SlideShare una empresa de Scribd logo
1 de 25
Descargar para leer sin conexión
© Peter R. Egli 2015
1/25
Rev. 1.50
PMIPv6 – Proxy Mobile IPv6 indigoo.com
Peter R. Egli
INDIGOO.COM
OVERVIEW OF PMIPV6, A PROXY-BASED
MOBILITY PROTOCOL FOR IPV6 HOSTS
PMIPv6
PROXY MOBILE IPV6
© Peter R. Egli 2015
2/25
Rev. 1.50
PMIPv6 – Proxy Mobile IPv6 indigoo.com
Contents
1. Why PMIPv6 when we have MIP?
2. PMIPv6 terminology
3. Where can PMIPv6 be deployed?
4. General PMIPv6 setup
5. PMIPv6 versus MIP (Mobile IP)
6. MN domain join sequence
7. MN handoff sequence
8. PMIPv6 packet routing
9. Use of link-local addresses
10. Proxy Based Fast Handover
© Peter R. Egli 2015
3/25
Rev. 1.50
PMIPv6 – Proxy Mobile IPv6 indigoo.com
1. Why PMIPv6 when we have MIP?
MIP (Mobile IP, originally RFC2002) is an early approach to get mobility in the Internet.
Problems with MIP:
1. Clients must implement MIP in the kernel (MIP mobility is host-based).
 difficult to implement kernel changes
 difficult to deploy (clients need software upgrade to get MIP support)
2. Handoff procedure is not efficient  large delay.
3. Security concerns (MIP support in the kernel provides an additional attack vector).
PMIPv6 solution:
• PMIPv6 (RFC5213) is completely transparent to mobile nodes (use of a „proxy“ to do the
handoff work).
• PMIPv6 is meant to be used in localized networks with limited topology where handoff
signalling delays are minimal.
© Peter R. Egli 2015
4/25
Rev. 1.50
PMIPv6 – Proxy Mobile IPv6 indigoo.com
2. PMIPv6 terminology (1/3)
Local Mobility Domain (LMD):
Network that is PMIP-enabled. The LMD contains 1 LMA and multiple MAGs.
Local Mobility Anchor (LMA):
All traffic from and to the mobile node is routed through the LMA.
The LMA maintains a set of routes for each MN connected to the LMD.
Mobile Access Gateway (MAG):
The MAG performs the mobility related signalling on behalf of the MNs attached to
its access links.
The MAG is usually the access router (first hop router) for the MN.
Mobile Node (MN):
Any device that connects through a wireless network (WLAN, WiMAX, MBWA, G3/G4) to the
LMD.
Corresponding Node (CN):
Any node in the Internet or also in the LMD that communicates with an MN.
NetLMM:
Network based Localized Mobility Management (IETF working group for network-based
mobility support).
© Peter R. Egli 2015
5/25
Rev. 1.50
PMIPv6 – Proxy Mobile IPv6 indigoo.com
2. PMIPv6 terminology (2/3)
Binding Cache:
Cache maintained by the LMA that contains BCEs.
Binding Cache Entry (BCE):
Entry in the LMA‘s binding cache. An entry has the fields MN-ID, MAG proxy-CoA and MN-
prefix.
Binding Update List:
Cache maintained by the MAG that contains information about the attached MNs.
Proxy Binding Update (PBU):
PMIP signalling packet sent by the MAG to the LMA to indicate a new MN. The PBU has the
fields MN-ID (e.g. MN MAC), MAG address (proxy-CoA) and handoff indicator to signal if the
MN-attachment is a new one or a handoff from another MAG.
Proxy Binding Acknowledge (PBA):
Response to a PBU sent by the LMA to the MAG. The PBA contains the MN-ID, the MAG
address and the prefix assigned to the MN.
© Peter R. Egli 2015
6/25
Rev. 1.50
PMIPv6 – Proxy Mobile IPv6 indigoo.com
2. PMIPv6 terminology (3/3)
Proxy care of address (proxy-CoA):
IP address of public interface of MAG. The proxy-CoA is the tunnel endpoint address on the
MAG. The LMA encapsulates packets destined to the MN into a tunnel packet with
destination address = proxy-CoA.
Mobile Node Identifier (MN-ID):
Unique identifier of mobile node, e.g. one of its MAC addresses.
Home Network Prefix:
Prefix assigned to the MN by the LMA.
© Peter R. Egli 2015
7/25
Rev. 1.50
PMIPv6 – Proxy Mobile IPv6 indigoo.com
3. Where can PMIPv6 be deployed?
PMIPv6 is primarily targeted at the following networks:
1. WLAN-based campus-style networks:
PMIPv6 provides transparent handoff
for mobile nodes in campus
networks.
2. Advanced 3G/4G networks
Replace GTP (GPRS tunneling
protocol) by PMIP, thus
reduce the costs and
management in the network.
BSS1
WLAN
AP
BSS2
WLAN
AP
MAG
InternetCampus LAN
MAG
LMA
Handoff
MN1 MN1 MN2
© Peter R. Egli 2015
8/25
Rev. 1.50
PMIPv6 – Proxy Mobile IPv6 indigoo.com
4. General PMIPv6 setup
BSS1
WLAN
AP
BSS2
WLAN
AP
MAG1
Campus LAN
MAG2
LMA:
Topological anchor point
for addresses assigned
to MNs in the LMD.
MN1 MN2 MN3
ID Prefix MAG
(proxy-CoA)
MN-ID-1 Pref1::/64 MAG1
MN-ID-2 Pref2::/64 MAG2
MN-ID-3 Pref3::/64 MAG2
LMD
Tunnel
LMA-MAG for
user traffic
between LMA
and MAG. Internet
Proxy Binding Cache
MAG:
Runs MIP on
behalf of MN
(=proxy).
© Peter R. Egli 2015
9/25
Rev. 1.50
PMIPv6 – Proxy Mobile IPv6 indigoo.com
5. PMIPv6 versus MIP (Mobile IP)
In PMIPv6 the MAG assumes the role of the MIP client in MIP.
The LMA in PMIPv6 is similar to the home agent (HA) in MIP.
BSS1
MAG1
Campus
LAN
MN1
LMA
BSS2
MN1
MAG2
LMD
BSS1
HA
BSS2
FA
MN1
Internet Internet
CN
MN1
Handoff
CN
IP in IP
tunntel
Handoff
PMIPv6 MIP
Packet path
after handoff.
Packet path
before handoff.
Tunnel
HA Home Agent
FA Foreign Agent
© Peter R. Egli 2015
10/25
Rev. 1.50
PMIPv6 – Proxy Mobile IPv6 indigoo.com
6. MN domain join sequence (1/2)
The following sequence diagram shows the procedure when a MN joins a PMIPv6 domain:
MN1 MAG1 LMA
Attaching:
MN1 attaches to
MAG1 (establish
link layer)
Router solicitation:
MN1 solicits an IPv6 prefix
Identification:
MN identification,
MN authorization,
MN ID acquisition
Proxy Binding Update:
PBU with MN-ID-1, MAG1
ID Prefix MAG
(proxy CoA)
- - -
ID Prefix MAG
(proxy CoA)
MN-ID-1 Pref1::/64 MAG1
Proxy Binding Ack:
LMA sends BPA with
MN-ID-1, MAG1, Pref1::/64
Tunnel setup:
LMA sets up a bidirectional tunnel
Router advertisement:
MAG1 sends the IPv6
prefix Pref1::/64 to MN1
Update BC:
LMA adds an entry to the binding cache.
BC
BC
1
2
3
4
5
6
7
8
Router advertisement is
delayed until PMIP signalling
is completed.
© Peter R. Egli 2015
11/25
Rev. 1.50
PMIPv6 – Proxy Mobile IPv6 indigoo.com
6. MN domain join sequence (2/2)
1. Attaching:
MN1 attaches to the MAG through a point-to-point link and establishes the link layer.
Any access technology is possible provided that it emulates a point-to-point behavior (e.g. PPP, PPPoE).
2. Identification:
MAG1 authenticates MN1 based on its link layer address (e.g. MAC address) and ascertains what MN1 is permitted to do
(authorization). The authorization step may use existing services like LDAP or RADIUS.
3. Router solicitation:
MN1 sends a router solicitation to obtain an IPv6 prefix. MAG1 will not send a router advertisement until it obtained a prefix
for MN1 from the LMA (step 6, PBA).
4. Proxy binding update (PBU):
MAG1 sends a proxy binding update to the LMA. This PBU associates the MAG1 address with the identity of the MN.
5. Allocate prefix, update BC:
The LMA allocates a prefix for MN1 (Home Network Prefix). The LMA creates an entry in its BC. The entry contains the MN1 ID
(MN-ID-1), the address MAG1 of the proxy MAG (proxy-CoA) as well as the prefix assigned to MN1.
6. Proxy binding ack (PBA):
The LMA sends a PBA back to MAG1. The PBA contains the information of the BPC entry created in step 5.
7. Tunnel setup:
The LMA and MAG1 establish a bidirectional IPv6-in-IPv6 tunnel that is used for tunneling packets to and from MN1. The LMA
sets a route through the tunnel for traffic that is addressed to the MN.
8. Router advertisement:
MAG1 sends a router advertisement with the assigned prefix to MN1. MN1 will assign the prefix through stateless
autoconfiguration. Stateful autoconfiguration would be possible as well (outside of scope of PMIPv6). MN1 creates a routing
table entry for the prefix.
© Peter R. Egli 2015
12/25
Rev. 1.50
PMIPv6 – Proxy Mobile IPv6 indigoo.com
7. MN handoff sequence (1/4)
Handoff from MAG1 (PMAG – Previous MAG) to MAG2 (NMAG – New MAG):
MN1 MAG1 LMA
Detaching:
MN1 detaches from
MAG1
Start timer:
LMA starts timer to delete the MN-ID-1 entry from
its binding cache (BD).
BC
1
3
MAG2
Deregistration:
PBU with MN-ID-1, MAG1
2
Proxy Binding Ack:
LMA sends BPA with MN-ID-1, MAG1, Pref1::/64
4Attaching:
MN1 attaches to
MAG2 (establish
link layer)
5
Router solicitation:
MN1 solicits an IPv6 prefix
6
Proxy Binding Update:
PBU with MN-ID-1, MAG2
7
9 Proxy Binding Ack:
LMA sends BPA with
MN-ID-1, MAG2, Pref1::/64
Tunnel setup:
LMA sets up a
bidirectional tunnel
10
11 Router advertisement:
MAG2 sends the IPv6 prefix Pref1::/64 to MN1
ID Prefix MAG
(proxy CoA)
MN-ID-1 Pref1::/64 MAG2
Update BC:
LMA updates the entry in the binding
cache.
BC
8
ID Prefix MAG
(proxy-CoA)
MN-ID-1 Pref1::/64 MAG1
© Peter R. Egli 2015
13/25
Rev. 1.50
PMIPv6 – Proxy Mobile IPv6 indigoo.com
7. MN handoff sequence (2/4)
1. Detaching:
MN1 detaches from MAG1 (PMAG – Previous MAG). MAG1 detects this event through some mechanism outside of the scope
of PMIPv6, e.g. through link layer events (link down) or through an IPv6 Neighbor Unreachability Detection event.
2. Deregistration:
MAG1 sends a PBU with a deregistration request for MN1 (MN-ID-1).
3. Start timer:
LMA starts a timer for the MN1 proxy binding cache entry. During the timer period the LMA drops any packets received for
MN1. If the LMA does not receive a PBU from the new MAG within the timer period, it can drop the entry for MN1 from its
binding cache. Thus the timer allows the LMA deleting binding cache entries in case the MN1 leaves the LMD for good.
4. Proxy binding ack (PBA):
The LMA sends a PBA back to MAG1. The PBA contains the information of the BPC entry created in the join phase.
5. Attaching to MAG2 (NMAG – New MAG):
MN1 now attaches to MAG2 the same way as it did to MAG1 in the LMD join phase. MN1 and MAG2 will establish the link layer
(PPP, PPPoE).
6. Router solicitation:
MN1 sends a router solicitation to obtain an IPv6 prefix. MAG2 will not send a router advertisement until it obtained a prefix
for MN1 from the LMA.
7. Proxy binding update (PBU):
MAG2 sends a proxy binding update to the LMA. This PBU associates the MAG2 address with the identity of the MN.
8. Update of the binding cache entry (BCE):
The LMA detects that MN1 already has an entry in the binding cache and therefore updates the entry for MN1. MN1 is now
associated with MAG2. The prefix for MN1 remains the same (address transparency for MN1).
© Peter R. Egli 2015
14/25
Rev. 1.50
PMIPv6 – Proxy Mobile IPv6 indigoo.com
7. MN handoff sequence (3/4)
9. Proxy binding ack (PBA):
The LMA sends a PBA back to MAG2. The PBA contains the information of the BPC entry updated in step 8.
10. Tunnel setup:
The LMA and MAG2 establish a bidirectional IPv6-in-IPv6 tunnel that is used for tunneling packets to and from MN1. The LMA
sets a route through the tunnel for traffic that is addressed to the MN.
11. Router advertisement:
MAG2 sends a router advertisement with the same prefix assigned to MN1. MN1 will not ‘see’ an address change and
