Mobile Computing Unit 1
Mobile Computing Unit 1
Assistant Professor
Department of Computer Science and Engineering
SKIT-Jaipur
1
Presentation Outline
What is mobile computing?
Comparison to wired networks
Why go mobile?
Types of wireless devices
Mobile objects
Moving object databases (MOD)
Query language for MOD
Applications of mobile computing
Challenges
Future of mobile computing
Conclusion
2
What Is Mobile Computing?
What is computing?
Operation of computers (according to oxfords
advance learner’s dictionary)
What is the mobile?
That someone /something can move or be moved
easily and quickly from place to place
What is mobile computing?
Users with portable computers still have network
connections while they move
3
What Is Mobile Computing? (Cont.)
Is using a digital camera “Mobile Computing”, or
using an MP3 player or handheld computer (e.g.
3Com’s Palm Pilot or Compaq’s iPAQ 3660)?
4
What Is Mobile Computing? (Cont.)
A simple definition could be:
Mobile Computing is using a computer (of one kind or
another) while on the move
Another definition could be:
Mobile Computing is when a (work) process is moved from a
normal fixed position to a more dynamic position.
A third definition could be:
Mobile Computing is when a work process is carried out
somewhere where it was not previously possible.
5
What Is Mobile Computing? (Cont.)
Mobile Computing is an umbrella term used to
describe technologies that enable people to access
network services anyplace, anytime, and
anywhere.
6
Comparison to Wired Net.
Wired Networks Mobile Networks
- high bandwidth - low bandwidth
- low bandwidth - high bandwidth
variability variability
- can listen on wire - hidden terminal problem
- high power machines - low power machines
- high resource machines - low resource machines
- need physical - need proximity
access(security) - higher delay
- low delay - disconnected operation
- connected operation
7
Why Go Mobile?
Enable anywhere/anytime connectivity
Bring computer communications to areas without
pre-existing infrastructure
Enable mobility
Enable new applications
An exciting new research area
8
Types of Wireless Devices
Laptops
Palmtops
PDAs
Cell phones
Pagers
Sensors
9
What is Mobile Computing?
Computing enabled by presence of wireless
enabled portable devices (PDAs, cell phones)
Some other names
Pervasive computing
Ubiquitous computing
Wireless computing
Embedded computing
Wireless communication is needed
Focus on logical aspects of mobile communication
What kind of application can be enabled by mobile
computing?
Design issues in mobile application and system
What is Mobile Computing?
Mobile Computing
Computing Platforms: PDAs, Smartphone, Pocket
PCs, Tablet PCs, Laptops
Networked embedded processors & apps
Information & computing anytime, anywhere
Distributed computing
Nodes (computers)
Communications
Computing tasks
Mobile Computing Applications
Email
Internet access
Personal Information Management (PIM)
Instant Messaging
Data & information access
Context-aware applications
Audio streaming
Video streaming
Cell phone
VoIP via WiFi
Mobile Computing Applications
Pervasive/ubiquitous computing: computing everywhere
Home appliances: refrigerator, washer/dryer, thermometer,
microwave, dishwasher, what else - rumba the vacuum cleaner
Mobile devices: laptop, PDA, PocketPC, iPhone, cell phones
Home electronics: TV, DVD player, satellite TV set-top boxes, cd
players, Stereos, iPod, Gameboy/Sony psp/Nintendo DS
Location positioning devises – GPS, MPS
Automobiles – every modern car is a network of computers
Tags – RFIDs, SmartCards
Sensor network and Smart Dust
Smart homes, wearable computing, ….
Mobile Objects
A mobile object is some
code that carries a state
14
Mobile Objects (Cont.)
A mobile object is some
code that carries a state
that lives on a host
15
Mobile Objects (Cont.)
A mobile object is some
code that carries a state
Lives in a host
That visits places
16
Mobile Objects (Cont.)
