
PMIPv6
PROXY MOBILE IPV6
© Peter R. Egli 2015
2/25
Rev. 1.50
PMIPv6 – Proxy Mobile IPv6 indigoo.com
Contents
1. Why PMIPv6 when we have MIP?
2. PMIPv6 terminology
3. Where can PMIPv6 be deployed?
4. General PMIPv6 setup
5. PMIPv6 versus MIP (Mobile IP)
6. MN domain join sequence
7. MN handoff sequence
8. PMIPv6 packet routing
9. Use of link-local addresses
10. Proxy Based Fast Handover
© Peter R. Egli 2015
3/25
Rev. 1.50
PMIPv6 – Proxy Mobile IPv6 indigoo.com
1. Why PMIPv6 when we have MIP?
MIP (Mobile IP, originally RFC2002) is an early approach to get mobility in the Internet.
Problems with MIP:
1. Clients must implement MIP in the kernel (MIP mobility is host-based).
 difficult to implement kernel changes
 difficult to deploy (clients need software upgrade to get MIP support)
2. Handoff procedure is not efficient  large delay.
3. Security concerns (MIP support in the kernel provides an additional attack vector).
PMIPv6 solution:
• PMIPv6 (RFC5213) is completely transparent to mobile nodes (use of a „proxy“ to do the
handoff work).
• PMIPv6 is meant to be used in localized networks with limited topology where handoff
signalling delays are minimal.
© Peter R. Egli 2015
4/25
Rev. 1.50
PMIPv6 – Proxy Mobile IPv6 indigoo.com
2. PMIPv6 terminology (1/3)
Local Mobility Domain (LMD):
Network that is PMIP-enabled. The LMD contains 1 LMA and multiple MAGs.
Local Mobility Anchor (LMA):
All traffic from and to the mobile node is routed through the LMA.
The LMA maintains a set of routes for each MN connected to the LMD.
Mobile Access Gateway (MAG):
The MAG performs the mobility related signalling on behalf of the MNs attached to
its access links.
The MAG is usually the access router (first hop router) for the MN.
Mobile Node (MN):
Any device that connects through a wireless network (WLAN, WiMAX, MBWA, G3/G4) to the
LMD.
Corresponding Node (CN):
Any node in the Internet or also in the LMD that communicates with an MN.
NetLMM:
Network based Localized Mobility Management (IETF working group for network-based
mobility support).
© Peter R. Egli 2015
5/25
Rev. 1.50
PMIPv6 – Proxy Mobile IPv6 indigoo.com
2. PMIPv6 terminology (2/3)
Binding Cache:
Cache maintained by the LMA that contains BCEs.
Binding Cache Entry (BCE):
Entry in the LMA‘s binding cache. An entry has the fields MN-ID, MAG proxy-CoA and MN-
prefix.
Binding Update List:
Cache maintained by the MAG that contains information about the attached MNs.
Proxy Binding Update (PBU):
PMIP signalling packet sent by the MAG to the LMA to indicate a new MN. The PBU has the
fields MN-ID (e.g. MN MAC), MAG address (proxy-CoA) and handoff indicator to signal if the
MN-attachment is a new one or a handoff from another MAG.
Proxy Binding Acknowledge (PBA):
Response to a PBU sent by the LMA to the MAG. The PBA contains the MN-ID, the MAG
address and the prefix assigned to the MN.
© Peter R. Egli 2015
6/25
Rev. 1.50
PMIPv6 – Proxy Mobile IPv6 indigoo.com
2. PMIPv6 terminology (3/3)
Proxy care of address (proxy-CoA):
IP address of public interface of MAG. The proxy-CoA is the tunnel endpoint address on the
MAG. The LMA encapsulates packets destined to the MN into a tunnel packet with
destination address = proxy-CoA.
Mobile Node Identifier (MN-ID):
Unique identifier of mobile node, e.g. one of its MAC addresses.
Home Network Prefix:
Prefix assigned to the MN by the LMA.
© Peter R. Egli 2015
7/25
Rev. 1.50
PMIPv6 – Proxy Mobile IPv6 indigoo.com
3. Where can PMIPv6 be deployed?
PMIPv6 is primarily targeted at the following networks:
1. WLAN-based campus-style networks:
PMIPv6 provides transparent handoff
for mobile nodes in campus
networks.
2. Advanced 3G/4G networks
Replace GTP (GPRS tunneling
protocol) by PMIP, thus
reduce the costs and
management in the network.
BSS1
WLAN
AP
BSS2
WLAN
AP
MAG
InternetCampus LAN
MAG
LMA
Handoff
MN1 MN1 MN2
© Peter R. Egli 2015
8/25
Rev. 1.50
PMIPv6 – Proxy Mobile IPv6 indigoo.com
4. General PMIPv6 setup
BSS1
WLAN
AP
BSS2
WLAN
AP
MAG1
Campus LAN
MAG2
LMA:
Topological anchor point
for addresses assigned
to MNs in the LMD.
MN1 MN2 MN3
ID Prefix MAG
(proxy-CoA)
MN-ID-1 Pref1::/64 MAG1
MN-ID-2 Pref2::/64 MAG2
MN-ID-3 Pref3::/64 MAG2
LMD
Tunnel
LMA-MAG for
user traffic
between LMA
and MAG. Internet
Proxy Binding Cache
MAG:
Runs MIP on
behalf of MN
(=proxy).
© Peter R. Egli 2015
9/25
Rev. 1.50
PMIPv6 – Proxy Mobile IPv6 indigoo.com
5. PMIPv6 versus MIP (Mobile IP)
In PMIPv6 the MAG assumes the role of the MIP client in MIP.
The LMA in PMIPv6 is similar to the home agent (HA) in MIP.
BSS1
MAG1
Campus
LAN
MN1
LMA
BSS2
MN1
MAG2
LMD
BSS1
HA
BSS2
FA
MN1
Internet Internet
CN
MN1
Handoff
CN
IP in IP
tunntel
Handoff
PMIPv6 MIP
Packet path
after handoff.
Packet path
before handoff.
Tunnel
HA Home Agent
FA Foreign Agent
© Peter R. Egli 2015
10/25
Rev. 1.50
PMIPv6 – Proxy Mobile IPv6 indigoo.com
6. MN domain join sequence (1/2)
The following sequence diagram shows the procedure when a MN joins a PMIPv6 domain:
MN1 MAG1 LMA
Attaching:
MN1 attaches to
MAG1 (establish
link layer)
Router solicitation:
MN1 solicits an IPv6 prefix
Identification:
MN identification,
MN authorization,
MN ID acquisition
Proxy Binding Update:
PBU with MN-ID-1, MAG1
ID Prefix MAG
(proxy CoA)
- - -
ID Prefix MAG
(proxy CoA)
MN-ID-1 Pref1::/64 MAG1
Proxy Binding Ack:
LMA sends BPA with
MN-ID-1, MAG1, Pref1::/64
Tunnel setup:
LMA sets up a bidirectional tunnel
Router advertisement:
MAG1 sends the IPv6
prefix Pref1::/64 to MN1
Update BC:
LMA adds an entry to the binding cache.
BC
BC
1
2
3
4
5
6
7
8
Router advertisement is
delayed until PMIP signalling
is completed.
© Peter R. Egli 2015
11/25
Rev. 1.50
PMIPv6 – Proxy Mobile IPv6 indigoo.com
6. MN domain join sequence (2/2)
1. Attaching:
MN1 attaches to the MAG through a point-to-point link and establishes the link layer.
Any access technology is possible provided that it emulates a point-to-point behavior (e.g. PPP, PPPoE).
2. Identification:
MAG1 authenticates MN1 based on its link layer address (e.g. MAC address) and ascertains what MN1 is permitted to do
(authorization). The authorization step may use existing services like LDAP or RADIUS.
3. Router solicitation:
MN1 sends a router solicitation to obtain an IPv6 prefix. MAG1 will not send a router advertisement until it obtained a prefix
for MN1 from the LMA (step 6, PBA).
4. Proxy binding update (PBU):
MAG1 sends a proxy binding update to the LMA. This PBU associates the MAG1 address with the identity of the MN.
5. Allocate prefix, update BC:
The LMA allocates a prefix for MN1 (Home Network Prefix). The LMA creates an entry in its BC. The entry contains the MN1 ID
(MN-ID-1), the address MAG1 of the proxy MAG (proxy-CoA) as well as the prefix assigned to MN1.
6. Proxy binding ack (PBA):
The LMA sends a PBA back to MAG1. The PBA contains the information of the BPC entry created in step 5.
7. Tunnel setup:
The LMA and MAG1 establish a bidirectional IPv6-in-IPv6 tunnel that is used for tunneling packets to and from MN1. The LMA
sets a route through the tunnel for traffic that is addressed to the MN.
8. Router advertisement:
MAG1 sends a router advertisement with the assigned prefix to MN1. MN1 will assign the prefix through stateless
autoconfiguration. Stateful autoconfiguration would be possible as well (outside of scope of PMIPv6). MN1 creates a routing
table entry for the prefix.
© Peter R. Egli 2015
12/25
Rev. 1.50
PMIPv6 – Proxy Mobile IPv6 indigoo.com
7. MN handoff sequence (1/4)
Handoff from MAG1 (PMAG – Previous MAG) to MAG2 (NMAG – New MAG):
MN1 MAG1 LMA
Detaching:
MN1 detaches from
MAG1
Start timer:
LMA starts timer to delete the MN-ID-1 entry from
its binding cache (BD).
BC
1
3
MAG2
Deregistration:
PBU with MN-ID-1, MAG1
2
Proxy Binding Ack:
LMA sends BPA with MN-ID-1, MAG1, Pref1::/64
4Attaching:
MN1 attaches to
MAG2 (establish
link layer)
5
Router solicitation:
MN1 solicits an IPv6 prefix
6
Proxy Binding Update:
PBU with MN-ID-1, MAG2
7
9 Proxy Binding Ack:
LMA sends BPA with
MN-ID-1, MAG2, Pref1::/64
Tunnel setup:
LMA sets up a
bidirectional tunnel
10
11 Router advertisement:
MAG2 sends the IPv6 prefix Pref1::/64 to MN1
ID Prefix MAG
(proxy CoA)
MN-ID-1 Pref1::/64 MAG2
Update BC:
LMA updates the entry in the binding
cache.
BC
8
ID Prefix MAG
(proxy-CoA)
MN-ID-1 Pref1::/64 MAG1
© Peter R. Egli 2015
13/25
Rev. 1.50
PMIPv6 – Proxy Mobile IPv6 indigoo.com
7. MN handoff sequence (2/4)
1. Detaching:
MN1 detaches from MAG1 (PMAG – Previous MAG). MAG1 detects this event through some mechanism outside of the scope
of PMIPv6, e.g. through link layer events (link down) or through an IPv6 Neighbor Unreachability Detection event.
2. Deregistration:
MAG1 sends a PBU with a deregistration request for MN1 (MN-ID-1).
3. Start timer:
LMA starts a timer for the MN1 proxy binding cache entry. During the timer period the LMA drops any packets received for
MN1. If the LMA does not receive a PBU from the new MAG within the timer period, it can drop the entry for MN1 from its
binding cache. Thus the timer allows the LMA deleting binding cache entries in case the MN1 leaves the LMD for good.
4. Proxy binding ack (PBA):
The LMA sends a PBA back to MAG1. The PBA contains the information of the BPC entry created in the join phase.
5. Attaching to MAG2 (NMAG – New MAG):
MN1 now attaches to MAG2 the same way as it did to MAG1 in the LMD join phase. MN1 and MAG2 will establish the link layer
(PPP, PPPoE).
6. Router solicitation:
MN1 sends a router solicitation to obtain an IPv6 prefix. MAG2 will not send a router advertisement until it obtained a prefix
for MN1 from the LMA.
7. Proxy binding update (PBU):
MAG2 sends a proxy binding update to the LMA. This PBU associates the MAG2 address with the identity of the MN.
8. Update of the binding cache entry (BCE):
The LMA detects that MN1 already has an entry in the binding cache and therefore updates the entry for MN1. MN1 is now
associated with MAG2. The prefix for MN1 remains the same (address transparency for MN1).
© Peter R. Egli 2015
14/25
Rev. 1.50
PMIPv6 – Proxy Mobile IPv6 indigoo.com
7. MN handoff sequence (3/4)
9. Proxy binding ack (PBA):
The LMA sends a PBA back to MAG2. The PBA contains the information of the BPC entry updated in step 8.
10. Tunnel setup:
The LMA and MAG2 establish a bidirectional IPv6-in-IPv6 tunnel that is used for tunneling packets to and from MN1. The LMA
sets a route through the tunnel for traffic that is addressed to the MN.
11. Router advertisement:
MAG2 sends a router advertisement with the same prefix assigned to MN1. MN1 will not ‘see’ an address change and
therefore all open transport connections (TCP, UDP) remain open.
© Peter R. Egli 2015
15/25
Rev. 1.50
PMIPv6 – Proxy Mobile IPv6 indigoo.com
