Preface |
|
xxi | |
Acknowledgments |
|
xxv | |
Acronyms |
|
xxvii | |
Part I Introduction and Background |
|
|
1 Mobility on the Internet: Introduction |
|
|
1 | |
|
|
5 | |
|
|
7 | |
|
|
7 | |
|
|
8 | |
|
|
9 | |
|
|
9 | |
|
2.3.2 IPv6 Extension Headers |
|
|
10 | |
|
|
12 | |
|
2.5 Neighbor Discovery Protocol |
|
|
15 | |
|
|
15 | |
|
2.6 Stateless Address Autoconfiguration |
|
|
17 | |
|
2.6.1 Looking for a Neighbor |
|
|
18 | |
|
2.6.2 Duplicate Address Detection (DAD) |
|
|
19 | |
|
|
22 | |
|
|
22 | |
|
|
25 | |
|
|
25 | |
|
|
26 | |
|
3.3 Security Associations |
|
|
27 | |
|
|
27 | |
|
|
29 | |
|
|
29 | |
|
|
31 | |
|
3.5 Internet Key Exchange (IKE) Protocol |
|
|
32 | |
|
|
33 | |
|
|
33 | |
Part II IP Mobility |
|
|
4 Mobility Concepts and Principles |
|
|
37 | |
|
|
37 | |
|
4.2 Roaming and Handover Together Constitute the Mobility Problem |
|
|
37 | |
|
4.2.1 Roaming Problem: How Packets Reach the Current Location of the Mobile Node |
|
|
38 | |
|
4.2.2 Robustness Problem: Connection Must Withstand Change of IP Address |
|
|
39 | |
|
4.2.3 Beyond Robustness: Supporting Real-time Mobility |
|
|
40 | |
|
4.3 Internet Principle: Core Network Transparency |
|
|
41 | |
|
4.4 Network-controlled Mobility |
|
|
42 | |
|
4.5 Application Layer and Session Layer Mobility |
|
|
43 | |
|
4.6 Supporting Mobility Using IP |
|
|
45 | |
|
|
46 | |
|
|
46 | |
|
|
47 | |
|
5 Mobility Support Using Mobile IP |
|
|
49 | |
|
|
49 | |
|
5.2 Mobility Events and Actions |
|
|
49 | |
|
5.2.1 Detecting Movement to a New Subnet |
|
|
50 | |
|
5.2.2 Regaining IP Connectivity |
|
|
50 | |
|
5.2.3 Packet Forwarding Subsequent to Movement |
|
|
51 | |
|
5.2.4 Route-optimized Communication Between a Mobile Node and Its Correspondents |
|
|
51 | |
|
5.3 How Mobile IP Supports IP Mobility |
|
|
52 | |
|
5.3.1 Mobile IP Terminology |
|
|
52 | |
|
5.3.2 Subnet Movement Detection in Mobile IP |
|
|
54 | |
|
5.3.3 Location Update to the Home Agent, and Correspondents |
|
|
55 | |
|
|
56 | |
|
5.4 Limitations Of the Base Mobile IP protocol |
|
|
57 | |
|
|
57 | |
|
|
57 | |
|
|
58 | |
|
|
59 | |
|
6.1 Binding Cache Management |
|
|
60 | |
|
6.2 Return Routability Development |
|
|
61 | |
|
|
65 | |
|
6.4 Delivering Packets to The Care-of Address |
|
|
68 | |
|
|
71 | |
|
6.6 Movement Detection and Link Establishment |
|
|
71 | |
|
|
73 | |
|
|
74 | |
|
|
74 | |
|
7 Binding Cache Management |
|
|
77 | |
|
7.1 Home Address Destination Option |
|
|
78 | |
|
|
79 | |
|
|
81 | |
|
7.3.1 Home Agent Actions for Receiving Binding Updates |
|
|
84 | |
|
7.3.2 Mobile Node Actions for Sending Binding Updates |
|
|
88 | |
|
7.3.3 Correspondent Node Actions for Receiving Binding Updates |
|
|
90 | |
|
7.4 Binding Acknowledgement (BACK) |
|
|
91 | |
|
7.5 Binding Refresh Request (BRR) |
|
|
92 | |
|
|
92 | |
|
7.7 Mobility Message Options |
|
|
93 | |
|
7.7.1 Binding Authorization Data option |
|
|
94 | |
|
|
95 | |
|
7.7.3 Alternate Care-of Address |
|
|
96 | |
|
7.7.4 Binding Refresh Advice |
|
|
96 | |
|
|
97 | |
|
|
98 | |
|
|
98 | |
|
|
101 | |
|
8.1 Return Routability – Theory of Operation |
|
|
103 | |
|
8.2 Home Test Init (HoTI) Message |
|
|
104 | |
|
8.3 Care-of Test Init (CoTI) Message |
|
|
106 | |
|
8.4 Home Test (HoT) Message |
|
|
107 | |
|
8.5 Care-of Test (CoT) Message |
|
|
