Course Name: Mobile Computing
Semester-VI Computer Engg.
Pinki Vishwakarma
Associate Professor
Computer Engg. Department
Mobile Computing
Topics to be covered:
• Optimization
Mobile IP
Source of Reference:
• Jochen Schiller, “Mobile Communications”, Addison
Wesley Second Edition.
• Mobility Protocols and Handover Optimization: Design,
Evaluation and Application By Ashutosh Dutta, Henning
Schulzrinne, IEEE Press, Wiley Publication
Objective
• To understand the Mobile IP optimization
mechanism.
Optimized Mobile IP
The optimized mobile IP protocol needs four additional messages.
● Binding request: Any node that wants to know the current location of an MN
can send a binding request to the HA. The HA can check if the MN has allowed
dissemination of its current location. If the HA is allowed to reveal the location
it sends back a binding update.
● Binding update: This message sent by the HA to CNs reveals the current
location of an MN. The message contains the fixed IP address of the MN and
the COA. The binding update can request an acknowledgement.
● Binding acknowledgement: If requested, a node returns this
acknowledgement after receiving a binding update message.
● Binding warning: If a node decapsulates a packet for an MN, but it is not the
current FA for this MN, this node sends a binding warning. The warning
contains MN’s home address and a target node address, i.e., the address of the
node that has tried to send the packet to this MN. The recipient of the warning
then knows that the target node could benefit from obtaining a fresh binding
for the MN. The recipient can be the HA, so the HA should now send a binding
update to the node that obviously has a wrong COA for the MN.
Optimized Mobile IP
Outcome
• To get to know the Optimized Mobile IP
mechanism.
Course Name: Mobile Computing
Semester-VI Computer Engg.
Pinki Vishwakarma
Associate Professor
Computer Engg. Department
Mobile Computing
Topics to be covered:
• Cellular IP
⮚ Basic Architecture
⮚ Advantages and Disadvantages
Source of Reference:
• Jochen Schiller, “Mobile Communications”, Addison
Wesley Second Edition.
• Mobility Protocols and Handover Optimization: Design,
Evaluation and Application By Ashutosh Dutta, Henning
Schulzrinne, IEEE Press, Wiley Publication
Objective
• To understand the micro-mobility
management protocol namely Cellular IP
mechanism.
Cellular IP (Basic Architecture)
• Micro-mobility
management
protocol
• Provides local
handovers
• Cellular IP
gateway (CIPGW)
for each domain
Cellular IP
Advantage
• Manageability: Cellular IP is mostly self-configuring, and integration of the
CIPGW into a firewall would facilitate administration of mobility-related
functionality.
Disadvantages
• Efficiency: Additional network load is induced by forwarding packets on
multiple paths.
• Transparency: Changes to MNs are required.
• Security: Routing tables are changed based on messages sent by mobile
nodes. Additionally, all systems in the network can easily obtain a copy of
all packets destined for an MN by sending packets with the MN’s source
address to the CIPGW.
Outcome
• To get to know the Cellular IP mechanism.
Course Name: Mobile Computing
Semester-VI Computer Engg.
Pinki Vishwakarma
Associate Professor
Computer Engg. Department
Mobile Computing
Topic to be covered:
• HAWAII (Handoff-Aware Wireless Access
Internet Infrastructure)
Basic Architecture
Advantages and Disadvantages
Source of Reference:
• Jochen Schiller, “Mobile Communications”, Addison Wesley
Second Edition.
• Mobility Protocols and Handover Optimization: Design,
Evaluation and Application By Ashutosh Dutta, Henning
Schulzrinne, IEEE Press, Wiley Publication
Objective
• To understand the micro-mobility
management protocol namely HAWAII
mechanism.
HAWAII (Basic Architecture)
• HAWAII (Handoff-
Aware Wireless
Access Internet
Infrastructure)
• Micro-mobility
support transparent as
possible for both
home agents and
mobile nodes.
• The goals are
performance and
reliability
improvements and
support for quality of
service mechanisms.
HAWAII (Basic Architecture)
Step 1 : On entering an
HAWAII domain, a mobile
node obtains a co-located
COA.
Step 2: A mobile node
registers with the HA.
Step 3: When moving to
another cell inside the
foreign domain, the MN
sends a registration request
to the new base station as
to a foreign agent thus
mixing the concepts of co-
located COA and foreign
agent COA.
HAWAII (Basic Architecture)
Step 4: The base station
intercepts the registration
request and sends out a
handoff update message,
which reconfigures all
routers on the paths from
the old and new base
station to the so-called
crossover router.
When routing has
been reconfigured
successfully, the base
station sends a registration
reply to the mobile node,
again as if it were a foreign
agent.
HAWAII (Basic Architecture)
• The use of challenge-
response extensions for
authenticating a mobile
node is mandatory.
• In contrast to cellular IP,
routing changes are always
initiated by the foreign
domain’s infrastructure, and
the corresponding messages
could be authenticated, e.g.,
by means of an IPSec
authentication header
reducing the risk of
malicious rerouting of
traffic initiated by bogus
mobile hosts.
HAWAII
Advantages
• Security: Challenge-response extensions are mandatory. In contrast to
Cellular IP, routing changes are always initiated by the foreign domain’s
infrastructure.
• Transparency: HAWAII is mostly transparent to mobile nodes.