7. MN handoff sequence (4/4)
From the perspective of the MN the LMD appears as a single link. The handoff is fully
transparent to the MN.
BSS1
MAG1
Campus
LAN
MN1
LMA
BSS2
MN1
MAG2
LMD
Handoff
Internet
CN
LMD
MN1
Internet
CN
From MN1‘s perspective
the LMD appears as a
single link.
© Peter R. Egli 2015
16/25
Rev. 1.50
PMIPv6 – Proxy Mobile IPv6 indigoo.com
8. Routing / packet forwarding from and to MN through LMD
The LMA is the anchor point for packets to and from the MN.
BSS1
MAG1
Campus
LAN
MN1
LMA
BSS2
MN2
MAG2
LMD Internet
CN A. Routing MNMAGLMACN:
All traffic is routed through the LMA
(=anchor point for routing).
B. MNMAGMN:
If 2 MNs are attached to the same MAG,
the traffic may be routed directly
through the MAG without the detour
through the LMA (short-circuit routing).
© Peter R. Egli 2015
17/25
Rev. 1.50
PMIPv6 – Proxy Mobile IPv6 indigoo.com
9. Use of link-local and link addresses by MAGs
Problem:
Emulation of a virtual link requires that router advertisements sent by MAGs to a particular MN
have
a. the same prefix assigned to the MN,
a. the same source IPv6 link-local address (IPv6 source address of ICMPv6 packet) and
b. the same source link layer address (source link layer option within ICMPv6 packet).
PMIPv6 proposes the following solutions:
A. Fixed address configuration:
Configuration of a fixed link-local and fixed link layer address to be used by all MAGs in the
LMD. However, the use of a fixed link-local address to be used in all access links in an PMIPv6
domain may lead to collisions. As PMIPv6 requires that the link-local address used by the
different MAGs for a particular MN be the same, these collisions can only happen when an MN
enters a PMIPv6 domain. PMIPv6 requires that the MN perform DAD (Duplicate Address
Detection) so that the MAG can defend its link-local address.
B. Dynamic address generation, signalling through LMA:
The LMA generates a link-local address to be used by all MAGs with a particular MN and signals
this address to all serving MAGs. This signalling must be completed before the MN performs
DAD.
© Peter R. Egli 2015
18/25
Rev. 1.50
PMIPv6 – Proxy Mobile IPv6 indigoo.com
10. Proxy Based Fast Handover for MIPv6 (PFMIPv6) with RFC5949 (1/8)
The handover sequence defined by RFC5213 is not optimized for fast handovers.
During handover from one radio access network to another network, packets cannot be
delivered to and from the mobile node. The handover delay essentially leads to packet loss
thus degrading the quality of service in mobility scenarios.
RFC5949 defines a fast handover procedure to be used in conjunction with PMIPv6. It defines
2 modes, predective fast handover (MAG1 initiates handover before MN establishes
connectivity with the new access network) and reactive fast handover (MAG2 initiates
handover after MN has established connectivity with the new access network).
Other mobility protocols have their specific fast handover protocol as shown in the following
table:
Mobility Protocol Corresponding Fast Handover Protocol
RFC6275
Mobile IPv6
RFC5568
Mobile IPv6 Fast Handovers (FMIPv6)
RFC5944 (obsoletes RFC3344)
Mobile IPv4
RFC4988
Mobile IPv4 Fast Handovers (FMIPv4)
RFC5213
Proxy Mobile IPv6
RFC5949
Proxy Based Fast Handover for MIPv6 (PFMIPv6), extends RFC5568
RFC5844
IPv4 Support for PMIPv6
RFC5949
Proxy Based Fast Handover for MIPv6 (PFMIPv6), extends RFC5568
© Peter R. Egli 2015
19/25
Rev. 1.50
PMIPv6 – Proxy Mobile IPv6 indigoo.com
10. Proxy Based Fast Handover for MIPv6 (PFMIPv6) with RFC5949 (2/8)
Predictive Fast Handover from MAG1 to MAG2 (initiated by MAG1=PMAG):
MN1 P-AN LMAN-AN MAG1
(PMAG)
MAG2
(NMAG)
CN
Report:
• MN-ID-1
• New AP-ID
1
Handover indication:
• MN-ID-1
• New AP-ID
2
HI (Handover Initiate):
• MN-ID-1
• HNP
• Current LMA addr.
3
HAck (Handover
Ack)
4
Tunnel setup:
Bidirectional tunnel
setup between MAG1
and MAG2
5
Handover command7
Buffering:
Buffering of downlink packets @ MAG2
until MAG2 has established connectivity
with N-AN
6
MN-AN connection establishment8 AN-MAG connection establishment9
10 Delivery of buffered downlink packets to MN
© Peter R. Egli 2015
20/25
Rev. 1.50
PMIPv6 – Proxy Mobile IPv6 indigoo.com
10. Proxy Based Fast Handover for MIPv6 (PFMIPv6) with RFC5949 (3/8)
Predictive Fast Handover from MAG1 to MAG2 (initiated by MAG1=PMAG):
MN1 P-AN LMAN-AN MAG1
(PMAG)
MAG2
(NMAG)
CN
11 Uplink packets
12
Proxy Binding
Update:
PBU with
MN-ID-1, MAG2
13
Proxy Binding
Ack
14 Direct data transfer for uplink and downlink packets through MAG2
© Peter R. Egli 2015
21/25
Rev. 1.50
PMIPv6 – Proxy Mobile IPv6 indigoo.com
10. Proxy Based Fast Handover for MIPv6 (PFMIPv6) with RFC5949 (4/8)
Predictive Fast Handover from MAG1 to MAG2 (initiated by MAG1=PMAG):
1. Report:
The MN1 detects that handover is imminent (waning radio signal strength in the radio access network where it is attached to)
and signals its MN-ID-1 and the ID of the radio access network ID (new AP-ID) to the current radio access network (P-AN for
Previous Access Network).
The way this is accomplished is outside the scope of PFMIPv6. Addtionally, it may be the access network itself (P-AN,
Previous Access Network) detecting an imminent handover and acting on behalf of MN1.
2. Handover indication:
The P-AN indicates the imminent handover along with the MN-ID-1 and new AP-ID to the current MAG (PMAG – Previous MAG).
MN-ID-1 may be the MAC address of its radio interface.
The new AP-ID may be the MAC address or SSID (Service Set ID) of a WLAN access point.
3. Handover Initiate:
MAG1 derives the address of MAG2 (NMAG – New MAG) from the new AP-ID (see RFC5568 for details).
The HI packet contains MN-ID-1, HNP (Home Network Prefix = MN1’s persistent IP address prefix) and MN1’s current LMA
address.
4. Handover Acknowledge:
MAG2 acknowledges the handover.
5. Bidirectional tunnel setup between MAG1 and MAG2:
MAG1 and MAG2 set up a bidirectional tunnel for temporarily tunneling data packets bound for MN1.
6. Buffering downlink data packets at MAG2:
Downlink packets destined for MN1 are forwarded by MAG1 (previous MAG) to MAG2 (new MAG) where they are queued for
delivery until MN1 has established connectivity with the new access network. When NM1 has established connectivity with
N-AN (New Access Network), MAG2 delivers the queued downlink packets to MN1 over N-AN.
© Peter R. Egli 2015
22/25
Rev. 1.50
PMIPv6 – Proxy Mobile IPv6 indigoo.com
10. Proxy Based Fast Handover for MIPv6 (PFMIPv6) with RFC5949 (5/8)
Predictive Fast Handover from MAG1 to MAG2 (initiated by MAG1=PMAG):
7. Handover command:
MAG1 sends a handover command to MN1 telling it that everything is set up and that it now may switch to N-AN. Again, the
way this is accomplished is outside of scope of PFMIPv6.
8. MN-AN connection establishment:
MN1 establishes layer 2 connectivity with the N-AN through some means outside the scope of PFMIPv6.
9. AN-MAG connection establishment:
Likewise, MAG2 establishes layer 2 connectivity with N-AN if not done so before. When connectivity is established, the
access network (N-AN) becomes responsible for buffering downlink packets. The specifics are again outside the scope of
PFMIPv6. From now on, MN1 uplink packets can be forwarded to CN without buffering.
10. Delivery of buffered downlink packets to MN1:
After having established N-AN connectivity, MAG2 deliveres the queued packets to MN1.
11. MN1 uplink packet forwarding:
All MN1 uplink packets between step 8./9. and 12. follow the forwarding path MN1MAG2MAG1 (through tunnel)LMA.
12. Proxy binding update (PBU):
MAG2 sends a proxy binding update to the LMA. This PBU associates the MAG2 address with the identity of MN1 (MN-ID-1).
The LMA updates the BCE (Binding Cache Entry) for MN1. MN1 is now associated with MAG2. The prefix (HNP) for MN1
remains the same (address transparency for MN1).
13. Proxy binding ack (PBA):
The LMA sends back a PBA packet to MAG2.
14. Uplink and downlink data transfer through MAG2:
Uplink and downlink packets are now forwarded through MAG2 and the tunnel between MAG2 and LMA.
© Peter R. Egli 2015
23/25
Rev. 1.50
PMIPv6 – Proxy Mobile IPv6 indigoo.com
10. Proxy Based Fast Handover for MIPv6 (PFMIPv6) with RFC5949 (6/8)
Reactive Fast Handover from MAG1 to MAG2 (initiated by MAG2=NMAG):
MN1 P-AN LMAN-AN MAG1
(PMAG)
MAG2
(NMAG)
CN
MN-AN connection establishment1
AN-MAG connection establishment:
• MN1-ID
• Old AP-ID
2
HI (Handover Initiate):
• MN-ID-1
3
HAck (Handover Ack):
• HNP
• MN LL-ID
• LMA addr.
4
Tunnel setup:
Bidirectional tunnel
setup between MAG1
and MAG2
5
6 Uplink packets
7 Downlink packets
© Peter R. Egli 2015
24/25
Rev. 1.50
PMIPv6 – Proxy Mobile IPv6 indigoo.com
10. Proxy Based Fast Handover for MIPv6 (PFMIPv6) with RFC5949 (7/8)
Reactive Fast Handover from MAG1 to MAG2 (initiated by MAG2=NMAG):
MN1 P-AN LMAN-AN MAG1
(PMAG)
MAG2
(NMAG)
CN
8
9
Proxy Binding
Ack
10 Direct data transfer for uplink and downlink through MAG2
Proxy Binding
Update:
PBU with
MN-ID-1, MAG2
© Peter R. Egli 2015
25/25
Rev. 1.50
PMIPv6 – Proxy Mobile IPv6 indigoo.com
10. Proxy Based Fast Handover for MIPv6 (PFMIPv6) with RFC5949 (8/8)
Reactive Fast Handover from MAG1 to MAG2 (initiated by MAG2=NMAG):
1. MN-AN connection establishment:
MN1 establishes layer 2 connectivity with the N-AN through some means outside the scope of PFMIPv6.
2. AN-MAG connection establishment:
Likewise, MAG2 establishes layer 2 connectivity with N-AN if not done so before. When connectivity is established, the
access network (N-AN) becomes responsible for buffering downlink packets. The specifics of all that is again outside the
scope of PFMIPv6.
3. Handover Initiate:
MAG2 derives the address of MAG1 from the old AP-ID and sends a HI (Handover Initiate) packet that contains MN-ID-1.
4. Handover Acknowledge:
MAG1 acknowledges the handover. The acknowledge packet contains MN1’s link layer ID (MN LL-ID), HNP (Home Network
Prefix) and MN1’s current LMA address.
5. Bidirectional tunnel setup between MAG1 and MAG2:
MAG1 and MAG2 set up a bidirectional tunnel for temporarily tunneling data packets bound for MN1.
6. & 7. Uplink and downlink packets:
Up- and downlink packets are relayed through MAG1.
12. & 13. Proxy binding update (PBU) and Proxy binding ack (PBA):
MAG2 sends a proxy binding update to the LMA. This PBU associates the MAG2 address with the identity of MN1 (MN-ID-1).
The LMA updates the BCE (Binding Cache Entry) for MN1. MN1 is now associated with MAG2. The prefix (HNP) for MN1
remains the same (address transparency for MN1). The LMA sends back a PBA packet to MAG2.
14. Uplink and downlink data transfer through MAG2:
Uplink and downlink packets are now forwarded through MAG2 and the tunnel between MAG2 and LMA.

