70,106 research outputs found

    Inter-subnet localized mobility support for host identity protocol

    Get PDF
    Host identity protocol (HIP) has security support to enable secured mobility and multihoming, both of which are essential for future Internet applications. Compared to end host mobility and multihoming with HIP, existing HIP-based micro-mobility solutions have optimized handover performance by reducing location update delay. However, all these mobility solutions are client-based mobility solutions. We observe that another fundamental issue with end host mobility and multihoming extension for HIP and HIP-based micro-mobility solutions is that handover delay can be excessive unless the support for network-based micro-mobility is strengthened. In this study, we co-locate a new functional entity, subnet-rendezvous server, at the access routers to provide mobility to HIP host. We present the architectural elements of the framework and show through discussion and simulation results that our proposed scheme has achieved negligible handover latency and little packet loss

    Mobile IP and Route Optimization: A Simulation Study.

    Get PDF
    Powerful light-weight portable computers, the availability of wireless networks, and the popularity of the Internet are driving the need for better networking support for mobile hosts. Current versions of the Internet Protocol (IP), make an implicit assumption that the point at which a computer attaches to a network is fixed and its IP address identifies the network to which it is attached. Packets are sent to a computer based on the location information contained in its IP address. Therefore, transparent host mobility is not supported by IP. But there is a growing need for users to be able to connect their portable computers to the Internet at any time, and stay connected even when they are on the move. Amongst various options available to implement host mobility, Mobile IP, which is an IETF (Internet Engineering Task Force) Draft Standard, is the most feasible one. The Mobile IP protocol, that is compatible with the TCP/IP protocol suite, allows a mobile host to move around the Internet without changing its identity. It is an internet (IP) layer solution to host mobility. Route Optimization, which is an extension to Mobile IP, allows a node to cache the location of a mobile host and to send packets directly to that mobile host. This thesis describes the development of a model to simulate Mobile IP with Route Optimization. An event-driven simulator was developed to study this protocol. Using this simulator, experiments were conducted to study the performance of the protocol under various changing network parameters. These experiments also establish the merits of Route Optimization over base Mobile IP

    Secure Mobile IP with HIP Style Handshaking and Readdressing

    Full text link
    Mobile IP allows the mobile node roaming into a new IP network without losing its connection with its peer. Mobile IPv6 is using Mobile IP with Route Optimizationto improve performance by avoiding the triangle routing and adopting Return Routability as a secure process for binding update. Host Identity Protocol (HIP) is an experimental security protocol which provides mobility management and multi-homing by its new namespace. Its architecture is similar to that of Mobile IP with Route Optimization. In this paper, we have introduced a Secure Mobile IP with HIP Style Handshaking and Readdressing (SMIP), which has stronger security, better performance and lower binding cost in binding update process compared with Mobile IPv6. The dependence of home agent in the new scheme is also shown dramatically decreased. The initiated scheme integrated the primary features of two completely different mobility management solutions and has set up a migration path from mobile-IP based solution to a public-key based solution in mobile IP network

    A Survey on Handover Management in Mobility Architectures

    Full text link
    This work presents a comprehensive and structured taxonomy of available techniques for managing the handover process in mobility architectures. Representative works from the existing literature have been divided into appropriate categories, based on their ability to support horizontal handovers, vertical handovers and multihoming. We describe approaches designed to work on the current Internet (i.e. IPv4-based networks), as well as those that have been devised for the "future" Internet (e.g. IPv6-based networks and extensions). Quantitative measures and qualitative indicators are also presented and used to evaluate and compare the examined approaches. This critical review provides some valuable guidelines and suggestions for designing and developing mobility architectures, including some practical expedients (e.g. those required in the current Internet environment), aimed to cope with the presence of NAT/firewalls and to provide support to legacy systems and several communication protocols working at the application layer

    Design and implementation of the node identity internetworking architecture

    Get PDF
    The Internet Protocol (IP) has been proven very flexible, being able to accommodate all kinds of link technologies and supporting a broad range of applications. The basic principles of the original Internet architecture include end-to-end addressing, global routeability and a single namespace of IP addresses that unintentionally serves both as locators and host identifiers. The commercial success and widespread use of the Internet have lead to new requirements, which include internetworking over business boundaries, mobility and multi-homing in an untrusted environment. Our approach to satisfy these new requirements is to introduce a new internetworking layer, the node identity layer. Such a layer runs on top of the different versions of IP, but could also run directly on top of other kinds of network technologies, such as MPLS and 2G/3G PDP contexts. This approach enables connectivity across different communication technologies, supports mobility, multi-homing, and security from ground up. This paper describes the Node Identity Architecture in detail and discusses the experiences from implementing and running a prototype

    IPv6 Network Mobility

    Get PDF
    Network Authentication, Authorization, and Accounting has been used since before the days of the Internet as we know it today. Authentication asks the question, “Who or what are you?” Authorization asks, “What are you allowed to do?” And fi nally, accounting wants to know, “What did you do?” These fundamental security building blocks are being used in expanded ways today. The fi rst part of this two-part series focused on the overall concepts of AAA, the elements involved in AAA communications, and highlevel approaches to achieving specifi c AAA goals. It was published in IPJ Volume 10, No. 1[0]. This second part of the series discusses the protocols involved, specifi c applications of AAA, and considerations for the future of AAA

    Mobility through Heterogeneous Networks in a 4G Environment

    Get PDF
    Serving and Managing users in a heterogeneous environment. 17th WWRF Meeting in Heidelberg, Germany, 15 - 17 November 2006. [Proceeding presented at WG3 - Co-operative and Ad-hoc Networks]The increase will of ubiquitous access of the users to the requested services points towards the integration of heterogeneous networks. In this sense, a user shall be able to access its services through different access technologies, such as WLAN, Wimax, UMTS and DVB technologies, from the same or different network operators, and to seamless move between different networks with active communications. In this paper we propose a mobility architecture able to support this users’ ubiquitous access and seamless movement, while simultaneously bringing a large flexibility to access network operators

    Names, addresses and identities in ambient networks

    Get PDF
    Ambient Networks interconnect independent realms that may use different local network technologies and may belong to different administrative or legal entities. At the core of these advanced internetworking concepts is a flexible naming architecture based on dynamic indirections between names, addresses and identities. This paper gives an overview of the connectivity abstractions of Ambient Networks and then describes its naming architecture in detail, comparing and contrasting them to other related next-generation network architectures
    • …
    corecore