Lectures notes for 2010 - KTH
Lectures notes for 2010 - KTH Lectures notes for 2010 - KTH
Module 11: Mobile IP............................................................................... 1 Outline.............................................................................................................................................. 2 Emerging Network Architecture...................................................................................................... 3 Mobility . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4 Updating after a move...................................................................................................................... 5 Objectives of Mobile IP................................................................................................................... 6 Communication from Z to X . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7 How can Z continue to communication to X? . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8 Identification . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9 Establishing Identity . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10 How did it know to send the “I am” message to the MSR?. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 11 Could the MSR functionality be collocated with the router? . . . . . . . . . . . . . . . . . . . . . . . . . . . . 12 Getting Service. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 13 Back to the original problem: Z wants to send a message to X. . . . . . . . . . . . . . . . . . . . . . . . . . . 14 Alternative 1. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 15 Alternative 2. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 16 Alternative 3. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 17 Alternative 4. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 18 Alternative 4 continued . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 19 How does Z know to send things to MSR-α? . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 20 What happens in the case of wireless networks?. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 21 Wireless Local Area Networks . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 22 Maguire xxxiii of xlii maguire@kth.se 2010.03.21 Internetworking/Internetteknik
Wireless WANs . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 23 Simulcasting in Wireless Local Area Networks (WLANs). . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 24 Mobile IP Standardization Effort................................................................................................... 25 A Mobile-IP(V4) Scenario............................................................................................................. 26 A Mobile-IP(V6) Scenario............................................................................................................. 27 IP-in-IP Encapsulation................................................................................................................... 28 Tunneling IP Datagrams ................................................................................................................ 29 Temporary Address Assignment.................................................................................................... 30 Agent Discovery ............................................................................................................................ 31 Agent Advertisement Message Format.......................................................................................... 32 Registration Message Format ....................................................................................................... 33 MN Requirements.......................................................................................................................... 34 FA Requirements (v4).................................................................................................................... 35 HA Requirements........................................................................................................................... 36 Optimization Problem.................................................................................................................... 37 Problems of Mobile IP (RFC2002)................................................................................................ 38 Mobile IP Problems and Development.......................................................................................... 39 CDMA2000 Extension to Mobile IP ............................................................................................. 40 Wireless IP Network Architecture................................................................................................. 41 Cellular IP (CIP) ............................................................................................................................ 42 Cellular IP (CIP): Handover .......................................................................................................... 43 Cellular IP (CIP): Location Update ............................................................................................... 44 Maguire xxxiv of xlii maguire@kth.se 2010.03.21 Internetworking/Internetteknik
- Page 1 and 2: IK1550 Internetworking/Internettekn
- Page 3 and 4: Internetworking....................
- Page 5 and 6: Virtual Interface (VIF)............
- Page 7 and 8: Module 2: IP Basics: Routing, ARP,
- Page 9 and 10: Wireshark’s IO Graph functionalit
- Page 11 and 12: ICMP Redirect .....................
- Page 13 and 14: Building a UDP packet from scratch
- Page 15 and 16: Module 5: TCP, HTTP, RPC, NFS, X...
- Page 17 and 18: Problems with multiple connections.
- Page 19 and 20: Module 6: SCTP ....................
- Page 21 and 22: Module 7: Dynamic Routing .........
- Page 23 and 24: BGP Open Message ..................
- Page 25 and 26: IGMP Implementation Details........
- Page 27 and 28: Capacity Assignment ...............
- Page 29 and 30: Network Management Systems ........
- Page 31 and 32: Module 10: IPv6 ...................
- Page 33: Why IPv6? .........................
- Page 37 and 38: Module 12: IPSec, VPNs, Firewalls,
- Page 39 and 40: Module 13: Future and Summary......
- Page 41 and 42: Peer to peer networking ...........
- Page 43 and 44: Module 14: Some exercises..........
- Page 45 and 46: Welcome to the Internetworking cour
- Page 47 and 48: Goals, Scope and Method Goals of th
- Page 49 and 50: Learning Outcomes Following this co
- Page 51 and 52: Prerequisites • Datorkommunikatio
- Page 53 and 54: Topics • What an internet is and
- Page 55 and 56: Grades: A..F (ECTS grades) • To g
- Page 57 and 58: Written Assignment Goal: to gain an
- Page 59 and 60: Literature The course will mainly b
- Page 61 and 62: Lecture Plan Subject to revision!
- Page 63 and 64: Context of the module Communication
- Page 65 and 66: How can we deal with all of these d
- Page 67 and 68: Basic concepts open-architecture ne
- Page 69 and 70: Internetworked Architecture H … M
- Page 71 and 72: Trends: Shifting from traditional t
- Page 73 and 74: IP traffic growing exponentially! T
- Page 75 and 76: Growth rates Some people think the
- Page 77 and 78: Increasing Data Rates “Ethernet
- Page 79 and 80: The Internet Today Local … Local
- Page 81 and 82: Implicit vs. Explicit Information V
- Page 83 and 84: Encapsulation Appl header user data
Module 11: Mobile IP............................................................................... 1<br />
Outline.............................................................................................................................................. 2<br />
Emerging Network Architecture...................................................................................................... 3<br />
Mobility . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4<br />
Updating after a move...................................................................................................................... 5<br />
Objectives of Mobile IP................................................................................................................... 6<br />
Communication from Z to X . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7<br />
How can Z continue to communication to X? . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8<br />
Identification . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9<br />
Establishing Identity . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10<br />
How did it know to send the “I am” message to the MSR?. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 11<br />
Could the MSR functionality be collocated with the router? . . . . . . . . . . . . . . . . . . . . . . . . . . . . 12<br />
Getting Service. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 13<br />
Back to the original problem: Z wants to send a message to X. . . . . . . . . . . . . . . . . . . . . . . . . . . 14<br />
Alternative 1. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 15<br />
Alternative 2. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 16<br />
Alternative 3. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 17<br />
Alternative 4. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 18<br />
Alternative 4 continued . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 19<br />
How does Z know to send things to MSR-α? . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 20<br />
What happens in the case of wireless networks?. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 21<br />
Wireless Local Area Networks . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 22<br />
Maguire xxxiii of xlii<br />
maguire@kth.se <strong>2010</strong>.03.21 Internetworking/Internetteknik