Kg Mobile Ip

Published on August 2016 | Categories: Documents | Downloads: 58 | Comments: 0 | Views: 327
of 17
Download PDF   Embed   Report

Comments

Content

A S TUDY OF M OBILE IP
KUNAL GANGULY, [email protected] DEPARTMENT OF COMPUTER SCIENCE IC!ITA STATE UNI"ERSIT#$ IC!ITA$ %ANSAS &'(&)$ USA CS*+, DISTRI-UTED COMPUTIN. S#STEMS$ DR. C!IN/C!I! C!AN.$ [email protected] ABSTRACT Connectivity to the Internet while in motion is becoming an extremely important part of computing research and development. Mobile IP, created by the Internet Engineering Tas !orce "IET!#, is a standard protocol that builds on Internet Protocol by ma ing mobility of a user transparent to applications and higher$level protocols such as Transfer Control Protocol. Mobile IP can be seen as the least common mobility denominator % providing seamless macro mobility solutions among the diversity of access. This paper will attempt to introduce Mobile IP from a technical point of view, while ta ing into consideration that the reader may not now anything about Mobile IP. &owever, the reader should now some networ ing basics before reading further. 'uilding on these concepts, this paper will then discuss effective implementations of Mobile IP, the protocols used by Mobile IP and the importance of Mobile IP. This paper will also introduce Mobile IP from a consumer perspective, i.e. electronic devices "and their (perating )ystems# which allow networ ing mobility. 1. INTRODUCTION The Inte1net i0 an e2cellent 03u1ce 34 in4315ati3n which i0 1eadily acce00i6le 4135 al530t any c357ute1 with a 4i2ed c3nnecti3n t3 035e kind 34 a netw31k$ h3we8e1 with inc1ea0ing 737ula1ity 34 536ile de8ice0 0uch a0 PDA90$ inte1net 1eady cell 7h3ne0$ PC Ta6let0$ etc$ the1e i0 a need t3 7138ide acce00 t3 the Inte1net 4135 a de8ice that 5ay 6e c3n0tantly in 53ti3n 31 wi1ele00 acce00 t3 the Inte1net. M36ile IP$ a 0tanda1d 713730ed 6y the Inte1net Enginee1ing Ta0k F31ce :IETF; ai50 t3 5ake 536ile c357uting a 1eality. The 71inci7al ad8antage 34 M36ile IP i0 that it 41ee0 the u0e1 4135 a 4i2ed l3cati3n. M36ile IP 5ake0 in8i0i6le the 63unda1ie0 6etween attach5ent 73int0$ it i0 a6le t3 t1ack and deli8e1 in4315ati3n t3 536ile de8ice0 with3ut needing t3 change the de8ice90 l3ng/te15 Inte1net P13t3c3l :IP; add1e00 :431 that 0e00i3n; <=.CP.())(>. -e431e 0tudying M36ile IP$ it i0 i5731tant t3 de4ine the c3nce7t 34 ?c357uting 536ility9. C357uting 536ility can 6e de4ined a0 all3wing the u0e1 035e deg1ee 34 41eed35 431 hi0@he1 c357uting ta0k0. The1e a1e e00entially tw3 kind0 34 c357uting 536ility A Pe103nal 536ility and Te15inal 536ility <(.IP.()),>. Pe103nal 536ility in83l8e0 5aking it 7300i6le 431 a u0e1 t3 u0e the netw31k90 0e18ice0 4135 any te15inal. hen the u0e1 l3g0 3nt3 a te15inal$ he@0he will get the 0a5e 4uncti3nality a0 the u0e190 h35e netw31k$ with3ut ha8ing t3 g3 th13ugh ti5e/c3n0u5ing c3n4igu1ati3n 713cedu1e0. hen thi0 u0e1 0ta1t0 an IP 0e00i3n$ an IP add1e00 will 6e a00igned i4 it ha0 n3t 6een d3ne 03 al1eady. A0 l3ng a0 the IP 0e00i3n i0 ke7t ali8e$ the IP add1e00 will 0e18e a0 a de0tinati3n 431 in4315ati3n deli8e1y. An inhe1ent 7136le5 with thi0 a7713ach i0 that 3nce l3gged 3n$ the u0e1 cann3t 0witch t3 any 3the1 te15inal. T3 u0e an3the1 te15inal the u0e1 will

=

ha8e t3 1e7eat the l3gin 713ce00 3n that te15inal. An e2a57le 34 thi0 5ay 6e an e57l3yee90 la7t37. At w31k$ when the la7t37 i0 d3cked$ the IP add1e00 will 0e18e 431 c355unicati3n0$ h3we8e1$ i4 the e57l3yee we1e t3 w31k 4135 h35e 38e1 a high/07eed c3nnecti3n 31 dial/u7$ the IP add1e00 34 the la7t37 will 6e di44e1ent$ 6ut the de0tinati3n netw31k will 6e the 0a5e. Thi0 a7713ach 1eBui1e0 techn3l3gie0 0uch a0 Netw31k Acce00 Identi4ie1 :NAI;$ whe1e the1e i0 a 1elati3n0hi7 6etween the u0e190 IP add1e00 and the NAI. Te15inal 536ility 5ean0 that the u0e1 and the te15inal a1e 536ile a0 3ne entity. The te15inal 5ay change it0 73int 34 attach5ent = with the h35e netw31k with3utC • In4315ing the netw31k t3 which it i0 c3nnected t3 • !a8ing any i57act 3n 3ng3ing netw31k 0e18ice0 Te15inal 536ility i0 tied t3 the M36ile IP 713t3c3l it0el4. M36ile IP d3e0 the0e tw3 thing0 in a 0ea5le00 and l300le00 5anne1$ in 4act$ ideally$ the u0e1 0h3uld n3t e8e1 6e awa1e 34 the 713ce00e0 in the 6ackg13und which all3w the 536ility. Thi0 536ility i0 handled in the netw31k laye1(D hence a77licati3n 0e00i3n c3ntinuity i0 inhe1ently 7138ided 431$ a0 they will n3t e8en ha8e t3 deal with 536ility. M36ile IP 4ace0 5any 360tacle0$ 6ut ingenuity in 53di4ying e2i0ting techn3l3gy and c355unicati3n 713t3c3l0 and adding new techn3l3gie0 ha8e 5ade M36ile IP a 1eality. Once the techn3l3gy i0 7e14ected$ u0e10 will enE3y the c3n8enience 34 0ea5le00 untethe1ed 13a5ing and a77licati3n t1an07a1ency 34 n35adic c357uting,. Th3ugh the Inte1net can 0ee5 ana1chic$ IP 13uting de7end0 3n a well/31de1ed hie1a1chy. At
=

the Inte1net c31e$ 13ute10 a1e n3t c3nce1ned with indi8idual u0e10. They l33k at 3nly the 4i10t 4ew 6it0 34 an IP add1e00 :the 71e4i2; and 431wa1d the 7acket t3 the c311ect netw31k. Once at the netw31k$ 13ute10 within the netw31k 4u1the1 l33k at the ne2t 4ew 6it0 3n the IP add1e00$ and 0end the 7acket t3 a 0u6net. At the edge$ acce00 13ute10 l33k at the 4inal 7a1t0 34 an add1e00 and 0end the 7acket t3 a 07eci4ic 5achine <,.AD.())(>. T3 0u55a1iFe the 4eatu1e0 34 M36ile IPC • N3 ge3g1a7hical li5itati3n0 • N3 7hy0ical c3nnecti3n 1eBui1ed • M3di4icati3n0 t3 3the1 536ile de8ice0@13ute10 i0 n3t 1eBui1ed • M36ile IP lea8e0 t1an0731t and highe1/le8el 713t3c3l0 una44ected • N3 53di4icati3n0 t3 the cu11ent IP add1e00 34 the 536ile de8ice 31 the 4315at 34 the IP add1e00 • Su7731t0 0ecu1ity 31 i57le5ent0 035e kind 34 authenticati3n 0che5e t3 7138ide 0ecu1ity 2. HOW MOBILE IP WORKS IP add1e00e0 a1e ty7ically a003ciated with a 4i2ed n3n/536ile l3cati3n 0uch a0 a 13ute1 31 a client c357ute1. IP 13ute0 7acket0 4135 a 03u1ce t3 a de0tinati3n 6y all3wing 13ute10 t3 431wa1d 7acket0 4135 inc35ing netw31k inte14ace0 t3 3ut63und inte14ace0 acc31ding t3 13uting ta6le0. The0e 13uting ta6le0 ty7ically 5aintain the ne2t/ h37 in4315ati3n 431 each de0tinati3n IP add1e00$ which i0 6a0ed 3n the nu56e1 34 netw31k0 t3 which that IP add1e00 i0 c3nnected. The netw31k nu56e1 i0 de1i8ed 4135 the IP add1e00 6y 5a0king 344 035e 34 the l3w 31de1 6it0. Thu0$ the IP add1e00 07eci4ie0 the n3de90+ 73int 34 attach5ent. T3 5aintain e2i0ting t1an0731t/laye1 c3nnecti3n0 the n3de 5u0t 5aintain a 0ingle IP add1e00. In
+

A P3int 34 Attach5ent can 6e de4ined a0 the acce00 73int 34 an entity int3 a netw31k. ( Di0cu00i3n 34 M36ile IP in te150 34 netw31k laye10 i0 d3ne in 0ecti3n +. , N35adic c357uting i0 anal3g3u0 t3 Te15inal M36ility.

?node’, ‘client computer’, and ‘client’ a1e u0ed inte1changea6ly t3 5ean a c357ute1 that i0 the 1ecei8ing 0tati3n.