A mobile object is some
code that carries a state
Lives in a host
That visits places
which is let in when
trusted
17
Mobile Objects (Cont.)
A mobile object is some
code that carries a state
Lives in a host
That visits places
which is let in when
trusted
and barred when untrusted
18
Mobile Objects (Cont.)
A mobile object is some code
that carries a state
Lives in a host
That visits places
which is let in when trusted
and barred when untrusted
and will refuse to go to
untrustworthy places
19
Mobile Objects (Cont.)
Mobile objects can talk to
their friends
20
Mobile Objects (Cont.)
Mobile objects can talk to
their friends
but only by co-operation
of the hosts
21
Moving Object Databases (MOD)
Deals with Mobile Objects whose geometry, position
changes over time
Traditional DBMS alone is incapable for this purpose
MOD is built on top of existing DBMS to support a
critical set of capabilities
22
Moving Object Databases (MOD)
(Cont.)
DOMINO (Databases for Moving Objects Tracking)
Approach
System Architecture
DOMINO
ArcView GIS
Informix DBMS
23
Moving Object Databases (MOD)
(Cont.)
Omnitracs
- developed by Qualcomm
- Is a commercial system used by the transportation
industry
- Provides location management by connecting
vehicles, via satellites, to company DB
- Vehicles are equipped with GPS, and they they
automatically and periodically report their
location
24
Query Language for MOD
Regular query language (SQL) is nontemporal
For MOD we need Spatial and Temporal Query
language
“Where is the nearest station?”
“What is the distance of the closest taxicab?”
25
Query Language for MOD
(Cont.)
Some proposed query language:
- Future Temporal Logic (FTL)
- MobSQL
SQL like query languages with specific predicates and
operators to address temporal issues
26
Query Language for MOD
(Cont.)
What is the nearest station?
SELECT station.name, station.address
FROM station in Stations
WHERE NEAREST (HERE,station);
“At what time truck 12A arrive to Windsor ”
SELECT t
FROM v in Trucks, c in Cities
WHERE v WITHIN(t) c and v.id = 12A
and c.name=Windsor
27
Applications of Mobile
Computing
Emergency services
28
Applications of Mobile
Computing (Cont.)
For Estate Agents
In courts
In companies
Stock Information Collection/Control
Credit Card Verification
Taxi/Truck Dispatch
Electronic Mail/Paging
29
Challenges
Disconnection
Low bandwidth
High bandwidth variability
Low power and resources
Security risks
Wide variety terminals and devices with
different capabilities
Device attributes
Fit more functionality into single, smaller
device
30
Future of Mobile Computing
Use of Artificial Intelligence
Integrated Circuitry -> Compact Size
Increases in Computer Processor speeds
31
Conclusion
Mobile computing has severe limitations
- however, it is far from impossible, and technology
improves all the time
Lots of challenges
- some have (good) solutions, many others are still
waiting to be solved
32
References
Papers:
- “Moving Object Databases: Issues and Solution” by Ouri Wolfson,
Bo Xu, Sam Chaamberlain and Liqin Jiang
- “DOMINO: Databases for Moving Objects Traking” by Ouri
Wolfson, Bo Xu, Sam Chaamberlain, Liqin Jiang and Prasad Sistla
- “MobSQL, An SQL Like Query Language for Mobile Objets
Databases” by Ahmed Lbath and Mourad Ouziri
WWW Links:
- http://www.doc.ic.ac.uk/~nd/surprise_96/journal/vol4/
vk5/report.html
- http://www.doc.ic.ac.uk/~nd/surprise_96/journal/vol1/vk5/article1
.html
- http://www.cs.ucsb.edu/~ebelding/courses/284/w04/slides/intro.
pdf
- http://www.ansa.co.uk/ANSATech/ANSAhtml/98-
ansa/external/9807tb/9807mose.pdf
- http://www.danishtechnology.dk/it/9238
33
Mobile Computing?
