SlideShare a Scribd company logo
1 of 23
Contents:
 Introduction To Mobile IP
 Requirements to Mobile IP
 Entities and Terminology
 IP Packet Delivery
 Agent Discovery
 Registration
 Mobile IP is an open standard, defined by the
 Internet Engineering Task Force (IETF) RFC 3220.
 By using Mobile IP, you can keep the same IP
 address, stay connected, and maintain ongoing
 applications while roaming between IP networks.
 Mobile IP is scalable for the Internet because it is
 based on IP—any media that can support IP can
 support Mobile IP.
 Compatibility
   support of the same layer 2 protocols as IP
   does
  no changes to current end-systems and
   routers required
  Mobile end-systems can communicate with
   fixed systems

 Transparency
   mobile end-systems keep their IP address
   continuation of communication after
   interruption of link possible
 Security
  authentication of all registration messages


 Efficiency and scalability
  only little additional messages to the
   mobile system required (connection
   typically via a low bandwidth radio link)
  world-wide support of a large number of
   mobile systems in the whole Internet
 Mobile Node (MN)
   A mobile node is an end-system or router that can
    change its point of attachment to the internet using
    mobile IP.
   The MN keeps its IP address and can continuously
    communicate with any other system in the internet
    as long as link-layer connectivity is given.
 Correspondent Node (CN)
   At least one partner is needed for communication.
   In the following the CN represents this partner for
    the MN. The CN can be a fixed or mobile node.
 Home Network
    The home network is the subnet the MN
     belongs to with respect to its IP address.
    No mobile IP support is needed within the
     home network.

 Foreign Network
   The foreign network is the current subnet the MN
   visits and which is not the home network.
 Foreign Agent (FA)
   The FA can provide several services to the MN
    during its visit to the foreign network.
   The FA can have the COA (defined below),
    acting as tunnel endpoint and forwarding
    packets to the MN.
   The FA can be the default router for the MN.
    FAs can also provide security services because
    they belong to the foreign network as opposed
    to the MN which is only visiting.
 Care Of Address (COA)
  The COA defines the current location of the MN
  from an IP point of view.
  All IP packets sent to the MN are delivered to
  the COA, not directly to the IP address of the
  MN. Packet delivery toward the MN is done
  using a tunnel, as explained later.
 Care Of Address (contd…)
  There are two different possibilities for the location of
   the COA:
     I. Foreign Agent COA:
              The COA could be located at the FA, i.e., the COA
               is an IP address of the FA.
              The FA is the tunnel end-point and forwards packets
               to the MN.
              Many MN using the FA can share this COA as
               common COA.
    II.       Co-Lated COA:
               The COA is co-lated if the MN temporarily acquires
                an additional IP address which acts as COA.
              This address is now topologically correct, and the
               tunnel endpoint is at the MN.
 Home Agent (HA)
  The HA provides several services for the MN and is
   located in the home network. The tunnel for packets
   toward the MN starts at the HA.
  The HA can be implemented on a router that is
   responsible for the home network. This is obviously the
   best position, because without optimizations to mobile
   IP, all packets for the MN have to go through the router
   anyway.
  If changing the router’s software is not possible, the HA
   could also be implemented on an arbitrary node in the
   subnet. One disadvantage of this solution is the double
   crossing of the router by the packet if the MN is in a
   foreign network. A packet for the MN comes in via the
   router; the HA sends it through the tunnel which again
   crosses the router.
 One of the requirements of mobile IP was to support hiding the
  mobility of the MN. CN does not need to know anything about the MN’s
  current location and sends the packet as usual to the IP address of MN
  (step 1). This means that CN sends an IP packet with MN as a
  destination address and CN as a source address. The internet, not
  having information on the current location of MN, routes the packet to
  the router responsible for the home network of MN. This is done using
  the standard routing mechanisms of the internet.
 The HA now intercepts the packet, knowing that MN is currently not in
  its home network. The packet is not forwarded into the subnet as usual,
  but encapsulated and tunneled to the COA. A new header is put in front
  of the old IP header showing the COA as new destination and HA as
  source of the encapsulated packet (step 2). The foreign agent now
  decapsulates packet, i.e., removes the additional header, and forwards
  the original packet with CN as source and MN as destination to the MN
  (step 3). Again, for the MN mobility is not visible. It receives the packet
  with the same sender and receiver address as it would have done in the
  home network.
 One initial problem of an MN after moving is how to
 find a foreign agent. How does the MN discover that
 it has moved? For this purpose mobile IP describes
 two methods: agent advertisement and agent
 solicitation, which are in fact router discovery
 methods plus extensions.
 Agent Advertisement:

  For the first method, foreign agents and home
   agents advertise their presence periodically using
   special agent advertisement messages. These
   advertisement messages can be seen as a beacon
   broadcast into the subnet. For these advertisements
   Internet control message protocol (ICMP)
   messages according to RFC 1256 (Deering, 1991)
   are used with some mobility extensions.

  The agent advertisement packet according to RFC
   1256 with the extension for mobility is shown in
   Figure 8.3. The upper part represents the ICMP
   packet while the lower part is the extension needed
   for mobility. The fields necessary on lower layers for
   the agent advertisement are not shown in this
   figure. Clearly, mobile nodes must be reached with
0              7 8                15 16    23 24      31


     Type             code                checksum

    #address         addr. size            lifetime
       es
                      router address 1
                     preference level 1

                     router address 2
                     preference level 2
                            ….
Type = 16     length            Sequence number

Registration lifetime     R B H F MG r T   reversed

                        COA 1

                        COA 2

                         …
 Agent solicitation:
   If no agent advertisements are present or the inter-
    arrival time is too high, and an MN has not received
    a COA by other means, e.g., DHCP, the mobile
    node must send agent solicitations. These
    solicitations are again based on RFC 1256 for
    router solicitations. Care must be taken to ensure
    that these solicitation messages do not flood the
    network, but basically an MN can search for an FA
    endlessly sending out solicitation messages.
    Typically, a mobile node can send out three
    solicitations, one per second, as soon as it enters a
    new network.
 Agent solicitation (contd…):
   If a node does not receive an answer to its solicitations it
    must decrease the rate of solicitations exponentially to
    avoid flooding the network until it reaches a maximum
    interval between solicitations (typically one minute).
    Discovering a new agent can be done anytime, not just if
    the MN is not connected to one. Consider the case that
    an MN is looking for a better connection while still
    sending via the old path. This is the case while moving
    through several cells of different wireless networks.
   After these steps of advertisements or solicitations the
    MN can now receive a COA, either one for an FA or a
    co-located COA. The MN knows its location (home
    network or foreign network) and the capabilities of the
    agent (if needed).
 Having received a COA, the MN has to register with
 the HA. The main purpose of the registration is to
 inform the HA of the current location for correct
 forwarding of packets. Registration can be done in
 two different ways depending on the location of the
 COA.
MN                  FA                  HA


     Registration                            MN                        HA
                         Registration
       Request
                           Request                   Registration
                                                       Request

                         Registration
                            Reply                 Registration Reply
     Registration
        Reply
0            7 8                15 16   23 24      31


    Type 1    S B D M G r   T   x       lifetime
                    Home Address

                     Home Agent

                        COA
                     Identification

                     Extensions….
Mobile network layer (mobile comm.)

