Cover image for Mobile IPv6 : mobility in a wireless Internet
Title:
Mobile IPv6 : mobility in a wireless Internet
Personal Author:
Publication Information:
Boston, MA : Addison-Wesley, 2004
ISBN:
9780201788976

Available:*

Library
Item Barcode
Call Number
Material Type
Item Category 1
Status
Searching...
30000010164509 TK5105.585 S64 2004 Open Access Book Book
Searching...

On Order

Summary

Summary

Explains MIPv6's structure, goals, deployment, operation, optimization, security, and more. This book reflects the IETF Mobile IPv6 standard, and provides an introduction to IPv6. It shows how MIPv6 works and how it's different from earlier Mobile IP standards; covers MIPv6 security; and more.


Author Notes

Hesham Soliman is a member of the Advanced Networking group at Flarion Technologies


Excerpts

Excerpts

Preface This book focuses primarily on the current Mobile IPv6 standard, which was finalized in 2003 by the Internet Engineering Task Force (IETF). It also covers current proposed optimizations and applications. The aim of this book is to explain in detail the current Mobile IPv6 specification and, more importantly, the assumptions that led to its final design. These assumptions are extremely important to developers and researchers in the field of IPv6 mobility. The topic of IPv6 mobility management has gained a lot of momentum over the last decade, especially with the growth of the wireless industry and the more recent convergence between wireless telecommunication networks (supporting over 1.5 billion devices) and the Internet. Research on packet switching started back in the 1960s and continued through the 1980s, producing the Internet as we know it today. The predominant Internet Protocol (IP) supported on the Internet today is the IP version 4 (IPv4). When IPv4 was first designed, the Internet was not expected to grow as fast as it did or to be used for the vast and diverse number of applications used today. In 1992, the IAB (known then as the Internet Activities Board and now called the Internet Architecture Board) forecasted the expected shortage in IP addresses in the near future and the imminent need for a new version of IP. A Next Generation Directorate was formed in IETF to choose the new protocol. In 1994, the Next Generation Directorate made its decision. The new protocol was named IP version 6 (IPv6), since version number 5 was already taken by another experimental protocol. Mobile IPv6 provides mobility support for IPv6, allowing devices to move within the Internet topology while being reachable and maintaining ongoing connections. To understand Mobile IPv6 and the assumptions behind the final specification, IPv6 needs to be understood in some detail. In addition, the fundamental principles of Internet routing and naming services must be understood. In this regard, this book is self-contained; it starts by describing the Internet protocol suite, commonly called the TCP/IP protocol stack, then describes the core IPv6 specifications in detail before getting into the details of Mobile IPv6 and its optimizations. Finally, the use of IPv6 and Mobile IPv6 are presented in the context of a third-generation cellular system based on the third Generation Partnership Project (3GPP) standards. Organization of This Book Mobility management is a very large area that impacts many parts of the Internet protocol stack. In order for you to gain the maximum benefit from this book, it has been divided into four parts. Part One includes Chapters 1 and 2 and provides the necessary background about IPv6 and the Internet. This information is essential for understanding the subsequent parts. Readers already familiar with the Internet specifications and the details of IPv6 may choose to quickly browse through this part and start reading the next. Part Two provides a detailed analysis of the Mobile IPv6 protocol, starting with an overview of the protocol's operation in Chapter 3. Chapter 4 introduces the topic of security on the Internet, describes the issues involved in securing communication between two machines, and presents the current state of the art in this area. The aim of this chapter is to help you understand the issues involved in securing Mobile IPv6 and the assumptions made in this part of the protocol design. Chapter 5 discusses in detail the security threats, requirements, and design of Mobile IPv6 security. Part Three is dedicated to providing a theoretical evaluation of the performance of Mobile IPv6 handovers. First, the impact of Mobile IPv6 handovers on the transport layer protocols (and consequently applications) is presented in Chapter 6. Chapter 7 presents several optimizations aimed at improving Mobile IPv6 performance. Chapter 8 discusses some of the ongoing and future work related to mobility management for IPv6. Some of these topics are not exclusive to IPv6 or Mobile IPv6; however, we chose to include topics related to IP mobility in general, as they were found to be within the scope and spirit of this book. Part Four focuses on deployment issues for IPv6 and Mobile IPv6. Chapter 9 presents some of the most important mechanisms designed to allow IPv6 to be deployed in an IPv4 Internet. Chapter 10 uses 3GPP networks as an example for a third-generation cellular network, provides an overview of its architecture, and illustrates how IPv6 can be deployed in that network. Target Readers This book is self-contained. You need not have a strong background in the Internet or IPv6; however, basic knowledge about the Internet is needed. All of the necessary background information is provided either in the first part or in the relevant chapters. However, readers with an engineering or computer science background will have a deeper understanding of the technical issues presented in this book. The book starts by explaining the fundamental principles of the Internet and gradually introduces more complex issues related to IPv6, mobility management, and wireless networks. Therefore, it is suited to a wide range of readers, including network practitioners, Internet developers, engineers studying the latest developments in the Internet and IPv6 mobility technologies or refreshing existing knowledge, final year undergraduate students of engineering or computer science disciplines, and postgraduate students of the same disciplines. This book is also suited to researchers in the area of mobility management, as it helps them understand the requirements and assumptions that led to the development of Mobile IPv6. Understanding these assumptions is one of the most important ingredients for a successful research program. Excerpted from Mobile IPv6: Mobility in a Wireless Internet by Hesham Soliman All rights reserved by the original copyright owners. Excerpts are provided for display purposes only and may not be reproduced, reprinted or distributed without the written permission of the publisher.

