For the base Mobile IP protocol, the routing algorithm will lead to a critical problem which is called "triangular routing problem". This document gives a routing optimal strategy to solve this problem. The ...For the base Mobile IP protocol, the routing algorithm will lead to a critical problem which is called "triangular routing problem". This document gives a routing optimal strategy to solve this problem. The description lays emphasises on the messages, smooth handoff between the home agent and the foreign agent of the same mobile node, the operations of the home agents and foreign agent, and the security considerations.展开更多
Mobile IP is one of the key technologies to implement mobile computing. But its security still needs furtherresearch. After an introduction to mobile IP, IPSec and the threat to mobile IP security,an IPSec-based mobil...Mobile IP is one of the key technologies to implement mobile computing. But its security still needs furtherresearch. After an introduction to mobile IP, IPSec and the threat to mobile IP security,an IPSec-based mobile IP se-curity architecture is presented in the article. This architecture combines IPSec and some other secure measures withmobile IP so as to give mobile IP stronger security. In the article this architecture is discussed in detail and a methodis proposed to traverse firewall using IKE.展开更多
One of the key problems in the mobile communication is the anonymous communication. The mobile userwants to hide his real identifying information to the visiting domain and the public network which he does not trust,a...One of the key problems in the mobile communication is the anonymous communication. The mobile userwants to hide his real identifying information to the visiting domain and the public network which he does not trust,and prevent from being tracked and located. In this paper, we have discoursed the anonymous communications in themobile IP, and presented a novel strategy of the dynamic address allocation and the routing with anonymity. The sug-gested method enables any identifying information can be carried over the anonymous and secure connections, andprovide end-to-end security. The implements of the mobile host and the mobile subnet are also presented.展开更多
This paper discusses the method of mobile multicast based on mobile IP protocol proposed by IETF. At first, the paper analyzes the methods of Remote subscription and Home subscription, points out the latent problem in...This paper discusses the method of mobile multicast based on mobile IP protocol proposed by IETF. At first, the paper analyzes the methods of Remote subscription and Home subscription, points out the latent problem in mobile ip protocol,and gives the methods of mobile multicast and multicast agent to solve mobile multicast problem, then compares delivery cost of multicast and delivery delay of multicast packets as well as disruption of multicast service due to mobility in four kinds of methods of mobile multicast.展开更多
Mobility management is one of the key problems in the mobile communication techniques. The performance of the mobile communication networks is heavily depended on the effectiveness of the mobility management. In this ...Mobility management is one of the key problems in the mobile communication techniques. The performance of the mobile communication networks is heavily depended on the effectiveness of the mobility management. In this paper, we have presented a protocol of the mobility management in the mobile IP networks, based on the distributed RSs. When the mobile user in the inactive connection handoffs, some pointers are constructed and modified by the RSs and routers. It can realize the local registration; only when a call arrives, the possible update operations of the mobile database are needed. Consequently, the access of the RS is limited, and the cost of the mobility management is also reduced.展开更多
文摘For the base Mobile IP protocol, the routing algorithm will lead to a critical problem which is called "triangular routing problem". This document gives a routing optimal strategy to solve this problem. The description lays emphasises on the messages, smooth handoff between the home agent and the foreign agent of the same mobile node, the operations of the home agents and foreign agent, and the security considerations.
文摘Mobile IP is one of the key technologies to implement mobile computing. But its security still needs furtherresearch. After an introduction to mobile IP, IPSec and the threat to mobile IP security,an IPSec-based mobile IP se-curity architecture is presented in the article. This architecture combines IPSec and some other secure measures withmobile IP so as to give mobile IP stronger security. In the article this architecture is discussed in detail and a methodis proposed to traverse firewall using IKE.
文摘One of the key problems in the mobile communication is the anonymous communication. The mobile userwants to hide his real identifying information to the visiting domain and the public network which he does not trust,and prevent from being tracked and located. In this paper, we have discoursed the anonymous communications in themobile IP, and presented a novel strategy of the dynamic address allocation and the routing with anonymity. The sug-gested method enables any identifying information can be carried over the anonymous and secure connections, andprovide end-to-end security. The implements of the mobile host and the mobile subnet are also presented.
文摘This paper discusses the method of mobile multicast based on mobile IP protocol proposed by IETF. At first, the paper analyzes the methods of Remote subscription and Home subscription, points out the latent problem in mobile ip protocol,and gives the methods of mobile multicast and multicast agent to solve mobile multicast problem, then compares delivery cost of multicast and delivery delay of multicast packets as well as disruption of multicast service due to mobility in four kinds of methods of mobile multicast.
文摘Mobility management is one of the key problems in the mobile communication techniques. The performance of the mobile communication networks is heavily depended on the effectiveness of the mobility management. In this paper, we have presented a protocol of the mobility management in the mobile IP networks, based on the distributed RSs. When the mobile user in the inactive connection handoffs, some pointers are constructed and modified by the RSs and routers. It can realize the local registration; only when a call arrives, the possible update operations of the mobile database are needed. Consequently, the access of the RS is limited, and the cost of the mobility management is also reduced.