SlideShare una empresa de Scribd logo
1 de 59
MOBILE INTERNET PROTOCOL
AND TRANSPORT LAYER
S J Savitha
Assistant Professor
Computer Science and Engineering
Sri Ramakrishna Institute of technology
1
 TCP/IP protocol suite – top collection of protocols.
 Core protocols.
 IP is responsible for routing a packet to any host.
 Identified by IP addresses.
 In traditional IP addressing scheme, each LAN is
assigned an address.
 When a host moves to a different location, it needs
to change its IP address.
 Mobile IP – IETF(Internet Engineering Task Force).
 Mobile IP allows mobile computers to stay
connected to the internet without changing their
address.
2
MOBILE IP
 Mobile IP stands for Mobile Internet Protocol
 A wireless connection to the Internet
 Designed to support host mobility
 Stay connected regardless of location without
changing IP address.
 Mobile IP is a network layer solution for
homogenous and heterogeneous mobility on the
global internet which is scalable, robust , secure
and which allow nodes to maintain all ongoing
communications while moving.
3
4
TERMINOLOGIES- MOBILE IP
 Mobile Node
A node/device that changes its point of attachment to the
Internet
 Home Agent
A router in the home network that communicates with the
mobile node
 Foreign Agent
A router in a foreign network that delivers information between
mobile node and its home agent
 Care-of-Address
Mobile Node’s current IP address
 Correspondent Node
Node/device that is communicating with the mobile node (i.e.
web server)
5
Winter
2001
5
6.6
DATA TRANSFER TO THE MOBILE SYSTEM
Internet
sender
FA
HA
MN
home network
foreign
network
receiver
1
2
3
1. Sender sends to the IP address of MN,
HA intercepts packet (proxy ARP)
2. HA tunnels packet to COA, here FA,
by encapsulation
3. FA forwards the packet
to the MN
CN
Winter
2001
6
6.7
DATA TRANSFER FROM THE MOBILE SYSTEM
Internet
receiver
FA
HA
MN
home network
foreign
network
sender
1
1. Sender sends to the IP address
of the receiver as usual,
FA works as default router
CN
DISCOVERING THE CARE-OF ADDRESS
 Agent advertisement – Needed for mobile node to
discover mobility agent. It is an advertisement
message constructed by attaching a special
extension to an ICMP router advertisement.
 If advertisement not received or needed sooner by
mobile a solicitation may be generated. 8
AGENT ADVERTISEMENT
 Allows for the detection of mobility agents
 Lists one or more available care-of addresses
 Informs mobile node about special feature provided
by foreign agents, for example, alternative
encapsulation techniques
 Allows mobile nodes to determine the network
number and status of their link to the Internet
 Allows mobile node to determine whether the agent
has the functionality to serve as a HA, a FA or both.
 Flag indicates whether it is home agent or a foreign
agent.
9
AGENT SOLICITATION
 In case a MN(Mobile node) does not receive any
COA, then the MN should send an agent
solicitation message.
 These Solicitation message should not flood the
network.
 A MN can send up to 3 solicitation messages(one
per second) as soon as it enters a new network.
 The purpose of sending this message to search for
a foreign agent.
 If an MN does not receive any address in response
to its solicitation messages, then to avoid network
flooding, the MN should reduce the rate of sending
the solicitation messages. 10
TUNNELLING PROCESS
 The packet is forwarded by the home agent to the
foreign agent. When the packet comes to the
foreign agent( COA) , it delivers the packet to the
mobile node.
 Two primary functions :
 Encapsulation – data packet to reach the tunnel
endpoint.
 Decapsulation – delivering packet at that endpoint.
11
TUNNELLING AND ENCAPSULATION
 Tunnelling establishes a virtual pipe for the packets
available between a tunnel entry and an endpoint.
 Encapsulation refers to arranging a packet header
and data in the part of a new packet.
 The operations of encapsulation and decapsulation
takes place whenever a packet sent from a higher
protocol to lower protocol.
12
13
PACKET DELIVERY
STEP 1 :
 If the correspondant node wants to send an IP
packet to a mobile node.CN sends the packet to the
IP address of the mobile node.
STEP 2 :
 In case MN is not present, then the packet is
encapsulated by a new header and it is tunnelled to
the COA and HA, acts as source address of a
packet. 14
STEP 3 :
 The encapsulated packet is routed to foreign agent
which performs decapsulation to remove the
additional header and forwards the decapsulated
packet to the MN.
STEP 4 :
 The MN after receiving the packet from CN forward
a reply packet to the CN by specifying its own IP
address along with the address of the CN.
15
OVERVIEW OF MOBILE IP
 Goal- Efficient packet transmission.
 A person working as a business development
executive for a company needs to take care of
many regional offices.
 How does he makes arrangements so that he
would continue to receive postal mails regardless of
his location?
 Two solutions:
 Address changing
 Decoupling mail routing from his address.
16
FEATURES OF MOBILE IP
 Transparency
 The IP address is to be managed transparently and
there should not be any affect of mobility on any ongoing
communication.
 Compatibility
 Mobile IP should be compatible.
 Security
 Mobile IP should, as for as possible, provide users with
secure communications over the internet.
 Efficiency and Scalability
 Efficient when overhead occurs.
 Scalable to support billions of moving hosts worldwide.
17
KEY MECHANISMS IN MOBILE IP
 Mobile IP is associated with three basic
mechanisms.
 Discovering the care-of-address
 Registering the care-of-address
 Tunnelling to the care-of-address
18
DISCOVERING THE COA
 Mobile agents advertise their presence by
periodically broadcasting the agent advertisement
messages
 Mobile node receives the advertisement messages
observes whether the message from HA or FA
 If a Mobile node does not wish to wait for a periodic
advertisement , it can send out gent solicitation
messages
19
REGISTERING THE COA
20
 If a mobile node is on new network , it registers
with the foreign agent by sending a registration
request
 Request includes permanent IP address of mobile
host and HA
 When the HA receives the Registration request , it
updates the mobility binding table
 HA sends an acknowledgement to FA
 The FA updates its visitors list by inserting the entry
of the mobile node 21
TUNNELLING TO THE COA
 Tunnelling – forward an IP datagram from HA to
COA
 Steps :
 When a HA receives a packet addressed to a mobile
host, it forwards the packet to the COA using IP- within
–IP
 HA inserts a new IP header in front of the IP header of
any datagram
 Destination- set to the COA
 Source- set to the HA address
 After stripping out the first header , IP processes the
packet again
22
ROUTE OPTIMIZATION
 Mobile IP protocol-all the data packets to the mobile
node go through the home agent
 Heavy traffic between HA and CN in the network
 To overcome this problem , route optimization
needs
 Enable direct notification of the corresponding host
 Direct tunnelling from the corresponding host to the
mobile host
 Binding cache maintained at the corresponding host
Binding – The Association of the home address with a
care-of-address.
23
 Four Messages :
 Binding Request
 Binding Acknowledgement
 Binding Update
 Binding Warning
Binding Request :
Node sends a request to HA to know the current
location of MN.
Binding Acknowledgement
Node will return an acknowledgement after getting
binding message.
24
Binding update :
Message sent by HA to CN mentioning the
correct location of MN.
Message-MN IP address and COA.
Binding Warning :
If a node decapsulates a packet for a MN, but
it is not the current FN, then this node sends a
binding warning to HA of the MN.
25
DHCP
 Dynamic Host Configuration Protocol
 Developed based on BOOTP (Bootstrap protocol)
 Information including IP address
 IETF an extension to BOOTP
 DHCP client and server- handle roaming status and
to assign IP address
 Significance of DHCP
 Static configuration
 Temporary IP address
26
 DHCP- Three mechanisms for IP address allocation
:
 Automatic allocation
 Dynamic allocation
 Manual allocation
27
TCP –TRANSMISSION CONTROL PROTOCOL
 Most popular transport layer protocol
 TCP- de facto
 Connection-oriented protocol
 UDP – Connectionless protocol in the TCP/IP suite
 Traditional TCP- Highly inefficient and
unsatisfactory manner
 Special adaptations-wireless networks
 Developed by DARPA in 1969
28
OVERVIEW OF TCP/IP
29
 Four layers of protocol :
 Application layer
 Transport layer
 Internet layer
 Network Interface layer
Application layer
 Application programmers and end users
 Messages will be passes to transport layer
Transport layer
 Converts messages into small parts and attaches certain
information.
 It passes segments to the Internet layer protocol
30
Internet Layer
o Attaches certain information to segments to form
packets
o TCP segment carried one or more IP packets
o The IP passes the packets to the network interface
layer
Network Interface layer
