Mobile Ip in Source Routing Systems

In: Science

Submitted By blackwhite2014
Words 7747
Pages 31
Technical University of Ilmenau
Faculty of Computer Science and Automation
Department of Integrated Communications Systems

Student research project
(Mobile IP in Source Routing Systems)

Supervisor: Dipl.-Inf. Florian Liers
Editor: Imad kailouh

Ilmenau, July 2010

1. Introduction ............................................................................................................. 4
1.1 Motivation .......................................................................................................... 4
1.2 Purpose of the work .......................................................................................... 4
2. Basics ..................................................................................................................... 5
2.1 Internet Protocol (IP) ......................................................................................... 5
2.1.1 IP Routing....................................................................................................... 5
2.1.1.1 What is routing ...................................................................................... 5
2.1.1.2 Source vs. Hop by Hop Routing ............................................................ 5
2.2 Mobile IP ........................................................................................................... 7
2.2.1 Terminology in Mobile IP ............................................................................. 7
2.2.2 How Mobile IP Works .................................................................................. 8
2.2.2.1 Agent Discovery .................................................................................... 9
2.2.2.2 Registration ......................................................................................... 11
2.2.2.3 Tunneling…...

Similar Documents

Mobile Operating Systems

...Mobile Operating Systems: A mobile operating system also, called OS, is an operating system that is specifically designed to run on mobile devices such as mobile phones smart phones, PDAs, tablet computers and other handheld devices. The mobile operating system is a software platform on top of which other programs called application programs can run on mobile devices. The Android operating system has grown from a small development project into the most frequently used mobile operating system that people use on a regular basis. It has had several stages in the development that has lead into the technology that powers many smart phones and tablets today. Android Inc. was founded in the United States in 2003 by Andy Rubin and Rich Minor of Palo Alto who then teamed up with Chris White and Nick Spears who work together to develop the software and associated technology to produce the most efficient Android operating system possible(itd_24 2012). While there have been many different versions of this technology, is important to realize that each version of operating system has helped to develop the most efficient operating system that is best for the consumer of that point in time. The android operating system has gone through a number of different names and versions before settling on the name android that is commonly known now. The previously known names of the android operating system consists of cupcake, donut, eclair, froyo, gingerbread, honeycomb, ice cream sandwich, and......

Words: 1200 - Pages: 5

Rfid Mobile System

...domains that involves this company meaning commerce and industry where mobility is very important. With the installation of the RFID system this company’s’ B2B solutions can be conducted in a more precisely manner and with a sufficient amount of time. The RFID system will be very mobile due to the use of multiple PDA devices and RFID readers connected to them in each office location. With the RFID system in place the company’s’ warehouse flow of incoming orders, outgoing orders and inventory can be scanned into the system as an order enters or deducted as an order leaves which makes this both time efficient and cost effective without any disruption in business when the company transfers over to the RFID system. The San Jose office will input all the company’s’ inventory into the RFID system and each item would be Identified as an individual item and not by an item class. The San Jose office will keep up to the minute data on how many and what kind of custom plastic parts are in the Pontiac, MI inventory stock. The Albany Ga. office will send on site productivity reports on how many plastic containers are package and ready for pickup every three hours. The China office will place an RFID tag on every fan that it produces and ships out to be all tracked by the corporate office in San Jose. As you can see by transferring onto the RFID system this will keep productivity up and moral high with in the company....

Words: 272 - Pages: 2

Mobile Store Management System

...MOBILE STORE MANAGEMENT SYSTEM _______________ A Thesis Presented to the Faculty of San Diego State University _______________ In Partial Fulfillment of the Requirements for the Degree Master of Science in Computer Science _______________ by Park B. Patel Fall 2012 iii Copyright © 2012 by Park B. Patel All Rights Reserved iv DEDICATION Dedicated to My Mother Chetna Patel, Father Bharat Patel, Wife Komal Trivedi And Brother Jatan Patel v ABSTRACT OF THE THESIS Mobile Store Management System by Park B. Patel Master of Science in Computer Science San Diego State University, 2012 The Mobile Store Management System is software which can become the backbone for a billing and inventory system for small organizations. This software provides an uncomplicated system to run mobile stores. This application could be very useful to small organizations. This application is inspired from current pen and paper based store management systems. It will provide an easy and attractive interface so that the user can easily manage and utilize the application. Various other approaches were considered for this application. This application is designed in a way that it will only require a minimum amount of information from the user. The goal was to look for the minimum amount of information that will meet needed requirements. vi TABLE OF CONTENTS PAGE ABSTRACT ...............................................................................................