(

T1an04e1 C3nt13l P13t3c3l :TCP;$ the 38e1whel5ingly 737ula1 713t3c3l 431 Inte1net c3nnecti3n0$ the c3nnecti3n0 a1e inde2ed 6y a Buad1u7let that i0 anal3g3u0 t3 035e3ne90 ge3g1a7hical h35e add1e00. Thi0 0et 34 nu56e10 i0 what all3w0 431 deli8e1y 34 a 7acket 34 data. I4 any 34 the0e nu56e10 a1e changed then the c3nnecti3n will 530t likely 6e l30t. C311ect deli8e1y 34 data 7acket0 t3 the n3de de7end0 3n the netw31k nu56e1 c3ntained within the n3de90 IP add1e00. I4 the n3de i0 536ile$ 7acket0 0ent t3 thi0 n3de 5ay ne8e1 5ake it a0$ l3gically$ 536ility will 431ce a new IP add1e00 t3 6e a003ciated with the n3de e8e1y ti5e it change0 it0 c3nnecti3n 73int. C3n0tantly changing IP add1e00 34 a n3de will 5ake t1an07a1ent 536ility i57300i6le. M36ile IP wa0 de0igned t3 03l8e thi0 7136le5 6y all3wing the n3de t3 u0e tw3 IP add1e00e0C • !35e add1e00 • Ca1e/34 add1e00 Figu1e (.= Si57le diag1a5 0h3wing c3nce7t 34 ha8ing tw3 IP add1e00e0 and a !35e agent

M36ile IP ena6le0 536ile n3de0 t3 0u14 the Inte1net$ 6ut 1e5ain add1e00a6le 8ia thei1 h35e netw31k <+.CP.=HH&>. The ca1e/34 add1e00 change0 at each new 73int 34 attach5entD it indicate0 the netw31k nu56e1 and thu0 identi4ie0 the 536ile n3de90 73int 34 attach5ent with 1e07ect t3 the netw31k t373l3gy. The h35e add1e00 5ake0 it a77ea1 that the 536ile n3de i0 c3ntinually a6le t3 1ecei8e data 3n it0 h35e netw31k whe1e a netw31k n3de kn3wn a0 the h35e agent a00i0t0 in thi0 37e1ati3n. The h35e agent90 71inci7al E36 i0 t3 get data 7acket0 intended 431 the 536ile n3de and deli8e1 the5 t1an07a1ently t3 the 536ile n3de90 cu11ent 73int 34 attach5ent. hene8e1 the 536ile n3de i0 in a 431eign netw31k&$ deli8e1y 34 data t3 the 536ile n3de i0 taken ca1e 34 6y the 431eign agent. FI.URE (.( M36ile n3de 3n a F31eign Netw31k

!35e add1e00 i0 0tatic and i0 u0ed t3 identi4y TCP c3nnecti3n0. -y de4initi3n$ a h35e add1e00 i0 an add1e00 that 5ake0 the 536ile n3de a77ea1 l3gically c3nnected t3 the h35e netw31kG.
G

A0 5enti3ned$ the ca1e/34 add1e00 change0 at e8e1y new 73int 34 attach5ent. hene8e1 the 73int 34 attach5ent change0$ the 536ile n3de 1egi0te10 it0 new ca1e/34 add1e00 with it0 h35e agent. T3 get a 7acket t3 the 536ile n3de 4135 it0 h35e netw31k$ the h35e agent deli8e10 the
the Inte1net I 3the1 0e18ice0. & A F31eign Netw31k can 6e de4ined a0 any netw31k that i0 n3t the h35e netw31k.

A !35e Netw31k 34 a 536ile n3de i0 the netw31k t3 which the 536ile n3de i0 a 7a1t 34$ and thu0 t3 the 1e0t 34

,

7acket 4135 the h35e netw31k t3 the ca1e/34 add1e00. T3 en0u1e deli8e1y$ the 7acket90 heade1 i0 53di4ied 03 that the de0tinati3n IP add1e00 i0 the ca1e/34/add1e00. Thi0 713ce00 can 6e th3ught 34 a0 a 1edi1ecti3n whe1e the 7acket i0 t1an04315ed 4135 it0 31iginal 0tate t3 get deli8e1ed t3 it0 de0tinati3n A the 536ile n3de. Thi0 new heade1 then 0hield0 31 enca70ulate0 the 31iginal 7acket$ cau0ing the 536ile n3de90 h35e add1e00 t3 ha8e n3 e44ect 3n the enca70ulated 7acket90 13uting until it a11i8e0 at the ca1e/34 add1e00. Such enca70ulati3n i0 al03 called tunneling'. Thi0 all3w0 the 7acket t3 6y7a00 the u0ual e44ect0 34 IP 13uting. The need 431 the e2i0tence 34 the h35e agent$ 431eign agent$ and tw3 di44e1ent IP add1e00e0 i0 6ecau0e 34 the lack 34 end/t3/end netw31k laye1 t1an07a1ency$ which i0 035eti5e0 1e4e11ed t3 a0 JInte1net 43gK <(.IP.()),>. E00entially$ an IP add1e00 ha0 t3 4ind it0 way th13ugh the Inte1net in 31de1 t3 get t3 it0 de0tinati3n with the hel7 34 13uting de8ice0 3n the way. F31 M36ile IP t3 w31k 7137e1ly$ 4uncti3nality ha0 t3 6e 6uilt/in 03 that it can 4ind a way th13ugh the J43gK. S3$ the 6a0ic entitie0 34 a netw31k that 0u7731t0 M36ile IP a1eC • The 536ile n3de • The 431eign agent • The h35e agent • The 0ende1 31 c311e073ndent n3de M36ile IP can 6e unde10t33d a0 the c337e1ati3n 34 , 0e7a1ate 5echani050 <G.CP.=HHH>C (.= Di0c38e1ing the ca1e/34 add1e00 (.( Regi0te1ing the ca1e/34 add1e00 (., Tunneling t3 the ca1e/34 add1e00

The M36ile IP di0c38e1y 713ce00 ha0 6een 6uilt 3n t37 34 an e2i0ting 0tanda1d 713t3c3l$ R3ute1 Ad8e1ti0e5ent. Inte1net C3nt13l Me00age P13t3c3l :ICMP; 13ute1 di0c38e1y 5e00age0 a1e kn3wn a0 R3ute1 Ad8e1ti0e5ent. R3ute1 Ad8e1ti0e5ent ena6le0 h30t0 attached t3 5ultica0t 31 613adca0t netw31k0 t3 di0c38e1 the IP add1e00 34 thei1 neigh631ing 13ute10. Each 13ute1 7e1i3dically 5ultica0t0 a R3ute1 Ad8e1ti0e5ent 4135 each 34 it0 5ultica0t inte14ace0$ ann3uncing the IP add1e00 34 that inte14ace. !30t0 di0c38e1 the add1e00e0 34 thei1 neigh631ing 13ute10 6y 0i57ly li0tening 431 ad8e1ti0e5ent0 <&.SED.=HH=>. M36ile IP d3e0 n3t 53di4y the 31iginal 4ield0 34 e2i0ting 13ute1 ad8e1ti0e5ent0 6ut 0i57ly e2tend0 the5 t3 a003ciate 536ility 4uncti3n0. Thu0$ a 13ute1 ad8e1ti0e5ent can ca11y in4315ati3n a63ut de4ault 13ute10$ Eu0t a0 6e431e$ and in additi3n ca11y 4u1the1 in4315ati3n a63ut 3ne 31 531e ca1e/34 add1e00e0. hen the 13ute1 ad8e1ti0e5ent0 a1e e2tended t3 al03 c3ntain the needed ca1e/34 add1e00$ they a1e kn3wn a0 agent ad8e1ti0e5ent0. !35e agent0 and 431eign agent0 ty7ically 613adca0t agent ad8e1ti0e5ent0 at 1egula1 inte18al0 34 ti5e. I4 the 536ile n3de need0 t3 get a ca1e/34 add1e00 and d3e0 n3t wi0h t3 wait 431 the 7e1i3dic ad8e1ti0e5ent$ the 536ile n3de can 613adca0t 31 5ultica0t a 03licitati3n that will 6e an0we1ed 6y any 431eign agent 31 h35e agent that 1ecei8e0 it. !35e agent0 u0e agent ad8e1ti0e5ent0 t3 5ake the50el8e0 kn3wn$ e8en i4 they d3 n3t 344e1 any ca1e/34 add1e00e0. An agent ad8e1ti0e5ent 7e143150 the 43ll3wing i5731tant 4uncti3n0C • All3w0 431 detecti3n 34 536ility agent0. • Li0t0 3ne 31 531e a8aila6le ca1e/34 add1e00e0. • In43150 the 536ile n3de a63ut 07ecial 4eatu1e0 7138ided 6y 431eign agent0$ 431 e2a57le$ alte1nati8e enca70ulati3n techniBue0.

2.1 Discove i!" #$e c% e&o' %(( ess

'

The c3nce7t 34 IP/within/IP enca70ulati3n and tunneling i0 de0c1i6ed in detail in late1 0ecti3n0.

+

• •

Let0 the 536ile n3de dete15ine the netw31k nu56e1 and 0tatu0 34 thei1 link t3 the Inte1net. Let0 the 536ile n3de kn3w whethe1 the agent i0 a h35e agent$ 431eign agent$ 31 63th$ and the1e431e whethe1 it i0 3n it0 h35e netw31k 31 a 431eign netw31k.

d3ing 03 344e10 a natu1al i57le5entati3n 0t1ategy$ and thu0 nece00a1y. Regi0t1ati3n 1eBue0t0 c3ntain0 7a1a5ete10 and 4lag0 that cha1acte1iFe the tunnelH th13ugh which the h35e agent will deli8e1 7acket0 t3 the ca1e/ 34 add1e00. hen a h35e agent acce7t0 the 1eBue0t$ it 6egin0 t3 a003ciate the h35e add1e00 34 the 536ile n3de with the ca1e/34 add1e00$ and 5aintain0 it0 a003ciati3n until the 1egi0t1ati3n li4eti5e=) e27i1e0. The t1i7let that c3ntain0 the h35e add1e00$ ca1e/34 add1e00 and the 1egi0t1ati3n li4eti5e i0 called a 6inding 431 the 536ile n3de. A 1egi0t1ati3n 1eBue0t can 6e c3n0ide1ed a 6inding u7date== 0ent 6y the 536ile n3de. A 6inding u7date i0 an e2a57le 34 a 1e53te 1edi1ect$ 6ecau0e it i0 0ent 1e53tely t3 the h35e agent t3 a44ect the h35e agent90 13uting ta6le. Thi0 5ake0 the need 431 authenticati3n 8e1y clea1. The h35e agent 5u0t 6e ce1tain that the 1egi0t1ati3n wa0 31iginated 6y the 536ile n3de and n3t 6y 035e 3the1 5alici3u0 n3de 71etending t3 6e the 536ile n3de. A 5alici3u0 n3de c3uld cau0e the h35e agent t3 alte1 it0 13uting ta6le with e113ne3u0 ca1e/34 add1e00 in4315ati3n$ and the 536ile n3de w3uld 6e un1eacha6le t3 all inc35ing c355unicati3n0 4135 the Inte1net. The need t3 authenticate 1egi0t1ati3n in4315ati3n ha0 7layed a 5aE31 13le in dete15ining the acce7ta6le de0ign 7a1a5ete10 431 M36ile IP. A detailed di0cu00i3n 34 authenticati3n i0 6ey3nd the 0c37e 34 thi0 7a7e1$ h3we8e1 it i0 w31thwhile t3 61ie4ly 5enti3n h3w
H

