B.
TECH 6TH SEMESTER TECHNICAL SEMINAR PRESENTATION 2020-21
National Institute of Science & Technology
MOBILE IP
NAME: AISHWARYA SINGH
ROLL NO.:201811600
ECE B
Under the guidance of
Prof. ASIT KR.PANDA
AISHWARYA
A SINGH 201811600 [1]
B.TECH 6TH SEMESTER TECHNICAL SEMINAR PRESENTATION 2020-21
CONTENTS
National Institute of Science & Technology
1. INTRODUCTION
2. MOTIVATION FOR MOBILE IP
3. REQUIREMENTS
4. TERMINOLOGIES
5. WORKING
6. MECHANISM
7. NETWORK INTEGRATION
8. PROBLEM WITH MOBILE IP
9. SECURITY IN MOBILE IP
10. WHY MOBILE IP?
11. REFERENCES
AISHWARYA SINGH 201811600 [2]
B.TECH 6TH SEMESTER TECHNICAL SEMINAR PRESENTATION 2020-21
INTRODUCTION
National Institute of Science & Technology
Mobile Internet Protocol (or Mobile IP)
Mobile IP is a communication protocol (created by extending Internet Protocol, IP) that
allows the users to move from one network to another with the same IP address. It ensures
that the communication will continue without user's sessions or connections being
dropped.
AISHWARYA SINGH 201811600 [3]
B.TECH 6TH SEMESTER TECHNICAL SEMINAR PRESENTATION 2020-21
MOTIVATION FOR MOBILE IP
National Institute of Science & Technology
Routing
• based on IP destination address, network prefix (e.g. 129.13.42) determines physical
subnet
• change of physical subnet implies change of IP address to have a topological correct
address (standard IP) or needs special entries in the routing tables
Specific routes to end-systems
• change of all routing table entries to forward packets to the right destination
• does not scale with the number of mobile hosts and frequent changes in the location,
security problems
Changing the IP-address?
• adjust the host IP address depending on the current location
• almost impossible to find a mobile system, DNS updates take to long time
• TCP connections break, security problems
AISHWARYA SINGH 201811600 [4]
B.TECH 6TH SEMESTER TECHNICAL SEMINAR PRESENTATION 2020-21
REQUIREMENTS
National Institute of Science & Technology
Transparency
mobile end-systems keep their IP address
continuation of communication after interruption of link possible
point of connection to the fixed network can be changed
Compatibility
support of the same layer 2 protocols as IP
no changes to current end-systems and routers required
mobile end-systems can communicate with fixed systems
Security
authentication of all registration messages
Efficiency and scalability
only little additional messages to the mobile system required (connection typically via
a low bandwidth radio link)
world-wide support of a large number of mobile systems in the whole Internet
AISHWARYA SINGH 201811600 [5]
B.TECH 6TH SEMESTER TECHNICAL SEMINAR PRESENTATION 2020-21
TERMINOLOGIES
National Institute of Science & Technology
• Mobile Node (MN):It is the hand-held communication device that the user caries e.g. Cell
phone.
• Home Network It is a network to which the mobile node originally belongs to as per its assigned
IP address (home address).
• Home Agent (HA):It is a router in home network to which the mobile node was originally
connected
• Home Address :It is the permanent IP address assigned to the mobile node (within its home
network).
• Foreign Network :It is the current network to which the mobile node is visiting (away from its
home network).
AISHWARYA SINGH 201811600 [6]
B.TECH 6TH SEMESTER TECHNICAL SEMINAR PRESENTATION 2020-21
TERMINOLOGIES (CONTD)
National Institute of Science & Technology
• Foreign Agent (FA):It is a router in foreign network to which mobile node is currently
connected. The packets from the home agent are sent to the foreign agent which delivers
it to the mobile node.
• Correspondent Node (CN):It is a device on the internet communicating to the mobile
node.
• Care of Address (COA): It is the temporary address used by a mobile node while it is
moving away from its home network.