therefore all open transport connections (TCP, UDP) remain open.
© Peter R. Egli 2015
15/25
Rev. 1.50
PMIPv6 – Proxy Mobile IPv6 indigoo.com
7. MN handoff sequence (4/4)
From the perspective of the MN the LMD appears as a single link. The handoff is fully
transparent to the MN.
BSS1
MAG1
Campus
LAN
MN1
LMA
BSS2
MN1
MAG2
LMD
Handoff
Internet
CN
LMD
MN1
Internet
CN
From MN1‘s perspective
the LMD appears as a
single link.
© Peter R. Egli 2015
16/25
Rev. 1.50
PMIPv6 – Proxy Mobile IPv6 indigoo.com
8. Routing / packet forwarding from and to MN through LMD
The LMA is the anchor point for packets to and from the MN.
BSS1
MAG1
Campus
LAN
MN1
LMA
BSS2
MN2
MAG2
LMD Internet
CN A. Routing MNMAGLMACN:
All traffic is routed through the LMA
(=anchor point for routing).
B. MNMAGMN:
If 2 MNs are attached to the same MAG,
the traffic may be routed directly
through the MAG without the detour
through the LMA (short-circuit routing).
© Peter R. Egli 2015
17/25
Rev. 1.50
PMIPv6 – Proxy Mobile IPv6 indigoo.com
9. Use of link-local and link addresses by MAGs
Problem:
Emulation of a virtual link requires that router advertisements sent by MAGs to a particular MN
have
a. the same prefix assigned to the MN,
a. the same source IPv6 link-local address (IPv6 source address of ICMPv6 packet) and
b. the same source link layer address (source link layer option within ICMPv6 packet).
PMIPv6 proposes the following solutions:
A. Fixed address configuration:
Configuration of a fixed link-local and fixed link layer address to be used by all MAGs in the
LMD. However, the use of a fixed link-local address to be used in all access links in an PMIPv6
domain may lead to collisions. As PMIPv6 requires that the link-local address used by the
different MAGs for a particular MN be the same, these collisions can only happen when an MN
enters a PMIPv6 domain. PMIPv6 requires that the MN perform DAD (Duplicate Address
Detection) so that the MAG can defend its link-local address.
B. Dynamic address generation, signalling through LMA:
The LMA generates a link-local address to be used by all MAGs with a particular MN and signals
this address to all serving MAGs. This signalling must be completed before the MN performs
DAD.
© Peter R. Egli 2015
18/25
Rev. 1.50
PMIPv6 – Proxy Mobile IPv6 indigoo.com
10. Proxy Based Fast Handover for MIPv6 (PFMIPv6) with RFC5949 (1/8)
The handover sequence defined by RFC5213 is not optimized for fast handovers.
During handover from one radio access network to another network, packets cannot be
delivered to and from the mobile node. The handover delay essentially leads to packet loss
thus degrading the quality of service in mobility scenarios.
RFC5949 defines a fast handover procedure to be used in conjunction with PMIPv6. It defines
2 modes, predective fast handover (MAG1 initiates handover before MN establishes
connectivity with the new access network) and reactive fast handover (MAG2 initiates
handover after MN has established connectivity with the new access network).
Other mobility protocols have their specific fast handover protocol as shown in the following
table:
Mobility Protocol Corresponding Fast Handover Protocol
RFC6275
Mobile IPv6
RFC5568
Mobile IPv6 Fast Handovers (FMIPv6)
RFC5944 (obsoletes RFC3344)
Mobile IPv4
RFC4988
Mobile IPv4 Fast Handovers (FMIPv4)
RFC5213
Proxy Mobile IPv6
RFC5949
Proxy Based Fast Handover for MIPv6 (PFMIPv6), extends RFC5568
RFC5844
IPv4 Support for PMIPv6
RFC5949
Proxy Based Fast Handover for MIPv6 (PFMIPv6), extends RFC5568
© Peter R. Egli 2015
19/25
Rev. 1.50
PMIPv6 – Proxy Mobile IPv6 indigoo.com
10. Proxy Based Fast Handover for MIPv6 (PFMIPv6) with RFC5949 (2/8)
Predictive Fast Handover from MAG1 to MAG2 (initiated by MAG1=PMAG):
MN1 P-AN LMAN-AN MAG1
(PMAG)
MAG2
(NMAG)
CN
Report:
• MN-ID-1
• New AP-ID
1
Handover indication:
• MN-ID-1
• New AP-ID
2
HI (Handover Initiate):
• MN-ID-1
• HNP
• Current LMA addr.
3
HAck (Handover
Ack)
4
Tunnel setup:
Bidirectional tunnel
setup between MAG1
and MAG2
5
Handover command7
Buffering:
Buffering of downlink packets @ MAG2
until MAG2 has established connectivity
with N-AN
6
MN-AN connection establishment8 AN-MAG connection establishment9
10 Delivery of buffered downlink packets to MN
© Peter R. Egli 2015
20/25
Rev. 1.50
PMIPv6 – Proxy Mobile IPv6 indigoo.com
10. Proxy Based Fast Handover for MIPv6 (PFMIPv6) with RFC5949 (3/8)
Predictive Fast Handover from MAG1 to MAG2 (initiated by MAG1=PMAG):
MN1 P-AN LMAN-AN MAG1
(PMAG)
MAG2
(NMAG)
CN
11 Uplink packets
12
Proxy Binding
Update:
PBU with
MN-ID-1, MAG2
13
Proxy Binding
Ack
14 Direct data transfer for uplink and downlink packets through MAG2
© Peter R. Egli 2015
21/25
Rev. 1.50
PMIPv6 – Proxy Mobile IPv6 indigoo.com
10. Proxy Based Fast Handover for MIPv6 (PFMIPv6) with RFC5949 (4/8)
Predictive Fast Handover from MAG1 to MAG2 (initiated by MAG1=PMAG):
1. Report:
The MN1 detects that handover is imminent (waning radio signal strength in the radio access network where it is attached to)
and signals its MN-ID-1 and the ID of the radio access network ID (new AP-ID) to the current radio access network (P-AN for
Previous Access Network).
The way this is accomplished is outside the scope of PFMIPv6. Addtionally, it may be the access network itself (P-AN,
Previous Access Network) detecting an imminent handover and acting on behalf of MN1.
2. Handover indication:
The P-AN indicates the imminent handover along with the MN-ID-1 and new AP-ID to the current MAG (PMAG – Previous MAG).
MN-ID-1 may be the MAC address of its radio interface.
The new AP-ID may be the MAC address or SSID (Service Set ID) of a WLAN access point.
3. Handover Initiate:
MAG1 derives the address of MAG2 (NMAG – New MAG) from the new AP-ID (see RFC5568 for details).
The HI packet contains MN-ID-1, HNP (Home Network Prefix = MN1’s persistent IP address prefix) and MN1’s current LMA
address.
4. Handover Acknowledge:
MAG2 acknowledges the handover.
5. Bidirectional tunnel setup between MAG1 and MAG2:
MAG1 and MAG2 set up a bidirectional tunnel for temporarily tunneling data packets bound for MN1.
6. Buffering downlink data packets at MAG2:
Downlink packets destined for MN1 are forwarded by MAG1 (previous MAG) to MAG2 (new MAG) where they are queued for
delivery until MN1 has established connectivity with the new access network. When NM1 has established connectivity with
N-AN (New Access Network), MAG2 delivers the queued downlink packets to MN1 over N-AN.
© Peter R. Egli 2015
22/25
Rev. 1.50
PMIPv6 – Proxy Mobile IPv6 indigoo.com
10. Proxy Based Fast Handover for MIPv6 (PFMIPv6) with RFC5949 (5/8)
Predictive Fast Handover from MAG1 to MAG2 (initiated by MAG1=PMAG):
7. Handover command:
MAG1 sends a handover command to MN1 telling it that everything is set up and that it now may switch to N-AN. Again, the
way this is accomplished is outside of scope of PFMIPv6.
8. MN-AN connection establishment:
MN1 establishes layer 2 connectivity with the N-AN through some means outside the scope of PFMIPv6.
9. AN-MAG connection establishment:
Likewise, MAG2 establishes layer 2 connectivity with N-AN if not done so before. When connectivity is established, the
access network (N-AN) becomes responsible for buffering downlink packets. The specifics are again outside the scope of
PFMIPv6. From now on, MN1 uplink packets can be forwarded to CN without buffering.
10. Delivery of buffered downlink packets to MN1:
After having established N-AN connectivity, MAG2 deliveres the queued packets to MN1.
11. MN1 uplink packet forwarding:
All MN1 uplink packets between step 8./9. and 12. follow the forwarding path MN1MAG2MAG1 (through tunnel)LMA.
12. Proxy binding update (PBU):
MAG2 sends a proxy binding update to the LMA. This PBU associates the MAG2 address with the identity of MN1 (MN-ID-1).
The LMA updates the BCE (Binding Cache Entry) for MN1. MN1 is now associated with MAG2. The prefix (HNP) for MN1
remains the same (address transparency for MN1).
13. Proxy binding ack (PBA):
The LMA sends back a PBA packet to MAG2.
14. Uplink and downlink data transfer through MAG2:
Uplink and downlink packets are now forwarded through MAG2 and the tunnel between MAG2 and LMA.
© Peter R. Egli 2015
23/25
Rev. 1.50
PMIPv6 – Proxy Mobile IPv6 indigoo.com
10. Proxy Based Fast Handover for MIPv6 (PFMIPv6) with RFC5949 (6/8)
Reactive Fast Handover from MAG1 to MAG2 (initiated by MAG2=NMAG):
MN1 P-AN LMAN-AN MAG1
(PMAG)
MAG2
(NMAG)
CN
MN-AN connection establishment1
AN-MAG connection establishment:
• MN1-ID
• Old AP-ID
2
HI (Handover Initiate):
• MN-ID-1
3
HAck (Handover Ack):
• HNP
• MN LL-ID
• LMA addr.
4
Tunnel setup:
Bidirectional tunnel
setup between MAG1
and MAG2
5
6 Uplink packets
7 Downlink packets
© Peter R. Egli 2015
24/25
Rev. 1.50
PMIPv6 – Proxy Mobile IPv6 indigoo.com
10. Proxy Based Fast Handover for MIPv6 (PFMIPv6) with RFC5949 (7/8)
Reactive Fast Handover from MAG1 to MAG2 (initiated by MAG2=NMAG):
MN1 P-AN LMAN-AN MAG1
(PMAG)
MAG2
(NMAG)
CN
8
9
Proxy Binding
Ack
10 Direct data transfer for uplink and downlink through MAG2
Proxy Binding
Update:
PBU with
MN-ID-1, MAG2
© Peter R. Egli 2015
25/25
Rev. 1.50
PMIPv6 – Proxy Mobile IPv6 indigoo.com
10. Proxy Based Fast Handover for MIPv6 (PFMIPv6) with RFC5949 (8/8)
Reactive Fast Handover from MAG1 to MAG2 (initiated by MAG2=NMAG):
1. MN-AN connection establishment:
MN1 establishes layer 2 connectivity with the N-AN through some means outside the scope of PFMIPv6.
2. AN-MAG connection establishment:
Likewise, MAG2 establishes layer 2 connectivity with N-AN if not done so before. When connectivity is established, the
access network (N-AN) becomes responsible for buffering downlink packets. The specifics of all that is again outside the
scope of PFMIPv6.
3. Handover Initiate:
MAG2 derives the address of MAG1 from the old AP-ID and sends a HI (Handover Initiate) packet that contains MN-ID-1.
4. Handover Acknowledge:
MAG1 acknowledges the handover. The acknowledge packet contains MN1’s link layer ID (MN LL-ID), HNP (Home Network
Prefix) and MN1’s current LMA address.
5. Bidirectional tunnel setup between MAG1 and MAG2:
MAG1 and MAG2 set up a bidirectional tunnel for temporarily tunneling data packets bound for MN1.
6. & 7. Uplink and downlink packets:
Up- and downlink packets are relayed through MAG1.
12. & 13. Proxy binding update (PBU) and Proxy binding ack (PBA):
MAG2 sends a proxy binding update to the LMA. This PBU associates the MAG2 address with the identity of MN1 (MN-ID-1).
The LMA updates the BCE (Binding Cache Entry) for MN1. MN1 is now associated with MAG2. The prefix (HNP) for MN1
remains the same (address transparency for MN1). The LMA sends back a PBA packet to MAG2.
14. Uplink and downlink data transfer through MAG2:
Uplink and downlink packets are now forwarded through MAG2 and the tunnel between MAG2 and LMA.