M36ile n3de0 u0e 13ute1 ad8e1ti0e5ent0 a0 de4ined in <&.SED.=HH=> t3 detect any change0 in the 0tate 34 536ility agent0 a8aila6le at the cu11ent 73int 34 attach5ent*. I4 ad8e1ti0e5ent0 a1e n3 l3nge1 detecta6le 4135 a 431eign agent that 71e8i3u0ly had 344e1ed a ca1e/34 add1e00 t3 the 536ile n3de$ the 536ile n3de 0h3uld 71e0u5e that the 431eign agent i0 n3 l3nge1 within 1ange 34 the 536ile n3de90 netw31k inte14ace. In thi0 0ituati3n$ the 536ile n3de 0h3uld 6egin t3 hunt 431 a new ca1e/34 add1e00$ 31 7300i6ly u0e a ca1e/34 add1e00 kn3wn 4135 ad8e1ti0e5ent0 it i0 0till 1ecei8ing. The 536ile n3de 5ay ch330e t3 wait 431 an3the1 ad8e1ti0e5ent i4 it ha0 n3t 1ecei8ed any 1ecently ad8e1ti0ed ca1e/34 add1e00$ 31 it 5ay 0end an agent 03licitati3n. Due t3 the una8aila6ility 34 an Inte1net key 5anage5ent 713t3c3l$ agent di0c38e1y 5e00age0 a1e n3t 1eBui1ed t3 6e authenticated <'.MS.=HH&>. 2.2 Re"is#e i!" #$e c% e&o' %(( ess Once a 536ile n3de ha0 a ca1e/34 add1e00$ it0 h35e agent 5u0t 4ind 3ut a63ut it. The 713ce00 6egin0 when the 536ile n3de$ 7300i6ly with the a00i0tance 34 a 431eign agent$ 0end0 a 1egi0t1ati3n 1eBue0t with the ca1e/34 add1e00 in4315ati3n. hen the h35e agent 1ecei8e0 thi0 1eBue0t$ it add0 the nece00a1y in4315ati3n t3 it0 13uting ta6le$ a77138e0 the 1eBue0t$ and 0end0 a 1egi0t1ati3n 1e7ly 6ack t3 the 536ile n3de. Alth3ugh the h35e agent i0 n3t 1eBui1ed 6y the M36ile IP 713t3c3l t3 handle 1egi0t1ati3n 1eBue0t0 6y u7dating ent1ie0 in it0 13uting ta6le$
*

Thi0 i0 kn3wn a0 agent solicitation.

A Tunnel i0 the 7ath taken 6y enca70ulated 7acket0. It i0 the 7ath that lead0 7acket0 4135 the h35e agent t3 the 431eign agent. Tunnel0 will 6e e27lained in 531e detail in late1 0ecti3n0. =) Regi0t1ati3n li4eti5e i0 h3w l3ng the 536ility agent0 5ay u0e the 6inding. == A 6inding u7date i0 a 5e00age that 0u77lie0 a new 6inding t3 an entity that need0 t3 kn3w the new ca1e/34 add1e00 431 a 536ile n3de. The 6inding u7date c3ntain0 the 536ile n3de90 h35e add1e00$ in0tead 34 6eing 3ne 344e1ed 6y a 431eign agent.

G

identi4icati3n 4ield0 in the 1egi0t1ati3n 5e00age a1e 53di4ied t3 i57138e authenticati3n. M36ile IP include0 within the 1egi0t1ati3n 5e00age a 07ecial identi4icati3n 4ield that change0 with e8e1y new 1egi0t1ati3nD thi0 i0 5andated within M36ile IP. The1e a1e tw3 5ain way0 t3 5ake the identi4icati3n 4ield uniBue. One i0 t3 u0e a ti5e0ta57D then each new 1egi0t1ati3n will ha8e a late1 ti5e0ta57 and thu0 di44e1 4135 71e8i3u0 1egi0t1ati3n0 <'.MS.=HH&>. The 3the1 i0 t3 cau0e the identi4icati3n t3 6e a 70eud31and35 nu56e1. ith en3ugh 6it0 34 1and35ne00$ it i0 highly unlikely that tw3 inde7endently ch30en 8alue0 431 the identi4icati3n 4ield will 6e the 0a5e <=.CP.())(>. Thi0 identi4icati3n 4ield i0 al03 u0ed 6y the 431eign agent t3 5atch 7ending 1egi0t1ati3n 1eBue0t0 t3 1egi0t1ati3n 1e7lie0 when they a11i8e at the h35e agent and t3 0u60eBuently 6e a6le t3 1elay the 1e7ly t3 the 536ile n3de. The 431eign agent al03 0t31e0 3the1 in4315ati3n 431 7ending 1egi0t1ati3n0$ including the 536ile n3de90 h35e add1e00$ the 536ile n3de90 Media Acce00 Laye1 :MAC; add1e00$ the 03u1ce 731t nu56e1 431 the 1egi0t1ati3n 1eBue0t 4135 the 536ile n3de$ the 1egi0t1ati3n li4eti5e 713730ed 6y the 536ile n3de$ and the h35e agent90 add1e00. The 431eign agent can li5it 1egi0t1ati3n li4eti5e0 t3 a c3n4igu1a6le 8alue that it 7ut0 int3 it0 agent ad8e1ti0e5ent0. The h35e agent can 1educe the 1egi0t1ati3n li4eti5e$ which it include0 a0 7a1t 34 the 1egi0t1ati3n 1e7ly$ 6ut it can ne8e1 inc1ea0e it <=.CP.())(>. 2.) T*!!e+i!" #o #$e c% e&o' %(( ess The de4ault enca70ulati3n 5echani05 that 5u0t 6e 0u7731ted 6y all 536ility agent0 u0ing M36ile IP i0 IP/within/IP :IPIP; <*.CP.=HH&.(>. U0ing IPIP$ the h35e agent$ which i0 the tunnel 03u1ce$ in0e1t0 a new IP heade1$ 31 tunnel heade1$ in 413nt 34 the IP heade1 34 any datag1a5 add1e00ed t3 the 536ile n3de90 h35e add1e00.

The new tunnel heade1 u0e0 the 536ile n3de90 ca1e/34 add1e00 a0 the de0tinati3n IP add1e00$ 31 tunnel de0tinati3n. The tunnel 03u1ce IP add1e00 i0 the h35e agent$ and the tunnel heade1 u0e0 + a0 the highe1/le8el 713t3c3l nu56e1$ indicating that the ne2t 713t3c3l heade1 i0 again an IP heade1. In IPIP the enti1e 31iginal IP heade1 i0 71e0e18ed a0 the 4i10t 7a1t 34 the 7ayl3ad 34 the tunnel heade1. Inte15ediate 13ute10 a1e unawa1e 34 thi0 enca70ulati3n. In 31de1 t3 1ec38e1 the 31iginal 7acket$ the 431eign agent 5e1ely ha0 t3 eli5inate the tunnel heade1 and deli8e1 the 1e0t t3 the 536ile n3de. In 31de1 t3 1educe heade1 38e1head$ 5ini5al enca70ulati3n can 6e u0ed in0tead 34 IPIP <H.CP.=HH&.,>$ h3we8e1$ thi0 inc1ea0e0 the c357le2ity 34 713ce00ing the heade1 a0 035e 34 the in4315ati3n 4135 the tunnel heade1 i0 c356ined with in4315ati3n in the inne1 enca70ulati3n heade1 <=).C $ et al.())(>. ). E,,ECTI-E USE O, MOBILE IP A0 can 6e gathe1ed 4135 1eading the 71e8i3u0 tw3 0ecti3n0$ the u0e0 34 M36ile IP a1e nu5e13u0. They can 1ange 4135 0i57le Inte1net acce00 4135 handheld de8ice0 t3 all3wing inte1acti8e 0e00i3n0 6etween e57l3yee0 in di44e1ent l3cati3n0 while any 3ne 31 all a1e 3n the 538e. Thi0 i0 7e1ha70 6e0t de53n0t1ated th3ugh a 1udi5enta1y e2a57le A i5agine a 0cena1i3 whe1e an e57l3yee un7lug0 a 536ile c357ute1 4315 it0 d3ck in the 344ice. The c357ute1$ M36ile IP ena6led$ will 6e a6le t3 c3ntinue d3wnl3ad0$ c3nduct "3ice 38e1 IP :"3IP; 0e00i3n0$ and c3ntinue any 3the1 netw31king ta0k with3ut any inte11u7ti3n0$ e8en while the e57l3yee i0 3n hi0 31 he1 way h35e and 4inally 4135 h35e :h37e4ully$ the e57l3yee will n3t 6e w31king 4135 h35e t33 5uch;. C3nnecti8ity will 4i10t 6e t1an04e11ed 4135 the 344ice L3cal