Words: 10507 - Pages: 43

Mobile Ip

...Material CheckPoint Assignment Mobile IP is emerging as the next industry standard for how wireless devices move from one network to another. This CheckPoint provides an opportunity for you to explore the possibilities of this new technology. Resources: Ch. 9 & 11 of CWNA Certified Wireless Network Administrator Official Study Guide Answer the following questions about the potential of mobile office networking and Mobile IP: • What are the advantages and disadvantages of Mobile IP? • What are the typical installations of Mobile IP? • Do you think Mobile IP will increase in popularity? Why or why not? Support your position with either textual evidence or research from the University Library. Format citations and references consistent with APA guidelines. CheckPoint The advantages of mobile IP protocol are numerous. First of all, unique IP assigned to a specific node allows for faster and more reliable routing. Second, high level of portability is reached as it allows users to go through different networks maintaining same IP address. Lastly, it allows users to cross over between networks without losing connectivity and session. I could not locate anything specific about disadvantages of mobile IP in the textbook or on the Internet, but I did find a few problematic issues with it. First, the mobile IP requires a very strong signal to work properly. If signal is anything......

Words: 454 - Pages: 2

Mobile Patrol Surveillence System

...Mobile Patrol Surveillance System EXECUTIVE SUMMARY The research in this paper focuses on iPad Mini application for police forces that are responsible for the security during the football matches in the UK in order to raise the effectiveness of surveillance. The research begins with a general view on the technological improvements in law enforcements including the kind of technologies used. It gives a brief review of policing the football matches in the UK with several historical information and current figures such as crime incidents and arrests. It then explains the main functionalities of the proposed solution, combination of iPad Mini along with a customised surveillance application, from technical and business benefits point of view along with main aim and objectives of the solution. In the Critical Evaluation section, concerns of using iPad Mini solution with police officers have been evaluated along with few practical implementations. BRIEF REVIEW OF TECHNOLOGY IN POLICE FORCE AND POLICING FOOTBALL Along with the stunning changes in technology, Police has inevitably gone through a significant transformation parallel to the changes in technology. It is extremely crucial for the police forces to stay up-to-date with current technological developments. The executives of police forces are becoming more familiar and informed of developing technologies, moreover they develop a high awareness on how these systems may provide efficiency for their agencies on duty.......

Words: 2002 - Pages: 9

Open Closed Source System

...providing rights to other users to use and alter other programs. The rights for a user consist of a programmer who develops a program and wants to distribute this program through GNU the developer must allow other users the ability whether by gratis or by fee give an user open access to the source code of the program followed by the rights to the user who decides to access the source code. There are two steps of rights developers must abide by; the first right is asserting copy rights of the software to all users who wish to utilize the program. The second step of rights offers the license of the software to the user and permitting the user legal permission to change, copy, distribute, and modify the software. The free software available to all users is not warrant for defects or errors and the developer cannot be held reliable for faults to the program. Some modified software may have problems running of some operating systems due to manufactures prohibiting certain modified software that may be patented and due to this the General Public Licensing uses different provisions to extend other alternatives through copyright laws to create ways for software to properly operate on the operating system. GNU GENERAL PUBLIC LICENSE. (Copyright © 2007 Free Software Foundation, Inc. <http://fsf.org/>). Retrieved from http://www.gnu.org/copyleft/gpl.html New York Times. (2013). BUSINESS TECHNOLOGY; One Man's Fight for Free Software. Retrieved from......

Words: 482 - Pages: 2

Web or Mobile Systems

...Web or Mobile Systems IT/205 Web or Mobile Systems One industry that has really rode the technology wave is the news media industry. With the speed of information on the internet and how, as a society, we have turned into an instant gratification kind of people. The boom of news stories being reported almost as soon as they happen has changed the way we take in our news, almost eliminating paper news sources. Being able to sign on to your national news application on your cell phone and seeing pictures and at times video along with an updated article at any time, as well other key information like weather and stocks, has made its way to being number one to a lot of people’s choice for news outlet. A lot of news outlets have taken advantage of the mobile application features, from the local to the national level. With all those options there’s a lot of apps to choose from but I kept it a broad scale and chose the USA Today mobile application. I can remember a time that doesn’t seem that long ago where I would gather up my change from my pocket or car and put it in a bin then retrieve my daily newspaper circular, for national news the USA Today paper was in front of a lot of businesses. The purpose of the mobile application for USA Today is to give the user the most update news and other critical information like weather and stock information at a much faster rate than the daily newspaper. The application gives the user more in-depth details than a paper by providing......