Más contenido relacionado

La actualidad más candente

Open shortest path first (ospf)
Open shortest path first (ospf)Open shortest path first (ospf)
Open shortest path first (ospf)Respa Peter
 
IEEE 802.11 Architecture and Services
IEEE 802.11 Architecture and ServicesIEEE 802.11 Architecture and Services
IEEE 802.11 Architecture and ServicesSayed Chhattan Shah
 
Lecture 23 27. quality of services in ad hoc wireless networks
Lecture 23 27. quality of services in ad hoc wireless networksLecture 23 27. quality of services in ad hoc wireless networks
Lecture 23 27. quality of services in ad hoc wireless networksChandra Meena
 
MQTT - MQ Telemetry Transport for Message Queueing
MQTT - MQ Telemetry Transport for Message QueueingMQTT - MQ Telemetry Transport for Message Queueing
MQTT - MQ Telemetry Transport for Message QueueingPeter R. Egli
 
5G and Internet of Things (IoT)
5G and Internet of Things (IoT)5G and Internet of Things (IoT)
5G and Internet of Things (IoT)Atifa Aqueel
 
MPLS (Multi-Protocol Label Switching)
MPLS (Multi-Protocol Label Switching)MPLS (Multi-Protocol Label Switching)
MPLS (Multi-Protocol Label Switching)Vipin Sahu
 
Wireless sensor network and its application
Wireless sensor network and its applicationWireless sensor network and its application
Wireless sensor network and its applicationRoma Vyas
 
ISSUES IN AD HOC WIRELESS NETWORKS
ISSUES IN  AD HOC WIRELESS  NETWORKS ISSUES IN  AD HOC WIRELESS  NETWORKS
ISSUES IN AD HOC WIRELESS NETWORKS Dushhyant Kumar
 
Issues in routing protocol
Issues in routing protocolIssues in routing protocol
Issues in routing protocolPradeep Kumar TS
 
WSN network architecture -Sensor Network Scenarios & Transceiver Design Consi...
WSN network architecture -Sensor Network Scenarios & Transceiver Design Consi...WSN network architecture -Sensor Network Scenarios & Transceiver Design Consi...
WSN network architecture -Sensor Network Scenarios & Transceiver Design Consi...ArunChokkalingam
 
Ngn presentation
Ngn presentationNgn presentation
Ngn presentationFrikha Nour
 
NGN Next Generation Network
NGN Next Generation NetworkNGN Next Generation Network
NGN Next Generation NetworkHavar Bathaee
 
6lowpan
6lowpan 6lowpan
6lowpan Wi6Labs
 
Network address translation
Network address translationNetwork address translation
Network address translationVarsha Honde
 

La actualidad más candente (20)

Handover
HandoverHandover
Handover
 
Static Routing
Static RoutingStatic Routing
Static Routing
 
Open shortest path first (ospf)
Open shortest path first (ospf)Open shortest path first (ospf)
Open shortest path first (ospf)
 
IEEE 802.11 Architecture and Services
IEEE 802.11 Architecture and ServicesIEEE 802.11 Architecture and Services
IEEE 802.11 Architecture and Services
 
Lecture 23 27. quality of services in ad hoc wireless networks
Lecture 23 27. quality of services in ad hoc wireless networksLecture 23 27. quality of services in ad hoc wireless networks
Lecture 23 27. quality of services in ad hoc wireless networks
 
MQTT - MQ Telemetry Transport for Message Queueing
MQTT - MQ Telemetry Transport for Message QueueingMQTT - MQ Telemetry Transport for Message Queueing
MQTT - MQ Telemetry Transport for Message Queueing
 
5 g core overview
5 g core overview5 g core overview
5 g core overview
 
5G and Internet of Things (IoT)
5G and Internet of Things (IoT)5G and Internet of Things (IoT)
5G and Internet of Things (IoT)
 
MPLS (Multi-Protocol Label Switching)
MPLS (Multi-Protocol Label Switching)MPLS (Multi-Protocol Label Switching)
MPLS (Multi-Protocol Label Switching)
 
Routing protocols
Routing protocolsRouting protocols
Routing protocols
 
Wireless sensor network and its application
Wireless sensor network and its applicationWireless sensor network and its application
Wireless sensor network and its application
 
ISSUES IN AD HOC WIRELESS NETWORKS
ISSUES IN  AD HOC WIRELESS  NETWORKS ISSUES IN  AD HOC WIRELESS  NETWORKS
ISSUES IN AD HOC WIRELESS NETWORKS
 
Issues in routing protocol
Issues in routing protocolIssues in routing protocol
Issues in routing protocol
 
Virtual Private Networks (VPN) ppt
Virtual Private Networks (VPN) pptVirtual Private Networks (VPN) ppt
Virtual Private Networks (VPN) ppt
 
WSN network architecture -Sensor Network Scenarios & Transceiver Design Consi...
WSN network architecture -Sensor Network Scenarios & Transceiver Design Consi...WSN network architecture -Sensor Network Scenarios & Transceiver Design Consi...
WSN network architecture -Sensor Network Scenarios & Transceiver Design Consi...
 