More Related Content

What's hot

Mobility Management in Wireless Communication
Mobility Management in Wireless CommunicationMobility Management in Wireless Communication
Mobility Management in Wireless Communication
Don Norwood
 
Mobility Management
Mobility ManagementMobility Management
Mobility Management
Hira Shaukat
 
Lecture 23 27. quality of services in ad hoc wireless networks
Lecture 23 27. quality of services in ad hoc wireless networksLecture 23 27. quality of services in ad hoc wireless networks
Lecture 23 27. quality of services in ad hoc wireless networks
Chandra Meena
 
Introduction & Wireless Transmission
Introduction & Wireless TransmissionIntroduction & Wireless Transmission
Introduction & Wireless Transmission
Joe Christensen
 

What's hot (20)

IT8602 Mobile Communication Unit II
IT8602 Mobile Communication   Unit II IT8602 Mobile Communication   Unit II
IT8602 Mobile Communication Unit II
 
MEDIUM ACCESS CONTROL
MEDIUM ACCESS CONTROLMEDIUM ACCESS CONTROL
MEDIUM ACCESS CONTROL
 
Paging and Location Update
Paging and Location UpdatePaging and Location Update
Paging and Location Update
 
Lecture 15
Lecture 15Lecture 15
Lecture 15
 
Wireless transmission
Wireless transmissionWireless transmission
Wireless transmission
 
IEEE 802.11
IEEE 802.11IEEE 802.11
IEEE 802.11
 
WLAN
WLANWLAN
WLAN
 
IEEE 802.11
IEEE 802.11IEEE 802.11
IEEE 802.11
 
MANET in Mobile Computing
MANET in Mobile ComputingMANET in Mobile Computing
MANET in Mobile Computing
 
Mobility Management in Wireless Communication
Mobility Management in Wireless CommunicationMobility Management in Wireless Communication
Mobility Management in Wireless Communication
 
Wireless Network Architecture
Wireless Network ArchitectureWireless Network Architecture
Wireless Network Architecture
 
Ad hoc networks
Ad hoc networksAd hoc networks
Ad hoc networks
 
Handover in Mobile Computing
Handover in Mobile ComputingHandover in Mobile Computing
Handover in Mobile Computing
 
Destination Sequenced Distance Vector Routing (DSDV)
Destination Sequenced Distance Vector Routing (DSDV)Destination Sequenced Distance Vector Routing (DSDV)
Destination Sequenced Distance Vector Routing (DSDV)
 
Mobility Management
Mobility ManagementMobility Management
Mobility Management
 
Lecture 23 27. quality of services in ad hoc wireless networks
Lecture 23 27. quality of services in ad hoc wireless networksLecture 23 27. quality of services in ad hoc wireless networks
Lecture 23 27. quality of services in ad hoc wireless networks
 
Fddi
FddiFddi
Fddi
 
Imt 2000
Imt 2000Imt 2000
Imt 2000
 
UMTS, Introduction.
UMTS, Introduction.UMTS, Introduction.
UMTS, Introduction.
 
Introduction & Wireless Transmission
Introduction & Wireless TransmissionIntroduction & Wireless Transmission
Introduction & Wireless Transmission
 

Viewers also liked (13)

Basic WDM Optical Network
Basic WDM Optical NetworkBasic WDM Optical Network
Basic WDM Optical Network
 
Mobile transportlayer
Mobile transportlayerMobile transportlayer
Mobile transportlayer
 
Cdma ppt for ECE
Cdma ppt for ECECdma ppt for ECE
Cdma ppt for ECE
 
Medium Access Control
Medium Access ControlMedium Access Control
Medium Access Control
 
Satellites presentation
Satellites presentationSatellites presentation
Satellites presentation
 
Satellite communication
Satellite communicationSatellite communication
Satellite communication
 
CELLULAR COMMUNICATION SYSTEM
CELLULAR COMMUNICATION SYSTEMCELLULAR COMMUNICATION SYSTEM
CELLULAR COMMUNICATION SYSTEM
 
Code division multiple access
Code division multiple accessCode division multiple access
Code division multiple access
 
Bluetooth Presentation
Bluetooth PresentationBluetooth Presentation
Bluetooth Presentation
 
The cellular concept
The cellular conceptThe cellular concept
The cellular concept
 
Satellite communications
Satellite communicationsSatellite communications
Satellite communications
 
Code Division Multiple Access- CDMA
Code Division Multiple Access- CDMA Code Division Multiple Access- CDMA
Code Division Multiple Access- CDMA
 
Multiple access control protocol
Multiple access control protocol Multiple access control protocol
Multiple access control protocol
 

Similar to Mobile network layer (mobile comm.)