Computer History
Mainframe, Microcomputers, Microcontrollers
Networking
Dialup, TCP/IP, Ethernet LAN, WAN, Wi-Fi,
Client-Server Computing
Web server, File Server, Database server
Distributed Computing
Grid computing
Peer-to-peer Computing
Mobile Computing
Mobile Computing Applications
User Groups
Cellular phone/VoIP
Personal Information Management (PIM)
Mobile Internet Access
Mobile Multimedia Entertainment
Business User Applications
Mobile Enterprise
Retail/Supply Chain
Intelligent Transportation
Maintenance and Field Service
Healthcare
Homeland Security/Emergency
Military
Mobile Computing Constraints
Resource-poor
Battery packs
Hardware: Memory, CPU, peripherals
Software
Battery lifetime will see very small
increase
Need energy efficient hardware and
system software
Planned disconnections – doze mode
Mobile Computing Constraints
Less secure and less reliable
Lost or stolen
Hostile or unfriendly environment
Mobile connectivity
Dynamic changes in environment:
infrastructure
Highly variable: bandwidth, latency
Reliability: disconnections
What Needs
Operating to be Reexamined?
systems
File systems
Database systems
Programming Languages
Communication architecture and protocols
Hardware and architecture
Real-Time, multimedia, QoS
Security
Application requirements and design
Adaptability – the Key to Mobile Computing
Scenario – searching for information
Adaptive to location, user’s preference
Scenario - Video streaming application
Adaptive to available resource, video contents
Continuous streaming
Routing video stream packets
Access points
New IP address
Adaptability – the Key to Mobile Computing
Vision
Adapt to dynamic changes in environmental and
system conditions
System agility
speed and accuracy with which an adaptive application
detects and responds to change in computing environment
Roam seamlessly
Perform computing and communication task
uninterrupted
E.g., mobile video streaming
Less human intervention
Adaptability – the Key to Mobile Computing
Fundamental to mobile computing is various
techniques in hardware/software to adapt to
resource availability
Take into account contextual information including
user preferences
Wireless sensor networking is enabling
technology for pervasive/ubiquitous computing
Middleware deals with the heterogeneity of the
mobile devices.
Who should be responsible for adaptation
system or application?
Application transparent or application aware?
Application Transparent
Transparency – the ability of system to hide
some characteristics of underlying
implementation from users.
Access transparency
Location transparency
Failure transparency
Application works with no modification in mobile
environment
Proxy can be provided to hide the differences
between the stationary and mobile environment
from applications.
Adaptive system is responsible for adaptation
Constraints of mobile computing
environment
Mobile computers can be expected to be more
resource –poor than their static counterparts.
mobile computers are less secure and reliable.
mobile connectivity can be highly variable in terms of
its performance(bandwidth and latency) and
reliability.
Application-Aware Adaptation
Adaptive system is responsible for adaptation
Does application-transparent way of adaptation suffice in mobile
computing?
Performance issue, difficult for system adaptive to different
applications, manual intervention may be needed
Allows Applications to react to mobile resource changes
How?
Collaboration between System and individual Applications
System monitors resource levels and notifies applications of
relevant changes
Application then adapts to the change
Application-Aware Adaptation
Multimedia Application
Applications
Video Conferencing on mobile devices
Conserve energy
Laissez- Application-
faire(no system transparent(no
support) changes to
Mechanism for Adaptation
Mechanisms for adaptation
Adapting Functionality of Mobile Application
Adapting Data – delivered
Adapting Functionality
Classic client-server systems assume
location of client and server hosts do not change
connection among them does not change
66
A Glimpse of the Future
Imagine you are a tourist in Paris
with a wearable computer
Let’s go . . . . . .
67
What Makes This Science Fiction?
Lack of hardware?
No! We have what we need.
Lack of applications?
Nope - we have those too.
68
Problems
with Mobility
Mobile elements are resource-poor
relative to static elements of same era
weight, power, size constraints
Who adapts?
