This document specifies a method by which an IP datagram may be encapsulated (carried as payload) within an IP datagram. Encapsulation is suggested as a means to alter the normal IP routing for datagrams, by delivering them to an intermediate destination that would otherwise not be selected by the (network part of the) IP Destination Address field in the original IP header. Encapsulation may serve a variety of purposes, such as delivery of a datagram to a mobile node using Mobile IP.
RFC Downloads
Cited By
- Liu X, Li Y, Zhang H, Yin X, Shi X, Wang Z, Ren G and Yao J Poster: Scalable and Interpretable Multilayer Overlay Network Checking via Ensemble Verification Proceedings of the ACM SIGCOMM 2024 Conference: Posters and Demos, (22-24)
- Hilal F and Gasser O (2023). Yarrpbox: Detecting Middleboxes at Internet-Scale, Proceedings of the ACM on Networking, 1:CoNEXT1, (1-23), Online publication date: 30-Jun-2023.
- Ohnishi K, Kotani D, Ichihara H, Kanemaru Y and Okabe Y Acila Proceedings of the ACM SIGCOMM Workshop on Future of Internet Routing & Addressing, (79-85)
- Pappas C, Lee T, Reischuk R, Szalachowski P and Perrig A (2019). Network Transparency for Better Internet Security, IEEE/ACM Transactions on Networking, 27:5, (2028-2042), Online publication date: 1-Oct-2019.
- Hong C, Mandal S, Al-Fares M, Zhu M, Alimi R, B. K, Bhagat C, Jain S, Kaimal J, Liang S, Mendelev K, Padgett S, Rabe F, Ray S, Tewari M, Tierney M, Zahn M, Zolla J, Ong J and Vahdat A B4 and after Proceedings of the 2018 Conference of the ACM Special Interest Group on Data Communication, (74-87)
- Sundarrajan A and Ramasubramanian S (2015). Fast reroute from single link and single node failures for IP multicast, Computer Networks: The International Journal of Computer and Telecommunications Networking, 82:C, (20-33), Online publication date: 8-May-2015.
- Jia W (2014). A unified MIPv6 and PMIPv6 route optimization scheme for heterogeneous mobility management domains, Computer Networks: The International Journal of Computer and Telecommunications Networking, 75:PA, (160-176), Online publication date: 24-Dec-2014.
- Abu-Amara M (2014). A combined solution for the Internet access denial caused by malicious Internet service providers, Security and Communication Networks, 7:11, (2078-2093), Online publication date: 1-Nov-2014.
- Cao J, Xia R, Yang P, Guo C, Lu G, Yuan L, Zheng Y, Wu H, Xiong Y and Maltz D Per-packet load-balanced, low-latency routing for clos-based data center networks Proceedings of the ninth ACM conference on Emerging networking experiments and technologies, (49-60)
- Patel P, Bansal D, Yuan L, Murthy A, Greenberg A, Maltz D, Kern R, Kumar H, Zikos M, Wu H, Kim C and Karri N (2013). Ananta, ACM SIGCOMM Computer Communication Review, 43:4, (207-218), Online publication date: 19-Sep-2013.
- Patel P, Bansal D, Yuan L, Murthy A, Greenberg A, Maltz D, Kern R, Kumar H, Zikos M, Wu H, Kim C and Karri N Ananta Proceedings of the ACM SIGCOMM 2013 conference on SIGCOMM, (207-218)
- Tuncer H, Mishra S and Shenoy N (2012). Review, Computer Communications, 36:1, (63-79), Online publication date: 1-Dec-2012.
- Matsuhashi Y, Shinagawa T, Ishii Y, Hirooka N and Kato K (2012). Transparent VPN failure recovery with virtualization, Future Generation Computer Systems, 28:1, (78-84), Online publication date: 1-Jan-2012.
- Kini S, Ramasubramanian S, Kvalbein A and Hansen A (2010). Fast recovery from dual-link or single-node failures in IP networks using tunneling, IEEE/ACM Transactions on Networking, 18:6, (1988-1999), Online publication date: 1-Dec-2010.
- Stevens T, Pareit D, De Turck F, Moerman I, Dhoedt B and Demeester P (2010). SCTP for robust and flexible IP anycast services, Computer Communications, 33:3, (365-371), Online publication date: 1-Feb-2010.
- Stevens T, Wauters T, Develder C, De Turck F, Dhoedt B and Demeester P (2010). Analysis of an anycast based overlay system for scalable service discovery and execution, Computer Networks: The International Journal of Computer and Telecommunications Networking, 54:1, (97-111), Online publication date: 1-Jan-2010.
- Liu H, Jin H, Liao X, Hu L and Yu C Live migration of virtual machine based on full system trace and replay Proceedings of the 18th ACM international symposium on High performance distributed computing, (101-110)
- Kong J, Schwan K, Lee M and Ahamad M (2008). Protectit, ACM SIGOPS Operating Systems Review, 42:4, (137-147), Online publication date: 25-Apr-2008.