o It converts the packets to frames by adding certain
additional information such as checksum and then
transmits them on the network
31
 The reverse operation takes place when a frame
arrives at a host
 The network interface layer protocol removes the
information added by the corresponding network
interface layer protocol at the sender-end and passes
on the packet to IP layer
 The IP layer protocol at the destination removes the
information added by the IP layer
 The transport layer protocol at the receiver stripes
the information added by the transport layer protocol
at the sender
 Reconstructs the message and sends it to the
application layer
32
TERMINOLOGIES OF TCP/IP
 TCP – Transmission Control Protocol
 IP –Internet Protocol
 HTTP-Hyper Text Transmission Protocol
 SMTP-Simple Mail Transfer Protocol
 MIME-Multipurpose Internet Mail Extension
 FTP – File Transport Protocol
 SNMP- Simple Network Management Protocol
 ICMP-Internet Control Message Protocol
 ARP- Address Resolution Protocol
 RARP-Reverse Address Resolution Protocol
 BOOTP- Boot Protocol
 DNS-Domain Name System
 IGMP-Internet Group Management Protocol
33
ARCHITECTURE OF TCP/IP
 Application Layer :
 The protocols at this layer used by applications to
communicate with other applications which possibly
running on separate hosts
 Examples :
 HTTP
 FTP
 TELNET
34
APPLICATION LAYER
TRANSPORT LAYER
INTERNET LAYER
NETWORK ACCESS LAYER
 Transport Layer
 End-End data transfer services
 Host -to- host protocols
 To identify the end point , the concept of port number is
used
 An application or a process specifies a port number on
which it would receive a message
 Message reaches a host – demultiplexed using the port
number at the transport layer
 It provides services by making use of services of its
lower layer protocols
 It includes
 TCP (Transmission Control Protocol)
 UDP(User Datagram Protocol)
35
 Internet Layer
 Packs data into data packets – IP datagrams
 IP datagram contains source and destination
address(IP address)
 Responsible for routing of IP datagrams
 In a nutshell , this layer manages the addressing of
packets and delivery of packets between networks
using IP address
 Protocols includes :
 IP
 ICMP
 ARP
 RARP
 IGMP
36
 Network access layer
 Encoding data and transmitting
 Provides error detection and packet framing
functionalities
 ISO/OSI protocol suite – data link and physical layers
 Data link layer help to deliver protocols by use of
physical layers
 Data link layer protocols - Ethernet , Token
Ring,FDDI,X.25
 Physical layer – how data is physically sent through
network
37
OPERATION OF TCP
 Client-server application
 Data transmission between client and server may
span multiple networks – Sub networks
 Identification of hosts is not enough for data
delivery
 Every process is identified by port number
 Message in the form of block of data is passed to
TCP by sending application
 TCP breaks into many small parts and attaches
certain control information(TCP header)
 Data along with TCP header called segment
38
STRUCTURE OF TCP SEGMENT
TCP
Header
Portion of
Data
39
Control
information
TCP header includes :
1. Destination host
2.Checksum
3.Sequence number
 IP datagram
 Ip packet- datagram
 Datagram- variable length up to 65,536 bytes
 Two fields – header and data
40
 Version - IP version number Eg :IPV4 or IPV6
 Hlen – Header length as multiples of 4 bytes
 Service – priority of datagram
 Total length – allotted 16 bits to define length of
IP datagram
 Identification – To identify fragmentation that
belongs to networks
 Flags – Deals with fragmentation
 Fragment Offset – Pointer to the offset of data in
original datagram
 Time to live – total number of hops and
operation time
41
 Protocol – 16 bits , Example : UDP , TCP , ICMP
 Header checksum – 16 bit field to check the
integrity of the packets
 Source address – define the original source
 Destination address – defines the destination of
datagram
 Port address –
 Data encapsulation
 Facilities requests
 Destination sub-network address
42
PROTOCOL PORT
TELNET 23
SMTP 25
RPC 111
DNS 53
ADAPTATION OF TCP WINDOW
 Flow control techniques to control congestion in a
network
 Traffic occurs when the rate at which data injected
to a host exceeds the rate at delivered to a host
 Flow control technique
 Prevents congestion in the network
 Prevents buffer overrun at the slow receivers
 If data transmissions occur at faster rate than
network infrastructure support , then packets get
built up.
 Faster rate at sender > faster rate at receiver
 Receiver uses flow control mechanism to restrict
the faster rate at sender 43
 Receiver indicates an advertise window , when
sender starts to send data packets
 Advertised window- set equal to the size of the
receiver buffer
 Congestion window – max number of segments
without acknowledgements
 A sender sets size to 1 and keeps on increasing
until it receives duplicate acknowledgements
 TCP detects packet loss - RTO – Retransmission
timeout and duplicate ack
 In wireless – packet loss due to mobility and
channel errors
 Wireless are vulnerable to noise
44
IMPROVEMENT IN TCP PERFORMANCE
 TCP designed for traditional wired networks
 Overview
 Traditional networks
 TCP in mobile networks
 TCP in Single-hop wireless networks
 TCP in multi-hop wireless networks
45
TRADITIONAL NETWORKS
 In wired networks - packet losses are primarily
 Congestion control mechanisms – reduces
congestions
 Important mechanisms used by TCP
 Slow start
 Congestion Avoidance
 Fast retransmit / fast recovery
RTT – Round Trip Time
RTO calculated based on RTT
46
SLOW START
 Slow start mechanism used when TCP session is
started
 Lowest window size and then doubled after each
successful transmission
 Rate of doubling- rate of ack come back
 Doubling size occurs at every RTT
 RTT – Time that elapses between a segment is
transmitted by a sender and ack is received
 Congestion detected – window size is reduced to
half of its current size
47
CONGESTION AVOIDANCE
 The CA algorithm starts when slow start stops
 When Congestion window reaches the congestion
threshold level – window size doubling is avoided
 TCP reduces its transmission rate to half the
previous value when congestion occurs
 Less aggressive than the slow start phase
48
FAST RETRANSMIT /FAST RECOVERY
 Sender initiates a timer after transmitting a packet
and sets timeout value(RTO)
 RTO is calculated based on RTT
 When the timer expires , it retransmits the packet
 Retransmission is not triggered by timer, triggered
by receipt of three duplicate copies of ack
 When retransmission occurs , the congestion
window size is reduced by half
49
TCP IN MOBILE NETWORKS
 TCP – de facto standard protocol
 The main differences between wired and wireless
networks :
 Lower bandwidth
 Bandwidth fluctuations
 Higher delay
 Intermittent disconnections
 High bit error rate
 Poor link reliability
50
TCP IN SINGLE-HOP WIRELESS NETWORKS
 The modifications proposed to TCP to make it
effective in single-hop wireless networks
 Indirect TCP(I- TCP)
 Fast Retransmission
 Snooping TCP(S-TCP)
 Mobile TCP (M-TCP)
 Freeze TCP
51
INDIRECT TCP
 Proposes by Bakre and Badrinath
 Wired part and wireless part
 Wired part – Connection between Fixed host and
base station
 Wireless part – Connection between base station
and Mobile host
 Two separate connections : fixed network and
wireless link
 Advantage - split connection of I-TCP is that it does
not need any changes to be made to standard
protocol
 Disadvantage – Does not maintain end-end
semantics of TCP 52
53
FAST RETRANSMISSION
 Proposed by Caceres et al
 Overcomes the delay in transmissions caused due
to intermittent disconnections
 Advantage
 Reduces the time for MH to get reconnected
 Disadvantage
 Does not propose a general approach for TCP
communications in mobile wireless networks
 Example : Does not address the specific error
characteristics of the wireless medium
54
SNOOPING TCP
 Proposed by Balkrishnan et al – protocol that
improves the performance of TCP by modifying the
Software
 Modified software – Snoop
 Monitors every packet passes through Tcp
Connection
 If Congestion occurs , it retransmits locally and
hides the duplicate ack
 Advantage :
 Maintains TCP semantics by hiding the duplicate ack
55
56
MOBILE TCP
 Proposed by Kevin Brown et al
 It tries to avoid the sender window
 As I-TCP , mobile host is segmented into wired and
wireless parts
 Wired part – Connection between FH and SH
(Supervisor Host)
 Wireless part – Connection between SH and MH
 SH supervises all packets transmitted to MH
 Sets full window size - MH is connected
 State transfer takes place when MH moves
 New SH can maintain TCP connection between FH
and MH 57
58
FREEZE TCP
 The idea is to “freeze” the TCP senders before a
disconnection occurs
 “Zero Windows Advertisement” – informs the
sender that the receiver cannot receive data at that
moment
 When sender resumes its connectivity ,the receiver
can unfreeze the sender by sending the value
 Advantage – Avoidance of slow start period
 Does not require the involvement of intermediate
nodes
59

