Each chapter concludes with a Chapter Summary. I. INTRODUCTION.
1. Introduction. What Is Driving Mobile Communications? What Background Do I Need to Understand This Book? Who Is the Target Audience of This Book? What Is the Purpose of This Book? What Notation Is Used throughout This Book? Are We Talking about IPv4 or IPv6? How Can I Obtain RFCs and Internet Drafts? What Is the Roadmap for the Rest of This Book?
2. Computer Networking Tutorial. How Do Computers Communicate? What Is the Internet Protocol (IP)? How Does IP Routing Work? How Are Routing-Table Entries Created? Why is Routing Based on Network-Prefix? How Can We Translate Names into Addresses? How Can We Determine Link-Layer Addresses?
3. The Need for Mobile. What Happens When a Node Changes Link? Can't You Solve This Problem with Host-Specific Routes? Why Not Just Change the Node's IP Address? Can't You Just Solve This at the Link Layer? What If I Only Need Nomadicity?
II. MOBILE.
4. Mobile Overview. Is Mobile an Official Standard? What Problems Does Mobile Solve? What Is the Scope of the Mobile Solution? What Are the Requirements for Mobile? What Are the Design Goals for Mobile? What Assumptions Does Mobile Make? Where Does Mobile Reside? At a 10,000-Foot Level, How Does Mobile Work?
5. Mobile: The Gory Details. What Is the Mobile IP Design Philosophy? What Is Agent Discovery? What Is Registration? How Are Packets Routed to and from Mobile Nodes?
6. Tunneling. What Is IP Fragmentation? What Is IP in IP Encapsulation? What Is Minimal Encapsulation? What Is Generic Routing Encapsulation (GRE)?
III. APPLYING MOBILE.
7. Security Primer. What Do We Mean by Security? What Is Cryptography? What Do We Mean by Confidentiality? What Do We Mean by Authentication, Integriy? How Can We Manage Keys Securely? What Security Protocols Are Used in the Internet? What Are Firewalls?
8. Campus Mobility:. What Is the Model for This Application? Insider Attacks Mobile Node Denial-of-Service. Theft of Information: Passive Eavesdropping. Theft of Information: Session-Stealing (Takeover) Attack. Other Active Attacks.
9. Internet-Wide Mobility:. What Is the Model for This Application? Which Threats Are Largely the Same As Before? How Do We Protect a Mobile Node That Is Outside the? How Can Mobile Nodes Traverse the Firewall without?
10. Applying Mobile:. What Is the Model for Commercial, Mobile Service? What Is Theft-Of-Service? Denial-of-Service Revisited. Motorola's iDEN=81: A Case Study.
11. Other Applications for Mobile. Support for Other Protocols within the Mobile. Mobile Networks (as Opposed to Mobile Hosts). Mobile as a Layer-2, Tunnel-Establishment Protocol.
IV. FUTURE TOPICS.
12. Mobility for IP Version 6. How Does IPv6 Differ from IPv4? Which of These Differences Is Relevant to the. Doesn't Address Autoconfiguration Eliminate the. How Does Mobile IPv6 Work? How Does a Mobile Node Determine Its Location? How Does a Mobile Node Inform Other Nodes of Its. How Are Packets Routed to and from Mobile Nodes?
13. Open Issues. TCP Performance and Mobility. RSVP and Real-Time Traffic. Service Location.
14. Summary and Final Thoughts. Mobile Summary. The Future of Mobile 307.
Glossary. References. Index.