Ngn presentation
Ngn presentationNgn presentation
Ngn presentation
 
NGN Next Generation Network
NGN Next Generation NetworkNGN Next Generation Network
NGN Next Generation Network
 
Leach
Leach Leach
Leach
 
6lowpan
6lowpan 6lowpan
6lowpan
 
Network address translation
Network address translationNetwork address translation
Network address translation
 

Destacado

IPv6 in Mobile Networks
IPv6 in Mobile NetworksIPv6 in Mobile Networks
IPv6 in Mobile NetworksAPNIC
 
Choosing A Proxy Server - Apachecon 2014
Choosing A Proxy Server - Apachecon 2014Choosing A Proxy Server - Apachecon 2014
Choosing A Proxy Server - Apachecon 2014bryan_call
 
Introduction to Mobile IPv6
Introduction to Mobile IPv6Introduction to Mobile IPv6
Introduction to Mobile IPv6guestbeb9a5
 
Measuring Web Performance
Measuring Web Performance Measuring Web Performance
Measuring Web Performance Dave Olsen
 
AWC January 2011 Newsletter
AWC January 2011 NewsletterAWC January 2011 Newsletter
AWC January 2011 Newsletterpurdueawc
 
Jenkins+vimenv で最新のVimを使おう! @ vimconf2014
Jenkins+vimenv で最新のVimを使おう! @ vimconf2014Jenkins+vimenv で最新のVimを使おう! @ vimconf2014
Jenkins+vimenv で最新のVimを使おう! @ vimconf2014Umezaki Hiroki
 
Holosonic audio spot light seminar ppt
Holosonic audio  spot light seminar pptHolosonic audio  spot light seminar ppt
Holosonic audio spot light seminar pptAyush Gautam
 
VimConf 2014 from deris0126
VimConf 2014 from deris0126VimConf 2014 from deris0126
VimConf 2014 from deris0126deris0126
 
Auto closing parenthesis @vim conf2014
Auto closing parenthesis @vim conf2014Auto closing parenthesis @vim conf2014
Auto closing parenthesis @vim conf2014cohama
 
eWaste Recycling & Management - Infotrek & Regalis.in
eWaste Recycling & Management - Infotrek & Regalis.ineWaste Recycling & Management - Infotrek & Regalis.in
eWaste Recycling & Management - Infotrek & Regalis.inHashPro Technologies
 
Wireless network ppt
Wireless network pptWireless network ppt
Wireless network pptBasil John
 
Screenless display technology
Screenless display technologyScreenless display technology
Screenless display technologyzeelarora
 
lamp technology
lamp technologylamp technology
lamp technologyDeepa
 

Destacado (20)

Mobile I Pv6
Mobile I Pv6Mobile I Pv6
Mobile I Pv6
 
IPv6 in Mobile Networks
IPv6 in Mobile NetworksIPv6 in Mobile Networks
IPv6 in Mobile Networks
 
Choosing A Proxy Server - Apachecon 2014
Choosing A Proxy Server - Apachecon 2014Choosing A Proxy Server - Apachecon 2014
Choosing A Proxy Server - Apachecon 2014
 
Introduction to Mobile IPv6
Introduction to Mobile IPv6Introduction to Mobile IPv6
Introduction to Mobile IPv6
 
Measuring Web Performance
Measuring Web Performance Measuring Web Performance
Measuring Web Performance
 
Afaq ahmed p71060
Afaq ahmed p71060Afaq ahmed p71060
Afaq ahmed p71060
 
Afaq ahmed p71060
Afaq ahmed p71060Afaq ahmed p71060
Afaq ahmed p71060
 
AWC January 2011 Newsletter
AWC January 2011 NewsletterAWC January 2011 Newsletter
AWC January 2011 Newsletter
 
Extraordinarios historia
Extraordinarios historiaExtraordinarios historia
Extraordinarios historia
 
Extraordinarios ics
Extraordinarios icsExtraordinarios ics
Extraordinarios ics
 
Mobile ip group_3
Mobile ip group_3Mobile ip group_3
Mobile ip group_3
 
Jenkins+vimenv で最新のVimを使おう! @ vimconf2014
Jenkins+vimenv で最新のVimを使おう! @ vimconf2014Jenkins+vimenv で最新のVimを使おう! @ vimconf2014
Jenkins+vimenv で最新のVimを使おう! @ vimconf2014
 
Hakin9 05 2013
Hakin9 05 2013Hakin9 05 2013
Hakin9 05 2013
 
Holosonic audio spot light seminar ppt
Holosonic audio  spot light seminar pptHolosonic audio  spot light seminar ppt
Holosonic audio spot light seminar ppt
 
VimConf 2014 from deris0126
VimConf 2014 from deris0126VimConf 2014 from deris0126
VimConf 2014 from deris0126
 
Auto closing parenthesis @vim conf2014
Auto closing parenthesis @vim conf2014Auto closing parenthesis @vim conf2014
Auto closing parenthesis @vim conf2014
 
eWaste Recycling & Management - Infotrek & Regalis.in
eWaste Recycling & Management - Infotrek & Regalis.ineWaste Recycling & Management - Infotrek & Regalis.in
eWaste Recycling & Management - Infotrek & Regalis.in
 
Wireless network ppt
Wireless network pptWireless network ppt
Wireless network ppt
 
Screenless display technology
Screenless display technologyScreenless display technology
Screenless display technology
 
lamp technology
lamp technologylamp technology
lamp technology
 

Similar a Proxy Mobile IPv6 (PMIPv6)

level 3 semester 2 presentation
level 3 semester 2 presentationlevel 3 semester 2 presentation
level 3 semester 2 presentationMehnaz Binte Zia
 
IMPROVED HANDOVER ALGORITHM TO AVOID DUPLICATION AAA AUTHENTICATION IN PROXY ...
IMPROVED HANDOVER ALGORITHM TO AVOID DUPLICATION AAA AUTHENTICATION IN PROXY ...IMPROVED HANDOVER ALGORITHM TO AVOID DUPLICATION AAA AUTHENTICATION IN PROXY ...
IMPROVED HANDOVER ALGORITHM TO AVOID DUPLICATION AAA AUTHENTICATION IN PROXY ...IJCNCJournal
 
Route Optimization in MIPv6 Experimental Test bed for Network Mobility: Trade...
Route Optimization in MIPv6 Experimental Test bed for Network Mobility: Trade...Route Optimization in MIPv6 Experimental Test bed for Network Mobility: Trade...
Route Optimization in MIPv6 Experimental Test bed for Network Mobility: Trade...IJCSIS Research Publications
 
BULK BINDING UPDATE PROCEDURE FOR PMIPV6 BASED INTELLIGENT TRANSPORTATION SYS...
BULK BINDING UPDATE PROCEDURE FOR PMIPV6 BASED INTELLIGENT TRANSPORTATION SYS...BULK BINDING UPDATE PROCEDURE FOR PMIPV6 BASED INTELLIGENT TRANSPORTATION SYS...
BULK BINDING UPDATE PROCEDURE FOR PMIPV6 BASED INTELLIGENT TRANSPORTATION SYS...cscpconf
 
A Tunnel Compress Scheme for Multi-Tunneling in PMIPv6-based Nested NEMO
A Tunnel Compress Scheme for Multi-Tunneling in PMIPv6-based Nested NEMO A Tunnel Compress Scheme for Multi-Tunneling in PMIPv6-based Nested NEMO
A Tunnel Compress Scheme for Multi-Tunneling in PMIPv6-based Nested NEMO ijwmn
 
A Tunnel Compress Scheme for Multi-Tunneling in PMIPv6-based Nested NEMO
A Tunnel Compress Scheme for Multi-Tunneling in PMIPv6-based Nested NEMOA Tunnel Compress Scheme for Multi-Tunneling in PMIPv6-based Nested NEMO
A Tunnel Compress Scheme for Multi-Tunneling in PMIPv6-based Nested NEMOijwmn
 
Welcome to International Journal of Engineering Research and Development (IJERD)
Welcome to International Journal of Engineering Research and Development (IJERD)Welcome to International Journal of Engineering Research and Development (IJERD)
Welcome to International Journal of Engineering Research and Development (IJERD)IJERD Editor
 
A review study of handover performance in mobile ip
A review study of handover performance in mobile ipA review study of handover performance in mobile ip
A review study of handover performance in mobile ipIJCNCJournal
 
PLNOG 4: Emil Gągała - Deploying Next-Generation Multicast VPN
PLNOG 4: Emil Gągała - Deploying Next-Generation Multicast VPNPLNOG 4: Emil Gągała - Deploying Next-Generation Multicast VPN
PLNOG 4: Emil Gągała - Deploying Next-Generation Multicast VPNPROIDEA
 
IMPROVED HANDOVER ALGORITHM FOR PROXY MIPv6 BASED ON AAA SERVER
IMPROVED HANDOVER ALGORITHM FOR PROXY MIPv6 BASED ON AAA SERVERIMPROVED HANDOVER ALGORITHM FOR PROXY MIPv6 BASED ON AAA SERVER
IMPROVED HANDOVER ALGORITHM FOR PROXY MIPv6 BASED ON AAA SERVERcscpconf
 
Flexible NFV WAN interconnections with Neutron BGP VPN
 Flexible NFV WAN interconnections with Neutron BGP VPN Flexible NFV WAN interconnections with Neutron BGP VPN
Flexible NFV WAN interconnections with Neutron BGP VPNThomas Morin
 
Developing route optimization based pmi pv6 testbed for reliable packet trans...
Developing route optimization based pmi pv6 testbed for reliable packet trans...Developing route optimization based pmi pv6 testbed for reliable packet trans...
Developing route optimization based pmi pv6 testbed for reliable packet trans...redpel dot com
 
Internet service provider mobile
Internet service provider mobileInternet service provider mobile
Internet service provider mobileIJCNCJournal
 
5G: Why Wait? - 5G Observatory 2016
5G: Why Wait? - 5G Observatory 20165G: Why Wait? - 5G Observatory 2016
5G: Why Wait? - 5G Observatory 2016Daniel Sproats
 