Words: 800 - Pages: 4

Open Source Operating Systems

...1-3 Short Paper: Open Source Operating Systems Southern New Hampshire University September 7, 2014 In 1991, Linus Torvalds created Linux and after a couple releases and improvements, the computer community caught on. Some advantages of the Linux Operating System are low cost, stability, performance, network friendliness, flexibility, compatibility, choice, fast and easy installation, full use of hard disk, multitasking, security and open source (Haas, 2014) . There is no major initial investment needed to obtain the Linux operating system. There is no fee for a license unlike Microsoft Windows. For comparative purposes, Windows 8.1 64-bit is retailing for 96.99 at BestBuy and 99.99 at Newegg.com. With no initial monetary investment, Linux gives many potential users an opportunity to try the OS. The ease of exposure to the Linux OS make it easier to increase adopters and faithful users of the OS. Linux’s stability can contributed to its user permission design. Linux runs with lowest permission levels possible which minimizes the possibility of damaging the system. Linux is written to survive in the way it keeps program memory space and system kernel resources separate (Cedar Valley Tech, 2009). Also since Linux is open-source, bugs are fixed by an army of ready developers who are not trapped within the confines of a software manufacturer. Though no operating system is perfect, Linux can run for years without needing to be restarted (Godbey, 2006). Linux performs well......

Words: 978 - Pages: 4

Web or Mobile System Paper

...Web or Mobile System Paper Jason Johnson IT/205 Management of Information Systems September 14, 2014 Wendy Chasser Web or Mobile System Paper Not since the creation of HyperText Markup Language by Tim Berners-Lee, has anything form the digital world had more of an impact on society than Facebook. Facebook is a social media site, founded by Mark Zuckerberg. The site launched on February 4, 2004 as a site for Harvard students to connect with one another. The site soon expanded to other university campuses and gained popularity. Today, over 1.3 billion people use the Facebook web and mobile applications ("Facebook Statistics", 2014). The site was formally called TheFacebook, but was later shortened to just Facebook. The purpose of the original web site application was to put students in touch with one another, share their photos and meet new people. The more popular Facebook became on campus; the more people began to talk about it. Soon, students in 800 college campuses across the United States and Canada could join the network. Membership grew to more than 5 million active users, before the decision to make it available to everyone (Strickland, 2007). Mark Zuckerberg said that purpose was to make the world more open and transparent, which he felt would create greater understanding and connection ("Facebook Principles", 2014). Joining Facebook is free to anyone age thirteen and older. They just need to create an account using a valid email address. Once you......

Words: 1064 - Pages: 5

Mobile System Paper

...Mobile System Paper Lamoni Woulard CIS/207 10/20/14 VICKIE SCHUBERT-MARTIN Mobile System Paper Technology changes every day. It is beginning to become intertwined with how he handle everyday tasks. One very important mobile application that has changed the way technology is being used and seen is the iOS. This software developed by Apple was technologically advanced to improve the user’s interaction with everyday tasks. Over the years the operating system has been expanded with many features that change how it is used in everyday use. The development of this application is being expanded more and more every day. How is iOS used? iOS (previously iPhone OS originally released June 29, 2007) includes a user interface that is based on the concept of direct manipulation. Direct manipulation, which uses multi-touch gestures, has interface control elements which consist of sliders, switches, and buttons. The interface elements consist of sliders, switches, and buttons, which includes gestures such as swipe, tap, pinch, and reverse pinch. The features of iOS include a home screen, folders, notification center, and much more. There are 40 million users who have interpreted this mobile application into their everyday lives. The home screen, also known as “SpringBoard”, displays different application icons and a dock where users can pin frequently used apps. This screen appears whenever the user unlocks the device. Folders on iOS have developed since the introduction......

Words: 694 - Pages: 3

Web or Mobile System Paper

...Web or Mobile System Paper: Netflix Abstract For the best free application for personal use is Netflix. The app itself is free but you have to pay for usage as far as purchasing goes. Very versatile you can use it on a mobile device, gaming console, or computer (i.e. Laptop, tablet, desktop). It’s good for people who can’t afford cable, don’t have time to catch their favorite shows, and enjoy watching old and new movies. There are other companies out there such as Hulu, Voodoo, and Viewster to name a few. I personally prefer Netflix because of the advertisement it received on my Xbox One. Netflix For the “at home” or the “on the go” movie lover, Netflix is a great app. You can download it on your mobile device, pc, and gaming console. It uses one account for multiple devices. The best thing for me is that your spouse and child can have their own profile. Netflix has been around for a long time and it is still running strong even though the competition is steadily increasing. This app is affordable, user friendly, and constantly upgrading to meet the needs of its users. Netflix is very affordable for even the lowest of budgets. I have found that Netflix is cheaper than going to the movies and paying for cable and overall, renting movies. Netflix allows the customer to set up one account with multiple profiles, for multiple devices at one low price. Although the movies and TV shows are a little slow coming to Netflix you are still able to watch some of your......