&

A1ea Netw31k :LAN;$ then t3 a cellula1 netw31k and 4inally t3 the c3nnecti3n t3 the Inte1net that the e57l3yee ha0 4135 h35e. An3the1 e44ecti8e u0e 34 M36ile IP i0 the c3nce7t 34 M36ile Netw31k0. Acc31ding t3 Ci0c3 Sy0te50 <==.CS.())=>C Ci0c3 M36ile Netw31k0 ena6le0 a 13ute1 and it0 0u6net0 t3 6e 536ile while c3ntinuing t3 5aintain IP c3nnecti8ity t1an07a1ent t3 the IP h30t0 c3nnecting t3 the netw31k th13ugh thi0 536ile 13ute1. Thi0 03luti3n ena6le0 the IP h30t0 3n a LAN c3nnected t3 0uch a 536ile 13ute1 t3 t1an07a1ently c3nnect t3 the 7a1ent netw31k while the LAN i0 in 53ti3n. The 536ile 13ute1 en0u1e0 netw31k c3nnecti8ity 4135 a 536ile en8i13n5ent. The M36ile Netw31k0 03luti3n ena6le0 enti1e netw31k0 t3 13a5. F31 e2a57le$ thi0 ena6le0 a 7lane t3 4ly a13und the w31ld while 7a00enge10 0tay c3nnected t3 the Inte1net. In thi0 ca0e$ each 7a00enge1N0 IP de8ice i0 a n3de 3n the 536ile netw31k c3nnected t3 a 13ute1 3n the 7lane. The n3de0 3n 0uch a 536ile netw31k a1e n3t awa1e 34 any IP 536ility at all. The M36ile Netw31k0 03luti3n that i0 1unning 3n the 13ute1 in the 7lane ?hide09 the IP 13a5ing 4135 the l3cal IP n3de0 03 that the l3cal n3de0 a77ea1 t3 6e di1ectly attached t3 the h35e netw31k. The0e a1e Eu0t 035e 34 the e2a57le0 34 the e44ecti8e u0e0 34 M36ile IP. !3we8e1$ M36ile IP i0 e27ected t3 6ec35e e8en 531e i5731tant a0 wi1ele00 netw31k0 and IP8&=( 6ec35e 737ula1. Cellula1 8end310 a1e 7u0hing M36ile IP ha1d a0 a way t3 all3w 0ea5le00 13a5ing 6etween Thi1d/.ene1ati3n :,.; netw31k0 and highe1 6andwidth h3t 073t0 6a0ed 3n -luet33th 31 i/ Fi :*)(.==6;.

T3 5ake clea1 035e 34 the unde1lying techn3l3gy that aid the e44ecti8e u0e 34 M36ile IP$ 035e 34 the c3nce7t0 e27lained in the 71e8i3u0 0ecti3n will 6e 1eite1ated with e44ecti8e i57le5entati3n ke7t in 5ind. A0 e27lained$ e8e1y kind 34 M36ile IP gi8e0 the 536ile n3de tw3 IP add1e00e0$ a 7e15anent add1e00 3n it0 h35e netw31k :h35e add1e00;$ and a ca1e/34 add1e00 :1eBui1ed i4 the 536ile n3de i0 3n a 431eign netw31k;. The h35e add1e00 i0 the 3ne that highe1/le8el 713t3c3l0 u0e$ while the ca1e/34 add1e00 0igni4ie0 the n3de90 actual l3cati3n within a netw31k and it0 0u6net0. hene8e1 the 536ile n3de 538e0 t3 a new netw31k$ it 5u0t acBui1e a new ca1e/34 add1e00 3n the netw31k it i0 8i0iting. In IP8+ thi0 5ean0 1eBue0ting 3ne 4135 a 07ecial 536ility agent kn3wn a0 the 431eign agent. M30t likely$ thi0 agent will e00entially 6e a Dyna5ic !30t C3n4igu1ati3n P13t3c3l :D!CP; 0e18e1. Thi0 0e18e1 0h3uld ha8e 035e Authenticati3n$ Auth31iFati3n$ and Acc3unting :AAA; 4uncti3nality added 3n t3 the 431eign netw31k. AAA i0 6a0ically an in41a0t1uctu1e$ which all3w0 Jt1u0tK in c355unicati3n0 <=(.SN$ RP.())(>. Re53te Authenticati3n Dial In U0e1 Se18ice :RADIUS; i0 the d35inating AAA 713t3c3l in IP netw31k0 t3day <=,.CR$ et al.()))>$ while Dia5ete1 i0 the 0ucce0031 34 thi0 well/kn3wn 713t3c3l. Dia5ete1 i0 the cu11ently 0tanda1diFed within the IETF AAA w31king g13u7. -3th RADIUS and Dia5ete1 a1e 4le2i6le and e2ten0i6le 713t3c3l0. Additi3nally Dia5ete1 i0 6uilt t3 6e 6ackwa1d0 c357ati6le with RADIUS. -3th RADIUS and Dia5ete1 713t3c3l0 a1e and will 6e u0ed 431 13a5ing M36ile IP u0e10 <=+.PC$ et al.())(>. -ack at the h35e netw31k$ an3the1 536ility agent$ the h35e agent$ u0ually an edge 13ute1 with 035e AAA 4uncti3n0 kee70 t1ack 34 all the 536ile n3de0 with 7e15anent add1e00e0 3n that

=(

The1e i0 a 61ie4 di0cu00i3n 34 IP8& i57le5entati3n0 in M36ile IP in 0ecti3n & 34 thi0 7a7e1.

'

netw31k$ a003ciating each with it0 ca1e/34 add1e00. The 536ile n3de kee70 the h35e agent in4315ed 34 it0 whe1ea63ut0 6y 0ending a 6inding u7date 8ia ICMP$ whene8e1 it0 ca1e/34 add1e00 change0. The0e u7date0 can inc31731ate a digital ce1ti4icate$ t3 en0u1e that they a1e actually 0ent 6y the 536ile agent$ 1athe1 than an attacke1 0eeking t3 i57e103nate hi5 31 he1. hen in4315ati3n :7acket0; i0 t3 6e 0ent t3 the 536ile n3de$ the h35e agent inte1ce7t0 the0e 7acket0 and 0end0 the5 t3 the 536ile n3de at it0 ca1e/34 add1e00 8ia tunneling. Thi0 all3w0 the 0ende1 t3 0end 7acket0 t3 a 7e15anent IP add1e00 :which 6el3ng0 t3 the h35e netw31k;. In IP8+$ thi0 i0 the 0i57le0t way t3 en0u1e 536ility$ 6ut thi0 add0 e2t1a 13uting h370 that tend t3 u0e 531e 6andwidth and inc1ea0e latency. The 7300i6ility 34 inc1ea0ed latency i0 34 7a1ticula1 c3nce1n 431 wi1ele00 netw31k0 whe1e 71e8enting latency i0 7a1a53unt. In the 31iginal 8e10i3n 34 536ile IP8+$ 0tanda1diFed in =HH&$ 536ile n3de0 we1e 0u7730ed t3 0end 1e7lie0 di1ectly t3 0ende10$ 431 c357ati6ility with highe1/le8el 713t3c3l0$ the J03u1ceK add1e00 4ield in the0e 7acket0 had t3 6e the 7e15anent add1e00 3n the h35e netw31k$ e8en th3ugh 13ute10 3n the Inte1net w3uld 0ee that the 7acket0 we1e actually c35ing 4135 the ca1e/34 add1e00 3n the 8i0ited netw31k. Thi0 i0 a 0e1i3u0 7136le5 n3w. T3 cu16 Denial 34 Se18ice :D3S; attack0$ whe1e 5alici3u0 7acket0 34ten clai5 t3 6e 4135 4ake IP add1e00e0$ 13ute10 3n the Inte1net 6egan t3 inc31731ate ing1e00 and 3utg1e00 4ilte1ing <=G.PF$ et al.=HH*>. R3ute10 w3uld 3nly all3w a 7acket th13ugh i4 it0 03u1ce add1e00 4ield wa0 c3n0i0tent with it0 31igin. T3 get a13und the0e 4ilte10$ 536ile IP8+ wa0 u7dated in ())( t3 include 1e8e10e tunneling <=&..M.())=>. In0tead 34 taking a t1iangula1 7ath :Figu1e ,.=;$ all 7acket0 t1a8el 8ia the h35e netw31k 3nly :Figu1e ,.(;D thi0 i0 kn3wn a0 Re0e18e

Tunneling. Re8e10e Tunneling 6andwidth and add0 t3 latency. Figu1e ,.= T1iangula1 R3uting

wa0te0

FI.URE ,.( Re8e10e Tunneling

Thi0 7136le5 i0 ea0ily 03l8ed in M36ile IP8& 6y a83iding tunneling a0 5uch a0 7300i6le. Th3ugh the 4i10t 4ew 7acket0 34 e8e1y 0e00i3n a1e 0till tunneled 8ia the h35e agent$ the 536ile n3de al03 0end0 6inding u7date0 t3 e8e1y c311e073ndent. Futu1e 7acket0 can 6e 0ent di1ectly$ Eu0t a0 i4 the 536ile n3de 6el3nged 3n the netw31k it wa0 8i0iting. M36ile IP8& can acc357li0h thi0 6y u0ing e2ten0i6le heade10 A a 4eatu1e all3wing IP8& 7acket0 t3 c3ntain e2t1a 713t3c3l in4315ati3n t3 deal with i00ue0 0uch a0 Ouality 34 Se18ice :O3S; and 71i31itiFati3n. The heade1 34 each 7acket can c3ntain 63th the h35e

*

and ca1e/34 add1e00$ 0ati04ying 63th highe1/le8el 713t3c3l0 and Inte1net 13ute10. Secti3n & 61ie4ly 3utline0 the0e and 3the1 6ene4it0 34 M36ile IP8&. .. PROTOCOLS O, MOBILE IP M36ile IP i0 a la1ge 7a1t$ 6ut 6y n3 5ean0 the 3nly 7a1t 34 536ile c357uting and netw31king. A g33d unde10tanding 34 M36ile IP in83l8e0 0tudying the 1elati3n0hi70 6etween the 8a1i3u0 laye10 34 netw31k 713t3c3l0. Each laye1 0h3uld 71e0ent a clea1 53del 34 37e1ati3n t3 the a1chitect. Once the 53del i0 identi4ied$ the e44ect0 34 536ility can 6e 0tudied in 1elati3n t3 it. The Inte1net netw31king 0tack 0h3wing c3553n 713t3c3l0 i0 0h3wn in the ta6le 6el3w. L%/e s
A77licati3n P1e0entati3n Se00i3n T1an0731t Netw31k Data Link Phy0ical

