E²T: End-to-End Tunneling Extension to Mobile IPv6

In the standard Mobile IPv6 (MIPv6), the bidirectional tunnelling through the home agent or the route optimization show inefficiency in per-packet routing, especially when both communicating endpoints are mobile. To be scalable and compatible, mobile devices’ packets should be routed efficiently with minimal changes to the network infrastructure. However, the current solutions do not provide any means for the end systems to perform optimized packet routing during the operation of the mobile devices. In this paper, we present an end-to-end tunnelling extension to MIPv6 (E 2 T) for mobile routing packets, which reduces the per-packet routing cost for the communications of mobile devices through the lower packet routing overhead. Besides, our approach requires little change to MIPv6, but allows the more efficient routing behavior with the shorter end-to-end transmission latency between communicating endpoints. The simulation results show our approach is suitable for real-time multimedia applications.

[1]  Paul Ferguson,et al.  Network Ingress Filtering: Defeating Denial of Service Attacks which employ IP Source Address Spoofing , 1998, RFC.

[2]  Dieter Hogrefe,et al.  A review of mobility support paradigms for the internet , 2006, IEEE Communications Surveys & Tutorials.

[3]  Thomas Narten,et al.  Neighbor Discovery for IP Version 6 (IPv6) , 1996, RFC.

[4]  Stephen E. Deering,et al.  Generic Packet Tunneling in IPv6 Specification , 1998, RFC.

[5]  F Bao Certificate-based Binding Update Protocol (CBU) , 2005 .

[6]  Nick Moore,et al.  Optimistic Duplicate Address Detection (DAD) for IPv6 , 2006, RFC.

[7]  Bernd Girod,et al.  Modeling the delays of successively-transmitted Internet packets , 2004, 2004 IEEE International Conference on Multimedia and Expo (ICME) (IEEE Cat. No.04TH8763).

[8]  Randall J. Atkinson,et al.  IP Encapsulating Security Payload (ESP) , 1995, RFC.

[9]  M. Samad,et al.  Deployment of Wireless Mobile IPv6 in Malaysia , 2004, 2004 RF and Microwave Conference (IEEE Cat. No.04EX924).

[10]  Charles E. Perkins,et al.  IP Mobility Support for IPv4 , 2002, RFC.

[11]  Charles E. Perkins Securing Mobile IPv6 Route Optimization Using a Static Shared Key , 2006, RFC.

[12]  Stephen T. Kent,et al.  Security Architecture for the Internet Protocol , 1998, RFC.

[13]  Dieter Hogrefe,et al.  Evaluation of Mobile IPv 6 Based on an OPNET Model , 2006 .

[14]  Hesham Soliman,et al.  Simultaneous Bindings for Mobile IPv6 Fast Handovers , 2005 .

[15]  Stephen T. Kent,et al.  IP Authentication Header , 1995, RFC.

[16]  Charles E. Perkins,et al.  IP Encapsulation within IP , 1996, RFC.

[17]  Charles E. Perkins,et al.  Mobility support in IPv6 , 1996, MobiCom '96.

[18]  Maurice Gagnaire,et al.  Evolution of Internet Technologies , 2004, Proc. IEEE.

[19]  David Thaler,et al.  IPv6 Host-to-Router Load Sharing , 2005, RFC.

[20]  Hugo Krawczyk,et al.  A Security Architecture for the Internet Protocol , 1999, IBM Syst. J..

[21]  JinHyeock Choi Fast Router Discovery with L2 support , 2006 .

[22]  Charles E. Perkins,et al.  Route Optimization for Mobile IP , 1998, Cluster Computing.

[23]  Gabriel Montenegro,et al.  Reverse Tunneling for Mobile IP, revised , 2001, RFC.

[24]  Christian Vogt,et al.  Early binding updates for mobile IPv6 , 2005, IEEE Wireless Communications and Networking Conference, 2005.

[25]  Steven J. Vaughan-Nichols Mobile IPv6 and the Future of Wireless Internet Access , 2003, Computer.