Weitere ähnliche Inhalte

Was ist angesagt?

MPLS Deployment Chapter 1 - Basic
MPLS Deployment Chapter 1 - BasicMPLS Deployment Chapter 1 - Basic
MPLS Deployment Chapter 1 - BasicEricsson
 
Advanced: 5G Service Based Architecture (SBA)
Advanced: 5G Service Based Architecture (SBA)Advanced: 5G Service Based Architecture (SBA)
Advanced: 5G Service Based Architecture (SBA)3G4G
 
3GPP SON Series: Mobility Load Balancing (MLB)
3GPP SON Series: Mobility Load Balancing (MLB)3GPP SON Series: Mobility Load Balancing (MLB)
3GPP SON Series: Mobility Load Balancing (MLB)3G4G
 
MPLS - Multiprotocol Label Switching
MPLS - Multiprotocol Label SwitchingMPLS - Multiprotocol Label Switching
MPLS - Multiprotocol Label SwitchingPeter R. Egli
 
Timing and synchronization for 5G over optical networks
Timing and synchronization for 5G over optical networksTiming and synchronization for 5G over optical networks
Timing and synchronization for 5G over optical networksADVA
 
Intermediate: 5G Network Architecture Options (Updated)
Intermediate: 5G Network Architecture Options (Updated)Intermediate: 5G Network Architecture Options (Updated)
Intermediate: 5G Network Architecture Options (Updated)3G4G
 
MPLS L3 VPN Deployment
MPLS L3 VPN DeploymentMPLS L3 VPN Deployment
MPLS L3 VPN DeploymentAPNIC
 
MP BGP-EVPN 실전기술-1편(개념잡기)
MP BGP-EVPN 실전기술-1편(개념잡기)MP BGP-EVPN 실전기술-1편(개념잡기)
MP BGP-EVPN 실전기술-1편(개념잡기)JuHwan Lee
 
Mobile Transport Evolution with Unified MPLS
Mobile Transport Evolution with Unified MPLSMobile Transport Evolution with Unified MPLS
Mobile Transport Evolution with Unified MPLSCisco Canada
 
ePRTC in data centers – GNSS backup as a service (GBaaS)
ePRTC in data centers – GNSS backup as a service (GBaaS)ePRTC in data centers – GNSS backup as a service (GBaaS)
ePRTC in data centers – GNSS backup as a service (GBaaS)ADVA
 
5G evolution 3gpp R6 R17-final
5G evolution 3gpp R6 R17-final5G evolution 3gpp R6 R17-final
5G evolution 3gpp R6 R17-finalalirezazavieh
 
5G Standards: 3GPP Release 15, 16, and beyond
5G Standards: 3GPP Release 15, 16, and beyond5G Standards: 3GPP Release 15, 16, and beyond
5G Standards: 3GPP Release 15, 16, and beyond3G4G
 
5G Network Architecture Options
5G Network Architecture Options5G Network Architecture Options
5G Network Architecture Options3G4G
 
Bidirectional Forwarding Detection (BFD)
Bidirectional Forwarding Detection (BFD) Bidirectional Forwarding Detection (BFD)
Bidirectional Forwarding Detection (BFD) KHNOG
 
Juniper MPLS Tutorial by Soricelli
Juniper MPLS Tutorial by SoricelliJuniper MPLS Tutorial by Soricelli
Juniper MPLS Tutorial by SoricelliFebrian ‎
 
Tutorial: Using GoBGP as an IXP connecting router
Tutorial: Using GoBGP as an IXP connecting routerTutorial: Using GoBGP as an IXP connecting router
Tutorial: Using GoBGP as an IXP connecting routerShu Sugimoto
 
Demystifying LTE Performance Management and Optimization
Demystifying LTE Performance Management and OptimizationDemystifying LTE Performance Management and Optimization
Demystifying LTE Performance Management and OptimizationOpeyemi Praise
 

Was ist angesagt? (20)

MPLS Deployment Chapter 1 - Basic
MPLS Deployment Chapter 1 - BasicMPLS Deployment Chapter 1 - Basic
MPLS Deployment Chapter 1 - Basic
 
ALU GPON TRAINING 1
ALU GPON TRAINING 1ALU GPON TRAINING 1
ALU GPON TRAINING 1
 
Advanced: 5G Service Based Architecture (SBA)
Advanced: 5G Service Based Architecture (SBA)Advanced: 5G Service Based Architecture (SBA)
Advanced: 5G Service Based Architecture (SBA)
 
3GPP SON Series: Mobility Load Balancing (MLB)
3GPP SON Series: Mobility Load Balancing (MLB)3GPP SON Series: Mobility Load Balancing (MLB)
3GPP SON Series: Mobility Load Balancing (MLB)
 
MPLS - Multiprotocol Label Switching
MPLS - Multiprotocol Label SwitchingMPLS - Multiprotocol Label Switching
MPLS - Multiprotocol Label Switching
 
Timing and synchronization for 5G over optical networks
Timing and synchronization for 5G over optical networksTiming and synchronization for 5G over optical networks
Timing and synchronization for 5G over optical networks
 
Intermediate: 5G Network Architecture Options (Updated)
Intermediate: 5G Network Architecture Options (Updated)Intermediate: 5G Network Architecture Options (Updated)
Intermediate: 5G Network Architecture Options (Updated)
 
MPLS L3 VPN Deployment
MPLS L3 VPN DeploymentMPLS L3 VPN Deployment
MPLS L3 VPN Deployment
 