The cell=, 34 a 536ile n3de i0 the ge3g1a7hical l3cati3n a13und the netw31k :which 0u7731t0 536ile n3de0;. Thi0 a1ea i0 de4ined 6y the 7137agati3n cha1acte1i0tic0 34 the elect135agnetic wa8e0 at the 37e1ating 41eBuency. In41a1ed c355unicati3n0$ 431 e2a57le$ 0t37 at the wall0 34 a 1335$ while 1adi3 41eBuency c355unicati3n0 ha8e 5uch 531e c357licated 7137agati3n cha1acte1i0tic0. The a6ility 34 the ha1dwa1e 34 the 536ile h30t t3 detect 0ignal 0t1ength and 1e731t it t3 the de8ice d1i8e1 will 6e hel74ul in 1ealiFing that the h30t i0 at the 3ute1 1eache0 34 a cell and that it 0h3uld t1y t3 0witch t3 a di44e1ent 3ne. In additi3n$ in the ca0e 34 071ead/07ect1u5 34 5ulti/channel 1adi3 c355unicati3n0$ the a6ility t3 1ecei8e 3n 5ulti7le channel0 at 3nce i0 highly de0i1a6le <='.MI$ et al.=HH&>. The data link laye1 i0 1e073n0i6le 431 link e0ta6li0h5ent and 5aintenance. Thu0$ 7hy0ical e44ect0 4135 536ility a1e likely t3 1eBui1e change0 in thi0 laye1. Change0 in 730iti3n a44ect the Signal/t3/Inte14e1ence Rati3 :SIR;. Link laye10 that ada7t 431wa1d e1131 c311ecti3n t3 SIR can e2hi6it 8a1ia6le 6andwidth 6ut 4a1 4ewe1 l30t 7acket0. i1ele00 5edia ty7ically int13duce 5any 3the1 de0ign 1eBui1e5ent0 at the data link laye1$ 0uch a0 enc1y7ti3n :t3 5aintain a deg1ee 34 c3n4identiality; and c3571e00i3n techniBue0 :t3 4it 531e data in l3we1 6andwidth; <=*.TIA.=HHG>. An inte1e0ting 7136le5 t3 6e dealt with in thi0 laye1 i0 53di4ying the Add1e00 Re03luti3n P13t3c3l :ARP; t3 all3w 431 536ility. In the data link laye1$ we eithe1 5a7 a l3gical add1e00 t3 a 7hy0ical add1e00 :n3n/536ile; 31 dyna5ically acBui1e an IP add1e00 431 a 538ing n3de. ARP w31k0 6y 613adca0ting a 1eBue0t 3n the c355unicati3n netw31k with the IP add1e00 34 the ta1get in the 7acket. All h30t0 3n the
=,

TA-LE +.= Co00o! P o#oco+s
!TTP$ DNS$ FTP$ etc TCP$ UDP$ RTP IP$ ICMP$ M36ile IP$ etc IEEE *)(.P$ PPP$ etc Netw31k Ada7t31

Ta6le +.= 0h3w0 a 0i57li4ied 8iew 34 the Inte1nati3nal Standa1d0 O1ganiFati3n90 :ISO; 713t3c3l 0tack a0 it a77lie0 t3 Inte1net netw31king. The 5aE31 g3al 34 M36ile IP 713t3c3l de0ign wa0 t3 handle 536ility at the netw31k laye1 and lea8e the 3the1 highe1 713t3c3l0 una44ected. Thi0 all3w0 431 the e2i0ting 13uting in41a0t1uctu1e t3 6e una44ected. Thi0 i0 al03 a 6ig ad8antage t3 cu11ent a77licati3n0$ a0 they d3 n3t ha8e t3 inc31731ate any new techn3l3gie0 eithe1.

A cell i0 the ge3g1a7hic a1ea in which a wi1ele00 de8ice 5ay 4uncti3n a0 de0i1ed. A la1ge ge3g1a7hical a1ea 5ay 6e di8ided int3 cell0 in 31de1 t3 7138ide 5a2i5u5 0ignal 0t1ength t3 a wi1ele00 de8ice.

H

netw31k will 1ecei8e thi0 7acket$ 6ut 3nly the n3de with the 1eBui1ed IP add1e00 will 1e073nd=+. The 7136le5 with ARP and 536ile n3de0 a1i0e0 when 3ne 536ile n3de t1ie0 t3 get the add1e00 34 an3the1 536ile n3de. I4 63th the 536ile n3de0 a1e 3n the 0a5e h35e netw31k then ARP will w31k in the n315al way. !3we8e1$ i4 3ne 34 the 536ile n3de0 :MN=; i0 3n an3the1 netw31k$ then the 0ending 536ile n3de :MN(; will ha8e t3 ?7132y/ARP9 the 1eBue0t 431 MN=. MN( will 0end all t1a44ic intended 431 MN= t3 it0 3wn h35e netw31k$ which will then enca70ulate the 1eBue0t in an IP/within/IP datag1a5. The h35e netw31k will then Bue1y all 3the1 netw31k0 in 31de1 t3 4ind 3ut which 3ne i0 handling MN=. Thi0 713ce00 c3ntinue0 until 0ucce00 31 4ailu1e <='.MI$ et al.=HH&>. Thi0 i0 al03 kn3wn a0 J.1atuit3u0 ARPK. At the netw31k laye1$ IP dete15ine0 a 7ath th13ugh a l330ely c3n4ede1ated a003ciati3n 34 inde7endent netw31k link0$ 13uting 4135 3ne netw31k t3 an3the1$ while 344e1ing 035e 0e18ice0 0uch a0 41ag5entati3n$ 1ea00e56ly and check0u55ing. !ence$ l3gically$ changing the 73int 34 attach5ent :536ility; 1eBui1e0 changing the 13uting 34 datag1a50 intended t3 and 4135 the 536ile n3de. Thi0 i0 d3ne 6y enca70ulati3n and deca70ulati3n techniBue0. The 0tanda1d techniBue 431 enca70ulati3n and deca70ulati3n i0 IP/within/IP :IPIP;D thi0 5u0t 6e 0u7731ted 6y de4ault 6y all 536ility agent0. P1e8i3u0ly in thi0 7a7e1$ IPIP ha0 6een u0ed 1e7eatedly with3ut actually de4ining the c3nce7t in 035e detail. The c3nce7t 34 IPIP 5ean0 that the 7ayl3ad 34 an IP datag1a5 will actually c3ntain an3the1 IP add1e00 and a 7ayl3ad. Thi0 i0 d3ne t3 all3w 431 deli8e1y t3 an inte15ediate de0tinati3n that w3uld 3the1wi0e n3t 6e 0elected 6y the :netw31k 7a1t 34 the; IP de0tinati3n add1e00 4ield in the 31iginal IP heade1
=+

<*.CP.=HH&.(>. Once the enca70ulated datag1a5 a11i8e0 at thi0 inte15ediate de0tinati3n n3de$ it i0 deca70ulated$ yielding the 31iginal IP datag1a5$ which i0 then deli8e1ed t3 the de0tinati3n indicated 6y the 31iginally enca70ulated IP datag1a590 de0tinati3n add1e00 4ield. Thi0 u0e 34 enca70ulati3n and deca70ulati3n 34 a datag1a5 i0 1e4e11ed t3 a0 tunneling$ and the enca70ulat31 and deca70ulat31 a1e c3n0ide1ed t3 6e the end73int0 34 the tunnel 0h3wn in 4igu1e0 ,.= and ,.(. The w31king 431 an enca70ulat31 and deca70ulat31 i0 0h3wn in Figu1e +.=. The end/73int0 34 a tunnel can al03 6e th3ught 34 a0 the 13ute 6etween the h35e agent and the ca1e/ 34 add1e00$ handled 6y the 431eign agent. It 0h3uld 6e n3ted that enca70ulati3n@deca70ulati3n i0 e57l3yed 3nly i4 the 536ile n3de i0 3n a 431eign netw31k. FI.URE +.= Si57le diag1a5 0h3wing IPIP 0che5e

Thi0 4act i0 de6ata6le$ the1e a1e 035e ca0e0 when thi0 5ight 4ail$ 31 035e 13uge n3de 5ay 4ake the IP add1e00 and 1e073nd in0tead. The1e a1e way0 t3 71e8ent thi0$ 6ut they a1e 6ey3nd the 0c37e 34 thi0 7a7e1.

SOURCE$ 0h3wn in Figu1e +$= 5ay 6e an Inte1net h30t 31 an3the1 536ile n3deD DESTINATION i0 the 536ile n3de 431 which the datag1a5 i0 intended. The h35e agent handle0 the 0ta1t 73int 34 the tunnel whe1e the enca70ulati3n i0 d3ne. At the end 73int 34 the tunnel$ 1e0ide0 the 431eign agent$ which deca70ulate0 the 7acket and deli8e10 the 7acket t3 the 536ile n3de. A 7136le5 a1i0e0 at the deca70ulati3n 73int. hen the enca70ulated 7acket i0 deca70ulated the 431eign agent 0ee0 =)

that the de0tinati3n 4ield 34 the 7acket actually 07eci4ie0 the add1e00 34 the h35e agent :h35e add1e00;. T3 a83id 0ending the 7acket 1ight 6ack t3 the h35e agent$ the 431eign agent 5u0t 6e 05a1t en3ugh t3 431wa1d the 7acket t3 the intended 536ile n3de identi4ied 6y it0 ha1dwa1e add1e00$ 1athe1 than the de0tinati3n IP add1e00. S35e 7136le50 with thi0 kind 34 03u1ce 13uting=G a1e <*.CP=HH&.(>C • S35e cu11ent 13ute10 d3 n3t handle datag1a5 53di4icati3n 31 e8en 03u1ce 13uting 8e1y well. • The1e a1e 035e 0ecu1ity i00ue0 with 03u1ce 13uting. • Enca70ulati3n cann3t 6e u0ed i4 it i0 kn3wn that the tunnel end/73int d3e0 n3t 0u7731t it :i.e. it cann3t deca70ulate it;. • Fi1ewall0 5ay cau0e 7136le50. At the t1an0731t laye1$ TCP and 3the1 t1an0731t 713t3c3l0 atte57t t3 344e1 a 531e c3n8enient a60t1acti3n 431 data 0e18ice0 than the cha1acte1i0tically cha3tic 0t1ea5 34 data e5anating 4135 IP. The 8aga1ie0 and ti5e de7endencie0 34 13ute10 and Inte1net c3nge0ti3n 34ten cau0e datag1a50 t3 6e deli8e1ed 3ut 34 31de1$ du7licated 31 e8en d1377ed enti1ely 6e431e 1eaching thei1 de0tinati3n. TCP atte57t0 t3 03l8e the0e and 3the1 7136le50$ 6ut 344e10 little hel7 in 0u77lying a 0teady :c3n0tant 6andwidth; 0t1ea5 34 data. O8e1 ti5e$ TCP ha0 6een 53di4ied t3 t1eat d1377ed 7acket0 a0 an indicati3n 34 netw31k c3nge0ti3n$ and the1e431e t3 th13ttle t1an05i00i3n0 a0 033n a0 a l30t 7acket i0 detected :6y 5anaging 0eBuence nu56e10;. In wi1ele00 c355unicati3n0$ a l30t 31 c311u7ted 7acket 5ay 6e cau0ed 6y n3i0y wi1ele00 channel$ i55ediate
=G

