Title:
Mobile IPv6 : mobility in a wireless Internet
Personal Author:
Publication Information:
Boston, MA : Addison-Wesley, 2004
ISBN:
9780201788976
Available:*
Library | Item Barcode | Call Number | Material Type | Item Category 1 | Status |
---|---|---|---|---|---|
Searching... | 30000010164509 | TK5105.585 S64 2004 | Open Access Book | Book | Searching... |
On Order
Summary
Summary
Explains MIPv6's structure, goals, deployment, operation, optimization, security, and more. This book reflects the IETF Mobile IPv6 standard, and provides an introduction to IPv6. It shows how MIPv6 works and how it's different from earlier Mobile IP standards; covers MIPv6 security; and more.
Author Notes
Hesham Soliman is a member of the Advanced Networking group at Flarion Technologies
Excerpts
Excerpts
Preface This book focuses primarily on the current Mobile IPv6 standard, which was finalized in 2003 by the Internet Engineering Task Force (IETF). It also covers current proposed optimizations and applications. The aim of this book is to explain in detail the current Mobile IPv6 specification and, more importantly, the assumptions that led to its final design. These assumptions are extremely important to developers and researchers in the field of IPv6 mobility. The topic of IPv6 mobility management has gained a lot of momentum over the last decade, especially with the growth of the wireless industry and the more recent convergence between wireless telecommunication networks (supporting over 1.5 billion devices) and the Internet. Research on packet switching started back in the 1960s and continued through the 1980s, producing the Internet as we know it today. The predominant Internet Protocol (IP) supported on the Internet today is the IP version 4 (IPv4). When IPv4 was first designed, the Internet was not expected to grow as fast as it did or to be used for the vast and diverse number of applications used today. In 1992, the IAB (known then as the Internet Activities Board and now called the Internet Architecture Board) forecasted the expected shortage in IP addresses in the near future and the imminent need for a new version of IP. A Next Generation Directorate was formed in IETF to choose the new protocol. In 1994, the Next Generation Directorate made its decision. The new protocol was named IP version 6 (IPv6), since version number 5 was already taken by another experimental protocol. Mobile IPv6 provides mobility support for IPv6, allowing devices to move within the Internet topology while being reachable and maintaining ongoing connections. To understand Mobile IPv6 and the assumptions behind the final specification, IPv6 needs to be understood in some detail. In addition, the fundamental principles of Internet routing and naming services must be understood. In this regard, this book is self-contained; it starts by describing the Internet protocol suite, commonly called the TCP/IP protocol stack, then describes the core IPv6 specifications in detail before getting into the details of Mobile IPv6 and its optimizations. Finally, the use of IPv6 and Mobile IPv6 are presented in the context of a third-generation cellular system based on the third Generation Partnership Project (3GPP) standards. Organization of This Book Mobility management is a very large area that impacts many parts of the Internet protocol stack. In order for you to gain the maximum benefit from this book, it has been divided into four parts. Part One includes Chapters 1 and 2 and provides the necessary background about IPv6 and the Internet. This information is essential for understanding the subsequent parts. Readers already familiar with the Internet specifications and the details of IPv6 may choose to quickly browse through this part and start reading the next. Part Two provides a detailed analysis of the Mobile IPv6 protocol, starting with an overview of the protocol's operation in Chapter 3. Chapter 4 introduces the topic of security on the Internet, describes the issues involved in securing communication between two machines, and presents the current state of the art in this area. The aim of this chapter is to help you understand the issues involved in securing Mobile IPv6 and the assumptions made in this part of the protocol design. Chapter 5 discusses in detail the security threats, requirements, and design of Mobile IPv6 security. Part Three is dedicated to providing a theoretical evaluation of the performance of Mobile IPv6 handovers. First, the impact of Mobile IPv6 handovers on the transport layer protocols (and consequently applications) is presented in Chapter 6. Chapter 7 presents several optimizations aimed at improving Mobile IPv6 performance. Chapter 8 discusses some of the ongoing and future work related to mobility management for IPv6. Some of these topics are not exclusive to IPv6 or Mobile IPv6; however, we chose to include topics related to IP mobility in general, as they were found to be within the scope