AISHWARYA SINGH 201811600 [7]
B.TECH 6TH SEMESTER TECHNICAL SEMINAR PRESENTATION 2020-21
WORKING
National Institute of Science & Technology
Correspondent node sends the data to the mobile node. Data packets contains correspondent node’s address
(Source) and home address (Destination). Packets reaches to the home agent. But now mobile node is not in
the home network, it has moved into the foreign network. Foreign agent sends the care-of-address to the
home agent to which all the packets should be sent. Now, a tunnel will be established between the home
agent and the foreign agent by the process of tunneling.
AISHWARYA SINGH 201811600 [8]
B.TECH 6TH SEMESTER TECHNICAL SEMINAR PRESENTATION 2020-21
MECHANISM
National Institute of Science & Technology
Agent Discovery:
Agents advertise their presence by periodically broadcasting their agent advertisement messages. The mobile
node receiving the agent advertisement messages observes whether the message is from its own home agent
and determines whether it is in the home network or foreign network.
Agent Registration:
Mobile node after discovering the foreign agent, sends registration request (RREQ) to the foreign agent.
Foreign agent in turn, sends the registration request to the home agent with the care-of-address. Home agent
sends registration reply (RREP) to the foreign agent. Then it forwards the registration reply to the mobile
node and completes the process of registration.
Tunneling:
It establishes a virtual pipe for the packets available between a tunnel entry and an endpoint. It is the process
of sending a packet via a tunnel and it is achieved by a mechanism called encapsulation. It takes place to
forward an IP datagram from the home agent to the care-of-address. Whenever home agent receives a packet
from correspondent node, it encapsulates the packet with source address as home address and destination as
care-of-address.
AISHWARYA SINGH 201811600 [9]
B.TECH 6TH SEMESTER TECHNICAL SEMINAR PRESENTATION 2020-21
NETWORK INTEGRATION
National Institute of Science & Technology
• Agent Advertisement
• HA and FA periodically send advertisement messages into their physical subnets
• MN listens to these messages and detects, if it is in the home or a foreign network (standard case for
home network)
• MN reads a COA from the FA advertisement messages
Registration (always limited lifetime!)
• MN signals COA to the HA via the FA, HA acknowledges via FA to MN
• these actions have to be secured by authentication
Advertisement
• HA advertises the IP address of the MN (as for fixed systems), i.e. standard routing information
• routers adjust their entries, these are stable for a longer time (HA responsible for a MN over a longer
period of time)
• packets to the MN are sent to the HA,
• independent of changes in COA/FA
AISHWARYA SINGH 201811600 [10]
B.TECH 6TH SEMESTER TECHNICAL SEMINAR PRESENTATION 2020-21
National Institute of Science & Technology
HA
MN
router
home network mobile end-system
Internet
(physical home network
for the MN)
FA foreign
network
router
(current physical network
for the MN)
N CN
end-system router
AISHWARYA SINGH 201811600 [11]
B.TECH 6TH SEMESTER TECHNICAL SEMINAR PRESENTATION 2020-21
Data transfer to the mobile system
National Institute of Science & Technology
HA
2
MN
home network receiver
3
Internet
FA foreign
network
1. Sender sends to the IP address of MN,
1 HA intercepts packet (proxy ARP)
CN 2. HA tunnels packet to COA, here FA,
by encapsulation
sender 3. FA forwards the packet to the MN
AISHWARYA SINGH 201811600 [12]
B.TECH 6TH SEMESTER TECHNICAL SEMINAR PRESENTATION 2020-21
Data transfer from the mobile system
National Institute of Science & Technology
HA
1 MN
home network sender
Internet
FA foreign
network
1. Sender sends to the IP address
CN of the receiver as usual,
FA works as default router
receiver
AISHWARYA SINGH 201811600 [13]
B.TECH 6TH SEMESTER TECHNICAL SEMINAR PRESENTATION 2020-21
Problems with mobile IP
National Institute of Science & Technology
Security
• authentication with FA problematic, for the FA typically belongs to another organization