1et1an05i00i3n i0 the 6e0t way t3 c311ect thi0$ 1athe1 than delayed t1an05i00i3n. The1e i0 0till a l3t 34 1e0ea1ch g3ing 3n t3 4ind the 6e0t 03luti3n. At the t37 laye1 a1e the a77licati3n 713t3c3l0. De7ending 3n the t1an0731t 53del e57l3yed$ a77licati3n 713t3c3l0 a1e la1gely 41eed 4135 the ha00le0 34 e1131 c311ecti3n$ 1et1an05i00i3n$ 4l3w c3nt13l$ and the like. !3we8e1$ 536ility c1eate0 new need0 at the a77licati3n laye1$ which 1eBui1e additi3nal 713t3c3l 0u7731tC aut35atic c3n4igu1ati3n$ 0e18ice$ di0c38e1y$ link awa1ene00$ and en8i13n5ent awa1ene00. E00entially$ the0e 713t3c3l 0u7731t 5echani050 4315 a 0et 34 5iddlewa1e 0e18ice0. F31 e2a57le$ a 536ile c357ute1 5ight need t3 6e c3n4igu1ed di44e1ently at each di44e1ent 73int 34 attach5ent. A53ng 3the1 thing0$ a new DNS 0e18e1$ IP add1e00$ Link Mini5u5 T1an05i00i3n Unit :MTU;$ and de4ault 13ute1 5ay 6e 1eBui1ed. The0e c3n4igu1ati3n ite50 a1e u0ually th3ught 34 a0 6eing w31ked 3ut at 0etu7 ti5e 431 de0kt37 0y0te50$ 6ut 431 536ile c357ute10 n3 0ingle an0we1 can 6e 0u44icient. Recent de7l3y5ent 34 D!CP g3e0 035e way t3wa1d 1e03l8ing c3n4igu1ati3n di44icultie0$ 6ut i0 n3t the wh3le an0we1. Di0c38e1ing 0e18ice0 can 6e 53deled a0 a 1eBui1e5ent 431 aut35atic c3n4igu1ati3n$ 6ut i0 531e natu1ally u0e4ul when 0e18ice0 a1e l3cated u73n de5and and acc31ding t3 the need0 34 a77licati3n 713t3c3l0. Thi0 need i0 6eing in8e0tigated 6y 5any 5ean0$ Se18ice L3cati3n P13t3c3l 6eing 3ne 34 the 71i5a1y 3ne0. The Se18ice L3cati3n P13t3c3l 7138ide0 a 0cala6le 41a5ew31k 431 the di0c38e1y and 0electi3n 34 netw31k 0e18ice0. U0ing thi0 713t3c3l$ c357ute10 u0ing the Inte1net n3 l3nge1 need 03 5uch 0tatic c3n4igu1ati3n 34 netw31k 0e18ice0 431 netw31k/6a0ed a77licati3n0. Thi0 i0 e07ecially i5731tant a0 c357ute10 6ec35e 531e 731ta6le$ and u0e10 le00 t3le1ant 31 a6le t3 4ul4ill the de5and0 34 netw31k 0y0te5 ad5ini0t1ati3n <=H.M"$ et al.=HH'>.

S3u1ce 13uting i0 a techniBue 6y which the 0ende1 can 07eci4y the 13ute the datag1a5 will take. M36ile IP utiliFe0 L330e S3u1ce Rec31d R3ute :LSRR;$ in which the 0ende1 gi8e0 3ne 31 531e h370 that the 7acket 5u0t g3 th13ugh. An3the1 ty7e$ St1ict 03u1ce 13uting i0 n3t 8e1y c3553n.

==

One 34 the challenge0 34 0uch a1chitectu1e 34 5iddlewa1e i0 that it 344e10 a77licati3n0 the 37731tunity t3 detect the 0tate 34 the 7hy0ical link$ which 5ay change dyna5ically and in tu1n a44ect the a77licati3n90 7137e1 37e1ati3n. M36ility 1eBui1e0 that a77licati3n0 ada7t t3 changing c3nnecti3n 7a1a5ete10 0uch a0 6andwidth$ e1131 1ate$ and R3und/T1i7 Ti5e0 :RTT;. The 43ll3wing ta6le c3nclude0 thi0 0ecti3n and 0u55a1iFe0 what we kn3w 03 4a1 34 the 0e18ice0 7138ided@1eBui1ed 6y M36ile IP 6y 0h3wing the Netw31k Stack and it0 c311e073nding n35adic 0e18ice0 <().CP.=HH*>. TA-LE +.( NET OR% STAC% NOMADIC SER"ICES • Re03u1ce Di0c38e1y A77licati3n Laye1 T1an0731t Laye1
• Link Ada7tati3n Laye1 • C3nge0ti3n C3nt13l • Fl3w C3nt13l • Ouality 34 Se18ice • Add1e00ing • R3uting • L3cati3n Manage5ent • Authenticati3n • Signal M3dulati3n • Enc1y7ti3n • C3571e00i3n • Inte14e1ence • Channel Acce00@Selecti3n

all3w0 a u0e1 t3 5aintain a c3n0tant c3nnecti3n t3 the 1ecei8e1$ and 8ice/8e10a. A 6ig di44e1ence in thi0 anal3gy i0 the 4act that it t33k a l3ng ti5e 431 536ile 7h3ne0 t3 6ec35e acce7ted in the c3n0u5e1 5a1ket. The 713hi6iti8e c30t 34 cellula1 techn3l3gy and li5ited a1ea0 34 c38e1age di0c3u1aged 5any u0e10 4135 u0ing cellula1 7h3ne0. M36ile c357uting i0 gua1anteed t3 6ec35e a h3t techn3l3gy$ a0 acce7tance 34 536ile de8ice0 that can 6e 53di4ied t3 0u7731t Inte1net acce00 i0 al1eady 737ula1 with c3n0u5e10. S35e 5anu4actu1e0 a1e al1eady 7138iding 731ta6le de8ice0 that all3w wi1ele00 Inte1net acce00. !a8ing al1eady 43und u0e1 acce7tance$ 536ile c357uting 5ay 6ec35e 737ula1 5uch 4a0te1. A0 5enti3ned$ 3ne 34 the 6igge0t ad8antage0 34 M36ile IP i0 that the u0e1 can 0ea5le00ly 538e a63ut with3ut ha8ing t3 1ec3nnect@1ec3n4igu1e at e8e1y 73int 34 attach5ent. The 5ain ai5 34 M36ile IP with the aid 34 the 713t3c3l0 di0cu00ed in the 71e8i3u0 0ecti3n i0 t3 7138ide c357letely aut35atic$ n3n/inte1acti8e 1ec3nnecti3n t3 netw31k acti8itie0 4135 any 73int 34 attach5ent. The i5731tant ad8antage0 34 M36ile IP a1eC  L3cati3n inde7endent acce00 t3 c357uting 1e03u1ce0  i1ele00 netw31k acce00  Ea0e 34 and c35431ta6le 37e1ati3n A u0e1 can w31k 4135 al530t anywhe1e  Ec3n35y A M36ile netw31king en8i13n5ent0 can 0a8e a l3t 34 53ney 6y a83iding ca6ling c30t0 and the 0u60eBuent 5aintenance :wea1 and tea1; that c35e with wi1e0.  S34twa1e 1eu0a6ility A E2i0ting a77licati3n0 d3 n3t ha8e t3 6e 53di4ied in 31de1 t3 6e a6le t3 acce00 a netw31k 38e1 M36ile IP.  C3ntinu3u0 c3nnecti8ity S35e e2a57le0 34 M36ile IP in acti3n ha8e al1eady 6een gi8en in 0ecti3n , 34 thi0 7a7e1. =(

Netw31k Laye1

Phy0ical@Link Laye1

1. NEED ,OR MOBILE IP A g33d anal3gy 431 M36ile IP i0 the de8el375ent 34 M36ile Cellula1 7h3ne0 38e1 the 7a0t decade. A l3t 34 cu0t35e10 ha8e 5ig1ated 4315 the t1aditi3nal 4i2ed/73int tele7h3ne0 :7h3ne0 which 1eBui1e a 4i2ed 7h3ne/Eack in the wall; t3 Cellula1 7h3ne0 which all3w the u0e1 t3 6e in 53ti3n while talking t3 035e3ne. Thi0 536ility i0 achie8ed 6y u0ing techn3l3gy that