Words: 798 - Pages: 4

Mobile System

...Mobile System For years, Google has been the top search engine in the world, holding over eighty percent market share in 2010. Google has stayed so popular because they have focused on keeping up with trends in technology, including getting into the Smartphone industry by purchasing the Android Operating System. Google is now trying to tailor all search results to every person individually to give their users more accurate results depending on what their interests are, and allowing businesses who choose to advertize with Google access to consumers who are directly interested in their products. They have recently decided to pair this idea with mobile computing by making and application called Google Now. Google Now is a mobile application built into Google’s Android Operation System that focuses on giving the user the information they want and it doesn’t require them to search. The application uses the web history from their phone, their Google e-mail history and their location to find what interest the consumer using the phone. If the user searches for the score to the Cleveland Cavaliers game, Google uses this information to keep the user informed of the Cleveland Cavaliers scores without the user needing to search. The app tells the user a Cavaliers game is in progress and what the score is. In addition, the app will tell the user when the Cavaliers are playing a game close to their locations and offers a one button option to even buy tickets for that game. If...

Words: 794 - Pages: 4

Mobile Operating Systems

...Paper on Mobile Operating Systems Submitted to Amity School of Engineering and Technology Guided By: Made By: Ms. Ankur Chaudhary Sagar Nenwani, 6CSE4X A2305213340 AMITY UNIVERSITY, UTTAR PRADESH GAUTAM BUDDHA NAGAR Declaration I, Sagar Nenwani, student of B.Tech (CSE) hereby declare that the project titled “Mobile Operating Systems” which is submitted by me to Department of Computer Sciences, Amity School of Engineering and Technology, Amity University Uttar Pradesh, Noida, in partial fulfillment of requirement for the award of the degree of Bachelor of Technology in Computer Science, has not been previously formed the basis for the award of any degree, diploma or other similar title or recognition. The Author attests that permission has been obtained for the use of any copy righted material appearing in the project report other than brief excerpts requiring only proper acknowledgement in scholarly writing and all such use is acknowledged. Sagar Nenwani 6 CSE 4 (x) A2305213486 May 7’ 2016 Certification This is to certify that Mr. Sagar Nenwani, student of B.Tech. in Computer Science has carried out the work presented in the project of the term paper entitle "Mobile Operating Systems" as......

Words: 3460 - Pages: 14

Dynamic Source Routing

...Dynamic Source Routing (DSR) DSR was first introduced and described by David B. Johnson, David A. Maltz and Josh Broch in 1994. The protocol is specifically designed for use in multi-hop wireless ad hoc networks. The protocol does not require any existing network infrastructure or administration and is completely self-organizing and self-configuring. The protocol basically consists of the two mechanisms: Route Discovery and Route Maintenance, where the Route Discovery mechanism handles establishment of routes and the Route Maintenance mechanism keeps route information updated. Assumptions Some assumptions concerning the behavior of the nodes that participate in the ad hoc network are made. The most important assumptions are the following: A1. All nodes that participate in the network are willing to participate fully in the protocols of the network. A2. The diameter of an ad hoc network is the minimum number of hops necessary for a packet to reach from any node located at one extreme edge of the ad hoc network to another node located at the opposite extreme. We assume that this diameter will often be small (e.g., perhaps 5 or 10 hops), but it may often be greater than 1. A3. Nodes can detect the error through a standard link-layer checksum or Cyclic Redundancy Check (CRC), and discard corrupted packages . A4. The speed at which nodes move is moderate with respect to packet transmission latency and wireless transmission range of the particular underlying network......

Words: 1841 - Pages: 8

Use of Ipsec in Mobile Ip

...IPSec in Mobile IP DONE BY: SALEM ITANI SUBMITTED TO: Dr. AYMAN KAYSSI DATE: MAY 21, 2001 ID #: 20011003 INTRODUCTION As mobile computing has become a reality, new technologies and protocols have been developed to provide to mobile users the services that already exist for non-mobile users. Mobile IP, one of these technologies, enables a node to change its point of attachment to an internet in a manner transparent to applications running on top of the protocol stack, since its IP address does not change. To provide this transparency, new elements are required: the “home agent”(HA), located in the home network, will forward all incoming packets addressed to the mobile node’s (MN) new location. The foreign agent (FA) is responsible for providing a temporary address to the MN. The flexibility of communication through the Internet allows the existence of such protocols as Mobile IP. As much as this is true, it is as well the fact that every time new protocols or services are made available on the Internet, new security challenges arise. IPSec has been developed as a protocol to provide security at the IP layer. That is to say, using IPSec all communications on the Internet can be accomplished in a secure fashion. Providing security is not an easy task, since many situations have to be taken into account. The approach IPSec uses to address security is by managing two key concepts: privacy and authentication. In this paper, the MOBILE IPv4 &......

Words: 9748 - Pages: 39