MP BGP-EVPN 실전기술-1편(개념잡기)
MP BGP-EVPN 실전기술-1편(개념잡기)MP BGP-EVPN 실전기술-1편(개념잡기)
MP BGP-EVPN 실전기술-1편(개념잡기)
 
LTE Measurement: How to test a device
LTE Measurement: How to test a deviceLTE Measurement: How to test a device
LTE Measurement: How to test a device
 
Mobile Transport Evolution with Unified MPLS
Mobile Transport Evolution with Unified MPLSMobile Transport Evolution with Unified MPLS
Mobile Transport Evolution with Unified MPLS
 
ePRTC in data centers – GNSS backup as a service (GBaaS)
ePRTC in data centers – GNSS backup as a service (GBaaS)ePRTC in data centers – GNSS backup as a service (GBaaS)
ePRTC in data centers – GNSS backup as a service (GBaaS)
 
5G evolution 3gpp R6 R17-final
5G evolution 3gpp R6 R17-final5G evolution 3gpp R6 R17-final
5G evolution 3gpp R6 R17-final
 
5G Standards: 3GPP Release 15, 16, and beyond
5G Standards: 3GPP Release 15, 16, and beyond5G Standards: 3GPP Release 15, 16, and beyond
5G Standards: 3GPP Release 15, 16, and beyond
 
Cisco MPLS
Cisco MPLSCisco MPLS
Cisco MPLS
 
5G Network Architecture Options
5G Network Architecture Options5G Network Architecture Options
5G Network Architecture Options
 
Bidirectional Forwarding Detection (BFD)
Bidirectional Forwarding Detection (BFD) Bidirectional Forwarding Detection (BFD)
Bidirectional Forwarding Detection (BFD)
 
Juniper MPLS Tutorial by Soricelli
Juniper MPLS Tutorial by SoricelliJuniper MPLS Tutorial by Soricelli
Juniper MPLS Tutorial by Soricelli
 
Tutorial: Using GoBGP as an IXP connecting router
Tutorial: Using GoBGP as an IXP connecting routerTutorial: Using GoBGP as an IXP connecting router
Tutorial: Using GoBGP as an IXP connecting router
 
Demystifying LTE Performance Management and Optimization
Demystifying LTE Performance Management and OptimizationDemystifying LTE Performance Management and Optimization
Demystifying LTE Performance Management and Optimization
 

Andere mochten auch

IPv6 in Mobile Networks
IPv6 in Mobile NetworksIPv6 in Mobile Networks
IPv6 in Mobile NetworksAPNIC
 
Choosing A Proxy Server - Apachecon 2014
Choosing A Proxy Server - Apachecon 2014Choosing A Proxy Server - Apachecon 2014
Choosing A Proxy Server - Apachecon 2014bryan_call
 
Introduction to Mobile IPv6
Introduction to Mobile IPv6Introduction to Mobile IPv6
Introduction to Mobile IPv6guestbeb9a5
 
Measuring Web Performance
Measuring Web Performance Measuring Web Performance
Measuring Web Performance Dave Olsen
 
AWC January 2011 Newsletter
AWC January 2011 NewsletterAWC January 2011 Newsletter
AWC January 2011 Newsletterpurdueawc
 
Jenkins+vimenv で最新のVimを使おう! @ vimconf2014
Jenkins+vimenv で最新のVimを使おう! @ vimconf2014Jenkins+vimenv で最新のVimを使おう! @ vimconf2014
Jenkins+vimenv で最新のVimを使おう! @ vimconf2014Umezaki Hiroki
 
Holosonic audio spot light seminar ppt
Holosonic audio  spot light seminar pptHolosonic audio  spot light seminar ppt
Holosonic audio spot light seminar pptAyush Gautam
 
VimConf 2014 from deris0126
VimConf 2014 from deris0126VimConf 2014 from deris0126
VimConf 2014 from deris0126deris0126
 
Auto closing parenthesis @vim conf2014
Auto closing parenthesis @vim conf2014Auto closing parenthesis @vim conf2014
Auto closing parenthesis @vim conf2014cohama
 
eWaste Recycling & Management - Infotrek & Regalis.in
eWaste Recycling & Management - Infotrek & Regalis.ineWaste Recycling & Management - Infotrek & Regalis.in
eWaste Recycling & Management - Infotrek & Regalis.inHashPro Technologies
 
Wireless network ppt
Wireless network pptWireless network ppt
Wireless network pptBasil John
 
Screenless display technology
Screenless display technologyScreenless display technology
Screenless display technologyzeelarora
 
lamp technology
lamp technologylamp technology
lamp technologyDeepa
 

Andere mochten auch (20)

Mobile I Pv6
Mobile I Pv6Mobile I Pv6
Mobile I Pv6
 
IPv6 in Mobile Networks
IPv6 in Mobile NetworksIPv6 in Mobile Networks
IPv6 in Mobile Networks
 
Choosing A Proxy Server - Apachecon 2014
Choosing A Proxy Server - Apachecon 2014Choosing A Proxy Server - Apachecon 2014
Choosing A Proxy Server - Apachecon 2014
 
Introduction to Mobile IPv6
Introduction to Mobile IPv6Introduction to Mobile IPv6
Introduction to Mobile IPv6
 
Measuring Web Performance
Measuring Web Performance Measuring Web Performance
Measuring Web Performance
 
Afaq ahmed p71060
Afaq ahmed p71060Afaq ahmed p71060
Afaq ahmed p71060
 
Afaq ahmed p71060
Afaq ahmed p71060Afaq ahmed p71060
Afaq ahmed p71060
 
AWC January 2011 Newsletter
AWC January 2011 NewsletterAWC January 2011 Newsletter
AWC January 2011 Newsletter
 
Extraordinarios historia
Extraordinarios historiaExtraordinarios historia
Extraordinarios historia
 
Extraordinarios ics
Extraordinarios icsExtraordinarios ics
Extraordinarios ics
 
Mobile ip group_3
Mobile ip group_3Mobile ip group_3
Mobile ip group_3
 
Jenkins+vimenv で最新のVimを使おう! @ vimconf2014
Jenkins+vimenv で最新のVimを使おう! @ vimconf2014Jenkins+vimenv で最新のVimを使おう! @ vimconf2014
Jenkins+vimenv で最新のVimを使おう! @ vimconf2014
 
Hakin9 05 2013
Hakin9 05 2013Hakin9 05 2013
Hakin9 05 2013
 
Holosonic audio spot light seminar ppt
Holosonic audio  spot light seminar pptHolosonic audio  spot light seminar ppt
Holosonic audio spot light seminar ppt
 
VimConf 2014 from deris0126
VimConf 2014 from deris0126VimConf 2014 from deris0126
VimConf 2014 from deris0126
 
Auto closing parenthesis @vim conf2014
Auto closing parenthesis @vim conf2014Auto closing parenthesis @vim conf2014
Auto closing parenthesis @vim conf2014
 
eWaste Recycling & Management - Infotrek & Regalis.in
eWaste Recycling & Management - Infotrek & Regalis.ineWaste Recycling & Management - Infotrek & Regalis.in
eWaste Recycling & Management - Infotrek & Regalis.in
 
Wireless network ppt
Wireless network pptWireless network ppt
Wireless network ppt
 
Screenless display technology
Screenless display technologyScreenless display technology
Screenless display technology
 
lamp technology
lamp technologylamp technology
lamp technology
 

Ähnlich wie Proxy Mobile IPv6 (PMIPv6)

level 3 semester 2 presentation
level 3 semester 2 presentationlevel 3 semester 2 presentation
level 3 semester 2 presentationMehnaz Binte Zia
 
IMPROVED HANDOVER ALGORITHM TO AVOID DUPLICATION AAA AUTHENTICATION IN PROXY ...
IMPROVED HANDOVER ALGORITHM TO AVOID DUPLICATION AAA AUTHENTICATION IN PROXY ...IMPROVED HANDOVER ALGORITHM TO AVOID DUPLICATION AAA AUTHENTICATION IN PROXY ...
IMPROVED HANDOVER ALGORITHM TO AVOID DUPLICATION AAA AUTHENTICATION IN PROXY ...IJCNCJournal
 
Route Optimization in MIPv6 Experimental Test bed for Network Mobility: Trade...
Route Optimization in MIPv6 Experimental Test bed for Network Mobility: Trade...Route Optimization in MIPv6 Experimental Test bed for Network Mobility: Trade...
Route Optimization in MIPv6 Experimental Test bed for Network Mobility: Trade...IJCSIS Research Publications
 
BULK BINDING UPDATE PROCEDURE FOR PMIPV6 BASED INTELLIGENT TRANSPORTATION SYS...
BULK BINDING UPDATE PROCEDURE FOR PMIPV6 BASED INTELLIGENT TRANSPORTATION SYS...BULK BINDING UPDATE PROCEDURE FOR PMIPV6 BASED INTELLIGENT TRANSPORTATION SYS...
BULK BINDING UPDATE PROCEDURE FOR PMIPV6 BASED INTELLIGENT TRANSPORTATION SYS...cscpconf
 
A Tunnel Compress Scheme for Multi-Tunneling in PMIPv6-based Nested NEMO
A Tunnel Compress Scheme for Multi-Tunneling in PMIPv6-based Nested NEMO A Tunnel Compress Scheme for Multi-Tunneling in PMIPv6-based Nested NEMO
A Tunnel Compress Scheme for Multi-Tunneling in PMIPv6-based Nested NEMO ijwmn
 
A Tunnel Compress Scheme for Multi-Tunneling in PMIPv6-based Nested NEMO
A Tunnel Compress Scheme for Multi-Tunneling in PMIPv6-based Nested NEMOA Tunnel Compress Scheme for Multi-Tunneling in PMIPv6-based Nested NEMO
A Tunnel Compress Scheme for Multi-Tunneling in PMIPv6-based Nested NEMOijwmn
 
Welcome to International Journal of Engineering Research and Development (IJERD)
Welcome to International Journal of Engineering Research and Development (IJERD)Welcome to International Journal of Engineering Research and Development (IJERD)
Welcome to International Journal of Engineering Research and Development (IJERD)IJERD Editor
 
A review study of handover performance in mobile ip
A review study of handover performance in mobile ipA review study of handover performance in mobile ip
A review study of handover performance in mobile ipIJCNCJournal
 