PERFORMANCE EVALUATION OF A NEW ROUTE OPTIMIZATION TECHNIQUE FOR MOBILE IP
PERFORMANCE EVALUATION OF A NEW ROUTE OPTIMIZATION TECHNIQUE FOR MOBILE IPPERFORMANCE EVALUATION OF A NEW ROUTE OPTIMIZATION TECHNIQUE FOR MOBILE IP
PERFORMANCE EVALUATION OF A NEW ROUTE OPTIMIZATION TECHNIQUE FOR MOBILE IP
IJNSA Journal
 

Similar to Mobile network layer (mobile comm.) (20)

Unit 3
Unit 3Unit 3
Unit 3
 
Ip packet delivery
Ip packet deliveryIp packet delivery
Ip packet delivery
 
Mobile Communication
Mobile CommunicationMobile Communication
Mobile Communication
 
Unit 4 MC QA.pdf
Unit 4 MC  QA.pdfUnit 4 MC  QA.pdf
Unit 4 MC QA.pdf
 
Mobileip 161105154557
Mobileip 161105154557Mobileip 161105154557
Mobileip 161105154557
 
Mobileip 161105154557
Mobileip 161105154557Mobileip 161105154557
Mobileip 161105154557
 
Mobile IP
Mobile IPMobile IP
Mobile IP
 
entities terminology
entities terminologyentities terminology
entities terminology
 
IT6601 MOBILE COMPUTING
IT6601 MOBILE COMPUTINGIT6601 MOBILE COMPUTING
IT6601 MOBILE COMPUTING
 
Unit 3
Unit 3Unit 3
Unit 3
 
Unit 3
Unit 3Unit 3
Unit 3
 
Mobile internet protocol
Mobile internet protocolMobile internet protocol
Mobile internet protocol
 
Mobile IP 1
Mobile IP 1Mobile IP 1
Mobile IP 1
 
mobile ip, Mobile COmmunication Internet Protocol
mobile ip, Mobile COmmunication Internet Protocolmobile ip, Mobile COmmunication Internet Protocol
mobile ip, Mobile COmmunication Internet Protocol
 
Mobile computing Unit III MANET Notes
Mobile computing Unit III MANET NotesMobile computing Unit III MANET Notes
Mobile computing Unit III MANET Notes
 
NetworkProtocols.ppt
NetworkProtocols.pptNetworkProtocols.ppt
NetworkProtocols.ppt
 
A review study of handover performance in mobile ip
A review study of handover performance in mobile ipA review study of handover performance in mobile ip
A review study of handover performance in mobile ip
 
Mobile IP
Mobile IPMobile IP
Mobile IP
 
PERFORMANCE EVALUATION OF MOBILE IP ON MOBILE AD HOC NETWORKS USING NS2
PERFORMANCE EVALUATION OF MOBILE IP ON MOBILE AD HOC NETWORKS USING NS2PERFORMANCE EVALUATION OF MOBILE IP ON MOBILE AD HOC NETWORKS USING NS2
PERFORMANCE EVALUATION OF MOBILE IP ON MOBILE AD HOC NETWORKS USING NS2
 
PERFORMANCE EVALUATION OF A NEW ROUTE OPTIMIZATION TECHNIQUE FOR MOBILE IP
PERFORMANCE EVALUATION OF A NEW ROUTE OPTIMIZATION TECHNIQUE FOR MOBILE IPPERFORMANCE EVALUATION OF A NEW ROUTE OPTIMIZATION TECHNIQUE FOR MOBILE IP
PERFORMANCE EVALUATION OF A NEW ROUTE OPTIMIZATION TECHNIQUE FOR MOBILE IP
 

More from ReachLocal Services India

More from ReachLocal Services India (12)