System?
take advantage of good times
Behave ok during bad times
CODA
70
Client Adaptation
71
Adaptive Applications
…so…
72
Who Controls Adaptation
Individual applications?
Both!
… Application-Aware Adaptation
73
Application-Aware Adaptation
Application only (laissez faire)
What if different applications compete for the
resources?
OS only (application-transparent)
Does not differentiate between applications (student
viewing a video of a lecture vs. a video
teleconference)
75
76
Applications
Video
server offers movie at several levels of fidelity
application plays the track that the current bandwidth can support
xanim: split into client and server
WWW
“distillation server” degrades data before shipping to client
images can be compressed
HTML can be summarized
Netscape: client-side proxy + remote distillation server
Speech Recognition
local/remote/hybrid execution
Janus: support remote recognition method, hybrid
Other?
77
Odyssey
A Platform for adaptive mobile data access
• Implementation:
• Need a central component for resource monitoring
and management (Viceroy)
• Need data aware components that offer fidelity
choices (Wardens)
78
Viceroy and Wardens
System-level data differentiation through wardens
specialized code components (a la device drivers)
provides system-level support to manage a data type
trusted entities (unlike applications)
79
Odyssey Architecture
Application Web
Warden
viceroy
Odyssey runtime Video
warden
Odyssey calls
Upcalls
Sys calls
Tsop,
kernel Interceptor request
80
Resource Negotiation
Applications give viceroy a window of tolerance for some resource
viceroy monitors resource availability
if it leaves window, notifies application via upcall
Available bandwidth
81
Viceroy
Monitors resources and notifies applications of any
changes in resource levels
Does this apply to non-mobile applications?
Viceroy acts as a single point of resource control
1. Select fidelity
(application)
1. Detect change
1. Notify application
84
Agility
An Odyssey client must estimate the quality of network paths used
by various applications.
Odyssey records:
Round-trip time
Throughput
85
Agility (cont.)
86
Agility (cont.)
87
Stability
Pursuing agility while completely sacrificing
stability can be counterproductive.
Rapidly switching
Low-fidelity
Variable latency
Stability is properly incorporated by individual
application.
When notifying an application , the viceroy can
include information about the expected variance of
estimate.
88
Client/Server Computing
Cache Coherency:
- cache invalidation server Client
- update propagation cache State
client Request
cache Server
Client Reply
Sockets Sockets
TLI TLI
RPC
Fixed Network RPC
RMI RMI
89
Client/Server Design
Stateless/stateful client/server design
Caching and cache invalidation
server invalidates client cache and/or
client requests server to validate its cache.
file system caching: writes => update propagation
Connectionless/connection-oriented design
TCP/IP & Interfaces
Other issues: multi-threading &deadlocks
90
Fixed Network C/S
Assumptions
Client Connectivity
client is always connected with availability
comparable to the server’s. Server can always
invalidate the client cache
Server Availability & Reliability
server is highly available. Reliable if stateless (but
state info is exchanged in every C/S interaction), or if
implements recovery procedures (may require client
availability)
Network
fast*, reliable*, BER < 10-6, bounded delay variance
91
Taxonomy of C/S Adaptations
System-transparent, application-transparent
The conventional, “unaware” client/server model
System-aware, application-transparent
the client/proxy/server model
System-transparent, application-aware
dynamic client/server model
System-aware, application-aware
92
The Unaware Client/Server
Model
Full client on mobile host and full server on fixed
network (SLIP/PPP C/S)
Client and Server are not mobility-aware
Client caching does not work as the client can be
disconnected when the server invalidates the cache
Not reliable and of unpredictable performance
Requires special cache invalidation algorithms to
enable caching despite long client disconnections
93
The Client/Proxy/Server
Model
Adding mobility-awareness between the client and
the server. Client and server are not mobility-aware.