108 | |
|
8.6 Using the Binding Management Key |
|
|
110 | |
|
8.7 Threat Models to Worry About |
|
|
111 | |
|
|
111 | |
|
|
112 | |
|
8.7.3 Use of the Home Address Option |
|
|
113 | |
|
8.7.4 Use of Routing Header Type 2 |
|
|
114 | |
|
8.8 Securing Route Optimization Using a Static Shared Key |
|
|
114 | |
|
|
115 | |
|
|
116 | |
|
9 IP Security for Mobile Nodes and their Home Agents |
|
|
117 | |
|
|
117 | |
|
9.2 Establishing a Security Association Between a Mobile Node and its Home Agent |
|
|
118 | |
|
9.3 Binding Update and IPsec Processing at a Mobile Node |
|
|
119 | |
|
9.4 Binding Update and IPsec Processing at a Home Agent |
|
|
120 | |
|
9.5 IKE, IPSEC and Mobile IPv6 |
|
|
122 | |
|
|
122 | |
|
|
124 | |
|
|
125 | |
|
|
127 | |
|
10.2 IPv6-in-IPv6 encapsulation |
|
|
129 | |
|
10.3 Routing Header Type 2 |
|
|
130 | |
|
10.4 Encapsulating Packets to the Mobile Node |
|
|
133 | |
|
|
135 | |
|
10.6 Direct Delivery to a Correspondent Node |
|
|
136 | |
|
10.7 Delivering Packets to a Mobile Node Directly |
|
|
136 | |
|
10.8 Sending Binding Updates |
|
|
136 | |
|
10.9 Inline Signaling or Piggybacking |
|
|
137 | |
|
|
138 | |
|
|
139 | |
|
|
141 | |
|
11.1 Movement Detection Algorithm |
|
|
142 | |
|
11.2 IP Address Configuration |
|
|
143 | |
|
|
143 | |
|
11.4 Changes to Neighbor Discovery |
|
|
144 | |
|
|
145 | |
|
12 Dynamic Home Agent Discovery |
|
|
147 | |
|
|
147 | |
|
12.2 Home Agent and Prefix Discovery |
|
|
148 | |
|
12.2.1 Dynamic Home Agent Discovery |
|
|
148 | |
|
12.2.2 Mobile Prefix Discovery |
|
|
149 | |
|
12.3 Discovery of other Home Agents |
|
|
150 | |
|
|
151 | |
|
|
153 | |
|
|
153 | |
|
13.2 NEMO Model and Terminology |
|
|
154 | |
|
|
156 | |
|
13.4 NEMO Route Optimization |
|
|
158 | |
|
13.5 Prefix Delegation and Management |
|
|
159 | |
|
|
160 | |
|
|
160 | |
|
|
161 | |
Part III Advanced Mobility Protocols |
|
|
|
165 | |
|
14.1 Snapshot of a Mobile Node's Actions |
|
|
165 | |
|
14.2 Enabling Fast Handovers |
|
|
168 | |
|
14.2.1 Connectivity Latency Bottlenecks |
|
|
168 | |
|
14.2.2 Reducing the Connectivity Latency |
|
|
169 | |
|
14.2.3 Bottlenecks in Reception Latency |
|
|
173 | |
|
14.2.4 Reducing Reception Latency |
|
|
174 | |
|
14.3 Understanding the Implications of Packet Rerouting |
|
|
186 | |
|
14.3.1 Avoiding Address Collisions Alltogether |
|
|
188 | |
|
|
189 | |
|
|
189 | |
|
|
191 | |
|
15 Fast Handovers Protocol |
|
|
193 | |
|
15.1 Neighborhood Prefix Discovery |
|
|
194 | |
|
15.1.1 Sending Router Solicitation for Proxy Advertisement |
|
|
194 | |
|
15.1.2 Sending a Proxy Router Advertisement |
|
|
199 | |
|
|
207 | |
|
15.2.1 Fast Binding Update |
|
|
207 | |
|
15.2.2 Fast Binding Acknowledgment |
|
|
215 | |
|
15.3 Interaccess Router Communication |
|
|
218 | |
|
15.4 Announcing Attachment |
|
|
220 | |
|
|
221 | |
|
|
221 | |
|
|
222 | |
|
|
222 | |
|
|
223 | |
|
|
223 | |
|
16.2 Context Creation on an Access Router |
|
|
224 | |
|
16.3 Context Transfer Design |
|
|
227 | |
|
16.3.1 Data Structure Representation |
|
|
227 | |
|
16.3.2 Context Data Structure Format |
|
|
228 | |
|
16.3.3 Using Context Transfer Options with Handover Signaling |
|
|
229 | |
|
|
231 | |
|
|
232 | |
|
|
233 | |
|
17 Hierarchical Mobility Management |
|
|
235 | |
|
|
235 | |
|
17.2 Hierarchical Mobility Model |