Excel ppt
Excel pptExcel ppt
Excel ppt
 
Virtual reality
Virtual realityVirtual reality
Virtual reality
 
Digital signatures
Digital signaturesDigital signatures
Digital signatures
 
System security
System securitySystem security
System security
 
Artificial intelligence
Artificial intelligenceArtificial intelligence
Artificial intelligence
 
Distributed database
Distributed databaseDistributed database
Distributed database
 
Loop invariant computation
Loop invariant computationLoop invariant computation
Loop invariant computation
 
Distributed dbms
Distributed dbmsDistributed dbms
Distributed dbms
 
Sexual harresment on women
Sexual harresment on womenSexual harresment on women
Sexual harresment on women
 
Digital signal processing
Digital signal processingDigital signal processing
Digital signal processing
 
Regular expression (compiler)
Regular expression (compiler)Regular expression (compiler)
Regular expression (compiler)
 
Temporal data mining
Temporal data miningTemporal data mining
Temporal data mining
 

Recently uploaded

Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
Joaquim Jorge
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
?#DUbAI#??##{{(☎️+971_581248768%)**%*]'#abortion pills for sale in dubai@
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Safe Software
 

Recently uploaded (20)

Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
HTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation StrategiesHTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation Strategies
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsTop 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
 

Mobile network layer (mobile comm.)