PLNOG 4: Emil Gągała - Deploying Next-Generation Multicast VPN
PLNOG 4: Emil Gągała - Deploying Next-Generation Multicast VPNPLNOG 4: Emil Gągała - Deploying Next-Generation Multicast VPN
PLNOG 4: Emil Gągała - Deploying Next-Generation Multicast VPNPROIDEA
 
IMPROVED HANDOVER ALGORITHM FOR PROXY MIPv6 BASED ON AAA SERVER
IMPROVED HANDOVER ALGORITHM FOR PROXY MIPv6 BASED ON AAA SERVERIMPROVED HANDOVER ALGORITHM FOR PROXY MIPv6 BASED ON AAA SERVER
IMPROVED HANDOVER ALGORITHM FOR PROXY MIPv6 BASED ON AAA SERVERcscpconf
 
Flexible NFV WAN interconnections with Neutron BGP VPN
 Flexible NFV WAN interconnections with Neutron BGP VPN Flexible NFV WAN interconnections with Neutron BGP VPN
Flexible NFV WAN interconnections with Neutron BGP VPNThomas Morin
 
Developing route optimization based pmi pv6 testbed for reliable packet trans...
Developing route optimization based pmi pv6 testbed for reliable packet trans...Developing route optimization based pmi pv6 testbed for reliable packet trans...
Developing route optimization based pmi pv6 testbed for reliable packet trans...redpel dot com
 
Internet service provider mobile
Internet service provider mobileInternet service provider mobile
Internet service provider mobileIJCNCJournal
 
5G: Why Wait? - 5G Observatory 2016
5G: Why Wait? - 5G Observatory 20165G: Why Wait? - 5G Observatory 2016
5G: Why Wait? - 5G Observatory 2016Daniel Sproats
 
5G: Why Wait? - 5G Observatory 2016
5G: Why Wait? - 5G Observatory 2016 5G: Why Wait? - 5G Observatory 2016
5G: Why Wait? - 5G Observatory 2016 ADVA
 
Introducció a les xarxes 5G
Introducció a les xarxes 5GIntroducció a les xarxes 5G
Introducció a les xarxes 5GTICAnoia
 
Akraino API TSC Ike Alisson 5G Mobility Edge MEC synergy present 2020 11 06 R...
Akraino API TSC Ike Alisson 5G Mobility Edge MEC synergy present 2020 11 06 R...Akraino API TSC Ike Alisson 5G Mobility Edge MEC synergy present 2020 11 06 R...
Akraino API TSC Ike Alisson 5G Mobility Edge MEC synergy present 2020 11 06 R...Ike Alisson
 
Fast Handovers in heterogeneous Wireless Networks
Fast Handovers in heterogeneous Wireless NetworksFast Handovers in heterogeneous Wireless Networks
Fast Handovers in heterogeneous Wireless NetworksSneha Vurrakula
 
Module 05 mobility management (1)
Module 05   mobility management (1)Module 05   mobility management (1)
Module 05 mobility management (1)JIGNESH PATEL
 

Ähnlich wie Proxy Mobile IPv6 (PMIPv6) (20)

level 3 semester 2 presentation
level 3 semester 2 presentationlevel 3 semester 2 presentation
level 3 semester 2 presentation
 
IMPROVED HANDOVER ALGORITHM TO AVOID DUPLICATION AAA AUTHENTICATION IN PROXY ...
IMPROVED HANDOVER ALGORITHM TO AVOID DUPLICATION AAA AUTHENTICATION IN PROXY ...IMPROVED HANDOVER ALGORITHM TO AVOID DUPLICATION AAA AUTHENTICATION IN PROXY ...
IMPROVED HANDOVER ALGORITHM TO AVOID DUPLICATION AAA AUTHENTICATION IN PROXY ...
 
Route Optimization in MIPv6 Experimental Test bed for Network Mobility: Trade...
Route Optimization in MIPv6 Experimental Test bed for Network Mobility: Trade...Route Optimization in MIPv6 Experimental Test bed for Network Mobility: Trade...
Route Optimization in MIPv6 Experimental Test bed for Network Mobility: Trade...
 
BULK BINDING UPDATE PROCEDURE FOR PMIPV6 BASED INTELLIGENT TRANSPORTATION SYS...
BULK BINDING UPDATE PROCEDURE FOR PMIPV6 BASED INTELLIGENT TRANSPORTATION SYS...BULK BINDING UPDATE PROCEDURE FOR PMIPV6 BASED INTELLIGENT TRANSPORTATION SYS...
BULK BINDING UPDATE PROCEDURE FOR PMIPV6 BASED INTELLIGENT TRANSPORTATION SYS...
 
A Tunnel Compress Scheme for Multi-Tunneling in PMIPv6-based Nested NEMO
A Tunnel Compress Scheme for Multi-Tunneling in PMIPv6-based Nested NEMO A Tunnel Compress Scheme for Multi-Tunneling in PMIPv6-based Nested NEMO
A Tunnel Compress Scheme for Multi-Tunneling in PMIPv6-based Nested NEMO
 
A Tunnel Compress Scheme for Multi-Tunneling in PMIPv6-based Nested NEMO
A Tunnel Compress Scheme for Multi-Tunneling in PMIPv6-based Nested NEMOA Tunnel Compress Scheme for Multi-Tunneling in PMIPv6-based Nested NEMO
A Tunnel Compress Scheme for Multi-Tunneling in PMIPv6-based Nested NEMO
 
Welcome to International Journal of Engineering Research and Development (IJERD)
Welcome to International Journal of Engineering Research and Development (IJERD)Welcome to International Journal of Engineering Research and Development (IJERD)
Welcome to International Journal of Engineering Research and Development (IJERD)
 
A review study of handover performance in mobile ip
A review study of handover performance in mobile ipA review study of handover performance in mobile ip
A review study of handover performance in mobile ip
 
PLNOG 4: Emil Gągała - Deploying Next-Generation Multicast VPN
PLNOG 4: Emil Gągała - Deploying Next-Generation Multicast VPNPLNOG 4: Emil Gągała - Deploying Next-Generation Multicast VPN
PLNOG 4: Emil Gągała - Deploying Next-Generation Multicast VPN
 
IMPROVED HANDOVER ALGORITHM FOR PROXY MIPv6 BASED ON AAA SERVER
IMPROVED HANDOVER ALGORITHM FOR PROXY MIPv6 BASED ON AAA SERVERIMPROVED HANDOVER ALGORITHM FOR PROXY MIPv6 BASED ON AAA SERVER
IMPROVED HANDOVER ALGORITHM FOR PROXY MIPv6 BASED ON AAA SERVER
 
Flexible NFV WAN interconnections with Neutron BGP VPN
 Flexible NFV WAN interconnections with Neutron BGP VPN Flexible NFV WAN interconnections with Neutron BGP VPN
Flexible NFV WAN interconnections with Neutron BGP VPN
 
Developing route optimization based pmi pv6 testbed for reliable packet trans...
Developing route optimization based pmi pv6 testbed for reliable packet trans...Developing route optimization based pmi pv6 testbed for reliable packet trans...
Developing route optimization based pmi pv6 testbed for reliable packet trans...
 
Internet service provider mobile
Internet service provider mobileInternet service provider mobile
Internet service provider mobile
 
BOMA Teaser
BOMA TeaserBOMA Teaser
BOMA Teaser
 
5G: Why Wait? - 5G Observatory 2016
5G: Why Wait? - 5G Observatory 20165G: Why Wait? - 5G Observatory 2016
5G: Why Wait? - 5G Observatory 2016
 
5G: Why Wait? - 5G Observatory 2016
5G: Why Wait? - 5G Observatory 2016 5G: Why Wait? - 5G Observatory 2016
5G: Why Wait? - 5G Observatory 2016
 
Introducció a les xarxes 5G
Introducció a les xarxes 5GIntroducció a les xarxes 5G
Introducció a les xarxes 5G
 
Akraino API TSC Ike Alisson 5G Mobility Edge MEC synergy present 2020 11 06 R...
Akraino API TSC Ike Alisson 5G Mobility Edge MEC synergy present 2020 11 06 R...Akraino API TSC Ike Alisson 5G Mobility Edge MEC synergy present 2020 11 06 R...
Akraino API TSC Ike Alisson 5G Mobility Edge MEC synergy present 2020 11 06 R...
 
Fast Handovers in heterogeneous Wireless Networks
Fast Handovers in heterogeneous Wireless NetworksFast Handovers in heterogeneous Wireless Networks
Fast Handovers in heterogeneous Wireless Networks
 
Module 05 mobility management (1)
Module 05   mobility management (1)Module 05   mobility management (1)
Module 05 mobility management (1)
 

Mehr von Peter R. Egli

LPWAN Technologies for Internet of Things (IoT) and M2M Scenarios
LPWAN Technologies for Internet of Things (IoT) and M2M ScenariosLPWAN Technologies for Internet of Things (IoT) and M2M Scenarios
LPWAN Technologies for Internet of Things (IoT) and M2M ScenariosPeter R. Egli
 
Data Networking Concepts
Data Networking ConceptsData Networking Concepts
Data Networking ConceptsPeter R. Egli
 
Communication middleware
Communication middlewareCommunication middleware
Communication middlewarePeter R. Egli
 
Transaction Processing Monitors (TPM)
Transaction Processing Monitors (TPM)Transaction Processing Monitors (TPM)
Transaction Processing Monitors (TPM)Peter R. Egli
 
Business Process Model and Notation (BPMN)
Business Process Model and Notation (BPMN)Business Process Model and Notation (BPMN)
Business Process Model and Notation (BPMN)Peter R. Egli
 
Microsoft .NET Platform
Microsoft .NET PlatformMicrosoft .NET Platform
Microsoft .NET PlatformPeter R. Egli
 
Overview of Cloud Computing
Overview of Cloud ComputingOverview of Cloud Computing
Overview of Cloud ComputingPeter R. Egli
 
MQTT - MQ Telemetry Transport for Message Queueing
MQTT - MQ Telemetry Transport for Message QueueingMQTT - MQ Telemetry Transport for Message Queueing
MQTT - MQ Telemetry Transport for Message QueueingPeter R. Egli
 
Enterprise Application Integration Technologies
Enterprise Application Integration TechnologiesEnterprise Application Integration Technologies
Enterprise Application Integration TechnologiesPeter R. Egli
 
Overview of Microsoft .Net Remoting technology
Overview of Microsoft .Net Remoting technologyOverview of Microsoft .Net Remoting technology
Overview of Microsoft .Net Remoting technologyPeter R. Egli
 