Más contenido relacionado

La actualidad más candente

La actualidad más candente (20)

Features of mobile ip
Features of mobile ipFeatures of mobile ip
Features of mobile ip
 
Mobile IP - pavankumar_912
Mobile IP - pavankumar_912Mobile IP - pavankumar_912
Mobile IP - pavankumar_912
 
IEEE 802.11 Architecture and Services
IEEE 802.11 Architecture and ServicesIEEE 802.11 Architecture and Services
IEEE 802.11 Architecture and Services
 
Manet
ManetManet
Manet
 
Mobile IP
Mobile IPMobile IP
Mobile IP
 
Mobile satellite communication
Mobile satellite communicationMobile satellite communication
Mobile satellite communication
 
Protocols for IoT
Protocols for IoTProtocols for IoT
Protocols for IoT
 
Wi Fi Technology
Wi Fi TechnologyWi Fi Technology
Wi Fi Technology
 
Mobile ip overview
Mobile ip overviewMobile ip overview
Mobile ip overview
 
Ipv6
Ipv6Ipv6
Ipv6
 
RARP, BOOTP, DHCP and PXE Protocols
RARP, BOOTP, DHCP and PXE ProtocolsRARP, BOOTP, DHCP and PXE Protocols
RARP, BOOTP, DHCP and PXE Protocols
 