S35e 531e e2a57le0 can 6e gi8en whe1e the u0e 34 M36ile IP can 6e c1itical t3 0ucce00C  C3lla631ati8e 344ice en8i13n5ent0C E57l3yee0 can 41eely 538e a63ut with 536ile de8ice0 and 6e a6le t3 inte1act$ 0ha1e and di0cu00 data 3n thei1 de8ice0 6y 6eing a6le t3 5eet 3n a 7e103nal le8el. Ai16u0 ichita ha0 a c3lla631ati8e enginee1ing 4acility that 5ay 6e a6le t3 u0e thi0 e44ecti8ely <(=.ML.()),>.  !307ital0C D3ct310 can get i55ediate in4315ati3n 3n thei1 536ile de8ice0 3n thei1 7atient0 with3ut ha8ing t3 g3 t3 thei1 te15inal0 A they can the needed in4315ati3n in the 71e0ence 34 the 7atient. U0ing thi0 kind 34 acce00 will 6e 7a1ticula1ly u0e4ul t3 E5e1gency Medical Se18ice0. Such 0e18ice0 a1e al1eady 6eing te0ted <((.EMS>.  -attle4ield O7e1ati3n0C i1ele00 83ice c355unicati3n ha0 6een 5ain0tay in the 5ilita1y 431 5any decade0 n3w$ 6ut with the ad8ent 34 new 5ilita1y techn3l3gy the need i0 the1e t3 7138ide de8ice0 that can 1ecei8e@1elay i5731tant 6attle4ield data t3@4135 a cent1al c357ute1 <(,.MM.())(>.  Ca57u0@C3llege en8i13n5ent0C Ca57u0 en8i13n5ent0 will 6ene4it g1eatly 4135 the i57le5entati3n 34 M36ility within the ca57u0 en8i13n5ent. Thu0$ 3nce 7136le50 34 536ile c357uting a1e i13ned 3ut$ al530t any c357uting en8i13n5ent$ which need0 Inte1netw31king$ can 6ene4it g1eatly 4135 the i57le5entati3n 34 M36ile IP. 2. IMPLEMENTATIONS O, MOBILE IP The1e a1e nu5e13u0 i57le5entati3n0 34 M36ile IP. Al1eady the1e a1e de8ice0 which 0u7731t M36ile IP$ and thi0 i0 3nly 4u1the1ed 6y techn3l3gie0 431 M36ile IP that ha8e 6een e2tended t3 di44e1ent O7e1ating 0y0te50 0uch a0 Linu2$ and al03 t3 IP8&. Thi0 0ecti3n will includeC

&.= A 0h31t di0cu00i3n 34 M36ile IP8& &.( M36ile IP unde1 Linu2 &., De8ice0 de8el37ed and 6eing de8el37ed which 0u7731t M36ile IP 2.1 A s$o # (isc*ssio! o' Mo3i+e IPv2 IP8& wa0 de8el37ed t3 include enhance5ent0 4135 IP8+ and 5any new techn3l3gie0 that a1e 5i00ing 4135 IP8+. M36ile IP8& c3ntain0 5any 4eatu1e0 that we1e 031ely 5i00ed in M36ile IP8+. P1inci7ally the 536ility 0u7731t 431 Inte1net de8ice0 in 7300i6le and 0tanda1diFed 431 63th IP 713t3c3l 8e10i3n0$ IP8+ and IP8&$ 6ut due t3 the enhanced 4uncti3nality and late1 de0ign 34 IP8& 035e 4eatu1e0 c3nce1ning the 536ility 0u7731t ha8e 6een integ1ated 531e e44iciently in M36ile IP8& when c357a1ed t3 M36ile IP8+. S35e i5731tant ad8antage0 34 M36ile IP8& and di44e1ence0 4135 IP8+ a1e <(+. F$ F!.()))$ (G.DM$ et al.()),>C • A 536ile n3de 1eBui1e0 a new ca1e/34 add1e00 e8e1y ti5e it change0 it0 73int 34 attach5ent. The1e i0 a 7300i6ility unde1 IP8+ that a8aila6ility 34 the0e add1e00e0 6ec35e0 a 7136le5. Due t3 the huge nu56e1 34 add1e00e0 a8aila6le unde1 IP8&$ a00igning add1e00e0 will ne8e1 6e a 7136le5. • U0ing anyca0t add1e00 34 IP8& ena6le0 a n3de t3 0end a 7acket t3 3ne 3ut 34 0e8e1al 0y0te50 ha8ing thi0 anyca0t add1e00 a00igned t3 3ne 34 thei1 inte14ace0. M36ile IP8& 5ake0 e44icient u0e 34 thi0 5echani05 431 the dyna5ic h30t di0c38e1y 5echani05 6y 0ending a 6inding u7date t3 the h35e agent anyca0t add1e00 and getting a 1e073n0e 4315 e2actly 3ne h35e agent. Thi0 i0 a60ent 4135 IP8+. • E57l3ying Statele00 Add1e00 Aut3c3n4igu1ati3n and Neigh631 Di0c38e1y 5echani050 M36ile IP8& neithe1 need0 D!CP n31 431eign agent0 t3 c3n4igu1e ca1e/ 34 add1e00e0. U0ing Neigh631 Di0c38e1y$ M36ile IP8& d3e0 n3t need t3 u0e ARPD thi0 i57138e0 38e1all 136u0tne00 34 the 713t3c3l. =,













M36ile IP8& can u0e IP0ec :IP Secu1ity P13t3c3l; 431 all 0ecu1ity 1eBui1e5ent0$ like authenticati3n$ data integ1ity 713tecti3n$ and 1e7lay 713tecti3n. Thi0 i0 7e1ha70 the 6igge0t di44e1ence 6etween M36ile IP8+ and M36ile IP8&. R3ute 37ti5iFati3n i0 g1eatly i57138ed and i0 a 4unda5ental 7a1t 34 M36ile IP8&. M36ile IP8& 13ute 37ti5iFati3n can 37e1ate 0ecu1ely e8en with3ut 71e/a11anged 0ecu1ity a003ciati3n0. It i0 e27ected that 13ute 37ti5iFati3n can 6e de7l3yed 3n a gl36al 0cale 6etween all 536ile n3de0 and h30t0 that 0end data t3 the5. M36ile IP8& ha0 n3 7136le50 with ing1e00 4ilte1ing$ thi0 i57138e0 e44iciency and the wa0te4ul techniBue 34 Re8e10e Tunneling i0 n3t 1eBui1ed. The 538e5ent detecti3n 5echani05 in M36ile IP8& 7138ide0 6idi1ecti3nal c3n4i15ati3n 34 a 536ile n3de90 a6ility t3 c355unicate with it0 13ute1 4135 it0 cu11ent l3cati3n. Packet0 in M36ile IP8+ 1eBui1e enca70ulati3n i4 the 536ile n3de i0 away 4135 h35e$ 7acket0 in M36ile IP8& a1e 0ent u0ing a M36ile IP8& 13uting heade1$ d3ing away with the need 431 enca70ulati3n@ deca70ulati3n techniBue0. Thi0 1educe0 the a53unt 34 1e0ulting 38e1head c357a1ed t3 M36ile IP8+. Managing tunnel J034t 0tateK i0 unnece00a1y in M36ile IP8&.



M36ile 13ute10 a1e n3t inhe1ently 0u7731tedD the0e ha8e t3 6e de0igned 6y the 8end31.

A 4ull di0cu00i3n 34 IP8& i0 w31thy 34 a wh3le new 7a7e1$ h3we8e1$ in thi0 int13duct31y 7a7e1 it i0 0u44icient t3 0ay that M36ile IP8+ c3ntain0 5any enhance5ent0 38e1 M36ile IP8+ and i0 de4initely the way t3 g3 431 4utu1e 536ile de8ice0. 2.2 Mo3i+e IP *!(e Li!*4 The1e i0 cu11ently a l3t 34 1e0ea1ch and i57le5entati3n0 34 M36ile IP unde1 Linu2$ Eu0t t3 na5e a 4ewC o M30Buit3 Net / htt7C@@530Buit3net.0tan431d.edu@5i7@ o Dyna5ic0 A !UT M36ile IP / htt7C@@www.c0.hut.4i@Re0ea1ch@Dyna5ic0@ o Lanca0te1 M36ile IP8& Package / htt7C@@www.c0/ i78&.lanc0.ac.uk@i78&@M36ileIP@ o P31tland State Uni8e10ity / htt7C@@www.c0.7d2.edu@1e0ea1ch@SMN@ A0 can 6e 0een$ the1e a1e Buite a 4ew i57le5entati3n 34 M36ile IP8& 431 Linu2$ 3ne c3553n den35inat31 i0 that 530t 43cu0 i0 n3w 0hi4ting t3wa1d0 M36ile IP8& due the 6uilt/in IP8& 4uncti3nality in Linu2 ke1nel0 a8aila6le t3day :"e10i3n0 (.=.2;. 2.) Devices (eve+o5e( %!( 3ei!" (eve+o5e( 6$ic$ s*55o # Mo3i+e IP C357anie0 which 5anu4actu1e de8ice0 0uch a0 la7t370$ PDA90 and 0i5ila1 de8ice0 a1e 0h3wing a l3t 34 inte1e0t in M36ile IP a0 a way t3 7138ide 1elia6le and Jalway0/3nK c3nnecti3n0 t3 0e18ice0 0uch a0 we6 613w0ing and e/5ail. Ea1thlink$ Pal5@!and071ing$ S3ny$ and 3the1 c357anie0 a1e in8e0ting hea8ily t3 get the edge in de8el37ing a de8ice that can 0u7731t 0ea5le00 536ility.

C3n8e10ely$ M36ile IP8& d3e0 n3t 03l8e all gene1al 7136le50 1elated t3 the u0e 34 536ility 31 wi1ele00 netw31k0$ 035e i5731tant e2a57le0 <(G.DM$ et al.()),>C • M36ile IP8& d3e0 n3t handle link0 with 7a1tial c3nnecti8ity 31 unidi1ecti3nal c3nnecti8ity. • Acce00 c3nt13l 3n a link 6eing 8i0ited 6y an3the1 536ile n3de i0 n3t handled. • A00i0tance 431 ada7ti8e a77licati3n0 i0 a60ent.