Android Native Development Kit
Android Native Development KitAndroid Native Development Kit
Android Native Development KitPeter R. Egli
 
Overview of SCTP (Stream Control Transmission Protocol)
Overview of SCTP (Stream Control Transmission Protocol)Overview of SCTP (Stream Control Transmission Protocol)
Overview of SCTP (Stream Control Transmission Protocol)Peter R. Egli
 
Overview of SCTP (Stream Control Transmission Protocol)
Overview of SCTP (Stream Control Transmission Protocol)Overview of SCTP (Stream Control Transmission Protocol)
Overview of SCTP (Stream Control Transmission Protocol)Peter R. Egli
 
Overview of Spanning Tree Protocol (STP & RSTP)
Overview of Spanning Tree Protocol (STP & RSTP)Overview of Spanning Tree Protocol (STP & RSTP)
Overview of Spanning Tree Protocol (STP & RSTP)Peter R. Egli
 
MSMQ - Microsoft Message Queueing
MSMQ - Microsoft Message QueueingMSMQ - Microsoft Message Queueing
MSMQ - Microsoft Message QueueingPeter R. Egli
 
Common Object Request Broker Architecture - CORBA
Common Object Request Broker Architecture - CORBACommon Object Request Broker Architecture - CORBA
Common Object Request Broker Architecture - CORBAPeter R. Egli
 
Component Object Model (COM, DCOM, COM+)
Component Object Model (COM, DCOM, COM+)Component Object Model (COM, DCOM, COM+)
Component Object Model (COM, DCOM, COM+)Peter R. Egli
 
JMS - Java Messaging Service
JMS - Java Messaging ServiceJMS - Java Messaging Service
JMS - Java Messaging ServicePeter R. Egli
 
Web Services (SOAP, WSDL, UDDI)
Web Services (SOAP, WSDL, UDDI)Web Services (SOAP, WSDL, UDDI)
Web Services (SOAP, WSDL, UDDI)Peter R. Egli
 

Mehr von Peter R. Egli (20)

LPWAN Technologies for Internet of Things (IoT) and M2M Scenarios
LPWAN Technologies for Internet of Things (IoT) and M2M ScenariosLPWAN Technologies for Internet of Things (IoT) and M2M Scenarios
LPWAN Technologies for Internet of Things (IoT) and M2M Scenarios
 
Data Networking Concepts
Data Networking ConceptsData Networking Concepts
Data Networking Concepts
 
Communication middleware
Communication middlewareCommunication middleware
Communication middleware
 
Transaction Processing Monitors (TPM)
Transaction Processing Monitors (TPM)Transaction Processing Monitors (TPM)
Transaction Processing Monitors (TPM)
 
Business Process Model and Notation (BPMN)
Business Process Model and Notation (BPMN)Business Process Model and Notation (BPMN)
Business Process Model and Notation (BPMN)
 
Microsoft .NET Platform
Microsoft .NET PlatformMicrosoft .NET Platform
Microsoft .NET Platform
 
Overview of Cloud Computing
Overview of Cloud ComputingOverview of Cloud Computing
Overview of Cloud Computing
 
MQTT - MQ Telemetry Transport for Message Queueing
MQTT - MQ Telemetry Transport for Message QueueingMQTT - MQ Telemetry Transport for Message Queueing
MQTT - MQ Telemetry Transport for Message Queueing
 
Enterprise Application Integration Technologies
Enterprise Application Integration TechnologiesEnterprise Application Integration Technologies
Enterprise Application Integration Technologies
 
Overview of Microsoft .Net Remoting technology
Overview of Microsoft .Net Remoting technologyOverview of Microsoft .Net Remoting technology
Overview of Microsoft .Net Remoting technology
 
Android Native Development Kit
Android Native Development KitAndroid Native Development Kit
Android Native Development Kit
 
Overview of SCTP (Stream Control Transmission Protocol)
Overview of SCTP (Stream Control Transmission Protocol)Overview of SCTP (Stream Control Transmission Protocol)
Overview of SCTP (Stream Control Transmission Protocol)
 
Overview of SCTP (Stream Control Transmission Protocol)
Overview of SCTP (Stream Control Transmission Protocol)Overview of SCTP (Stream Control Transmission Protocol)
Overview of SCTP (Stream Control Transmission Protocol)
 
Web services
Web servicesWeb services
Web services
 
Overview of Spanning Tree Protocol (STP & RSTP)
Overview of Spanning Tree Protocol (STP & RSTP)Overview of Spanning Tree Protocol (STP & RSTP)
Overview of Spanning Tree Protocol (STP & RSTP)
 
MSMQ - Microsoft Message Queueing
MSMQ - Microsoft Message QueueingMSMQ - Microsoft Message Queueing
MSMQ - Microsoft Message Queueing
 
Common Object Request Broker Architecture - CORBA
Common Object Request Broker Architecture - CORBACommon Object Request Broker Architecture - CORBA
Common Object Request Broker Architecture - CORBA
 
Component Object Model (COM, DCOM, COM+)
Component Object Model (COM, DCOM, COM+)Component Object Model (COM, DCOM, COM+)
Component Object Model (COM, DCOM, COM+)
 
JMS - Java Messaging Service
JMS - Java Messaging ServiceJMS - Java Messaging Service
JMS - Java Messaging Service
 
Web Services (SOAP, WSDL, UDDI)
Web Services (SOAP, WSDL, UDDI)Web Services (SOAP, WSDL, UDDI)
Web Services (SOAP, WSDL, UDDI)
 

Kürzlich hochgeladen

Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CVKhem
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessPixlogix Infotech
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?Igalia
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 

Kürzlich hochgeladen (20)

Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your Business
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 

Proxy Mobile IPv6 (PMIPv6)