5G: Why Wait? - 5G Observatory 2016
5G: Why Wait? - 5G Observatory 2016 5G: Why Wait? - 5G Observatory 2016
5G: Why Wait? - 5G Observatory 2016 ADVA
 
Introducció a les xarxes 5G
Introducció a les xarxes 5GIntroducció a les xarxes 5G
Introducció a les xarxes 5GTICAnoia
 
Akraino API TSC Ike Alisson 5G Mobility Edge MEC synergy present 2020 11 06 R...
Akraino API TSC Ike Alisson 5G Mobility Edge MEC synergy present 2020 11 06 R...Akraino API TSC Ike Alisson 5G Mobility Edge MEC synergy present 2020 11 06 R...
Akraino API TSC Ike Alisson 5G Mobility Edge MEC synergy present 2020 11 06 R...Ike Alisson
 
Fast Handovers in heterogeneous Wireless Networks
Fast Handovers in heterogeneous Wireless NetworksFast Handovers in heterogeneous Wireless Networks
Fast Handovers in heterogeneous Wireless NetworksSneha Vurrakula
 
Module 05 mobility management (1)
Module 05   mobility management (1)Module 05   mobility management (1)
Module 05 mobility management (1)JIGNESH PATEL
 

Similar a Proxy Mobile IPv6 (PMIPv6) (20)

level 3 semester 2 presentation
level 3 semester 2 presentationlevel 3 semester 2 presentation
level 3 semester 2 presentation
 
IMPROVED HANDOVER ALGORITHM TO AVOID DUPLICATION AAA AUTHENTICATION IN PROXY ...
IMPROVED HANDOVER ALGORITHM TO AVOID DUPLICATION AAA AUTHENTICATION IN PROXY ...IMPROVED HANDOVER ALGORITHM TO AVOID DUPLICATION AAA AUTHENTICATION IN PROXY ...
IMPROVED HANDOVER ALGORITHM TO AVOID DUPLICATION AAA AUTHENTICATION IN PROXY ...
 
Route Optimization in MIPv6 Experimental Test bed for Network Mobility: Trade...
Route Optimization in MIPv6 Experimental Test bed for Network Mobility: Trade...Route Optimization in MIPv6 Experimental Test bed for Network Mobility: Trade...
Route Optimization in MIPv6 Experimental Test bed for Network Mobility: Trade...
 
BULK BINDING UPDATE PROCEDURE FOR PMIPV6 BASED INTELLIGENT TRANSPORTATION SYS...
BULK BINDING UPDATE PROCEDURE FOR PMIPV6 BASED INTELLIGENT TRANSPORTATION SYS...BULK BINDING UPDATE PROCEDURE FOR PMIPV6 BASED INTELLIGENT TRANSPORTATION SYS...
BULK BINDING UPDATE PROCEDURE FOR PMIPV6 BASED INTELLIGENT TRANSPORTATION SYS...
 
A Tunnel Compress Scheme for Multi-Tunneling in PMIPv6-based Nested NEMO
A Tunnel Compress Scheme for Multi-Tunneling in PMIPv6-based Nested NEMO A Tunnel Compress Scheme for Multi-Tunneling in PMIPv6-based Nested NEMO
A Tunnel Compress Scheme for Multi-Tunneling in PMIPv6-based Nested NEMO
 
A Tunnel Compress Scheme for Multi-Tunneling in PMIPv6-based Nested NEMO
A Tunnel Compress Scheme for Multi-Tunneling in PMIPv6-based Nested NEMOA Tunnel Compress Scheme for Multi-Tunneling in PMIPv6-based Nested NEMO
A Tunnel Compress Scheme for Multi-Tunneling in PMIPv6-based Nested NEMO
 
Welcome to International Journal of Engineering Research and Development (IJERD)
Welcome to International Journal of Engineering Research and Development (IJERD)Welcome to International Journal of Engineering Research and Development (IJERD)
Welcome to International Journal of Engineering Research and Development (IJERD)
 
A review study of handover performance in mobile ip
A review study of handover performance in mobile ipA review study of handover performance in mobile ip
A review study of handover performance in mobile ip
 
PLNOG 4: Emil Gągała - Deploying Next-Generation Multicast VPN
PLNOG 4: Emil Gągała - Deploying Next-Generation Multicast VPNPLNOG 4: Emil Gągała - Deploying Next-Generation Multicast VPN
PLNOG 4: Emil Gągała - Deploying Next-Generation Multicast VPN
 
IMPROVED HANDOVER ALGORITHM FOR PROXY MIPv6 BASED ON AAA SERVER
IMPROVED HANDOVER ALGORITHM FOR PROXY MIPv6 BASED ON AAA SERVERIMPROVED HANDOVER ALGORITHM FOR PROXY MIPv6 BASED ON AAA SERVER
IMPROVED HANDOVER ALGORITHM FOR PROXY MIPv6 BASED ON AAA SERVER
 
Flexible NFV WAN interconnections with Neutron BGP VPN
 Flexible NFV WAN interconnections with Neutron BGP VPN Flexible NFV WAN interconnections with Neutron BGP VPN
Flexible NFV WAN interconnections with Neutron BGP VPN
 
Developing route optimization based pmi pv6 testbed for reliable packet trans...
Developing route optimization based pmi pv6 testbed for reliable packet trans...Developing route optimization based pmi pv6 testbed for reliable packet trans...
Developing route optimization based pmi pv6 testbed for reliable packet trans...
 
Internet service provider mobile
Internet service provider mobileInternet service provider mobile
Internet service provider mobile
 
BOMA Teaser
BOMA TeaserBOMA Teaser
BOMA Teaser
 
5G: Why Wait? - 5G Observatory 2016
5G: Why Wait? - 5G Observatory 20165G: Why Wait? - 5G Observatory 2016
5G: Why Wait? - 5G Observatory 2016
 
5G: Why Wait? - 5G Observatory 2016
5G: Why Wait? - 5G Observatory 2016 5G: Why Wait? - 5G Observatory 2016
5G: Why Wait? - 5G Observatory 2016
 
Introducció a les xarxes 5G
Introducció a les xarxes 5GIntroducció a les xarxes 5G
Introducció a les xarxes 5G
 
Akraino API TSC Ike Alisson 5G Mobility Edge MEC synergy present 2020 11 06 R...
Akraino API TSC Ike Alisson 5G Mobility Edge MEC synergy present 2020 11 06 R...Akraino API TSC Ike Alisson 5G Mobility Edge MEC synergy present 2020 11 06 R...
Akraino API TSC Ike Alisson 5G Mobility Edge MEC synergy present 2020 11 06 R...
 
Fast Handovers in heterogeneous Wireless Networks
Fast Handovers in heterogeneous Wireless NetworksFast Handovers in heterogeneous Wireless Networks
Fast Handovers in heterogeneous Wireless Networks
 
Module 05 mobility management (1)
Module 05   mobility management (1)Module 05   mobility management (1)
Module 05 mobility management (1)
 

Más de Peter R. Egli

LPWAN Technologies for Internet of Things (IoT) and M2M Scenarios
LPWAN Technologies for Internet of Things (IoT) and M2M ScenariosLPWAN Technologies for Internet of Things (IoT) and M2M Scenarios
LPWAN Technologies for Internet of Things (IoT) and M2M ScenariosPeter R. Egli
 
Data Networking Concepts
Data Networking ConceptsData Networking Concepts
Data Networking ConceptsPeter R. Egli
 
Communication middleware
Communication middlewareCommunication middleware
Communication middlewarePeter R. Egli
 
Transaction Processing Monitors (TPM)
Transaction Processing Monitors (TPM)Transaction Processing Monitors (TPM)
Transaction Processing Monitors (TPM)Peter R. Egli
 
Business Process Model and Notation (BPMN)
Business Process Model and Notation (BPMN)Business Process Model and Notation (BPMN)
Business Process Model and Notation (BPMN)Peter R. Egli
 
Microsoft .NET Platform
Microsoft .NET PlatformMicrosoft .NET Platform
Microsoft .NET PlatformPeter R. Egli
 
Overview of Cloud Computing
Overview of Cloud ComputingOverview of Cloud Computing
Overview of Cloud ComputingPeter R. Egli
 
Enterprise Application Integration Technologies
Enterprise Application Integration TechnologiesEnterprise Application Integration Technologies
Enterprise Application Integration TechnologiesPeter R. Egli
 
Overview of Microsoft .Net Remoting technology
Overview of Microsoft .Net Remoting technologyOverview of Microsoft .Net Remoting technology
Overview of Microsoft .Net Remoting technologyPeter R. Egli
 
Android Native Development Kit
Android Native Development KitAndroid Native Development Kit
Android Native Development KitPeter R. Egli
 
Overview of SCTP (Stream Control Transmission Protocol)
Overview of SCTP (Stream Control Transmission Protocol)Overview of SCTP (Stream Control Transmission Protocol)
Overview of SCTP (Stream Control Transmission Protocol)Peter R. Egli
 
Overview of SCTP (Stream Control Transmission Protocol)
Overview of SCTP (Stream Control Transmission Protocol)Overview of SCTP (Stream Control Transmission Protocol)
Overview of SCTP (Stream Control Transmission Protocol)Peter R. Egli
 
Overview of Spanning Tree Protocol (STP & RSTP)
Overview of Spanning Tree Protocol (STP & RSTP)Overview of Spanning Tree Protocol (STP & RSTP)
Overview of Spanning Tree Protocol (STP & RSTP)Peter R. Egli
 
MSMQ - Microsoft Message Queueing
MSMQ - Microsoft Message QueueingMSMQ - Microsoft Message Queueing
MSMQ - Microsoft Message QueueingPeter R. Egli
 
Common Object Request Broker Architecture - CORBA
Common Object Request Broker Architecture - CORBACommon Object Request Broker Architecture - CORBA
Common Object Request Broker Architecture - CORBAPeter R. Egli
 
Component Object Model (COM, DCOM, COM+)
Component Object Model (COM, DCOM, COM+)Component Object Model (COM, DCOM, COM+)
Component Object Model (COM, DCOM, COM+)Peter R. Egli
 
JMS - Java Messaging Service
JMS - Java Messaging ServiceJMS - Java Messaging Service
JMS - Java Messaging ServicePeter R. Egli
 