  • 1.
  • 2. Contents:  Introduction To Mobile IP  Requirements to Mobile IP  Entities and Terminology  IP Packet Delivery  Agent Discovery  Registration
  • 3.  Mobile IP is an open standard, defined by the Internet Engineering Task Force (IETF) RFC 3220. By using Mobile IP, you can keep the same IP address, stay connected, and maintain ongoing applications while roaming between IP networks. Mobile IP is scalable for the Internet because it is based on IP—any media that can support IP can support Mobile IP.
  • 4.  Compatibility  support of the same layer 2 protocols as IP does  no changes to current end-systems and routers required  Mobile end-systems can communicate with fixed systems  Transparency  mobile end-systems keep their IP address  continuation of communication after interruption of link possible
  • 5.  Security  authentication of all registration messages  Efficiency and scalability  only little additional messages to the mobile system required (connection typically via a low bandwidth radio link)  world-wide support of a large number of mobile systems in the whole Internet
  • 6.  Mobile Node (MN)  A mobile node is an end-system or router that can change its point of attachment to the internet using mobile IP.  The MN keeps its IP address and can continuously communicate with any other system in the internet as long as link-layer connectivity is given.  Correspondent Node (CN)  At least one partner is needed for communication.  In the following the CN represents this partner for the MN. The CN can be a fixed or mobile node.
  • 7.  Home Network  The home network is the subnet the MN belongs to with respect to its IP address.  No mobile IP support is needed within the home network.  Foreign Network  The foreign network is the current subnet the MN visits and which is not the home network.
  • 8.  Foreign Agent (FA)  The FA can provide several services to the MN during its visit to the foreign network.  The FA can have the COA (defined below), acting as tunnel endpoint and forwarding packets to the MN.  The FA can be the default router for the MN. FAs can also provide security services because they belong to the foreign network as opposed to the MN which is only visiting.
  • 9.  Care Of Address (COA)  The COA defines the current location of the MN from an IP point of view.  All IP packets sent to the MN are delivered to the COA, not directly to the IP address of the MN. Packet delivery toward the MN is done using a tunnel, as explained later.
  • 10.  Care Of Address (contd…)  There are two different possibilities for the location of the COA: I. Foreign Agent COA:  The COA could be located at the FA, i.e., the COA is an IP address of the FA.  The FA is the tunnel end-point and forwards packets to the MN.  Many MN using the FA can share this COA as common COA. II. Co-Lated COA:  The COA is co-lated if the MN temporarily acquires an additional IP address which acts as COA.  This address is now topologically correct, and the tunnel endpoint is at the MN.
  • 11.  Home Agent (HA)  The HA provides several services for the MN and is located in the home network. The tunnel for packets toward the MN starts at the HA.  The HA can be implemented on a router that is responsible for the home network. This is obviously the best position, because without optimizations to mobile IP, all packets for the MN have to go through the router anyway.  If changing the router’s software is not possible, the HA could also be implemented on an arbitrary node in the subnet. One disadvantage of this solution is the double crossing of the router by the packet if the MN is in a foreign network. A packet for the MN comes in via the router; the HA sends it through the tunnel which again crosses the router.
  • 12.  One of the requirements of mobile IP was to support hiding the mobility of the MN. CN does not need to know anything about the MN’s current location and sends the packet as usual to the IP address of MN (step 1). This means that CN sends an IP packet with MN as a destination address and CN as a source address. The internet, not having information on the current location of MN, routes the packet to the router responsible for the home network of MN. This is done using the standard routing mechanisms of the internet.  The HA now intercepts the packet, knowing that MN is currently not in its home network. The packet is not forwarded into the subnet as usual, but encapsulated and tunneled to the COA. A new header is put in front of the old IP header showing the COA as new destination and HA as source of the encapsulated packet (step 2). The foreign agent now decapsulates packet, i.e., removes the additional header, and forwards the original packet with CN as source and MN as destination to the MN (step 3). Again, for the MN mobility is not visible. It receives the packet with the same sender and receiver address as it would have done in the home network.
  • 13.
  • 14.  One initial problem of an MN after moving is how to find a foreign agent. How does the MN discover that it has moved? For this purpose mobile IP describes two methods: agent advertisement and agent solicitation, which are in fact router discovery methods plus extensions.
  • 15.  Agent Advertisement:  For the first method, foreign agents and home agents advertise their presence periodically using special agent advertisement messages. These advertisement messages can be seen as a beacon broadcast into the subnet. For these advertisements Internet control message protocol (ICMP) messages according to RFC 1256 (Deering, 1991) are used with some mobility extensions.  The agent advertisement packet according to RFC 1256 with the extension for mobility is shown in Figure 8.3. The upper part represents the ICMP packet while the lower part is the extension needed for mobility. The fields necessary on lower layers for the agent advertisement are not shown in this figure. Clearly, mobile nodes must be reached with
  • 16. 0 7 8 15 16 23 24 31 Type code checksum #address addr. size lifetime es router address 1 preference level 1 router address 2 preference level 2 ….
  • 17. Type = 16 length Sequence number Registration lifetime R B H F MG r T reversed COA 1 COA 2 …
  • 18.  Agent solicitation:  If no agent advertisements are present or the inter- arrival time is too high, and an MN has not received a COA by other means, e.g., DHCP, the mobile node must send agent solicitations. These solicitations are again based on RFC 1256 for router solicitations. Care must be taken to ensure that these solicitation messages do not flood the network, but basically an MN can search for an FA endlessly sending out solicitation messages. Typically, a mobile node can send out three solicitations, one per second, as soon as it enters a new network.
  • 19.  Agent solicitation (contd…):  If a node does not receive an answer to its solicitations it must decrease the rate of solicitations exponentially to avoid flooding the network until it reaches a maximum interval between solicitations (typically one minute). Discovering a new agent can be done anytime, not just if the MN is not connected to one. Consider the case that an MN is looking for a better connection while still sending via the old path. This is the case while moving through several cells of different wireless networks.  After these steps of advertisements or solicitations the MN can now receive a COA, either one for an FA or a co-located COA. The MN knows its location (home network or foreign network) and the capabilities of the agent (if needed).
  • 20.  Having received a COA, the MN has to register with the HA. The main purpose of the registration is to inform the HA of the current location for correct forwarding of packets. Registration can be done in two different ways depending on the location of the COA.
  • 21. MN FA HA Registration MN HA Registration Request Request Registration Request Registration Reply Registration Reply Registration Reply
  • 22. 0 7 8 15 16 23 24 31 Type 1 S B D M G r T x lifetime Home Address Home Agent COA Identification Extensions….