Disadvantages
• Security: There are no provisions regarding the setup of IPSec tunnels.
• Implementation: No private address support is possible because of co-
located COAs.
Outcome
• To get to know the HAWAII mechanism.
Course Name: Mobile Computing
Semester-VI Computer Engg.
Pinki Vishwakarma
Associate Professor
Computer Engg. Department
Mobile Computing
Topics to be covered:
• Fast Mobile IPV6 (FMIPV6)
Source of Reference:
• Mobility Protocols and Handover Optimization: Design,
Evaluation and Application By Ashutosh Dutta, Henning
Schulzrinne, IEEE Press, Wiley Publication
Objective
• To understand the network layer macro
mobility namely Fast Mobile IPV6
mechanism.
Fast Mobile IPV6
• Drawback in MIPV6 is
handoff delays.
• FMIPV6 proposes the
mechanisms to
reduce the handoff
delay
• There are two types
of handover, namely
predictive and
reactive
Fast Mobile IPV6
Fast MobileIPV6: Call Flow for Predictive Handoff
Fast MobileIPV6: Call Flow for Reactive Handoff
Outcome
• To get to know the Fast Mobile IPV6
mechanism.
Course Name: Mobile Computing
Semester-VI Computer Engg.
Pinki Vishwakarma
Associate Professor
Computer Engg. Department
Mobile Computing
Topics to be covered:
• HMIPV6
➢ Basic Architecture
➢ Advantages and Disadvantages
Source of Reference:
• Jochen Schiller, “Mobile Communications”, Addison
Wesley Second Edition.
• Mobility Protocols and Handover Optimization: Design,
Evaluation and Application By Ashutosh Dutta, Henning
Schulzrinne, IEEE Press, Wiley Publication
Objective
• To understand the micro-mobility
management protocol namely HMIPV6
mechanism.
HMIPV6 (Basic Architecture)
• Micro-mobility management
protocol
• Introduces hierarchies for
handling micro-mobility
issues.
• HMIPv6 provides micro-
mobility support by installing
a mobility anchor point
(MAP), which is responsible
for a certain domain and acts
as a local HA within this
domain for visiting MNs.
HMIPV6 (Basic Architecture)
• Mobility Anchor Point
• A MAP domain’s
boundaries are defined by
the access routers (AR)
advertising the MAP
information to the attached
MNs.
• Local handovers
• Binding update.
• RCOA stays unchanged
• Support smooth handovers
• Limited location privacy
HMIPV6
Advantages
• Security: MNs can have (limited) location privacy because
LCOAs can
be hidden.
• Efficiency: Direct routing between CNs sharing the same link is
possible
Disadvantages
• Transparency: Additional infrastructure component (MAP).
• Security: Routing tables are changed based on messages sent by
mobile nodes. This requires strong authentication and protection
against denial of service attacks. Additional security functions
might be necessary in MAPs.
Outcome
• To get to know the HMIPV6 mechanism.
Course Name: Mobile Computing
Semester-VI Computer Engg.
Pinki Vishwakarma
Associate Professor
Computer Engg. Department
Mobile Computing
Topics to be covered:
• IPV6
• Mobile IPV6
Source of Reference:
• Jochen Schiller, “Mobile Communications”, Addison
Wesley Second Edition.
• Mobility Protocols and Handover Optimization: Design,
Evaluation and Application By Ashutosh Dutta, Henning
Schulzrinne, IEEE Press, Wiley Publication
Objective
• To understand the network layer macro
mobility namely Mobile IPV6 mechanism.
IPV6
• Every IPv6 node masters address autoconfiguration
• Neighbor discovery
• A soft handover is possible with IPv6
• The FA is not needed any more
Mobile IPV6
• Route optimization
• No need for the CH
to be equipped with
additional software
like MIP-RO (Mobile
IP with route
optimization.
IPv4 (Internet Protocol Version 4)
IPV4 Vs IPV6 IPv6 (Internet Protocol Version 6)
Encryption and authentication is not provided in IPv4 (Internet Encryption and authentication is provided in IPv6 (Internet Protocol
Protocol Version 4). Version 6)
Header of IPv4 is 20 – 60 bytes. Header of IPv6 is fixed at 40 bytes
Checksumfield is available in IPv4. Checksumfield is not available in IPv6.
Packet flow identification is not available in IPv4 (Internet Protocol Packet flow identification is available in IPv6. Flow label field is available in
Version 4). the header.
IPv4 addresses are usually represented in dot-decimal notation, An IPv6 address is represented as eight groups of four hexadecimal digits,
consisting of four decimal numbers, each ranging from 0 to 255, each group representing 16 bits.
separated by dots.
Sender and forwarding routers performs fragmentation in IPv4 Fragmentation is performed only by the sender in IPv6.
In IPv4, security features relies on application In IPv6, there is an inbuilt security feature named IPSEC.
End to end connection integrity cannot be achieved in IPv4. End to end connection integrity can be done in IPv6.
IPv4 supports DHCP and Manual address configuration IPv6 supports renumbering and auto address configuration.
IPv4 addresses are 32-bit long IPv6 addresses are 128 bits long.
The address space in IPv4 is 4.29 ×109 The address space in IPv6 is 3.4 ×1038
IPv4 has a broadcast message transmission scheme. Multicast and Anycast message transmission scheme is available in IPv6.
Outcome
• To get to know the mobile IPV6 mechanism.