Proxy functions as a client to the fixed network server,
and as a mobility-aware server to the mobile client
Proxy may be placed in the mobile host (Coda’s
Venus), or the fixed network, or both (WebExpress)
Application- and user-dependent
One advantage: enables thin client design for
resource-poor mobile computers
94
Thin Client/Server Model
95
The Disconnected Operation
Model
Approach I:
Provide full client and a thin version of the server on
the mobile platform. In addition, needed data is
replicated into the mobile platform. Upon
reconnection, updated replicas are synchronized with
the home server. Conflict resolution strategies are
needed (Coda/Venus & Oracle Lite)
Approach II:
Provide a full client and a mobility agent that intercepts
requests to the unreachable server, emulates the server,
buffers the requests, and transmit them upon
reconnection (Oracle Mobile Agents)
96
The Dynamic Client/Server
Model
Servers (or their thin versions) dynamically relocate between
mobile and fixed hosts. Proxies created and relocated dynamically
A spectrum of design and adaptation possibilities
Dynamic availability/performance tuning
97
Dynamic Client/Server Model
Mobile objects:
applications programmed with dynamic object relocation policies for
adaptation (Rover’s RDOs)
Collaborative Groups:
disconnected mobile clients turns into a group of collaborating, mobile
servers and clients connected via an ad-hoc net. (Bayou architecture)
Virtual Mobility of Servers:
servers relocate in the fixed network, near the mobile host,
transparently, as the latter moves.
98
File System Proxy in Coda
99
Isolation-Only Transactions
in Coda
100
Web Proxy in WebExpress
102
Thin Client InfoPad
Architecture
103
Case Studies
Bayou
Odyssey
Rover
104
Case Study1: Bayou
Main Features
Novel Aspects
Bayou architecture
Bayou application-specific conflict resolution
Bayou replication management
105
Main Features of Bayou
Replicated, weakly consistent storage system for
collaborative applications
Ad-hoc network of portable computers participate in
managing a mobile, replicated storage system
Suitable for a group of collaborators, all mobile and
disconnected from fixed network, sharing
(reading/writing) appointment calendars, meeting
notes, evolving design documents, etc.
106
Novel Aspects of Bayou
Support for application-specific detection and resolution of update
conflicts
dependency checks
client-provided, per-write conflict resolution (merge procedures)
Eventual replica convergence through a peer--wise anti-entropy
process
Per-client consistency guarantees
Roll-back and undo capabilities
107
The Bayou Architecture
Storage Storage
Application
System System
Bayou API
Client Stub
Server State Anti-entropy Server State
Read
Client Server
or Server
Write
Storage
System
Storage
Application
Server State System
Bayou API
Read
Client Stub or
Write Server Server State
Client
Server
108
Application-Specific Conflict
Resolution in Bayou
Along with desired update, a write operation
includes a dependency check:
server query & expected query results
As a pre-condition to performing the write
operation, the dependency check must succeed
A conflict is detected if query, when run against
server data, does not produce same results.
109
Application-Specific Conflict
Resolution in Bayou
If dependency check fails, write is not performed
and server runs a merge procedure:
also submitted along with the write operation
templates or rules written in a high-level interpretive
language
uses server data and application-specific data to resolve the
conflict
when run, produces a revised update request
110
Conflict Resolution in Bayou
Example (Application-specific):
Write {
reserve an hour time slot by meeting room sched
application; dependency_check: (list of previously scheduled
meetings that overlap with requested time slot,
NULL); merge_procedure: ();
}
Others:
detect read/write conflicts
detect write/write conflicts
111
Replication Management in
Bayou
Clients send their writes to only one server (weak
consistency)
Bayou servers propagate their writes during pair-
wise contacts. This process is called Anti-entropy
and results on the two server agreeing on the
writes and their order.