Table of Contents

Forewordp. xv
Prefacep. xvii
Acknowledgmentsp. xxiii
Part 1 Introductionp. 1
1 Introductionp. 3
1.1 The Internet Protocol Suitep. 3
1.2 IP Addressesp. 7
1.3 The Domain Name Systemp. 7
1.4 Host-to-Host Communicationp. 9
1.5 Routing in the Internetp. 13
1.6 Client-Server Versus Peer-to-Peer Communicationp. 17
1.7 The Need for IPv6p. 18
1.8 What Is IP Mobility?p. 19
1.9 Summaryp. 24
2 An IPv6 Primerp. 25
2.1 The IPv6 Protocolp. 26
2.2 IPv6 Extension Headersp. 29
2.3 ICMPv6p. 44
2.4 Tunnelingp. 48
2.5 IPv6 Addressesp. 51
2.6 Neighbor Discoveryp. 61
2.7 Stateless Address Autoconfigurationp. 73
2.8 A Communication Examplep. 74
2.9 Summaryp. 77
Part 2 Mobile IPv6p. 79
3 Mobile IPv6p. 81
3.1 Mobile IPv6 Terminologyp. 82
3.2 Overview of Mobile IPv6p. 83
3.3 Route Optimizationp. 106
3.4 What if the Mobile Node Failed?p. 114
3.5 Site-Local Addresses and Mobile IPv6p. 115
3.6 A Communication Examplep. 116
3.7 Summaryp. 118
4 Introduction to Securityp. 121
4.1 What Is Security and Why Is It Needed?p. 121
4.2 Authenticationp. 122
4.3 Authorizationp. 123
4.4 Confidentiality, Integrity Checks, Nonrepudiation, and Replay Attacksp. 123
4.5 Cryptographyp. 124
4.6 Summaryp. 146
5 Securing Mobile IPv6 Signalingp. 149
5.1 Why Do We Need to Secure Mobile IPv6?p. 149
5.2 Requirements for Mobile IPv6 Securityp. 154
5.3 Mobile IPv6 Securityp. 157
5.4 Future Mechanisms for Authenticating Binding Updatesp. 185
5.5 Summaryp. 189
Part 3 Handover Optimizations for Wireless Networksp. 179
6 Evaluating Mobile IPv6 Handoversp. 195
6.1 Layer 2 Versus Layer 3 Handoversp. 196
6.2 How Long Does a Mobile IPv6 Handover Take?p. 202
6.3 Handover Impacts on TCP and UDP Trafficp. 207
6.4 Summaryp. 218
7 Mobile IPv6: Handover Optimizations and Extensionsp. 221
7.1 Fast Handovers for Mobile IPv6p. 221
7.2 Hierarchical Mobile IPv6 (HMIPv6)p. 239
7.3 Combining Fast Handovers and HMIPv6p. 253
7.4 Flow Movement in Mobile IPv6p. 259
7.5 Summaryp. 263
8 Current and Future Work on IPv6 Mobilityp. 265
8.1 AAA as an Enabler for Mobilityp. 265
8.2 Achieving Seamless Mobilityp. 268
8.3 Network Mobilityp. 270
8.4 Summaryp. 274
Part 4 IPv6 and Movile IPv6 Deploymentp. 277
9 IPv6 in an IPv4 Internet: Migration and Coexistencep. 279
9.1 How and When Will IPv6 Be Deployed?p. 280
9.2 What Are the Problems?p. 280
9.3 Tunnelingp. 281
9.4 Translationp. 288
9.5 Other Deployment Scenarios and Considerationsp. 293
9.6 Summaryp. 296
10 A Case Study: IPv6 in 3GPP Networksp. 299
10.1 3GPP Backgroundp. 300
10.2 3GPP UMTS Network Architecturep. 301
10.3 UTRAN Architecturep. 305
10.4 UMTS Core Networkp. 311
10.5 IPv6 in UMTSp. 315
10.6 Summaryp. 325
Indexp. 327