  • 1. © Peter R. Egli 2015 1/25 Rev. 1.50 PMIPv6 – Proxy Mobile IPv6 indigoo.com Peter R. Egli INDIGOO.COM OVERVIEW OF PMIPV6, A PROXY-BASED MOBILITY PROTOCOL FOR IPV6 HOSTS PMIPv6 PROXY MOBILE IPV6
  • 2. © Peter R. Egli 2015 2/25 Rev. 1.50 PMIPv6 – Proxy Mobile IPv6 indigoo.com Contents 1. Why PMIPv6 when we have MIP? 2. PMIPv6 terminology 3. Where can PMIPv6 be deployed? 4. General PMIPv6 setup 5. PMIPv6 versus MIP (Mobile IP) 6. MN domain join sequence 7. MN handoff sequence 8. PMIPv6 packet routing 9. Use of link-local addresses 10. Proxy Based Fast Handover
  • 3. © Peter R. Egli 2015 3/25 Rev. 1.50 PMIPv6 – Proxy Mobile IPv6 indigoo.com 1. Why PMIPv6 when we have MIP? MIP (Mobile IP, originally RFC2002) is an early approach to get mobility in the Internet. Problems with MIP: 1. Clients must implement MIP in the kernel (MIP mobility is host-based).  difficult to implement kernel changes  difficult to deploy (clients need software upgrade to get MIP support) 2. Handoff procedure is not efficient  large delay. 3. Security concerns (MIP support in the kernel provides an additional attack vector). PMIPv6 solution: • PMIPv6 (RFC5213) is completely transparent to mobile nodes (use of a „proxy“ to do the handoff work). • PMIPv6 is meant to be used in localized networks with limited topology where handoff signalling delays are minimal.
  • 4. © Peter R. Egli 2015 4/25 Rev. 1.50 PMIPv6 – Proxy Mobile IPv6 indigoo.com 2. PMIPv6 terminology (1/3) Local Mobility Domain (LMD): Network that is PMIP-enabled. The LMD contains 1 LMA and multiple MAGs. Local Mobility Anchor (LMA): All traffic from and to the mobile node is routed through the LMA. The LMA maintains a set of routes for each MN connected to the LMD. Mobile Access Gateway (MAG): The MAG performs the mobility related signalling on behalf of the MNs attached to its access links. The MAG is usually the access router (first hop router) for the MN. Mobile Node (MN): Any device that connects through a wireless network (WLAN, WiMAX, MBWA, G3/G4) to the LMD. Corresponding Node (CN): Any node in the Internet or also in the LMD that communicates with an MN. NetLMM: Network based Localized Mobility Management (IETF working group for network-based mobility support).
  • 5. © Peter R. Egli 2015 5/25 Rev. 1.50 PMIPv6 – Proxy Mobile IPv6 indigoo.com 2. PMIPv6 terminology (2/3) Binding Cache: Cache maintained by the LMA that contains BCEs. Binding Cache Entry (BCE): Entry in the LMA‘s binding cache. An entry has the fields MN-ID, MAG proxy-CoA and MN- prefix. Binding Update List: Cache maintained by the MAG that contains information about the attached MNs. Proxy Binding Update (PBU): PMIP signalling packet sent by the MAG to the LMA to indicate a new MN. The PBU has the fields MN-ID (e.g. MN MAC), MAG address (proxy-CoA) and handoff indicator to signal if the MN-attachment is a new one or a handoff from another MAG. Proxy Binding Acknowledge (PBA): Response to a PBU sent by the LMA to the MAG. The PBA contains the MN-ID, the MAG address and the prefix assigned to the MN.
  • 6. © Peter R. Egli 2015 6/25 Rev. 1.50 PMIPv6 – Proxy Mobile IPv6 indigoo.com 2. PMIPv6 terminology (3/3) Proxy care of address (proxy-CoA): IP address of public interface of MAG. The proxy-CoA is the tunnel endpoint address on the MAG. The LMA encapsulates packets destined to the MN into a tunnel packet with destination address = proxy-CoA. Mobile Node Identifier (MN-ID): Unique identifier of mobile node, e.g. one of its MAC addresses. Home Network Prefix: Prefix assigned to the MN by the LMA.
  • 7. © Peter R. Egli 2015 7/25 Rev. 1.50 PMIPv6 – Proxy Mobile IPv6 indigoo.com 3. Where can PMIPv6 be deployed? PMIPv6 is primarily targeted at the following networks: 1. WLAN-based campus-style networks: PMIPv6 provides transparent handoff for mobile nodes in campus networks. 2. Advanced 3G/4G networks Replace GTP (GPRS tunneling protocol) by PMIP, thus reduce the costs and management in the network. BSS1 WLAN AP BSS2 WLAN AP MAG InternetCampus LAN MAG LMA Handoff MN1 MN1 MN2
  • 8. © Peter R. Egli 2015 8/25 Rev. 1.50 PMIPv6 – Proxy Mobile IPv6 indigoo.com 4. General PMIPv6 setup BSS1 WLAN AP BSS2 WLAN AP MAG1 Campus LAN MAG2 LMA: Topological anchor point for addresses assigned to MNs in the LMD. MN1 MN2 MN3 ID Prefix MAG (proxy-CoA) MN-ID-1 Pref1::/64 MAG1 MN-ID-2 Pref2::/64 MAG2 MN-ID-3 Pref3::/64 MAG2 LMD Tunnel LMA-MAG for user traffic between LMA and MAG. Internet Proxy Binding Cache MAG: Runs MIP on behalf of MN (=proxy).
  • 9. © Peter R. Egli 2015 9/25 Rev. 1.50 PMIPv6 – Proxy Mobile IPv6 indigoo.com 5. PMIPv6 versus MIP (Mobile IP) In PMIPv6 the MAG assumes the role of the MIP client in MIP. The LMA in PMIPv6 is similar to the home agent (HA) in MIP. BSS1 MAG1 Campus LAN MN1 LMA BSS2 MN1 MAG2 LMD BSS1 HA BSS2 FA MN1 Internet Internet CN MN1 Handoff CN IP in IP tunntel Handoff PMIPv6 MIP Packet path after handoff. Packet path before handoff. Tunnel HA Home Agent FA Foreign Agent
  • 10. © Peter R. Egli 2015 10/25 Rev. 1.50 PMIPv6 – Proxy Mobile IPv6 indigoo.com 6. MN domain join sequence (1/2) The following sequence diagram shows the procedure when a MN joins a PMIPv6 domain: MN1 MAG1 LMA Attaching: MN1 attaches to MAG1 (establish link layer) Router solicitation: MN1 solicits an IPv6 prefix Identification: MN identification, MN authorization, MN ID acquisition Proxy Binding Update: PBU with MN-ID-1, MAG1 ID Prefix MAG (proxy CoA) - - - ID Prefix MAG (proxy CoA) MN-ID-1 Pref1::/64 MAG1 Proxy Binding Ack: LMA sends BPA with MN-ID-1, MAG1, Pref1::/64 Tunnel setup: LMA sets up a bidirectional tunnel Router advertisement: MAG1 sends the IPv6 prefix Pref1::/64 to MN1 Update BC: LMA adds an entry to the binding cache. BC BC 1 2 3 4 5 6 7 8 Router advertisement is delayed until PMIP signalling is completed.
  • 11. © Peter R. Egli 2015 11/25 Rev. 1.50 PMIPv6 – Proxy Mobile IPv6 indigoo.com 6. MN domain join sequence (2/2) 1. Attaching: MN1 attaches to the MAG through a point-to-point link and establishes the link layer. Any access technology is possible provided that it emulates a point-to-point behavior (e.g. PPP, PPPoE). 2. Identification: MAG1 authenticates MN1 based on its link layer address (e.g. MAC address) and ascertains what MN1 is permitted to do (authorization). The authorization step may use existing services like LDAP or RADIUS. 3. Router solicitation: MN1 sends a router solicitation to obtain an IPv6 prefix. MAG1 will not send a router advertisement until it obtained a prefix for MN1 from the LMA (step 6, PBA). 4. Proxy binding update (PBU): MAG1 sends a proxy binding update to the LMA. This PBU associates the MAG1 address with the identity of the MN. 5. Allocate prefix, update BC: The LMA allocates a prefix for MN1 (Home Network Prefix). The LMA creates an entry in its BC. The entry contains the MN1 ID (MN-ID-1), the address MAG1 of the proxy MAG (proxy-CoA) as well as the prefix assigned to MN1. 6. Proxy binding ack (PBA): The LMA sends a PBA back to MAG1. The PBA contains the information of the BPC entry created in step 5. 7. Tunnel setup: The LMA and MAG1 establish a bidirectional IPv6-in-IPv6 tunnel that is used for tunneling packets to and from MN1. The LMA sets a route through the tunnel for traffic that is addressed to the MN. 8. Router advertisement: MAG1 sends a router advertisement with the assigned prefix to MN1. MN1 will assign the prefix through stateless autoconfiguration. Stateful autoconfiguration would be possible as well (outside of scope of PMIPv6). MN1 creates a routing table entry for the prefix.
  • 12. © Peter R. Egli 2015 12/25 Rev. 1.50 PMIPv6 – Proxy Mobile IPv6 indigoo.com 7. MN handoff sequence (1/4) Handoff from MAG1 (PMAG – Previous MAG) to MAG2 (NMAG – New MAG): MN1 MAG1 LMA Detaching: MN1 detaches from MAG1 Start timer: LMA starts timer to delete the MN-ID-1 entry from its binding cache (BD). BC 1 3 MAG2 Deregistration: PBU with MN-ID-1, MAG1 2 Proxy Binding Ack: LMA sends BPA with MN-ID-1, MAG1, Pref1::/64 4Attaching: MN1 attaches to MAG2 (establish link layer) 5 Router solicitation: MN1 solicits an IPv6 prefix 6 Proxy Binding Update: PBU with MN-ID-1, MAG2 7 9 Proxy Binding Ack: LMA sends BPA with MN-ID-1, MAG2, Pref1::/64 Tunnel setup: LMA sets up a bidirectional tunnel 10 11 Router advertisement: MAG2 sends the IPv6 prefix Pref1::/64 to MN1 ID Prefix MAG (proxy CoA) MN-ID-1 Pref1::/64 MAG2 Update BC: LMA updates the entry in the binding cache. BC 8 ID Prefix MAG (proxy-CoA) MN-ID-1 Pref1::/64 MAG1
  • 13. © Peter R. Egli 2015 13/25 Rev. 1.50 PMIPv6 – Proxy Mobile IPv6 indigoo.com 7. MN handoff sequence (2/4) 1. Detaching: MN1 detaches from MAG1 (PMAG – Previous MAG). MAG1 detects this event through some mechanism outside of the scope of PMIPv6, e.g. through link layer events (link down) or through an IPv6 Neighbor Unreachability Detection event. 2. Deregistration: MAG1 sends a PBU with a deregistration request for MN1 (MN-ID-1). 3. Start timer: LMA starts a timer for the MN1 proxy binding cache entry. During the timer period the LMA drops any packets received for MN1. If the LMA does not receive a PBU from the new MAG within the timer period, it can drop the entry for MN1 from its binding cache. Thus the timer allows the LMA deleting binding cache entries in case the MN1 leaves the LMD for good. 4. Proxy binding ack (PBA): The LMA sends a PBA back to MAG1. The PBA contains the information of the BPC entry created in the join phase. 5. Attaching to MAG2 (NMAG – New MAG): MN1 now attaches to MAG2 the same way as it did to MAG1 in the LMD join phase. MN1 and MAG2 will establish the link layer (PPP, PPPoE). 6. Router solicitation: MN1 sends a router solicitation to obtain an IPv6 prefix. MAG2 will not send a router advertisement until it obtained a prefix for MN1 from the LMA. 7. Proxy binding update (PBU): MAG2 sends a proxy binding update to the LMA. This PBU associates the MAG2 address with the identity of the MN. 8. Update of the binding cache entry (BCE): The LMA detects that MN1 already has an entry in the binding cache and therefore updates the entry for MN1. MN1 is now associated with MAG2. The prefix for MN1 remains the same (address transparency for MN1).
  • 14. © Peter R. Egli 2015 14/25 Rev. 1.50 PMIPv6 – Proxy Mobile IPv6 indigoo.com 7. MN handoff sequence (3/4) 9. Proxy binding ack (PBA): The LMA sends a PBA back to MAG2. The PBA contains the information of the BPC entry updated in step 8. 10. Tunnel setup: The LMA and MAG2 establish a bidirectional IPv6-in-IPv6 tunnel that is used for tunneling packets to and from MN1. The LMA sets a route through the tunnel for traffic that is addressed to the MN. 11. Router advertisement: MAG2 sends a router advertisement with the same prefix assigned to MN1. MN1 will not ‘see’ an address change and therefore all open transport connections (TCP, UDP) remain open.