|
|
237 | |
|
|
237 | |
|
17.3.1 Mobility Anchor Point Discovery |
|
|
237 | |
|
17.3.2 Mobility Anchor Point Registration |
|
|
239 | |
|
|
240 | |
|
|
241 | |
|
|
241 | |
|
|
242 | |
Part IV Applying IP Mobility |
|
|
18 Mobile IPv6 in CDMA Packet Data Networks |
|
|
245 | |
|
|
245 | |
|
18.2 Mobile IPv6 Operation |
|
|
248 | |
|
18.2.1 Data Link Layer Establishment |
|
|
248 | |
|
18.2.2 Bootstrapping Home Network Parameters |
|
|
250 | |
|
18.2.3 Mobile IPv6 Home Registration |
|
|
252 | |
|
18.3 IP Reachability Service |
|
|
255 | |
|
18.4 Mobile IPv6 and IP Multimedia Subsystem (IMS) |
|
|
256 | |
|
|
257 | |
|
18.4.2 Personal Mobility and Device Mobility |
|
|
258 | |
|
|
263 | |
|
|
263 | |
|
|
264 | |
|
19 Enterprise Mobile Networking |
|
|
265 | |
|
|
265 | |
|
|
266 | |
|
19.2.1 IKEv2 Mobility and Multihoming (Mobike) |
|
|
267 | |
|
19.3 Middlebox Management |
|
|
272 | |
|
19.4 Adapting IPv6 Fast Handovers for IPv4 Networks |
|
|
274 | |
|
19.4.1 Protocol Operation |
|
|
274 | |
|
|
277 | |
|
|
277 | |
|
20 Fast Handover in a Wireless LAN |
|
|
279 | |
|
|
279 | |
|
20.2 Establishing connectivity in WLAN |
|
|
280 | |
|
20.3 Handover Bottlenecks |
|
|
282 | |
|
20.3.1 WLAN Considerations |
|
|
282 | |
|
|
284 | |
|
20.4 Improving Handover Support |
|
|
286 | |
|
|
290 | |
|
|
292 | |
|
|
293 | |
Part V Emerging Topics in IP Mobility |
|
|
21 Multiaccess and Mobility |
|
|
297 | |
|
|
297 | |
|
21.2 Mobility Between Networks |
|
|
298 | |
|
21.3 Case Study: VoIP Handovers |
|
|
299 | |
|
21.3.1 Experiment Framework |
|
|
300 | |
|
|
301 | |
|
|
302 | |
|
|
305 | |
|
21.4 Taxonomy of Research Problems |
|
|
306 | |
|
|
309 | |
|
|
309 | |
|
|
311 | |
|
|
311 | |
|
22.2 Background and Problem Description |
|
|
312 | |
|
22.2.1 Header Compression |
|
|
312 | |
|
22.2.2 Seamless Mobility with Header Compression |
|
|
313 | |
|
22.3 Design of Header Compression Context Transfer |
|
|
314 | |
|
22.3.1 Defining Context Structure |
|
|
314 | |
|
22.3.2 Relocation Timing and State Consistency |
|
|
314 | |
|
22.3.3 State Update Rules |
|
|
317 | |
|
22.3.4 Synchronization with Handover Signaling |
|
|
317 | |
|
|
317 | |
|
|
320 | |
|
22.4.2 Predictive Context Transfer |
|
|
322 | |
|
22.4.3 Reactive Context Transfer |
|
|
323 | |
|
22.4.4 Behavior of State Transitions During Handover |
|
|
325 | |
|
|
328 | |
|
|
328 | |
|
|
330 | |
|
23 Location Privacy and IP Mobility |
|
|
331 | |
|
|
331 | |
|
23.2 Location Privacy Problem with Mobile IPv6 |
|
|
334 | |
|
23.2.1 Revealing the Home Address |
|
|
334 | |
|
23.2.2 Disclosing the Care-of Address |
|
|
334 | |
|
23.2.3 Problem Illustration |
|
|
334 | |
|
23.3 Hiding the Home Address from Onlookers |
|
|
336 | |
|
23.3.1 Privacy-Tag Computation |
|
|
337 | |
|
23.3.2 Privacy Tag in Route-Optimized Binding Update |
|
|
341 | |
|
|
344 | |
|
23.3.4 Using a Pseudo Home Address |
|
|
345 | |
|
23.3.5 Protecting Mobile IPv6 Messages |
|
|
345 | |
|
23.4 Disclosing the Care-of Address |
|
|
346 | |
|
|
347 | |
|
|
348 | |
|
|
349 | |
|
24 Route Optimization for Mobile IPv4 using Return Routability |
|
|
351 | |
|
|
351 | |
|
24.2 Reference Model and Assumptions |
|
|
352 | |
|
|
353 | |
|
|
355 | |
|
24.5 Security Implications |
|
|
355 | |
|
|
355 | |
|
|
356 | |
Glossary |
|
357 | |
Index |
|
360 | |