• no protocol for key management and key distribution has been standardized in the Internet
• patent and export restrictions
Firewalls
• typically mobile IP cannot be used together with firewalls, special set-ups are needed (such as reverse
tunneling)
QoS
• many new reservations in case of RSVP
• tunneling makes it hard to give a flow of packets a special treatment needed for the QoS
• Security, firewalls, QoS etc. are topics of research and discussions
AISHWARYA SINGH 201811600 [14]
B.TECH 6TH SEMESTER TECHNICAL SEMINAR PRESENTATION 2020-21
SECURITY IN MOBILE IP
National Institute of Science & Technology
• Security requirements (Security Architecture for the Internet Protocol, RFC 4301, was: 1825, 2401)
• Integrity
any changes to data between sender and receiver can be detected by the receiver
• Authentication
sender address is really the address of the sender and all data received is really data sent by this
sender
• Confidentiality
only sender and receiver can read the data
• Non-Repudiation
sender cannot deny sending of data
• Traffic Analysis
creation of traffic and user profiles should not be possible
• Replay Protection
receivers can detect replay of messages
AISHWARYA SINGH 201811600 [15]
B.TECH 6TH SEMESTER TECHNICAL SEMINAR PRESENTATION 2020-21
MOBILE IP OPERATION
National Institute of Science & Technology
AMN listens for agent advertisement and then initiates registration
After receiving the registration request from a MN, FA request to HA
The HA acknowledges and registration is complete
HA intercepts all packets destined for MN
HA then encapsulates all packets addressed to MN and forwards them to FA
FA decapsulates all packets addressed to MN and forwards them via hardware address
AISHWARYA SINGH 201811600 [16]
B.TECH 6TH SEMESTER TECHNICAL SEMINAR PRESENTATION 2020-21
WHY MOBILE IP ?
National Institute of Science & Technology
Mobile IP is targeted to the users who are mobile and need to work in a flexible manner -
in the office, on the road, at customer premises, or at home.
There are numerous applications that do not cope well with network changes. In
general, deploying a Mobile IP based solution ensures that all your applications will work
properly in a mobile environment. Instead of building this function in the application, the
underlying Mobile IP layer solves this problem once and for all. There are several
examples of applications where sudden changes in network and IP-address can cause
problems. The most common ones are listed in the next slide
P.T.O.
AISHWARYA SINGH 201811600 [17]
B.TECH 6TH SEMESTER TECHNICAL SEMINAR PRESENTATION 2020-21
APPLICATIONS
National Institute of Science & Technology
Remote Access VPNs:
Remote access VPNs(Virtual Private Network), based on IPSec technology, are very sensitive to IP-address
changes. Mobile IP solution is compatible with all the major VPN solutions on the market.
Microsoft Office and Windows:
If a user edits a file on a server while changing networks, the file will be blocked on the server and cause
problems.
Database applications:
Any client-server application based on ODBC(Open Database Connectivity) drivers or something like that will
fail if the user changes IP-address while working.
Voice over IP:
Voice applications, which are becoming more and more popular on wireless networks, are typical examples of
session driven applications. Without Mobile IP, the user has to restart the conversation every time he moves between
networks or subnets.
AISHWARYA SINGH 201811600 [18]
B.TECH 6TH SEMESTER TECHNICAL SEMINAR PRESENTATION 2020-21
REFERENCES
National Institute of Science & Technology
• https://www.geeksforgeeks.org/mobile-internet-protocol-or-mobile-ip/
• https://www.csie.ntu.edu.tw/~b93070/CNL/v4.0/CNLv4.0.files/Page947.htm
• YOUTUBE
• WIKIPEDIA
• https://www.cisco.com/c/en/us/td/docs/ios/solutions_docs/mobile_ip/mobil_ip.html
AISHWARYA SINGH 201811600 [19]
B.TECH 6TH SEMESTER TECHNICAL SEMINAR PRESENTATION 2020-21
National Institute of Science & Technology
THANKYOU
AISHWARYA SINGH 201811600 [20]