  • 15. © Peter R. Egli 2015 15/25 Rev. 1.50 PMIPv6 – Proxy Mobile IPv6 indigoo.com 7. MN handoff sequence (4/4) From the perspective of the MN the LMD appears as a single link. The handoff is fully transparent to the MN. BSS1 MAG1 Campus LAN MN1 LMA BSS2 MN1 MAG2 LMD Handoff Internet CN LMD MN1 Internet CN From MN1‘s perspective the LMD appears as a single link.
  • 16. © Peter R. Egli 2015 16/25 Rev. 1.50 PMIPv6 – Proxy Mobile IPv6 indigoo.com 8. Routing / packet forwarding from and to MN through LMD The LMA is the anchor point for packets to and from the MN. BSS1 MAG1 Campus LAN MN1 LMA BSS2 MN2 MAG2 LMD Internet CN A. Routing MNMAGLMACN: All traffic is routed through the LMA (=anchor point for routing). B. MNMAGMN: If 2 MNs are attached to the same MAG, the traffic may be routed directly through the MAG without the detour through the LMA (short-circuit routing).
  • 17. © Peter R. Egli 2015 17/25 Rev. 1.50 PMIPv6 – Proxy Mobile IPv6 indigoo.com 9. Use of link-local and link addresses by MAGs Problem: Emulation of a virtual link requires that router advertisements sent by MAGs to a particular MN have a. the same prefix assigned to the MN, a. the same source IPv6 link-local address (IPv6 source address of ICMPv6 packet) and b. the same source link layer address (source link layer option within ICMPv6 packet). PMIPv6 proposes the following solutions: A. Fixed address configuration: Configuration of a fixed link-local and fixed link layer address to be used by all MAGs in the LMD. However, the use of a fixed link-local address to be used in all access links in an PMIPv6 domain may lead to collisions. As PMIPv6 requires that the link-local address used by the different MAGs for a particular MN be the same, these collisions can only happen when an MN enters a PMIPv6 domain. PMIPv6 requires that the MN perform DAD (Duplicate Address Detection) so that the MAG can defend its link-local address. B. Dynamic address generation, signalling through LMA: The LMA generates a link-local address to be used by all MAGs with a particular MN and signals this address to all serving MAGs. This signalling must be completed before the MN performs DAD.
  • 18. © Peter R. Egli 2015 18/25 Rev. 1.50 PMIPv6 – Proxy Mobile IPv6 indigoo.com 10. Proxy Based Fast Handover for MIPv6 (PFMIPv6) with RFC5949 (1/8) The handover sequence defined by RFC5213 is not optimized for fast handovers. During handover from one radio access network to another network, packets cannot be delivered to and from the mobile node. The handover delay essentially leads to packet loss thus degrading the quality of service in mobility scenarios. RFC5949 defines a fast handover procedure to be used in conjunction with PMIPv6. It defines 2 modes, predective fast handover (MAG1 initiates handover before MN establishes connectivity with the new access network) and reactive fast handover (MAG2 initiates handover after MN has established connectivity with the new access network). Other mobility protocols have their specific fast handover protocol as shown in the following table: Mobility Protocol Corresponding Fast Handover Protocol RFC6275 Mobile IPv6 RFC5568 Mobile IPv6 Fast Handovers (FMIPv6) RFC5944 (obsoletes RFC3344) Mobile IPv4 RFC4988 Mobile IPv4 Fast Handovers (FMIPv4) RFC5213 Proxy Mobile IPv6 RFC5949 Proxy Based Fast Handover for MIPv6 (PFMIPv6), extends RFC5568 RFC5844 IPv4 Support for PMIPv6 RFC5949 Proxy Based Fast Handover for MIPv6 (PFMIPv6), extends RFC5568
  • 19. © Peter R. Egli 2015 19/25 Rev. 1.50 PMIPv6 – Proxy Mobile IPv6 indigoo.com 10. Proxy Based Fast Handover for MIPv6 (PFMIPv6) with RFC5949 (2/8) Predictive Fast Handover from MAG1 to MAG2 (initiated by MAG1=PMAG): MN1 P-AN LMAN-AN MAG1 (PMAG) MAG2 (NMAG) CN Report: • MN-ID-1 • New AP-ID 1 Handover indication: • MN-ID-1 • New AP-ID 2 HI (Handover Initiate): • MN-ID-1 • HNP • Current LMA addr. 3 HAck (Handover Ack) 4 Tunnel setup: Bidirectional tunnel setup between MAG1 and MAG2 5 Handover command7 Buffering: Buffering of downlink packets @ MAG2 until MAG2 has established connectivity with N-AN 6 MN-AN connection establishment8 AN-MAG connection establishment9 10 Delivery of buffered downlink packets to MN
  • 20. © Peter R. Egli 2015 20/25 Rev. 1.50 PMIPv6 – Proxy Mobile IPv6 indigoo.com 10. Proxy Based Fast Handover for MIPv6 (PFMIPv6) with RFC5949 (3/8) Predictive Fast Handover from MAG1 to MAG2 (initiated by MAG1=PMAG): MN1 P-AN LMAN-AN MAG1 (PMAG) MAG2 (NMAG) CN 11 Uplink packets 12 Proxy Binding Update: PBU with MN-ID-1, MAG2 13 Proxy Binding Ack 14 Direct data transfer for uplink and downlink packets through MAG2
  • 21. © Peter R. Egli 2015 21/25 Rev. 1.50 PMIPv6 – Proxy Mobile IPv6 indigoo.com 10. Proxy Based Fast Handover for MIPv6 (PFMIPv6) with RFC5949 (4/8) Predictive Fast Handover from MAG1 to MAG2 (initiated by MAG1=PMAG): 1. Report: The MN1 detects that handover is imminent (waning radio signal strength in the radio access network where it is attached to) and signals its MN-ID-1 and the ID of the radio access network ID (new AP-ID) to the current radio access network (P-AN for Previous Access Network). The way this is accomplished is outside the scope of PFMIPv6. Addtionally, it may be the access network itself (P-AN, Previous Access Network) detecting an imminent handover and acting on behalf of MN1. 2. Handover indication: The P-AN indicates the imminent handover along with the MN-ID-1 and new AP-ID to the current MAG (PMAG – Previous MAG). MN-ID-1 may be the MAC address of its radio interface. The new AP-ID may be the MAC address or SSID (Service Set ID) of a WLAN access point. 3. Handover Initiate: MAG1 derives the address of MAG2 (NMAG – New MAG) from the new AP-ID (see RFC5568 for details). The HI packet contains MN-ID-1, HNP (Home Network Prefix = MN1’s persistent IP address prefix) and MN1’s current LMA address. 4. Handover Acknowledge: MAG2 acknowledges the handover. 5. Bidirectional tunnel setup between MAG1 and MAG2: MAG1 and MAG2 set up a bidirectional tunnel for temporarily tunneling data packets bound for MN1. 6. Buffering downlink data packets at MAG2: Downlink packets destined for MN1 are forwarded by MAG1 (previous MAG) to MAG2 (new MAG) where they are queued for delivery until MN1 has established connectivity with the new access network. When NM1 has established connectivity with N-AN (New Access Network), MAG2 delivers the queued downlink packets to MN1 over N-AN.
  • 22. © Peter R. Egli 2015 22/25 Rev. 1.50 PMIPv6 – Proxy Mobile IPv6 indigoo.com 10. Proxy Based Fast Handover for MIPv6 (PFMIPv6) with RFC5949 (5/8) Predictive Fast Handover from MAG1 to MAG2 (initiated by MAG1=PMAG): 7. Handover command: MAG1 sends a handover command to MN1 telling it that everything is set up and that it now may switch to N-AN. Again, the way this is accomplished is outside of scope of PFMIPv6. 8. MN-AN connection establishment: MN1 establishes layer 2 connectivity with the N-AN through some means outside the scope of PFMIPv6. 9. AN-MAG connection establishment: Likewise, MAG2 establishes layer 2 connectivity with N-AN if not done so before. When connectivity is established, the access network (N-AN) becomes responsible for buffering downlink packets. The specifics are again outside the scope of PFMIPv6. From now on, MN1 uplink packets can be forwarded to CN without buffering. 10. Delivery of buffered downlink packets to MN1: After having established N-AN connectivity, MAG2 deliveres the queued packets to MN1. 11. MN1 uplink packet forwarding: All MN1 uplink packets between step 8./9. and 12. follow the forwarding path MN1MAG2MAG1 (through tunnel)LMA. 12. Proxy binding update (PBU): MAG2 sends a proxy binding update to the LMA. This PBU associates the MAG2 address with the identity of MN1 (MN-ID-1). The LMA updates the BCE (Binding Cache Entry) for MN1. MN1 is now associated with MAG2. The prefix (HNP) for MN1 remains the same (address transparency for MN1). 13. Proxy binding ack (PBA): The LMA sends back a PBA packet to MAG2. 14. Uplink and downlink data transfer through MAG2: Uplink and downlink packets are now forwarded through MAG2 and the tunnel between MAG2 and LMA.
  • 23. © Peter R. Egli 2015 23/25 Rev. 1.50 PMIPv6 – Proxy Mobile IPv6 indigoo.com 10. Proxy Based Fast Handover for MIPv6 (PFMIPv6) with RFC5949 (6/8) Reactive Fast Handover from MAG1 to MAG2 (initiated by MAG2=NMAG): MN1 P-AN LMAN-AN MAG1 (PMAG) MAG2 (NMAG) CN MN-AN connection establishment1 AN-MAG connection establishment: • MN1-ID • Old AP-ID 2 HI (Handover Initiate): • MN-ID-1 3 HAck (Handover Ack): • HNP • MN LL-ID • LMA addr. 4 Tunnel setup: Bidirectional tunnel setup between MAG1 and MAG2 5 6 Uplink packets 7 Downlink packets
  • 24. © Peter R. Egli 2015 24/25 Rev. 1.50 PMIPv6 – Proxy Mobile IPv6 indigoo.com 10. Proxy Based Fast Handover for MIPv6 (PFMIPv6) with RFC5949 (7/8) Reactive Fast Handover from MAG1 to MAG2 (initiated by MAG2=NMAG): MN1 P-AN LMAN-AN MAG1 (PMAG) MAG2 (NMAG) CN 8 9 Proxy Binding Ack 10 Direct data transfer for uplink and downlink through MAG2 Proxy Binding Update: PBU with MN-ID-1, MAG2
  • 25. © Peter R. Egli 2015 25/25 Rev. 1.50 PMIPv6 – Proxy Mobile IPv6 indigoo.com 10. Proxy Based Fast Handover for MIPv6 (PFMIPv6) with RFC5949 (8/8) Reactive Fast Handover from MAG1 to MAG2 (initiated by MAG2=NMAG): 1. MN-AN connection establishment: MN1 establishes layer 2 connectivity with the N-AN through some means outside the scope of PFMIPv6. 2. AN-MAG connection establishment: Likewise, MAG2 establishes layer 2 connectivity with N-AN if not done so before. When connectivity is established, the access network (N-AN) becomes responsible for buffering downlink packets. The specifics of all that is again outside the scope of PFMIPv6. 3. Handover Initiate: MAG2 derives the address of MAG1 from the old AP-ID and sends a HI (Handover Initiate) packet that contains MN-ID-1. 4. Handover Acknowledge: MAG1 acknowledges the handover. The acknowledge packet contains MN1’s link layer ID (MN LL-ID), HNP (Home Network Prefix) and MN1’s current LMA address. 5. Bidirectional tunnel setup between MAG1 and MAG2: MAG1 and MAG2 set up a bidirectional tunnel for temporarily tunneling data packets bound for MN1. 6. & 7. Uplink and downlink packets: Up- and downlink packets are relayed through MAG1. 12. & 13. Proxy binding update (PBU) and Proxy binding ack (PBA): MAG2 sends a proxy binding update to the LMA. This PBU associates the MAG2 address with the identity of MN1 (MN-ID-1). The LMA updates the BCE (Binding Cache Entry) for MN1. MN1 is now associated with MAG2. The prefix (HNP) for MN1 remains the same (address transparency for MN1). The LMA sends back a PBA packet to MAG2. 14. Uplink and downlink data transfer through MAG2: Uplink and downlink packets are now forwarded through MAG2 and the tunnel between MAG2 and LMA.