WAP- Wireless Application Protocol
WAP- Wireless Application ProtocolWAP- Wireless Application Protocol
WAP- Wireless Application Protocol
 
Mobile Ad hoc Networks
Mobile Ad hoc NetworksMobile Ad hoc Networks
Mobile Ad hoc Networks
 
proactive and reactive routing comparisons
proactive and reactive routing comparisonsproactive and reactive routing comparisons
proactive and reactive routing comparisons
 
6lowpan
6lowpan6lowpan
6lowpan
 
IPv6
IPv6IPv6
IPv6
 
GSM - Addresses and Identifiers
GSM - Addresses and IdentifiersGSM - Addresses and Identifiers
GSM - Addresses and Identifiers
 
Umts system architecture
Umts system architectureUmts system architecture
Umts system architecture
 
Wi-max Technology PPT
Wi-max Technology PPTWi-max Technology PPT
Wi-max Technology PPT
 
Lte Presentation.Ppt
Lte Presentation.PptLte Presentation.Ppt
Lte Presentation.Ppt
 

Similar a Mobile internet protocol

Similar a Mobile internet protocol (20)

It6601 mobile computing unit2
It6601 mobile computing unit2It6601 mobile computing unit2
It6601 mobile computing unit2
 
Ip packet delivery
Ip packet deliveryIp packet delivery
Ip packet delivery
 
unit-2 mc.pdf
unit-2 mc.pdfunit-2 mc.pdf
unit-2 mc.pdf
 
Unit 4 MC QA.pdf
Unit 4 MC  QA.pdfUnit 4 MC  QA.pdf
Unit 4 MC QA.pdf
 
Unit 3
Unit 3Unit 3
Unit 3
 
mobile ip, Mobile COmmunication Internet Protocol
mobile ip, Mobile COmmunication Internet Protocolmobile ip, Mobile COmmunication Internet Protocol
mobile ip, Mobile COmmunication Internet Protocol
 
Mobile IP
Mobile IPMobile IP
Mobile IP
 
IT6601 MOBILE COMPUTING
IT6601 MOBILE COMPUTINGIT6601 MOBILE COMPUTING
IT6601 MOBILE COMPUTING
 
Mobileip 161105154557
Mobileip 161105154557Mobileip 161105154557
Mobileip 161105154557
 
Mobileip 161105154557
Mobileip 161105154557Mobileip 161105154557
Mobileip 161105154557
 
Unit 2
Unit 2Unit 2
Unit 2
 
Module 05 mobility management (1)
Module 05   mobility management (1)Module 05   mobility management (1)
Module 05 mobility management (1)
 
It2402 mobile communication unit 4
It2402 mobile communication unit 4It2402 mobile communication unit 4
It2402 mobile communication unit 4
 
IT8602 - Mobile Communication Unit IV
IT8602 - Mobile Communication   Unit IV IT8602 - Mobile Communication   Unit IV
IT8602 - Mobile Communication Unit IV
 
Ch6-Network_Protocols.ppt
Ch6-Network_Protocols.pptCh6-Network_Protocols.ppt
Ch6-Network_Protocols.ppt
 
Mobile ip group_3
Mobile ip group_3Mobile ip group_3
Mobile ip group_3
 
Bluetooth and mobile ip
Bluetooth and mobile ipBluetooth and mobile ip
Bluetooth and mobile ip
 
A lthough the Internet offers access to information sources worldwid.pdf
A lthough the Internet offers access to information sources worldwid.pdfA lthough the Internet offers access to information sources worldwid.pdf
A lthough the Internet offers access to information sources worldwid.pdf
 
Mobile computing - SARASWATHI RAMALINGAM
Mobile computing - SARASWATHI RAMALINGAMMobile computing - SARASWATHI RAMALINGAM
Mobile computing - SARASWATHI RAMALINGAM
 
MOBILE COMPUTING Unit 2.pptx
MOBILE COMPUTING Unit 2.pptxMOBILE COMPUTING Unit 2.pptx
MOBILE COMPUTING Unit 2.pptx
 

Último

Kuwait City MTP kit ((+919101817206)) Buy Abortion Pills Kuwait
Kuwait City MTP kit ((+919101817206)) Buy Abortion Pills KuwaitKuwait City MTP kit ((+919101817206)) Buy Abortion Pills Kuwait
Kuwait City MTP kit ((+919101817206)) Buy Abortion Pills Kuwaitjaanualu31
 
Hostel management system project report..pdf
Hostel management system project report..pdfHostel management system project report..pdf
Hostel management system project report..pdfKamal Acharya
 
Double Revolving field theory-how the rotor develops torque
Double Revolving field theory-how the rotor develops torqueDouble Revolving field theory-how the rotor develops torque
Double Revolving field theory-how the rotor develops torqueBhangaleSonal
 
Introduction to Serverless with AWS Lambda
Introduction to Serverless with AWS LambdaIntroduction to Serverless with AWS Lambda
Introduction to Serverless with AWS LambdaOmar Fathy
 
Bhubaneswar🌹Call Girls Bhubaneswar ❤Komal 9777949614 💟 Full Trusted CALL GIRL...
Bhubaneswar🌹Call Girls Bhubaneswar ❤Komal 9777949614 💟 Full Trusted CALL GIRL...Bhubaneswar🌹Call Girls Bhubaneswar ❤Komal 9777949614 💟 Full Trusted CALL GIRL...
Bhubaneswar🌹Call Girls Bhubaneswar ❤Komal 9777949614 💟 Full Trusted CALL GIRL...Call Girls Mumbai
 
Design For Accessibility: Getting it right from the start
Design For Accessibility: Getting it right from the startDesign For Accessibility: Getting it right from the start
Design For Accessibility: Getting it right from the startQuintin Balsdon
 