- Kong J, Schwan K, Lee M and Ahamad M Protectit Proceedings of the 3rd ACM SIGOPS/EuroSys European Conference on Computer Systems 2008, (137-147)
- Bradford R, Kotsovinos E, Feldmann A and Schiöberg H Live wide-area migration of virtual machines including local persistent state Proceedings of the 3rd international conference on Virtual execution environments, (169-179)
- Zarifzadeh S, Yazdani N and Khanmirza H (2007). A routing framework for load balancing of bandwidth sensitive traffic in differentiated service networks, Computer Networks: The International Journal of Computer and Telecommunications Networking, 51:4, (1183-1204), Online publication date: 1-Mar-2007.
- Huang Y and Chuang M (2006). Fault tolerance for home agents in mobile IP, Computer Networks: The International Journal of Computer and Telecommunications Networking, 50:18, (3686-3700), Online publication date: 21-Dec-2006.
- Lai S, Ma Y and Deng H HO-RSVP Proceedings of the 2nd ACM international workshop on Quality of service & security for wireless and mobile networks, (103-110)
- Hunter D and Gilfedder T Protection of long-reach PON traffic Proceedings of the 1st international conference on Access networks, (16-es)
- Kitahara R, Ueno H, Suzuki H, Ishikawa N, Komura T, Fujikawa K and Takagi H MAPT Proceedings of the 2006 international conference on Wireless communications and mobile computing, (785-790)
- Lu T, Sui C, Ma Y, Zhao J and Yang Y Extending address space of IP networks with hierarchical addressing Proceedings of the 10th Asia-Pacific conference on Advances in Computer Systems Architecture, (499-508)
- Herwono I, Sachs J and Keller R (2005). Provisioning and performance of mobility-aware personalized push services in wireless broadband hotspots, Computer Networks: The International Journal of Computer and Telecommunications Networking, 49:3, (364-384), Online publication date: 19-Oct-2005.
- Cheng C, Wang S and Liang T (2005). Multi-agent schema of Mobile IP protocol for mobile environment, ACM SIGOPS Operating Systems Review, 39:4, (46-65), Online publication date: 1-Oct-2005.
- Buddhikot M, Hari A, Singh K and Miller S (2005). MobileNAT, Mobile Networks and Applications, 10:3, (289-302), Online publication date: 1-Jun-2005.
- Sen A, Hao B, Shen B, Murthy S and Ganguly S On multipath routing with transit hubs Proceedings of the 4th IFIP-TC6 international conference on Networking Technologies, Services, and Protocols; Performance of Computer and Communication Networks; Mobile and Wireless Communication Systems, (1043-1055)
- Papaioannou T and Stamoulis G (2004). Design of a charging and accounting architecture for QoS-differentiated VPN services to mobile users, Computer Communications, 27:4, (364-373), Online publication date: 1-Mar-2004.
- Phatak D, Goff T and Plusquellic J (2003). IP-in-IP tunneling to enable the simultaneous use of multiple IP interfaces for network level connection striping, Computer Networks: The International Journal of Computer and Telecommunications Networking, 43:6, (787-804), Online publication date: 20-Dec-2003.
- Pérez-Costa X, Torrent-Moreno M and Hartenstein H (2003). A performance comparison of Mobile IPv6, Hierarchical Mobile IPv6, fast handovers for Mobile IPv6 and their combination, ACM SIGMOBILE Mobile Computing and Communications Review, 7:4, (5-19), Online publication date: 1-Oct-2003.
- Buddhikot M, Hari A, Singh K and Miller S MobileNAT Proceedings of the 1st ACM international workshop on Wireless mobile applications and services on WLAN hotspots, (75-84)
- Hsieh R and Seneviratne A A comparison of mechanisms for improving mobile IP handoff latency for end-to-end TCP Proceedings of the 9th annual international conference on Mobile computing and networking, (29-41)
- Keromytis A Tagging data in the network stack Proceedings of the BSD Conference 2003 on BSD Conference, (13-13)
- Bejerano Y and Cidon I (2003). An anchor chain scheme for IP mobility management, Wireless Networks, 9:5, (409-420), Online publication date: 1-Sep-2003.
- Zhang B and Krunz M (2003). Algorithms and protocols for stateless constrained-based routing, Computer Communications, 26:14, (1570-1580), Online publication date: 1-Sep-2003.
- Tseng C, Lee G, Liu R and Wang T (2003). HMRSVP, Wireless Networks, 9:2, (95-102), Online publication date: 1-Mar-2003.
- Aggélou G An integrated platform for ad hoc GSM cellular communications The handbook of ad hoc wireless networks, (189-203)
- Shannon C, Moore D and Claffy K (2002). Beyond folklore, IEEE/ACM Transactions on Networking, 10:6, (709-720), Online publication date: 1-Dec-2002.