Web Services (SOAP, WSDL, UDDI)
Web Services (SOAP, WSDL, UDDI)Web Services (SOAP, WSDL, UDDI)
Web Services (SOAP, WSDL, UDDI)Peter R. Egli
 
REST - Representational State Transfer
REST - Representational State TransferREST - Representational State Transfer
REST - Representational State TransferPeter R. Egli
 

Más de Peter R. Egli (20)

LPWAN Technologies for Internet of Things (IoT) and M2M Scenarios
LPWAN Technologies for Internet of Things (IoT) and M2M ScenariosLPWAN Technologies for Internet of Things (IoT) and M2M Scenarios
LPWAN Technologies for Internet of Things (IoT) and M2M Scenarios
 
Data Networking Concepts
Data Networking ConceptsData Networking Concepts
Data Networking Concepts
 
Communication middleware
Communication middlewareCommunication middleware
Communication middleware
 
Transaction Processing Monitors (TPM)
Transaction Processing Monitors (TPM)Transaction Processing Monitors (TPM)
Transaction Processing Monitors (TPM)
 
Business Process Model and Notation (BPMN)
Business Process Model and Notation (BPMN)Business Process Model and Notation (BPMN)
Business Process Model and Notation (BPMN)
 
Microsoft .NET Platform
Microsoft .NET PlatformMicrosoft .NET Platform
Microsoft .NET Platform
 
Overview of Cloud Computing
Overview of Cloud ComputingOverview of Cloud Computing
Overview of Cloud Computing
 
Enterprise Application Integration Technologies
Enterprise Application Integration TechnologiesEnterprise Application Integration Technologies
Enterprise Application Integration Technologies
 
Overview of Microsoft .Net Remoting technology
Overview of Microsoft .Net Remoting technologyOverview of Microsoft .Net Remoting technology
Overview of Microsoft .Net Remoting technology
 
Android Native Development Kit
Android Native Development KitAndroid Native Development Kit
Android Native Development Kit
 
Overview of SCTP (Stream Control Transmission Protocol)
Overview of SCTP (Stream Control Transmission Protocol)Overview of SCTP (Stream Control Transmission Protocol)
Overview of SCTP (Stream Control Transmission Protocol)
 
Overview of SCTP (Stream Control Transmission Protocol)
Overview of SCTP (Stream Control Transmission Protocol)Overview of SCTP (Stream Control Transmission Protocol)
Overview of SCTP (Stream Control Transmission Protocol)
 
Web services
Web servicesWeb services
Web services
 
Overview of Spanning Tree Protocol (STP & RSTP)
Overview of Spanning Tree Protocol (STP & RSTP)Overview of Spanning Tree Protocol (STP & RSTP)
Overview of Spanning Tree Protocol (STP & RSTP)
 
MSMQ - Microsoft Message Queueing
MSMQ - Microsoft Message QueueingMSMQ - Microsoft Message Queueing
MSMQ - Microsoft Message Queueing
 
Common Object Request Broker Architecture - CORBA
Common Object Request Broker Architecture - CORBACommon Object Request Broker Architecture - CORBA
Common Object Request Broker Architecture - CORBA
 
Component Object Model (COM, DCOM, COM+)
Component Object Model (COM, DCOM, COM+)Component Object Model (COM, DCOM, COM+)
Component Object Model (COM, DCOM, COM+)
 
JMS - Java Messaging Service
JMS - Java Messaging ServiceJMS - Java Messaging Service
JMS - Java Messaging Service
 
Web Services (SOAP, WSDL, UDDI)
Web Services (SOAP, WSDL, UDDI)Web Services (SOAP, WSDL, UDDI)
Web Services (SOAP, WSDL, UDDI)
 
REST - Representational State Transfer
REST - Representational State TransferREST - Representational State Transfer
REST - Representational State Transfer
 

Último

Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...Alkin Tezuysal
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxLoriGlavin3
 
A Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersA Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersNicole Novielli
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity PlanDatabarracks
 
Emixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native developmentEmixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native developmentPim van der Noll
 
Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...Farhan Tariq
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxLoriGlavin3
 
Sample pptx for embedding into website for demo
Sample pptx for embedding into website for demoSample pptx for embedding into website for demo
Sample pptx for embedding into website for demoHarshalMandlekar2
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.Curtis Poe
 
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Mark Goldstein
 
Generative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfGenerative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfIngrid Airi González
 
Scale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL RouterScale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL RouterMydbops
 
Potential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsPotential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsRavi Sanghani
 
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...AliaaTarek5
 
Testing tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesTesting tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesKari Kakkonen
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsPixlogix Infotech
 
So einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdfSo einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdfpanagenda
 
Data governance with Unity Catalog Presentation
Data governance with Unity Catalog PresentationData governance with Unity Catalog Presentation
Data governance with Unity Catalog PresentationKnoldus Inc.
 
Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...Rick Flair
 
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesHow to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesThousandEyes
 

Último (20)

Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
 
A Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersA Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software Developers
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity Plan
 
Emixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native developmentEmixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native development
 
Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
 
Sample pptx for embedding into website for demo
Sample pptx for embedding into website for demoSample pptx for embedding into website for demo
Sample pptx for embedding into website for demo
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.
 
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
 
Generative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfGenerative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdf
 
Scale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL RouterScale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL Router
 
Potential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsPotential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and Insights
 
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
 
Testing tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesTesting tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examples
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and Cons
 
So einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdfSo einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdf
 
Data governance with Unity Catalog Presentation
Data governance with Unity Catalog PresentationData governance with Unity Catalog Presentation
Data governance with Unity Catalog Presentation
 
Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...
 
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesHow to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
 

Proxy Mobile IPv6 (PMIPv6)