=+

S35e e2a57le0 34 8end310 de8el37ing 713duct0 07eci4ically t3 0u7731t M36ile IP a1e IPAO G+GG 4135 !ewlett Packa1d$ 0u7731ted 6y T/536ile. The IPAO 1etail0 431 a63ut Q&))/Q')) and ha0 a 53di4ied 8e10i3n 34 the ind3w0 37e1ating 0y0te5. S35e new the newe1 53del0 34 PDA90 4135 Pal5 and S3ny al03 ha8e ni4ty wi1ele00 4eatu1e0. Re0ea1ch i0 unde1way at the la60 34 5aE31 8end310 t3 713duce de8ice0 which a1e 4ully ca7a6le i4 wi1ele00 c355unicati3n$ 34 c3u10e$ the in41a0t1uctu1e need0 t3 6e in 7lace 431 t1ue n35adic c357uting. In 035e 34 the 5aE31 5et1373litan citie0$ whe1e 0uch in41a0t1uctu1e e2i0t0 wi1ele00 c355unicati3n0 ha8e 7138ed t3 6e 71icele00. Thi0 wa0 6e0t de53n0t1ated 6y 3ne 34 the 6igge0t t1agedie0 t3 ha77en t3 the United State0. In the a4te15ath 34 the Se7te56e1 ==th te1131i0t attack0$ hund1ed0 34 344ice w31ke10$ 4inding the50el8e0 with3ut an 344ice$ tu1ned t3 wi1ele00 c355unicati3n0 t3 ca11y 3ut the 530t 8ital 34 6u0ine00 ta0k0. Cellula1 techn3l3gy and 536ile c357uting al03 all3wed 1e0cue and 3the1 37e1ati3n0 t3 6e ca11ied 3ut with 035e 0e56lance 34 1elia6ility in the 5id0t 34 t1e5end3u0 de0t1ucti3n <(&.SM.()),>. 7. CONCLUSION A0 thi0 int13duct31y 7a7e1 ha0 0h3wn$ M36ile IP ha0 g1eat 73tential. ithin the IETF$ M36ile IP al1eady ha0 a la1ge nu56e1 34 63th RFC0 and D1a4t0$ which indicate0 that M36ile IP ha0 6een a well 1e0ea1ched 4ield and that a g1eat deal 34 cu11ent 1e0ea1ch i0 3ng3ing a0 well :A 0ea1ch in IETF we60ite$ htt7C@@0ea1ch.iet4.31g@$ 1e8ealed =($)*& d3cu5ent0;. Te0t 1e0ult0 ha8e gi8en added c3n4idence that the M36ile IP 07eci4icati3n i0 03und$ i57le5ent a6le$ and 34 di8e10e inte1e0t th13ugh3ut the

Inte1net c355unity. M36ile IP 07eci4icati3n ha0 al03 6een ea0ily inte171eted 6y netw31k 713t3c3l enginee10 and netw31k 713g1a55e10 <=*.TIA.=HHG>. It i0 7300i6le that the de7l3y5ent 7ace 34 M36ile IP will t1ack that 34 IP8&$ 31 that the 1eBui1e5ent0 431 0u7731ting 536ility in IP8& n3de0 will gi8e additi3nal i57etu0 t3 the de7l3y5ent 34 63th IP8& and 536ile netw31king. The inc1ea0ed u0e1 c3n8enience and the 1educed need 431 a77licati3n awa1ene00 34 536ility can 6e a 5aE31 d1i8ing 431ce 431 ad37ti3n. Since 63th IP8& and M36ile IP ha8e little di1ect e44ect 3n the 713t3c3l 0tack$ a77licati3n de0igne10 0h3uld 4ind thi0 t3 6e an acce7ta6le 713g1a55ing en8i13n5ent. O4 c3u10e$ e8e1ything de7end0 hea8ily 3n the willingne00 34 7lat4315 and 13ute1 8end310 t3 i57le5ent M36ile IP and@31 IP8&. Indicati3n0 a1e the1e a1e 530t 5aE31 8end310 a1e al1eady dedicating a l3t 34 ti5e and 53ney t3 thi0 4ield which ha0 en3153u0 73tential. RE,ERENCES 81.CP.2992: Cha1le0 E. Pe1kin0. IP M36ility Su7731t. htt7C@@www.iet4.31g@14c@ 14c,,++.t2t. Augu0t ())( 82.IP.299): i7Un7lugged hite Pa7e1 A M36ility and M36ile IP$ Int13ducti3n. ()), 8).AD.2992: Andy D31nan. M36ile IP.htt7C@@www.netw31k5againe.c35@a1ticle@ NM.())()+(HS))=,. Mune ())(. 8..CP.1;;2: Cha1le0 E. Pe1kin0. M36ile IP$ Ad/ !3c Netw31king and N35adicity. htt7C@@cite0ee1.nE.nec.c35@,+*(+. ht5l. =HH&.

81.CP.1;;;: Cha1le0 Pe1kin0. M36ile Netw31king Th13ugh M36ile IP. htt7C@@www.c357ute1.31g@inte1net@8(n=@ =G

7e1kin0.ht5l. =HHH.

82.SED.1;;1: S.E. Dee1ing. ICMP R3ute1 Di0c38e1y Me00age0. htt7C@@www.iet4.31g@14c@14c=(G&.t2t. Se7te56e1 =HH=.
87.<S.1;;2: M. S3l353n$ A77lica6ility State5ent 431 IP M36ility Su7731t. htt7C@@www.iet4.31g@14c@14c())G.t2t. Oct36e1 =HH&.

htt7C@@www.iet4.31g@inte1net/d1a4t0@d1a4t/iet4/ aaa/dia5ete1/='.t2t. Dece56e1 ())(. 811.P,, e# %+.1;;=: P. Fe1gu03n$ D. Senie. Netw31k Ing1e00 Filte1ingC De4eating Denial 34 Se18ice Attack0 which e57l3y IP S3u1ce Add1e00 S7334ing. htt7C@@www.iet4.31g@14c@ 14c((&'.t2t. Manua1y =HH*. 812.GM.2991: .. M3nteneg13. Re8e10e Tunneling 431 M36ile IP$ 1e8i0ed. htt7C@@www.iet4.31g@14c@14c,)(+.t2t. Manua1y ())=. 817.<I, e# %+.1;;2: M3hn I3annidi0$ Dan Ducha57 I .e1ald O. Magui1e M1. IP/6a0ed 713t3c3l0 431 M36ile Inte1netw31king. =HH&. 81=.TIA.1;;1: Telec355unicati3n0 Indu0t1y A003ciati3n. M36ile Stati3n /// -a0e Stati3n c357ati6ility 0tanda1d 431 dual53de wide6and 071ead 07ect1u5 cellula1 0y0te50. Muly =HHG. 81;.<-, e# %+.1;;7: M. "eiFade0 E. .utt5an$ C. Pe1kin0$ S. %a7lan. Se18ice L3cati3n P13t3c3l. htt7C@@www.iet4.31g@14c@14c(=&G.t2t. Mune =HH'. 829.CP.1;;=: Cha1le0 E. Pe1kin0. M36ile Netw31king in the Inte1net. htt7C@@nt1g.c0.tcd. ie@htewa1i@7a7e10@5nt)'=.7d4. =HH*. 821.<L.299): M3hn O9Lea1y. 31ld T1ade C3uncil 34 ichita Inc. P13g1a5 P13ceeding0. A71il ()),. 822.EMS: E5e1gency Medical Se18ice0C Li4eLink M3del De7l3y5ent Initiati8e Sy0te5 U0e10 Manual. htt7C@@www.t1an0guide. d3t.0tate.t2.u0@[email protected]. 82).<<.2992: M3a6 Mack03n. M36ile IP netw31k0 0ti1 inte1e0t. htt7C@@www.wa0hingt3ntechn3l3gy.c35@

8=.CP.1;;2.2: Cha1le0 E. Pe1kin0. IP Enca70ulati3n within IP. htt7C@@www.iet4.31g@14c@14c()),.t2t. Oct36e1 =HH&
8;.CP.1;;2.): Cha1le0 E. Pe1kin0. Mini5al Enca70ulati3n within IP. htt7C@@www.iet4.31g@14c@14c())+.t2t. Oct36e1 =HH&. 819.CW, e# %+.2992: Chun/!0in u$ Ann/ TFung Cheng$ Sha3/Ting Lee$ Man/Ming !3$ De1/T0ai Lee. -i/di1ecti3nal R3ute O7ti5iFati3n in M36ile IP O8e1 i1ele00 LAN. ())(. 811.CS.2991: Ci0c3 Sy0te50. Ci0c3 M36ile Netw31k0. htt7C@@www.ci0c3.c35@wa17@7u6lic @',(@Tech@536ile@netw31k0@. ())=. 812. SN, RP. 2992: Sanket Ne0a1gi$ Ra8i P1aka0h. C3n4igu1ati3n 34 !30t0 in a M36ile Ad !3c Netw31k. ())(.

81).CR, e# %+.2999: C. Rigney$ S.

illen0 Li8ing0t3n$ A. Ru6en0 Me1it$ . Si5703n Dayd1ea5e1. Re53te Authenticati3n Dial In U0e1 Se18ice :RADIUS;. htt7C@@www.iet4.31g@14c@14c(*&G.t2t. Mune ())).

81..PC, e# %+.2992: Pat R. Calh3un$ M3hn L3ughney$ E1ik .utt5an$ .len R31n$ Ma1i A1kk3. Dia5ete1 -a0e P13t3c3l. =&

new0@='S=*@e5e1gingtech@=H&++/=.ht5l. Dece56e1 ())(. 82..W,, ,H.2999: 3l4gang F1it0che$ Fl31ian !ie00enhu6e1. M36ile IP8&$ M36ilty Su7731t 431 the Ne2t .ene1ati3n Inte1net. ())). 821.D<, e# %+.299): D. M3hn03n C. Pe1kin0 M. A1kk3. M36ility Su7731t in IP8& < 31k in P13g1e00>. htt7C@@www.iet4.31g@inte1net/ d1a4t0@d1a4t/iet4/536ilei7/i78&/(=.t2t. Fe6 ()),. 822.SM.299): Sun Mic130y0te50. All IP i1ele00 All the ti5e. htt7C@@1e0ea1ch.0un.c35 @4eatu1e0@[email protected]

='

Sponsor Documents

Or use your account on DocShare.tips

Hide

Forgot your password?

Or register your new account on DocShare.tips

Hide

Lost your password? Please enter your email address. You will receive a link to create a new password.

Back to log-in

Close