1_Introduction + EAM Vocabulary + how to navigate in EAM.pdf
1_Introduction + EAM Vocabulary + how to navigate in EAM.pdf1_Introduction + EAM Vocabulary + how to navigate in EAM.pdf
1_Introduction + EAM Vocabulary + how to navigate in EAM.pdfAldoGarca30
 
AIRCANVAS[1].pdf mini project for btech students
AIRCANVAS[1].pdf mini project for btech studentsAIRCANVAS[1].pdf mini project for btech students
AIRCANVAS[1].pdf mini project for btech studentsvanyagupta248
 
Employee leave management system project.
Employee leave management system project.Employee leave management system project.
Employee leave management system project.Kamal Acharya
 
Online food ordering system project report.pdf
Online food ordering system project report.pdfOnline food ordering system project report.pdf
Online food ordering system project report.pdfKamal Acharya
 
Thermal Engineering -unit - III & IV.ppt
Thermal Engineering -unit - III & IV.pptThermal Engineering -unit - III & IV.ppt
Thermal Engineering -unit - III & IV.pptDineshKumar4165
 
kiln thermal load.pptx kiln tgermal load
kiln thermal load.pptx kiln tgermal loadkiln thermal load.pptx kiln tgermal load
kiln thermal load.pptx kiln tgermal loadhamedmustafa094
 
PE 459 LECTURE 2- natural gas basic concepts and properties
PE 459 LECTURE 2- natural gas basic concepts and propertiesPE 459 LECTURE 2- natural gas basic concepts and properties
PE 459 LECTURE 2- natural gas basic concepts and propertiessarkmank1
 
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXssuser89054b
 
A CASE STUDY ON CERAMIC INDUSTRY OF BANGLADESH.pptx
A CASE STUDY ON CERAMIC INDUSTRY OF BANGLADESH.pptxA CASE STUDY ON CERAMIC INDUSTRY OF BANGLADESH.pptx
A CASE STUDY ON CERAMIC INDUSTRY OF BANGLADESH.pptxmaisarahman1
 
NO1 Top No1 Amil Baba In Azad Kashmir, Kashmir Black Magic Specialist Expert ...
NO1 Top No1 Amil Baba In Azad Kashmir, Kashmir Black Magic Specialist Expert ...NO1 Top No1 Amil Baba In Azad Kashmir, Kashmir Black Magic Specialist Expert ...
NO1 Top No1 Amil Baba In Azad Kashmir, Kashmir Black Magic Specialist Expert ...Amil baba
 
Generative AI or GenAI technology based PPT
Generative AI or GenAI technology based PPTGenerative AI or GenAI technology based PPT
Generative AI or GenAI technology based PPTbhaskargani46
 
A Study of Urban Area Plan for Pabna Municipality
A Study of Urban Area Plan for Pabna MunicipalityA Study of Urban Area Plan for Pabna Municipality
A Study of Urban Area Plan for Pabna MunicipalityMorshed Ahmed Rahath
 

Último (20)

Kuwait City MTP kit ((+919101817206)) Buy Abortion Pills Kuwait
Kuwait City MTP kit ((+919101817206)) Buy Abortion Pills KuwaitKuwait City MTP kit ((+919101817206)) Buy Abortion Pills Kuwait
Kuwait City MTP kit ((+919101817206)) Buy Abortion Pills Kuwait
 
Hostel management system project report..pdf
Hostel management system project report..pdfHostel management system project report..pdf
Hostel management system project report..pdf
 
Double Revolving field theory-how the rotor develops torque
Double Revolving field theory-how the rotor develops torqueDouble Revolving field theory-how the rotor develops torque
Double Revolving field theory-how the rotor develops torque
 
Introduction to Serverless with AWS Lambda
Introduction to Serverless with AWS LambdaIntroduction to Serverless with AWS Lambda
Introduction to Serverless with AWS Lambda
 
Bhubaneswar🌹Call Girls Bhubaneswar ❤Komal 9777949614 💟 Full Trusted CALL GIRL...
Bhubaneswar🌹Call Girls Bhubaneswar ❤Komal 9777949614 💟 Full Trusted CALL GIRL...Bhubaneswar🌹Call Girls Bhubaneswar ❤Komal 9777949614 💟 Full Trusted CALL GIRL...
Bhubaneswar🌹Call Girls Bhubaneswar ❤Komal 9777949614 💟 Full Trusted CALL GIRL...
 
Design For Accessibility: Getting it right from the start
Design For Accessibility: Getting it right from the startDesign For Accessibility: Getting it right from the start
Design For Accessibility: Getting it right from the start
 
1_Introduction + EAM Vocabulary + how to navigate in EAM.pdf
1_Introduction + EAM Vocabulary + how to navigate in EAM.pdf1_Introduction + EAM Vocabulary + how to navigate in EAM.pdf
1_Introduction + EAM Vocabulary + how to navigate in EAM.pdf
 
AIRCANVAS[1].pdf mini project for btech students
AIRCANVAS[1].pdf mini project for btech studentsAIRCANVAS[1].pdf mini project for btech students
AIRCANVAS[1].pdf mini project for btech students
 
FEA Based Level 3 Assessment of Deformed Tanks with Fluid Induced Loads
FEA Based Level 3 Assessment of Deformed Tanks with Fluid Induced LoadsFEA Based Level 3 Assessment of Deformed Tanks with Fluid Induced Loads
FEA Based Level 3 Assessment of Deformed Tanks with Fluid Induced Loads
 
Employee leave management system project.
Employee leave management system project.Employee leave management system project.
Employee leave management system project.
 