Eventually all writes will reach all servers
(eventual consistency)
112
Bayou: Summary
A
pplic
atio
ns N o n -re altim ec ollab ora tiv eap plic atio ns: m eetin g
roo m sc h ed ulera n db ib lio g rap hicd atab ase,
ap p o in tm en tca len d ars,e v o lv ingd e sig nd oc um e nts,
ne w sb ulletinb o ard s.
A
dap
tatio
n A p p lic ation -spe cificad ap tatio ntod isc onn ectio n
an din term ittentc on n e ctiv ity ; ap p lic ationsa re
pe rm itte dtom ak etrad e-o ffo fre p lic ate dd ata
co n siste n cyan dav ailab ilityb yu sin gin divid ually
sele c tab lesessio ng uara n te e s.
M
od
el D isc o n n ecte dc ollab orativ eg rou p ;fu ll(o r
disc o n n ecte d)c lie nta rc h ite c ture .
M
ob
ileD
ata Sy ste m su pp ortfo rd e tec tio no fu p d a tec onflicts,
ap p lic atio n -spec ificre so lu tio no fu p d ateco nflicts,
ev en tu alre plicac on v e rge n c eth ro u g hap eer-w ise
an ti-e n thro pyp ro cess,a n dp e r-c lie n tc onsisten cy
gu a ra n tees.
113
Case Study 2: Odyssey
Odyssey client architecture
Odyssey system components
Odyssey applications:
Video player
Web browser
114
Odyssey Client Architecture
Wardens Type-Specific
Support
115
Main Features of Odyssey
Application-aware adaptation approach
Odyssey monitors system resources and notifies
applications of relevant changes
Applications decide when and how to adapt, to
maintain certain level of fidelity
General support for adaptation: Viceroy
Type-specific support: Warden
Caching support
116
Odyssey System Components
Odyssey Objects
Client API to allow applications to:
operate on Odyssey objects
express resource needs (expectations)
be notified when needed resources are no longer
available
respond by changing levels of fidelity
117
Odyssey API
Request( in path, in resource_descriptor, out request_id) Resource_id
Cancel(in request_id) lower bound
upper bound
Resource Negotiation Operations name of upcall handler
Resource Descriptor Fileds
118
Video Player in Odyssey
119
Web Browser in Odyssey
120
Odyssey: Summary
A
p
pl
ic
at
ion
s F
il
e s
yst
em ac
ces
s,v
ide
o p
lay
ing,a
ndW e
b
b
rows
ing.
A
d
ap
t
at
io
n App
li
cat
ion-
awar
e a
dap
tat
io
n wi
tht
hesys
te
m
s
uppo
rtt
hatpr
ovid
esr
esou
rcemoni
tor
i
ng,n
ot
if
ie
s
a
ppl
ica
ti
onsofr
esou
rcec
hanges
,an
d e
nfo
rc
es
r
es
ourc
e al
lo
cat
io
n d
eci
si
ons.
M
o
de
l Cl
ass
iccl
ie
nt-
se
rvera
rc
hit
ect
ure
.
M
o
bi
leD
at
a Di
st
il
le
d se
rve
rdat
adel
ive
rybas
edonth
e c
l
ie
nt
F
eedb
acks.
121
Mobility Management
Location
handoff
management
Location Management
Location management schemes use several database
called location registrars to maintain the location and
other information.
Example:
Consider a simple location management that uses a
single-location registrar,called the home location
registrar(HLR), to maintain the location information
of all the mobile nodes in n/w.
The search and update oopreation are
performed as follows:
The location of a mobile node is maintained at
the granularity of a cell,i.e which cell the mobile
node was in when it last registered.
For each mobile node m, the HLR maintains a
mobility binding(m,c) where c is the latest cell of
m known to the HLR.
The location info of m in HLR is updated as
follows:
• When a mobile node is switched on,the HLR
is notified of the current location of m.
• Whenever handoff occurs,the HLR is
notified of the cell ID to which m is handing
off to.
