Mobile IP

Masters
Essay
Technology
Pages 8 (2008 words)
Download 0
In the current Internet, IP addresses are primarily used to identify particular end systems. In this respect, IP addresses are often thought of as being semantically equivalent to a Domain Name Server's Fully Qualified Domain Name (FQDN). In other words, one can (conceptually) use either an IP address or FQDN to identify one particular computer in the Internet…

Introduction


The route does not have to be the same in both directions. Therefore, a mobile host needs to have a stable IP address in order to be uniquely identifiable to other Internet hosts. However, when a mobile host moves from one network to another, as shown in Fig. 1, the IP address of an MH will change due to the enforced hierarchical address structure of the Internet. If the MH has only standard IP stack in its operating system, the TCP connection will break up following this movement. (Mondal, 2003)
Mobile IP (Perkins, 2002) is the standard proposed by IETF to offer seamless mobile computing. Mobile IP extends IP by allowing a mobile computer to utilize two IP addresses: one for identification, and another for routing. For example, it enables a TCP connection to keep alive and re-route packets when the mobile host moves between points of attachment.
Mobile Host (MH): A host or router that changes its point of attachment from one network or sub network to another, without changing its IP address. A mobile node can continue to communicate with other Internet nodes at any location using its (constant) IP address.
In order to route data packets after MH has moved into its new location, MIP also defines simple mechanisms to deliver packets to the mobile node when it is away from its home network. ...
Download paper
Not exactly what you need?

Related papers

Mobile IP
The route does not have to be the same in both directions. Therefore, a mobile host needs to have a stable IP address in order to be uniquely identifiable to other Internet hosts. However, when a mobile host moves from one network to another, as shown in Fig. 1, the IP address of an MH will change due to the enforced hierarchical address structure of the Internet. If the MH has only standard IP…
Mobility Management
Each node is required to know the topology of the network within its routing zone only. Thus, nodes are updated about topological changes only witin their routing zones. Thus, in spite of the fact that a network can be quite large, the updates are only locally propagated. Since for radius greater than one, the routing zones heavily overlap, the routing tends to be extremely robust. The routes…
Mobile Computing Assignment
The design requirement I- e devices needed to construct the network will follow this. The issues like how will user connect to the network will be address in this part.…
Spyware and Implementing Network Security
More malicious variants attempt to intercept passwords or credit card numbers as a user enters them into a web form or other application.…
Mobile Policy
The company mobile phones that will be supplied are Windows mobile Smart Phones and Blackberries. You have the choice to decide which you will use. When a phone is issued to you that is the phone that you will keep. When leaving at the end of the day, you will return the phone to your locker and use it again when you return to work the following day.…
Virtual Private Network
A virtual private network (VPN) is a private data network which makes use of the public communication infrastructure, and at the same time maintains privacy through the use of a tunnelling protocol and security procedures.…
Mobile Computing
As a key component of Intelligent Transportation Systems Inter Vehicle Communication (IVC) is one of the major applications of mobile computing. A large amount of research has been carried out by academia and the industry alike in this field. IVC enables each and every high speed automobile to send, receive and forward packets amongst each other by dynamically forming mobile ad-hoc networks…