and spirit of this book. Part Four focuses on deployment issues for IPv6 and Mobile IPv6. Chapter 9 presents some of the most important mechanisms designed to allow IPv6 to be deployed in an IPv4 Internet. Chapter 10 uses 3GPP networks as an example for a third-generation cellular network, provides an overview of its architecture, and illustrates how IPv6 can be deployed in that network. Target Readers This book is self-contained. You need not have a strong background in the Internet or IPv6; however, basic knowledge about the Internet is needed. All of the necessary background information is provided either in the first part or in the relevant chapters. However, readers with an engineering or computer science background will have a deeper understanding of the technical issues presented in this book. The book starts by explaining the fundamental principles of the Internet and gradually introduces more complex issues related to IPv6, mobility management, and wireless networks. Therefore, it is suited to a wide range of readers, including network practitioners, Internet developers, engineers studying the latest developments in the Internet and IPv6 mobility technologies or refreshing existing knowledge, final year undergraduate students of engineering or computer science disciplines, and postgraduate students of the same disciplines. This book is also suited to researchers in the area of mobility management, as it helps them understand the requirements and assumptions that led to the development of Mobile IPv6. Understanding these assumptions is one of the most important ingredients for a successful research program. Excerpted from Mobile IPv6: Mobility in a Wireless Internet by Hesham Soliman All rights reserved by the original copyright owners. Excerpts are provided for display purposes only and may not be reproduced, reprinted or distributed without the written permission of the publisher.Table of Contents
Foreword | p. xv |
Preface | p. xvii |
Acknowledgments | p. xxiii |
Part 1 Introduction | p. 1 |
1 Introduction | p. 3 |
1.1 The Internet Protocol Suite | p. 3 |
1.2 IP Addresses | p. 7 |
1.3 The Domain Name System | p. 7 |
1.4 Host-to-Host Communication | p. 9 |
1.5 Routing in the Internet | p. 13 |
1.6 Client-Server Versus Peer-to-Peer Communication | p. 17 |
1.7 The Need for IPv6 | p. 18 |
1.8 What Is IP Mobility? | p. 19 |
1.9 Summary | p. 24 |
2 An IPv6 Primer | p. 25 |
2.1 The IPv6 Protocol | p. 26 |
2.2 IPv6 Extension Headers | p. 29 |
2.3 ICMPv6 | p. 44 |
2.4 Tunneling | p. 48 |
2.5 IPv6 Addresses | p. 51 |
2.6 Neighbor Discovery | p. 61 |
2.7 Stateless Address Autoconfiguration | p. 73 |
2.8 A Communication Example | p. 74 |
2.9 Summary | p. 77 |
Part 2 Mobile IPv6 | p. 79 |
3 Mobile IPv6 | p. 81 |
3.1 Mobile IPv6 Terminology | p. 82 |
3.2 Overview of Mobile IPv6 | p. 83 |
3.3 Route Optimization | p. 106 |
3.4 What if the Mobile Node Failed? | p. 114 |
3.5 Site-Local Addresses and Mobile IPv6 | p. 115 |
3.6 A Communication Example | p. 116 |
3.7 Summary | p. 118 |
4 Introduction to Security | p. 121 |
4.1 What Is Security and Why Is It Needed? | p. 121 |
4.2 Authentication | p. 122 |
4.3 Authorization | p. 123 |
4.4 Confidentiality, Integrity Checks, Nonrepudiation, and Replay Attacks | p. 123 |
4.5 Cryptography | p. 124 |
4.6 Summary | p. 146 |
5 Securing Mobile IPv6 Signaling | p. 149 |
5.1 Why Do We Need to Secure Mobile IPv6? | p. 149 |
5.2 Requirements for Mobile IPv6 Security | p. 154 |
5.3 Mobile IPv6 Security | p. 157 |
5.4 Future Mechanisms for Authenticating Binding Updates | p. 185 |
5.5 Summary | p. 189 |
Part 3 Handover Optimizations for Wireless Networks | p. 179 |
6 Evaluating Mobile IPv6 Handovers | p. 195 |
6.1 Layer 2 Versus Layer 3 Handovers | p. 196 |
6.2 How Long Does a Mobile IPv6 Handover Take? | p. 202 |
6.3 Handover Impacts on TCP and UDP Traffic | p. 207 |
6.4 Summary | p. 218 |
7 Mobile IPv6: Handover Optimizations and Extensions | p. 221 |
7.1 Fast Handovers for Mobile IPv6 | p. 221 |
7.2 Hierarchical Mobile IPv6 (HMIPv6) | p. 239 |
7.3 Combining Fast Handovers and HMIPv6 | p. 253 |
7.4 Flow Movement in Mobile IPv6 | p. 259 |
7.5 Summary | p. 263 |
8 Current and Future Work on IPv6 Mobility | p. 265 |
8.1 AAA as an Enabler for Mobility | p. 265 |
8.2 Achieving Seamless Mobility | p. 268 |
8.3 Network Mobility | p. 270 |
8.4 Summary | p. 274 |
Part 4 IPv6 and Movile IPv6 Deployment | p. 277 |
9 IPv6 in an IPv4 Internet: Migration and Coexistence | p. 279 |
9.1 How and When Will IPv6 Be Deployed? | p. 280 |
9.2 What Are the Problems? | p. 280 |
9.3 Tunneling | p. 281 |
9.4 Translation | p. 288 |
9.5 Other Deployment Scenarios and Considerations | p. 293 |
9.6 Summary | p. 296 |
10 A Case Study: IPv6 in 3GPP Networks | p. 299 |
10.1 3GPP Background | p. 300 |
10.2 3GPP UMTS Network Architecture | p. 301 |
10.3 UTRAN Architecture | p. 305 |
10.4 UMTS Core Network | p. 311 |
10.5 IPv6 in UMTS | p. 315 |
10.6 Summary | p. 325 |
Index | p. 327 |