Call Girls in South Ex (delhi) call me [🔝9953056974🔝] escort service 24X7
Call Girls in South Ex (delhi) call me [🔝9953056974🔝] escort service 24X7Call Girls in South Ex (delhi) call me [🔝9953056974🔝] escort service 24X7
Call Girls in South Ex (delhi) call me [🔝9953056974🔝] escort service 24X7
 
Online food ordering system project report.pdf
Online food ordering system project report.pdfOnline food ordering system project report.pdf
Online food ordering system project report.pdf
 
Thermal Engineering -unit - III & IV.ppt
Thermal Engineering -unit - III & IV.pptThermal Engineering -unit - III & IV.ppt
Thermal Engineering -unit - III & IV.ppt
 
kiln thermal load.pptx kiln tgermal load
kiln thermal load.pptx kiln tgermal loadkiln thermal load.pptx kiln tgermal load
kiln thermal load.pptx kiln tgermal load
 
PE 459 LECTURE 2- natural gas basic concepts and properties
PE 459 LECTURE 2- natural gas basic concepts and propertiesPE 459 LECTURE 2- natural gas basic concepts and properties
PE 459 LECTURE 2- natural gas basic concepts and properties
 
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
 
A CASE STUDY ON CERAMIC INDUSTRY OF BANGLADESH.pptx
A CASE STUDY ON CERAMIC INDUSTRY OF BANGLADESH.pptxA CASE STUDY ON CERAMIC INDUSTRY OF BANGLADESH.pptx
A CASE STUDY ON CERAMIC INDUSTRY OF BANGLADESH.pptx
 
NO1 Top No1 Amil Baba In Azad Kashmir, Kashmir Black Magic Specialist Expert ...
NO1 Top No1 Amil Baba In Azad Kashmir, Kashmir Black Magic Specialist Expert ...NO1 Top No1 Amil Baba In Azad Kashmir, Kashmir Black Magic Specialist Expert ...
NO1 Top No1 Amil Baba In Azad Kashmir, Kashmir Black Magic Specialist Expert ...
 
Generative AI or GenAI technology based PPT
Generative AI or GenAI technology based PPTGenerative AI or GenAI technology based PPT
Generative AI or GenAI technology based PPT
 
A Study of Urban Area Plan for Pabna Municipality
A Study of Urban Area Plan for Pabna MunicipalityA Study of Urban Area Plan for Pabna Municipality
A Study of Urban Area Plan for Pabna Municipality
 

