This book provides a thorough introduction to Internet protocol (IP) mobility using the Internet Engineering Task Force (IETF) standard mobile IP protocol. Mobile IP allows users to roam across various IP subnets and access links, while maintaining continuous communication. According to the authors, mobile IP can be summed up as a “dynamic routing protocol where end devices signal their own routing updates and dynamic tunnels eliminate the need for host route propagation.”
The book is organized into nine chapters. The first few chapters provide an excellent overview of the mobile IP protocol. The core concepts are presented in chapter 2, “Understanding Mobile IP.” This chapter provides a comprehensive overview of various key concepts presented in several mobile IP requests for comments (RFCs). Chapter 3 examines the security aspects of mobile IP and discusses mechanisms for secure IP communication between mobile IP entities. The material presented in chapters 2 and 3 is used in various scenarios in later chapters.
Chapter 4 uses a simple lab topology to present key concepts of Cisco IOS mobile IP configuration, while chapter 5 builds on this lab topology to create a campus mobility solution. Topics such as security key management options; integration with authentication, authorization, and accounting (AAA) protocol servers; and high availability architectures are discussed. Chapter 6 addresses metro mobility, which provides seamless, always-on mobility solutions for users commuting beyond their private campus networks. The chapter discusses different environments a mobile node might encounter, and explores mobile IP features such as reverse tunneling techniques, virtual private network (VPN) integration, and public and private roaming.
Chapter 7 introduces the concept of network mobility. By allowing a router to be a mobile node, devices attached to the mobile network inherit mobility without having to be mobile IP-aware. Chapter 8 discusses miscellaneous but important topics, such as mobile node home address management, call models to determine sizing and scalability of mobility agents, and simple network management protocol (SNMP) support for managing Cisco mobility agents and mobile nodes.
The book can be used both as a general reference by information technology (IT) professionals and as a recommended reference in a graduate-level course. Although the book organizes content logically from basic to advanced topics, each chapter is self-contained, allowing experienced readers to skip topics. Cisco IOS knowledge is assumed, though the authors clearly explain the logic behind implementation and options.
Overall, this book is well written, is thorough in its coverage, and has clear and concise examples and illustrations. The authors have succeeded in explaining a complex subject clearly, and the book is highly recommended to both novice and advanced readers.