Cluster Computing

, Volume 1, Issue 2, pp 161–176 | Cite as

Route Optimization for Mobile IP

  • Charles E. Perkins
  • David B. Johnson


Route Optimization has been designed within the IETF to ameliorate the problem of triangle routing, a routing artifact introduced by Mobile IP's requirement to route packets destined for a mobile node by way of its home network. In this article, we describe the current protocol specification for the Route Optimization protocol, concentrating on design decisions and justifications. Once the basic mechanisms are explained, we show how they are applied to enable foreign agents to offer smooth handoffs for mobile nodes, and describe the security operations that enable reliable operation of this handoff between foreign agents with which a mobile node has no pre-existing security relationship.


Mobile Node Home Agent Route Optimization Foreign Agent Correspondent Node 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.


Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.


  1. [1]
    S. Bradner and A. Mankin, The recommendation for the IP Next Generation Protocol, RFC 1752 (January 1995).Google Scholar
  2. [2]
    CDPD consortium, Cellular Digital Packet Data Specification(Chicago, IL, 1993).Google Scholar
  3. [3]
    S.E. Deering, ed., ICMP router discovery messages, RFC 1256 (September 1991).Google Scholar
  4. [4]
    S. Deering and R. Hinden, Internet Protocol, version 6 (IPv6) specification, RFC 1883 (December 1995).Google Scholar
  5. [5]
    W. Diffie and M. Hellman, New directions in cryptography, IEEE Transactions on Information Theory 22 (November 1976) 644-654.zbMATHCrossRefGoogle Scholar
  6. [6]
    D.E. Eastlake, S.D. Crocker and J.I. Schiller, Randomness recommendations for security, RFC 1750 (December 1994).Google Scholar
  7. [7]
    S. Hanks, T. Li, D. Farinacci and P. Traina, Generic Routing Encapsulation (GRE), RFC 1701 (October 1994).Google Scholar
  8. [8]
    S. Hanks, T. Li, D. Farinacci and P. Traina, Generic routing encapsulation over IPv4 networks, RFC 1702 (October 1994).Google Scholar
  9. [9]
    D.B. Johnson, Scalable and robust internetwork routing for mobile hosts, in: Proceedings of the 14th International Conference on Distributed Computing Systems(June 1994) pp. 2-11.Google Scholar
  10. [10]
    D. Johnson and C. Perkins, Mobility support in IPv6, draft-ietfmobileip-ipv6-06.txt (August 1998). (Work in progress.)Google Scholar
  11. [11]
    H. Krawczyk, M. Bellare and R. Cannetti, HMAC: keyed-hashing for message authentication, RFC 2104 (February 1997).Google Scholar
  12. [12]
    T. Narten, E. Nordmark and W. Simpson, Neighbor discovery for IP version 6 (IPv6), RFC 1970 (August 1996).Google Scholar
  13. [13]
    C. Perkins, IP encapsulation within IP, RFC 2003 (May 1996).Google Scholar
  14. [14]
    C. Perkins, Minimal encapsulation within IP, RFC 2004 (May 1996).Google Scholar
  15. [15]
    C. Perkins, ed., IP mobility support, RFC 2002 (October 1996).Google Scholar
  16. [16]
    C.E. Perkins and D.B. Johnson, Special tunnels for Mobile IP, draftietf-mobileip-spectun-00.txt (November 1997). (Work in progress.)Google Scholar
  17. [17]
    J.B. Postel, ed., Internet control message protocol, RFC 792 (September 1981).Google Scholar
  18. [18]
    B. Schneier, Applied Cryptography: Protocols, Algorithms, and Source Code in C(Wiley, New York, 2nd ed., 1996).Google Scholar
  19. [19]
    S. Thomson and T. Narten, IPv6 stateless address autoconfiguration, RFC 1971 (August 1996).Google Scholar

Copyright information

© Kluwer Academic Publishers 1998

Authors and Affiliations

  • Charles E. Perkins
    • 1
  • David B. Johnson
    • 2
  1. 1.Sun MicrosystemsMenlo ParkUSA
  2. 2.Carnegie Mellon UniversityPittsburghUSA

Personalised recommendations