Professional Documents
Culture Documents
o\:* {behavior:url(#default#VML);}
w\:* {behavior:url(#default#VML);}
.shape {behavior:url(#default#VML);}
MOBILE COMPUTING
UNIT IV
Mobile IP
Change location without restart its application or terminating any ongoing communication
IP Networking
Protocol layer
Network Layer
Transport Layer
What does IP do
No ’end-to-end’ guarantees
IP addresses
Network-prefix
Host portion
IP Routing
Packet Header
Network-prefix
f a node moves from one link to another without chnging its IP address, it will be unable to
receive packets at the new link; and
If a node moves from one link to another without chnging its IP address, it will be unable to
receive packets at the new link; and
Mobile IP Overview
Routing protocol
Route packets to nodes that could potentially change location very rapidly
– forwards tunneled packets to the MN, typically the default router for MN
Tunneling
MotivationforMobileIP
Routing
change of all routing table entries to forward packets to the right destination
does not scale with the number of mobile hosts and frequent changes in the location,
security problems
Changing the IP-address?
almost impossible to find a mobile system, DNS updates take to long time
Requirements to Mobile IP
Transparency
Compatibility
Security
only little additional messages to the mobile system required (connection typically via a low
bandwidth radio link)
world-wide support of a large number of mobile systems in the whole
Internet
IPv6 availability
• Quality of service.
• Security.
Traditionalroutingalgorithms
Traditional algorithms arepro–active– i.e. operate independentofuser–
messagedemands.Suitableforwirednetworks.
Distance Vector
· periodic notification of all routers about the currentstate of all physical links
Dynamicsofthetopology
Links can be asymmetric, i.e., they can have a directiondependent transmission quality
Uncontrolled redundancy in links
DSDV
Early work
Sequencenumbersforallroutingupdates
Decreaseofupdatefrequency(‘damping’)
Furthermore, if a laptop or any type of mobile computer is configured for DHCP, it can
be moved from office to office without being reconfigured as long as each office has a
DHCP server that allows it to connect to the network.
Configuration File
The first step in configuring a DHCP server is to create the configuration file that stores
the network information for the clients. Global options can be declared for all clients,
while other options can be declared for individual client systems.
The configuration file can contain extra tabs or blank lines for easier formatting.
Keywords are case-insensitive and lines beginning with a hash mark (#) are considered
comments.
Two DNS update schemes are currently implemented — the ad-hoc DNS update mode
and the interim DHCP-DNS interaction draft update mode. If and when these two are
accepted as part of the Internet Engineering Task Force (IETF) standards process,
there will be a third mode — the standard DNS update method. The DHCP server must
be configured to use one of the two current schemes. Version 3.0b2pl11 and previous
versions used the ad-hoc mode; however, it has been deprecated.
Some parameters must start with the option keyword and are referred to as options.
Options configure DHCP options; whereas, parameters configure values that are not
optional or control how the DHCP server behaves.
In Example the routers, subnet-mask, domain-name, domain-name-servers, and time-
offset options are used for any hoststatements declared below it.
Additionally, a subnet can be declared, a subnet declaration must be included for every
subnet in the network. If it is not, the DHCP server fails to start.
In this example, there are global options for every DHCP client in the subnet and
a range declared. Clients are assigned an IP address within the range.
DSR
Discovering a path
Only if a path for sending packets to a certain destination is needed and no path is currently available
(reactive algorithm)
Maintaining a path
Only while the path is in use: make sure that it can be used continuously
Path discovery
Maintaining paths
ALTERNATIVE METRICS.
MobileIPwithreversetunneling
problems with firewalls, the reverse tunnel can be abused to circumvent security
mechanisms (tunnel hijacking)
optimization of data paths, i.e. packets will be forwarded through the tunnel via the HA to a
sender (double triangular routing)
The standard is backwards compatible
the extensions can be implemented easily and cooperate with current implementations
without these extensions
(HTML, Hypertext Markup Language) of the Web have not been designed for mobile
applications and mobile devices, thus creating many problems!
Typical transfer sizes
responses avg. <10 kbyte, header 160 byte, GIF 4.1kByte, JPEG
12.8 kbyte, HTML 5.6 kbyte
static and dynamic content, interaction with servers via forms, content transformation, push
technologies etc.
many hyperlinks, automatic loading and reloading, redirecting
Normal
0
false
false
false
EN-US
X-NONE
X-NONE
MicrosoftInternetExplorer4
st1\:*{behavior:url(#ieooui) }
/* Style Definitions */
table.MsoNormalTable
{mso-style-name:”Table Normal”;
mso-tstyle-rowband-size:0;
mso-tstyle-colband-size:0;
mso-style-noshow:yes;
mso-style-priority:99;
mso-style-qformat:yes;
mso-style-parent:””;
mso-padding-alt:0in 5.4pt 0in 5.4pt;
mso-para-margin:0in;
mso-para-margin-bottom:.0001pt;
mso-pagination:widow-orphan;
font-size:10.0pt;
font-family:”Times New Roman”,”serif”;}