Mobile internet protocol

  • 1. MOBILE INTERNET PROTOCOL AND TRANSPORT LAYER S J Savitha Assistant Professor Computer Science and Engineering Sri Ramakrishna Institute of technology 1
  • 2.  TCP/IP protocol suite – top collection of protocols.  Core protocols.  IP is responsible for routing a packet to any host.  Identified by IP addresses.  In traditional IP addressing scheme, each LAN is assigned an address.  When a host moves to a different location, it needs to change its IP address.  Mobile IP – IETF(Internet Engineering Task Force).  Mobile IP allows mobile computers to stay connected to the internet without changing their address. 2
  • 3. MOBILE IP  Mobile IP stands for Mobile Internet Protocol  A wireless connection to the Internet  Designed to support host mobility  Stay connected regardless of location without changing IP address.  Mobile IP is a network layer solution for homogenous and heterogeneous mobility on the global internet which is scalable, robust , secure and which allow nodes to maintain all ongoing communications while moving. 3
  • 4. 4
  • 5. TERMINOLOGIES- MOBILE IP  Mobile Node A node/device that changes its point of attachment to the Internet  Home Agent A router in the home network that communicates with the mobile node  Foreign Agent A router in a foreign network that delivers information between mobile node and its home agent  Care-of-Address Mobile Node’s current IP address  Correspondent Node Node/device that is communicating with the mobile node (i.e. web server) 5
  • 6. Winter 2001 5 6.6 DATA TRANSFER TO THE MOBILE SYSTEM Internet sender FA HA MN home network foreign network receiver 1 2 3 1. Sender sends to the IP address of MN, HA intercepts packet (proxy ARP) 2. HA tunnels packet to COA, here FA, by encapsulation 3. FA forwards the packet to the MN CN
  • 7. Winter 2001 6 6.7 DATA TRANSFER FROM THE MOBILE SYSTEM Internet receiver FA HA MN home network foreign network sender 1 1. Sender sends to the IP address of the receiver as usual, FA works as default router CN
  • 8. DISCOVERING THE CARE-OF ADDRESS  Agent advertisement – Needed for mobile node to discover mobility agent. It is an advertisement message constructed by attaching a special extension to an ICMP router advertisement.  If advertisement not received or needed sooner by mobile a solicitation may be generated. 8
  • 9. AGENT ADVERTISEMENT  Allows for the detection of mobility agents  Lists one or more available care-of addresses  Informs mobile node about special feature provided by foreign agents, for example, alternative encapsulation techniques  Allows mobile nodes to determine the network number and status of their link to the Internet  Allows mobile node to determine whether the agent has the functionality to serve as a HA, a FA or both.  Flag indicates whether it is home agent or a foreign agent. 9
  • 10. AGENT SOLICITATION  In case a MN(Mobile node) does not receive any COA, then the MN should send an agent solicitation message.  These Solicitation message should not flood the network.  A MN can send up to 3 solicitation messages(one per second) as soon as it enters a new network.  The purpose of sending this message to search for a foreign agent.  If an MN does not receive any address in response to its solicitation messages, then to avoid network flooding, the MN should reduce the rate of sending the solicitation messages. 10
  • 11. TUNNELLING PROCESS  The packet is forwarded by the home agent to the foreign agent. When the packet comes to the foreign agent( COA) , it delivers the packet to the mobile node.  Two primary functions :  Encapsulation – data packet to reach the tunnel endpoint.  Decapsulation – delivering packet at that endpoint. 11
  • 12. TUNNELLING AND ENCAPSULATION  Tunnelling establishes a virtual pipe for the packets available between a tunnel entry and an endpoint.  Encapsulation refers to arranging a packet header and data in the part of a new packet.  The operations of encapsulation and decapsulation takes place whenever a packet sent from a higher protocol to lower protocol. 12
  • 13. 13
  • 14. PACKET DELIVERY STEP 1 :  If the correspondant node wants to send an IP packet to a mobile node.CN sends the packet to the IP address of the mobile node. STEP 2 :  In case MN is not present, then the packet is encapsulated by a new header and it is tunnelled to the COA and HA, acts as source address of a packet. 14
  • 15. STEP 3 :  The encapsulated packet is routed to foreign agent which performs decapsulation to remove the additional header and forwards the decapsulated packet to the MN. STEP 4 :  The MN after receiving the packet from CN forward a reply packet to the CN by specifying its own IP address along with the address of the CN. 15
  • 16. OVERVIEW OF MOBILE IP  Goal- Efficient packet transmission.  A person working as a business development executive for a company needs to take care of many regional offices.  How does he makes arrangements so that he would continue to receive postal mails regardless of his location?  Two solutions:  Address changing  Decoupling mail routing from his address. 16
  • 17. FEATURES OF MOBILE IP  Transparency  The IP address is to be managed transparently and there should not be any affect of mobility on any ongoing communication.  Compatibility  Mobile IP should be compatible.  Security  Mobile IP should, as for as possible, provide users with secure communications over the internet.  Efficiency and Scalability  Efficient when overhead occurs.  Scalable to support billions of moving hosts worldwide. 17
  • 18. KEY MECHANISMS IN MOBILE IP  Mobile IP is associated with three basic mechanisms.  Discovering the care-of-address  Registering the care-of-address  Tunnelling to the care-of-address 18
  • 19. DISCOVERING THE COA  Mobile agents advertise their presence by periodically broadcasting the agent advertisement messages  Mobile node receives the advertisement messages observes whether the message from HA or FA  If a Mobile node does not wish to wait for a periodic advertisement , it can send out gent solicitation messages 19
  • 21.  If a mobile node is on new network , it registers with the foreign agent by sending a registration request  Request includes permanent IP address of mobile host and HA  When the HA receives the Registration request , it updates the mobility binding table  HA sends an acknowledgement to FA  The FA updates its visitors list by inserting the entry of the mobile node 21
  • 22. TUNNELLING TO THE COA  Tunnelling – forward an IP datagram from HA to COA  Steps :  When a HA receives a packet addressed to a mobile host, it forwards the packet to the COA using IP- within –IP  HA inserts a new IP header in front of the IP header of any datagram  Destination- set to the COA  Source- set to the HA address  After stripping out the first header , IP processes the packet again 22
  • 23. ROUTE OPTIMIZATION  Mobile IP protocol-all the data packets to the mobile node go through the home agent  Heavy traffic between HA and CN in the network  To overcome this problem , route optimization needs  Enable direct notification of the corresponding host  Direct tunnelling from the corresponding host to the mobile host  Binding cache maintained at the corresponding host Binding – The Association of the home address with a care-of-address. 23
  • 24.  Four Messages :  Binding Request  Binding Acknowledgement  Binding Update  Binding Warning Binding Request : Node sends a request to HA to know the current location of MN. Binding Acknowledgement Node will return an acknowledgement after getting binding message. 24
  • 25. Binding update : Message sent by HA to CN mentioning the correct location of MN. Message-MN IP address and COA. Binding Warning : If a node decapsulates a packet for a MN, but it is not the current FN, then this node sends a binding warning to HA of the MN. 25
  • 26. DHCP  Dynamic Host Configuration Protocol  Developed based on BOOTP (Bootstrap protocol)  Information including IP address  IETF an extension to BOOTP  DHCP client and server- handle roaming status and to assign IP address  Significance of DHCP  Static configuration  Temporary IP address 26
  • 27.  DHCP- Three mechanisms for IP address allocation :  Automatic allocation  Dynamic allocation  Manual allocation 27
  • 28. TCP –TRANSMISSION CONTROL PROTOCOL  Most popular transport layer protocol  TCP- de facto  Connection-oriented protocol  UDP – Connectionless protocol in the TCP/IP suite  Traditional TCP- Highly inefficient and unsatisfactory manner  Special adaptations-wireless networks  Developed by DARPA in 1969 28
  • 30.  Four layers of protocol :  Application layer  Transport layer  Internet layer  Network Interface layer Application layer  Application programmers and end users  Messages will be passes to transport layer Transport layer  Converts messages into small parts and attaches certain information.  It passes segments to the Internet layer protocol 30
  • 31. Internet Layer o Attaches certain information to segments to form packets o TCP segment carried one or more IP packets o The IP passes the packets to the network interface layer Network Interface layer o It converts the packets to frames by adding certain additional information such as checksum and then transmits them on the network 31