• To find a mobile node m’s current
location,first the HLR is contacted.The HLR
contacts the base station of cell c in the
mobility binding for m.
The finest granularity at which location can be (and
needs to be) maintained is a cell.
• This would require a mobile node to update its location
whenever it moves from one cell to another.
146
Introduction
• key components
– Mobile terminal (MT)
– Base station (BS)
– Mobile switching center
(MSC)
– Home location register (HLR)
– Visitor location register (VLR)
147
Introduction
148
Introduction
Mobility Management
location management
handoff management
149
Time Based Updating
150
Movement Based Updating
movement threshold of 3 is used
151
Distance Based Updating
152
Calling Procedure
Call delivery
1. Determining the serving VLR of the called
MT
2.Locating the visiting cell of the called MT
(Paging)
Determining the serving VLR of the called
MT procedure
1. The calling MT sends a call initiation signal to
the serving MSC of the MT through a nearby
base station.
153
154
Location Management for Cellular
Networks
1. Pointer Forwarding:
K=2
155
Location Management for Cellular
Networks
2. Local Anchoring:
156
Location Management for Cellular
Networks(Cont.)
3. Pre-User Location Caching:
157
Mobile IP
Agenda
What is Mobile IP?
Mobile IP Architecture
Why Mobile IP?
How Mobile IP Works
Registration Message Format
Tunneling in Mobile IP
Mobile IP in Action
Security in Mobile IP
Mobile in IPv6
Conclusion
What is Mobile IP
Definition:
Entities in Mobile IP
Mobile Node (MN) - A Node moving to different network, with permanent Home Address.
Home Agent (HA) - A router on a mobile node's home network which tunnels datagrams for delivery to the mobile
node when it is away from home, and maintains current location information for the mobile node.
Home Address - The static fixed IP Address allocated to a mobile node by Home Agent.
Home Network - A network, having a network prefix/network id.matching that of a mobile node's home address
Foriegn Network - A network other than a Mobile node’s home network.
Foreign Agent - Router in foreign network that provides CoA and tunneling with HA and forward the packets to MN.
Care-of Address - Termination point of a tunnel toward a MN in the foreign netwrok.
Mobility Binding - The association of a home address with a care-of address (CoA).
Correspondent Node (CN) - A peer node with which a Mobile node is communicating.
Why Mobile IP ?
CN is successfully communicating with MN via HA
Correspondent node (CN)
Packets for MN are dropped by the
Home Agent as Mobile node is not
Mobile node (MN) present in its network
Router
Home Agent (HA)
1. Registration Request by MN to FA
2
2. FA Relays Registration request to HA 1
4 3
3. HA sends Registration reply to FA
HA
MN
Mobility Binding Table
Registration message format
HA tunnels the
Packet and sends to FA
MN moves to FA Foreign Agent(FA)
FA extracts original
Packet and sends to the MN
When CN sends the data to MN, it uses the original address of the MN, so the
packet goes to HA.
From the mobility binding HA encapsulates the packet (IP-in-IP or GRE) and
sends to CoA.
The FA de-capsulate the packet and extracts the original packet that was sent
by the CN.
The FA then sends this packet to the MN using the Home address destination.
The reverse route from MN to CN may or may not follow this path.
CoA = B
Mobile Node moves to remote network
Security in Mobile IP
Required as Mobile Nodes are often in unprotected remote
network
Authenticity and Integrity of Registration messages using
Authentication (e.g. HMAC-MD5).
Replay attack protection for Registration messages using
sequence number.
Issue Protocol Solution
Security Issues in
Optional authentication Mobile
between IP FA
MN and IPv4 AAA and Broker AAA
services
Location Privacy IPv4,IPv6 None
5 6
Remote Agent (RA)
1 10
Home Agent (HA)
Registration Request
Registration Response
Mobile node (MN)
Security in Mobile IP (Cont.)
IPSec for Data Confidentiality
IPSec Tunnel