  • 1. © Peter R. Egli 2015 1/25 Rev. 1.50 PMIPv6 – Proxy Mobile IPv6 indigoo.com Peter R. Egli INDIGOO.COM OVERVIEW OF PMIPV6, A PROXY-BASED MOBILITY PROTOCOL FOR IPV6 HOSTS PMIPv6 PROXY MOBILE IPV6
  • 2. © Peter R. Egli 2015 2/25 Rev. 1.50 PMIPv6 – Proxy Mobile IPv6 indigoo.com Contents 1. Why PMIPv6 when we have MIP? 2. PMIPv6 terminology 3. Where can PMIPv6 be deployed? 4. General PMIPv6 setup 5. PMIPv6 versus MIP (Mobile IP) 6. MN domain join sequence 7. MN handoff sequence 8. PMIPv6 packet routing 9. Use of link-local addresses 10. Proxy Based Fast Handover
  • 3. © Peter R. Egli 2015 3/25 Rev. 1.50 PMIPv6 – Proxy Mobile IPv6 indigoo.com 1. Why PMIPv6 when we have MIP? MIP (Mobile IP, originally RFC2002) is an early approach to get mobility in the Internet. Problems with MIP: 1. Clients must implement MIP in the kernel (MIP mobility is host-based).  difficult to implement kernel changes  difficult to deploy (clients need software upgrade to get MIP support) 2. Handoff procedure is not efficient  large delay. 3. Security concerns (MIP support in the kernel provides an additional attack vector). PMIPv6 solution: • PMIPv6 (RFC5213) is completely transparent to mobile nodes (use of a „proxy“ to do the handoff work). • PMIPv6 is meant to be used in localized networks with limited topology where handoff signalling delays are minimal.
  • 4. © Peter R. Egli 2015 4/25 Rev. 1.50 PMIPv6 – Proxy Mobile IPv6 indigoo.com 2. PMIPv6 terminology (1/3) Local Mobility Domain (LMD): Network that is PMIP-enabled. The LMD contains 1 LMA and multiple MAGs. Local Mobility Anchor (LMA): All traffic from and to the mobile node is routed through the LMA. The LMA maintains a set of routes for each MN connected to the LMD. Mobile Access Gateway (MAG): The MAG performs the mobility related signalling on behalf of the MNs attached to its access links. The MAG is usually the access router (first hop router) for the MN. Mobile Node (MN): Any device that connects through a wireless network (WLAN, WiMAX, MBWA, G3/G4) to the LMD. Corresponding Node (CN): Any node in the Internet or also in the LMD that communicates with an MN. NetLMM: Network based Localized Mobility Management (IETF working group for network-based mobility support).
  • 5. © Peter R. Egli 2015 5/25 Rev. 1.50 PMIPv6 – Proxy Mobile IPv6 indigoo.com 2. PMIPv6 terminology (2/3) Binding Cache: Cache maintained by the LMA that contains BCEs. Binding Cache Entry (BCE): Entry in the LMA‘s binding cache. An entry has the fields MN-ID, MAG proxy-CoA and MN- prefix. Binding Update List: Cache maintained by the MAG that contains information about the attached MNs. Proxy Binding Update (PBU): PMIP signalling packet sent by the MAG to the LMA to indicate a new MN. The PBU has the fields MN-ID (e.g. MN MAC), MAG address (proxy-CoA) and handoff indicator to signal if the MN-attachment is a new one or a handoff from another MAG. Proxy Binding Acknowledge (PBA): Response to a PBU sent by the LMA to the MAG. The PBA contains the MN-ID, the MAG address and the prefix assigned to the MN.
  • 6. © Peter R. Egli 2015 6/25 Rev. 1.50 PMIPv6 – Proxy Mobile IPv6 indigoo.com 2. PMIPv6 terminology (3/3) Proxy care of address (proxy-CoA): IP address of public interface of MAG. The proxy-CoA is the tunnel endpoint address on the MAG. The LMA encapsulates packets destined to the MN into a tunnel packet with destination address = proxy-CoA. Mobile Node Identifier (MN-ID): Unique identifier of mobile node, e.g. one of its MAC addresses. Home Network Prefix: Prefix assigned to the MN by the LMA.
  • 7. © Peter R. Egli 2015 7/25 Rev. 1.50 PMIPv6 – Proxy Mobile IPv6 indigoo.com 3. Where can PMIPv6 be deployed? PMIPv6 is primarily targeted at the following networks: 1. WLAN-based campus-style networks: PMIPv6 provides transparent handoff for mobile nodes in campus networks. 2. Advanced 3G/4G networks Replace GTP (GPRS tunneling protocol) by PMIP, thus reduce the costs and management in the network. BSS1 WLAN AP BSS2 WLAN AP MAG InternetCampus LAN MAG LMA Handoff MN1 MN1 MN2
  • 8. © Peter R. Egli 2015 8/25 Rev. 1.50 PMIPv6 – Proxy Mobile IPv6 indigoo.com 4. General PMIPv6 setup BSS1 WLAN AP BSS2 WLAN AP MAG1 Campus LAN MAG2 LMA: Topological anchor point for addresses assigned to MNs in the LMD. MN1 MN2 MN3 ID Prefix MAG (proxy-CoA) MN-ID-1 Pref1::/64 MAG1 MN-ID-2 Pref2::/64 MAG2 MN-ID-3 Pref3::/64 MAG2 LMD Tunnel LMA-MAG for user traffic between LMA and MAG. Internet Proxy Binding Cache MAG: Runs MIP on behalf of MN (=proxy).
  • 9. © Peter R. Egli 2015 9/25 Rev. 1.50 PMIPv6 – Proxy Mobile IPv6 indigoo.com 5. PMIPv6 versus MIP (Mobile IP) In PMIPv6 the MAG assumes the role of the MIP client in MIP. The LMA in PMIPv6 is similar to the home agent (HA) in MIP. BSS1 MAG1 Campus LAN MN1 LMA BSS2 MN1 MAG2 LMD BSS1 HA BSS2 FA MN1 Internet Internet CN MN1 Handoff CN IP in IP tunntel Handoff PMIPv6 MIP Packet path after handoff. Packet path before handoff. Tunnel HA Home Agent FA Foreign Agent
  • 10. © Peter R. Egli 2015 10/25 Rev. 1.50 PMIPv6 – Proxy Mobile IPv6 indigoo.com 6. MN domain join sequence (1/2) The following sequence diagram shows the procedure when a MN joins a PMIPv6 domain: MN1 MAG1 LMA Attaching: MN1 attaches to MAG1 (establish link layer) Router solicitation: MN1 solicits an IPv6 prefix Identification: MN identification, MN authorization, MN ID acquisition Proxy Binding Update: PBU with MN-ID-1, MAG1 ID Prefix MAG (proxy CoA) - - - ID Prefix MAG (proxy CoA) MN-ID-1 Pref1::/64 MAG1 Proxy Binding Ack: LMA sends BPA with MN-ID-1, MAG1, Pref1::/64 Tunnel setup: LMA sets up a bidirectional tunnel Router advertisement: MAG1 sends the IPv6 prefix Pref1::/64 to MN1 Update BC: LMA adds an entry to the binding cache. BC BC 1 2 3 4 5 6 7 8 Router advertisement is delayed until PMIP signalling is completed.
  • 11. © Peter R. Egli 2015 11/25 Rev. 1.50 PMIPv6 – Proxy Mobile IPv6 indigoo.com 6. MN domain join sequence (2/2) 1. Attaching: MN1 attaches to the MAG through a point-to-point link and establishes the link layer. Any access technology is possible provided that it emulates a point-to-point behavior (e.g. PPP, PPPoE). 2. Identification: MAG1 authenticates MN1 based on its link layer address (e.g. MAC address) and ascertains what MN1 is permitted to do (authorization). The authorization step may use existing services like LDAP or RADIUS. 3. Router solicitation: MN1 sends a router solicitation to obtain an IPv6 prefix. MAG1 will not send a router advertisement until it obtained a prefix for MN1 from the LMA (step 6, PBA). 4. Proxy binding update (PBU): MAG1 sends a proxy binding update to the LMA. This PBU associates the MAG1 address with the identity of the MN. 5. Allocate prefix, update BC: The LMA allocates a prefix for MN1 (Home Network Prefix). The LMA creates an entry in its BC. The entry contains the MN1 ID (MN-ID-1), the address MAG1 of the proxy MAG (proxy-CoA) as well as the prefix assigned to MN1. 6. Proxy binding ack (PBA): The LMA sends a PBA back to MAG1. The PBA contains the information of the BPC entry created in step 5. 7. Tunnel setup: The LMA and MAG1 establish a bidirectional IPv6-in-IPv6 tunnel that is used for tunneling packets to and from MN1. The LMA sets a route through the tunnel for traffic that is addressed to the MN. 8. Router advertisement: MAG1 sends a router advertisement with the assigned prefix to MN1. MN1 will assign the prefix through stateless autoconfiguration. Stateful autoconfiguration would be possible as well (outside of scope of PMIPv6). MN1 creates a routing table entry for the prefix.
  • 12. © Peter R. Egli 2015 12/25 Rev. 1.50 PMIPv6 – Proxy Mobile IPv6 indigoo.com 7. MN handoff sequence (1/4) Handoff from MAG1 (PMAG – Previous MAG) to MAG2 (NMAG – New MAG): MN1 MAG1 LMA Detaching: MN1 detaches from MAG1 Start timer: LMA starts timer to delete the MN-ID-1 entry from its binding cache (BD). BC 1 3 MAG2 Deregistration: PBU with MN-ID-1, MAG1 2 Proxy Binding Ack: LMA sends BPA with MN-ID-1, MAG1, Pref1::/64 4Attaching: MN1 attaches to MAG2 (establish link layer) 5 Router solicitation: MN1 solicits an IPv6 prefix 6 Proxy Binding Update: PBU with MN-ID-1, MAG2 7 9 Proxy Binding Ack: LMA sends BPA with MN-ID-1, MAG2, Pref1::/64 Tunnel setup: LMA sets up a bidirectional tunnel 10 11 Router advertisement: MAG2 sends the IPv6 prefix Pref1::/64 to MN1 ID Prefix MAG (proxy CoA) MN-ID-1 Pref1::/64 MAG2 Update BC: LMA updates the entry in the binding cache. BC 8 ID Prefix MAG (proxy-CoA) MN-ID-1 Pref1::/64 MAG1
  • 13. © Peter R. Egli 2015 13/25 Rev. 1.50 PMIPv6 – Proxy Mobile IPv6 indigoo.com 7. MN handoff sequence (2/4) 1. Detaching: MN1 detaches from MAG1 (PMAG – Previous MAG). MAG1 detects this event through some mechanism outside of the scope of PMIPv6, e.g. through link layer events (link down) or through an IPv6 Neighbor Unreachability Detection event. 2. Deregistration: MAG1 sends a PBU with a deregistration request for MN1 (MN-ID-1). 3. Start timer: LMA starts a timer for the MN1 proxy binding cache entry. During the timer period the LMA drops any packets received for MN1. If the LMA does not receive a PBU from the new MAG within the timer period, it can drop the entry for MN1 from its binding cache. Thus the timer allows the LMA deleting binding cache entries in case the MN1 leaves the LMD for good. 4. Proxy binding ack (PBA): The LMA sends a PBA back to MAG1. The PBA contains the information of the BPC entry created in the join phase. 5. Attaching to MAG2 (NMAG – New MAG): MN1 now attaches to MAG2 the same way as it did to MAG1 in the LMD join phase. MN1 and MAG2 will establish the link layer (PPP, PPPoE). 6. Router solicitation: MN1 sends a router solicitation to obtain an IPv6 prefix. MAG2 will not send a router advertisement until it obtained a prefix for MN1 from the LMA. 7. Proxy binding update (PBU): MAG2 sends a proxy binding update to the LMA. This PBU associates the MAG2 address with the identity of the MN. 8. Update of the binding cache entry (BCE): The LMA detects that MN1 already has an entry in the binding cache and therefore updates the entry for MN1. MN1 is now associated with MAG2. The prefix for MN1 remains the same (address transparency for MN1).
  • 14. © Peter R. Egli 2015 14/25 Rev. 1.50 PMIPv6 – Proxy Mobile IPv6 indigoo.com 7. MN handoff sequence (3/4) 9. Proxy binding ack (PBA): The LMA sends a PBA back to MAG2. The PBA contains the information of the BPC entry updated in step 8. 10. Tunnel setup: The LMA and MAG2 establish a bidirectional IPv6-in-IPv6 tunnel that is used for tunneling packets to and from MN1. The LMA sets a route through the tunnel for traffic that is addressed to the MN. 11. Router advertisement: MAG2 sends a router advertisement with the same prefix assigned to MN1. MN1 will not ‘see’ an address change and therefore all open transport connections (TCP, UDP) remain open.