  • 32.  The reverse operation takes place when a frame arrives at a host  The network interface layer protocol removes the information added by the corresponding network interface layer protocol at the sender-end and passes on the packet to IP layer  The IP layer protocol at the destination removes the information added by the IP layer  The transport layer protocol at the receiver stripes the information added by the transport layer protocol at the sender  Reconstructs the message and sends it to the application layer 32
  • 33. TERMINOLOGIES OF TCP/IP  TCP – Transmission Control Protocol  IP –Internet Protocol  HTTP-Hyper Text Transmission Protocol  SMTP-Simple Mail Transfer Protocol  MIME-Multipurpose Internet Mail Extension  FTP – File Transport Protocol  SNMP- Simple Network Management Protocol  ICMP-Internet Control Message Protocol  ARP- Address Resolution Protocol  RARP-Reverse Address Resolution Protocol  BOOTP- Boot Protocol  DNS-Domain Name System  IGMP-Internet Group Management Protocol 33
  • 34. ARCHITECTURE OF TCP/IP  Application Layer :  The protocols at this layer used by applications to communicate with other applications which possibly running on separate hosts  Examples :  HTTP  FTP  TELNET 34 APPLICATION LAYER TRANSPORT LAYER INTERNET LAYER NETWORK ACCESS LAYER
  • 35.  Transport Layer  End-End data transfer services  Host -to- host protocols  To identify the end point , the concept of port number is used  An application or a process specifies a port number on which it would receive a message  Message reaches a host – demultiplexed using the port number at the transport layer  It provides services by making use of services of its lower layer protocols  It includes  TCP (Transmission Control Protocol)  UDP(User Datagram Protocol) 35
  • 36.  Internet Layer  Packs data into data packets – IP datagrams  IP datagram contains source and destination address(IP address)  Responsible for routing of IP datagrams  In a nutshell , this layer manages the addressing of packets and delivery of packets between networks using IP address  Protocols includes :  IP  ICMP  ARP  RARP  IGMP 36
  • 37.  Network access layer  Encoding data and transmitting  Provides error detection and packet framing functionalities  ISO/OSI protocol suite – data link and physical layers  Data link layer help to deliver protocols by use of physical layers  Data link layer protocols - Ethernet , Token Ring,FDDI,X.25  Physical layer – how data is physically sent through network 37
  • 38. OPERATION OF TCP  Client-server application  Data transmission between client and server may span multiple networks – Sub networks  Identification of hosts is not enough for data delivery  Every process is identified by port number  Message in the form of block of data is passed to TCP by sending application  TCP breaks into many small parts and attaches certain control information(TCP header)  Data along with TCP header called segment 38
  • 39. STRUCTURE OF TCP SEGMENT TCP Header Portion of Data 39 Control information TCP header includes : 1. Destination host 2.Checksum 3.Sequence number
  • 40.  IP datagram  Ip packet- datagram  Datagram- variable length up to 65,536 bytes  Two fields – header and data 40
  • 41.  Version - IP version number Eg :IPV4 or IPV6  Hlen – Header length as multiples of 4 bytes  Service – priority of datagram  Total length – allotted 16 bits to define length of IP datagram  Identification – To identify fragmentation that belongs to networks  Flags – Deals with fragmentation  Fragment Offset – Pointer to the offset of data in original datagram  Time to live – total number of hops and operation time 41
  • 42.  Protocol – 16 bits , Example : UDP , TCP , ICMP  Header checksum – 16 bit field to check the integrity of the packets  Source address – define the original source  Destination address – defines the destination of datagram  Port address –  Data encapsulation  Facilities requests  Destination sub-network address 42 PROTOCOL PORT TELNET 23 SMTP 25 RPC 111 DNS 53
  • 43. ADAPTATION OF TCP WINDOW  Flow control techniques to control congestion in a network  Traffic occurs when the rate at which data injected to a host exceeds the rate at delivered to a host  Flow control technique  Prevents congestion in the network  Prevents buffer overrun at the slow receivers  If data transmissions occur at faster rate than network infrastructure support , then packets get built up.  Faster rate at sender > faster rate at receiver  Receiver uses flow control mechanism to restrict the faster rate at sender 43
  • 44.  Receiver indicates an advertise window , when sender starts to send data packets  Advertised window- set equal to the size of the receiver buffer  Congestion window – max number of segments without acknowledgements  A sender sets size to 1 and keeps on increasing until it receives duplicate acknowledgements  TCP detects packet loss - RTO – Retransmission timeout and duplicate ack  In wireless – packet loss due to mobility and channel errors  Wireless are vulnerable to noise 44
  • 45. IMPROVEMENT IN TCP PERFORMANCE  TCP designed for traditional wired networks  Overview  Traditional networks  TCP in mobile networks  TCP in Single-hop wireless networks  TCP in multi-hop wireless networks 45
  • 46. TRADITIONAL NETWORKS  In wired networks - packet losses are primarily  Congestion control mechanisms – reduces congestions  Important mechanisms used by TCP  Slow start  Congestion Avoidance  Fast retransmit / fast recovery RTT – Round Trip Time RTO calculated based on RTT 46
  • 47. SLOW START  Slow start mechanism used when TCP session is started  Lowest window size and then doubled after each successful transmission  Rate of doubling- rate of ack come back  Doubling size occurs at every RTT  RTT – Time that elapses between a segment is transmitted by a sender and ack is received  Congestion detected – window size is reduced to half of its current size 47
  • 48. CONGESTION AVOIDANCE  The CA algorithm starts when slow start stops  When Congestion window reaches the congestion threshold level – window size doubling is avoided  TCP reduces its transmission rate to half the previous value when congestion occurs  Less aggressive than the slow start phase 48
  • 49. FAST RETRANSMIT /FAST RECOVERY  Sender initiates a timer after transmitting a packet and sets timeout value(RTO)  RTO is calculated based on RTT  When the timer expires , it retransmits the packet  Retransmission is not triggered by timer, triggered by receipt of three duplicate copies of ack  When retransmission occurs , the congestion window size is reduced by half 49
  • 50. TCP IN MOBILE NETWORKS  TCP – de facto standard protocol  The main differences between wired and wireless networks :  Lower bandwidth  Bandwidth fluctuations  Higher delay  Intermittent disconnections  High bit error rate  Poor link reliability 50
  • 51. TCP IN SINGLE-HOP WIRELESS NETWORKS  The modifications proposed to TCP to make it effective in single-hop wireless networks  Indirect TCP(I- TCP)  Fast Retransmission  Snooping TCP(S-TCP)  Mobile TCP (M-TCP)  Freeze TCP 51
  • 52. INDIRECT TCP  Proposes by Bakre and Badrinath  Wired part and wireless part  Wired part – Connection between Fixed host and base station  Wireless part – Connection between base station and Mobile host  Two separate connections : fixed network and wireless link  Advantage - split connection of I-TCP is that it does not need any changes to be made to standard protocol  Disadvantage – Does not maintain end-end semantics of TCP 52
  • 53. 53
  • 54. FAST RETRANSMISSION  Proposed by Caceres et al  Overcomes the delay in transmissions caused due to intermittent disconnections  Advantage  Reduces the time for MH to get reconnected  Disadvantage  Does not propose a general approach for TCP communications in mobile wireless networks  Example : Does not address the specific error characteristics of the wireless medium 54
  • 55. SNOOPING TCP  Proposed by Balkrishnan et al – protocol that improves the performance of TCP by modifying the Software  Modified software – Snoop  Monitors every packet passes through Tcp Connection  If Congestion occurs , it retransmits locally and hides the duplicate ack  Advantage :  Maintains TCP semantics by hiding the duplicate ack 55
  • 56. 56
  • 57. MOBILE TCP  Proposed by Kevin Brown et al  It tries to avoid the sender window  As I-TCP , mobile host is segmented into wired and wireless parts  Wired part – Connection between FH and SH (Supervisor Host)  Wireless part – Connection between SH and MH  SH supervises all packets transmitted to MH  Sets full window size - MH is connected  State transfer takes place when MH moves  New SH can maintain TCP connection between FH and MH 57
  • 58. 58
  • 59. FREEZE TCP  The idea is to “freeze” the TCP senders before a disconnection occurs  “Zero Windows Advertisement” – informs the sender that the receiver cannot receive data at that moment  When sender resumes its connectivity ,the receiver can unfreeze the sender by sending the value  Advantage – Avoidance of slow start period  Does not require the involvement of intermediate nodes 59