  • 15. © Peter R. Egli 2015 15/25 Rev. 1.50 PMIPv6 – Proxy Mobile IPv6 indigoo.com 7. MN handoff sequence (4/4) From the perspective of the MN the LMD appears as a single link. The handoff is fully transparent to the MN. BSS1 MAG1 Campus LAN MN1 LMA BSS2 MN1 MAG2 LMD Handoff Internet CN LMD MN1 Internet CN From MN1‘s perspective the LMD appears as a single link.
  • 16. © Peter R. Egli 2015 16/25 Rev. 1.50 PMIPv6 – Proxy Mobile IPv6 indigoo.com 8. Routing / packet forwarding from and to MN through LMD The LMA is the anchor point for packets to and from the MN. BSS1 MAG1 Campus LAN MN1 LMA BSS2 MN2 MAG2 LMD Internet CN A. Routing MNMAGLMACN: All traffic is routed through the LMA (=anchor point for routing). B. MNMAGMN: If 2 MNs are attached to the same MAG, the traffic may be routed directly through the MAG without the detour through the LMA (short-circuit routing).
  • 17. © Peter R. Egli 2015 17/25 Rev. 1.50 PMIPv6 – Proxy Mobile IPv6 indigoo.com 9. Use of link-local and link addresses by MAGs Problem: Emulation of a virtual link requires that router advertisements sent by MAGs to a particular MN have a. the same prefix assigned to the MN, a. the same source IPv6 link-local address (IPv6 source address of ICMPv6 packet) and b. the same source link layer address (source link layer option within ICMPv6 packet). PMIPv6 proposes the following solutions: A. Fixed address configuration: Configuration of a fixed link-local and fixed link layer address to be used by all MAGs in the LMD. However, the use of a fixed link-local address to be used in all access links in an PMIPv6 domain may lead to collisions. As PMIPv6 requires that the link-local address used by the different MAGs for a particular MN be the same, these collisions can only happen when an MN enters a PMIPv6 domain. PMIPv6 requires that the MN perform DAD (Duplicate Address Detection) so that the MAG can defend its link-local address. B. Dynamic address generation, signalling through LMA: The LMA generates a link-local address to be used by all MAGs with a particular MN and signals this address to all serving MAGs. This signalling must be completed before the MN performs DAD.
  • 18. © Peter R. Egli 2015 18/25 Rev. 1.50 PMIPv6 – Proxy Mobile IPv6 indigoo.com 10. Proxy Based Fast Handover for MIPv6 (PFMIPv6) with RFC5949 (1/8) The handover sequence defined by RFC5213 is not optimized for fast handovers. During handover from one radio access network to another network, packets cannot be delivered to and from the mobile node. The handover delay essentially leads to packet loss thus degrading the quality of service in mobility scenarios. RFC5949 defines a fast handover procedure to be used in conjunction with PMIPv6. It defines 2 modes, predective fast handover (MAG1 initiates handover before MN establishes connectivity with the new access network) and reactive fast handover (MAG2 initiates handover after MN has established connectivity with the new access network). Other mobility protocols have their specific fast handover protocol as shown in the following table: Mobility Protocol Corresponding Fast Handover Protocol RFC6275 Mobile IPv6 RFC5568 Mobile IPv6 Fast Handovers (FMIPv6) RFC5944 (obsoletes RFC3344) Mobile IPv4 RFC4988 Mobile IPv4 Fast Handovers (FMIPv4) RFC5213 Proxy Mobile IPv6 RFC5949 Proxy Based Fast Handover for MIPv6 (PFMIPv6), extends RFC5568 RFC5844 IPv4 Support for PMIPv6 RFC5949 Proxy Based Fast Handover for MIPv6 (PFMIPv6), extends RFC5568
  • 19. © Peter R. Egli 2015 19/25 Rev. 1.50 PMIPv6 – Proxy Mobile IPv6 indigoo.com 10. Proxy Based Fast Handover for MIPv6 (PFMIPv6) with RFC5949 (2/8) Predictive Fast Handover from MAG1 to MAG2 (initiated by MAG1=PMAG): MN1 P-AN LMAN-AN MAG1 (PMAG) MAG2 (NMAG) CN Report: • MN-ID-1 • New AP-ID 1 Handover indication: • MN-ID-1 • New AP-ID 2 HI (Handover Initiate): • MN-ID-1 • HNP • Current LMA addr. 3 HAck (Handover Ack) 4 Tunnel setup: Bidirectional tunnel setup between MAG1 and MAG2 5 Handover command7 Buffering: Buffering of downlink packets @ MAG2 until MAG2 has established connectivity with N-AN 6 MN-AN connection establishment8 AN-MAG connection establishment9 10 Delivery of buffered downlink packets to MN
  • 20. © Peter R. Egli 2015 20/25 Rev. 1.50 PMIPv6 – Proxy Mobile IPv6 indigoo.com 10. Proxy Based Fast Handover for MIPv6 (PFMIPv6) with RFC5949 (3/8) Predictive Fast Handover from MAG1 to MAG2 (initiated by MAG1=PMAG): MN1 P-AN LMAN-AN MAG1 (PMAG) MAG2 (NMAG) CN 11 Uplink packets 12 Proxy Binding Update: PBU with MN-ID-1, MAG2 13 Proxy Binding Ack 14 Direct data transfer for uplink and downlink packets through MAG2
  • 21. © Peter R. Egli 2015 21/25 Rev. 1.50 PMIPv6 – Proxy Mobile IPv6 indigoo.com 10. Proxy Based Fast Handover for MIPv6 (PFMIPv6) with RFC5949 (4/8) Predictive Fast Handover from MAG1 to MAG2 (initiated by MAG1=PMAG): 1. Report: The MN1 detects that handover is imminent (waning radio signal strength in the radio access network where it is attached to) and signals its MN-ID-1 and the ID of the radio access network ID (new AP-ID) to the current radio access network (P-AN for Previous Access Network). The way this is accomplished is outside the scope of PFMIPv6. Addtionally, it may be the access network itself (P-AN, Previous Access Network) detecting an imminent handover and acting on behalf of MN1. 2. Handover indication: The P-AN indicates the imminent handover along with the MN-ID-1 and new AP-ID to the current MAG (PMAG – Previous MAG). MN-ID-1 may be the MAC address of its radio interface. The new AP-ID may be the MAC address or SSID (Service Set ID) of a WLAN access point. 3. Handover Initiate: MAG1 derives the address of MAG2 (NMAG – New MAG) from the new AP-ID (see RFC5568 for details). The HI packet contains MN-ID-1, HNP (Home Network Prefix = MN1’s persistent IP address prefix) and MN1’s current LMA address. 4. Handover Acknowledge: MAG2 acknowledges the handover. 5. Bidirectional tunnel setup between MAG1 and MAG2: MAG1 and MAG2 set up a bidirectional tunnel for temporarily tunneling data packets bound for MN1. 6. Buffering downlink data packets at MAG2: Downlink packets destined for MN1 are forwarded by MAG1 (previous MAG) to MAG2 (new MAG) where they are queued for delivery until MN1 has established connectivity with the new access network. When NM1 has established connectivity with N-AN (New Access Network), MAG2 delivers the queued downlink packets to MN1 over N-AN.
  • 22. © Peter R. Egli 2015 22/25 Rev. 1.50 PMIPv6 – Proxy Mobile IPv6 indigoo.com 10. Proxy Based Fast Handover for MIPv6 (PFMIPv6) with RFC5949 (5/8) Predictive Fast Handover from MAG1 to MAG2 (initiated by MAG1=PMAG): 7. Handover command: MAG1 sends a handover command to MN1 telling it that everything is set up and that it now may switch to N-AN. Again, the way this is accomplished is outside of scope of PFMIPv6. 8. MN-AN connection establishment: MN1 establishes layer 2 connectivity with the N-AN through some means outside the scope of PFMIPv6. 9. AN-MAG connection establishment: Likewise, MAG2 establishes layer 2 connectivity with N-AN if not done so before. When connectivity is established, the access network (N-AN) becomes responsible for buffering downlink packets. The specifics are again outside the scope of PFMIPv6. From now on, MN1 uplink packets can be forwarded to CN without buffering. 10. Delivery of buffered downlink packets to MN1: After having established N-AN connectivity, MAG2 deliveres the queued packets to MN1. 11. MN1 uplink packet forwarding: All MN1 uplink packets between step 8./9. and 12. follow the forwarding path MN1MAG2MAG1 (through tunnel)LMA. 12. Proxy binding update (PBU): MAG2 sends a proxy binding update to the LMA. This PBU associates the MAG2 address with the identity of MN1 (MN-ID-1). The LMA updates the BCE (Binding Cache Entry) for MN1. MN1 is now associated with MAG2. The prefix (HNP) for MN1 remains the same (address transparency for MN1). 13. Proxy binding ack (PBA): The LMA sends back a PBA packet to MAG2. 14. Uplink and downlink data transfer through MAG2: Uplink and downlink packets are now forwarded through MAG2 and the tunnel between MAG2 and LMA.
  • 23. © Peter R. Egli 2015 23/25 Rev. 1.50 PMIPv6 – Proxy Mobile IPv6 indigoo.com 10. Proxy Based Fast Handover for MIPv6 (PFMIPv6) with RFC5949 (6/8) Reactive Fast Handover from MAG1 to MAG2 (initiated by MAG2=NMAG): MN1 P-AN LMAN-AN MAG1 (PMAG) MAG2 (NMAG) CN MN-AN connection establishment1 AN-MAG connection establishment: • MN1-ID • Old AP-ID 2 HI (Handover Initiate): • MN-ID-1 3 HAck (Handover Ack): • HNP • MN LL-ID • LMA addr. 4 Tunnel setup: Bidirectional tunnel setup between MAG1 and MAG2 5 6 Uplink packets 7 Downlink packets
  • 24. © Peter R. Egli 2015 24/25 Rev. 1.50 PMIPv6 – Proxy Mobile IPv6 indigoo.com 10. Proxy Based Fast Handover for MIPv6 (PFMIPv6) with RFC5949 (7/8) Reactive Fast Handover from MAG1 to MAG2 (initiated by MAG2=NMAG): MN1 P-AN LMAN-AN MAG1 (PMAG) MAG2 (NMAG) CN 8 9 Proxy Binding Ack 10 Direct data transfer for uplink and downlink through MAG2 Proxy Binding Update: PBU with MN-ID-1, MAG2
  • 25. © Peter R. Egli 2015 25/25 Rev. 1.50 PMIPv6 – Proxy Mobile IPv6 indigoo.com 10. Proxy Based Fast Handover for MIPv6 (PFMIPv6) with RFC5949 (8/8) Reactive Fast Handover from MAG1 to MAG2 (initiated by MAG2=NMAG): 1. MN-AN connection establishment: MN1 establishes layer 2 connectivity with the N-AN through some means outside the scope of PFMIPv6. 2. AN-MAG connection establishment: Likewise, MAG2 establishes layer 2 connectivity with N-AN if not done so before. When connectivity is established, the access network (N-AN) becomes responsible for buffering downlink packets. The specifics of all that is again outside the scope of PFMIPv6. 3. Handover Initiate: MAG2 derives the address of MAG1 from the old AP-ID and sends a HI (Handover Initiate) packet that contains MN-ID-1. 4. Handover Acknowledge: MAG1 acknowledges the handover. The acknowledge packet contains MN1’s link layer ID (MN LL-ID), HNP (Home Network Prefix) and MN1’s current LMA address. 5. Bidirectional tunnel setup between MAG1 and MAG2: MAG1 and MAG2 set up a bidirectional tunnel for temporarily tunneling data packets bound for MN1. 6. & 7. Uplink and downlink packets: Up- and downlink packets are relayed through MAG1. 12. & 13. Proxy binding update (PBU) and Proxy binding ack (PBA): MAG2 sends a proxy binding update to the LMA. This PBU associates the MAG2 address with the identity of MN1 (MN-ID-1). The LMA updates the BCE (Binding Cache Entry) for MN1. MN1 is now associated with MAG2. The prefix (HNP) for MN1 remains the same (address transparency for MN1). The LMA sends back a PBA packet to MAG2. 14. Uplink and downlink data transfer through MAG2: Uplink and downlink packets are now forwarded through MAG2 and the tunnel between MAG2 and LMA.