- Choi S, Choi J, Yang S and Jong S History based RSVP setup mechanism for supporting QoS guarantee on the mobile environment Proceedings of the 7th CDMA international conference on Mobile communications, (413-419)
- Yang C, Hwang M, Li J and Chang T A solution to mobile IP registration for AAA Proceedings of the 7th CDMA international conference on Mobile communications, (329-337)
- Yoo J, Kim K and Choo H Cellular packet network supporting multi-level hierarchical regional registration Proceedings of the 7th CDMA international conference on Mobile communications, (319-328)
- Papaioannou T and Stamoulis G Design and implementation of a charging and accounting architecture for QoS-differentiated VPN services to mobile users Proceedings of the 3rd international conference on quality of future internet services and internet charging and QoS technologies 2nd international conference on From QoS provisioning to QoS charging, (250-262)
- Keromytis A, Misra V and Rubenstein D (2002). SOS, ACM SIGCOMM Computer Communication Review, 32:4, (61-72), Online publication date: 1-Oct-2002.
- Costa X and Hartenstein H (2002). A simulation study on the performance of mobile IPv6 in a WLAN-based cellular network, Computer Networks: The International Journal of Computer and Telecommunications Networking, 40:1, (191-204), Online publication date: 16-Sep-2002.
- Keromytis A, Misra V and Rubenstein D SOS Proceedings of the 2002 conference on Applications, technologies, architectures, and protocols for computer communications, (61-72)
- Thomas R, Raines R, Baldwin R and Temple M (2002). Performance analysis of multicast algorithms for mobile satellite communication networks1The views expressed in this article are those of the authors and do not reflect the official policy of the United States Air Force, Department of Defense or the U.S. Government.1, Computer Communications, 25:11-12, (1085-1093), Online publication date: 1-Jul-2002.
- Douligeris C and Vasilakos T Mobile IP protocols Handbook of wireless networks and mobile computing, (529-552)
- Striegel A, Ramanujan R and Bonney J A Protocol Independent Internet Gateway for Ad Hoc Wireless Networks Proceedings of the 26th Annual IEEE Conference on Local Computer Networks
- Kravets R, Carter C and Magalhães L (2001). A cooperative approach to user mobility, ACM SIGCOMM Computer Communication Review, 31:5, (57-69), Online publication date: 1-Oct-2001.
- Tilak S and Abu-Ghazaleh N (2001). A concurrent migration extension to an end-to-end host mobility architecture, ACM SIGMOBILE Mobile Computing and Communications Review, 5:3, (26-31), Online publication date: 1-Jul-2001.
- Floroiu J, Ionescu T, Ruppelt R, Henckel B and Mateescu M (2001). Using NDIS intermediate drivers for extending the protocol stack. A case study, Computer Communications, 24:7-8, (703-715), Online publication date: 1-Apr-2001.
- Tseng C, Chi K and Huang T (2001). A new locality-based IP multicasting scheme for mobile hosts, Computer Communications, 24:5-6, (486-495), Online publication date: 1-Mar-2001.
- Rodriguez P, Sibal S and Spatscheck O (2001). TPOT, Computer Communications, 24:2, (249-255), Online publication date: 1-Feb-2001.
- Ghosh D (2000). Mobile IP, XRDS: Crossroads, The ACM Magazine for Students, 7:2, (10-17), Online publication date: 1-Dec-2000.
- Jönsson U, Alriksson F, Larsson T, Johansson P and Maguire G MIPMANET Proceedings of the 1st ACM international symposium on Mobile ad hoc networking & computing, (75-85)
- Camp T, Lusth J and Matocha J Reduced cell switching in a mobile computing environment Proceedings of the 6th annual international conference on Mobile computing and networking, (143-154)
- Mink S, Pählke F, Schäfer G and Schiller J FATIMA Proceedings of the Fifth IEEE Symposium on Computers and Communications (ISCC 2000)
- Li D and Cheriton D Scalable web caching of frequently updated objects using reliable multicast Proceedings of the 2nd conference on USENIX Symposium on Internet Technologies and Systems - Volume 2, (1-1)
- Zao J, Gahm J, Troxel G, Condell M, Helinek P, Yuan N, Castineyra I and Kent S (1999). A public-key based secure mobile IP, Wireless Networks, 5:5, (373-390), Online publication date: 1-Oct-1999.
- Wedlund E and Schulzrinne H Mobility support using SIP Proceedings of the 2nd ACM international workshop on Wireless mobile multimedia, (76-82)
- Perkins C (1999). Mobile IP and the IETF, ACM SIGMOBILE Mobile Computing and Communications Review, 3:3, (28-31), Online publication date: 1-Jul-1999.
- Chua K, Li Y and Foo C (1999). On a Linux implementation of mobile IP and its effects on TCP performance, Computer Communications, 22:6, (568-588), Online publication date: 1-Apr-1999.
- Lin J and Chang R (1999). A comparison of the Internet multicast routing protocols, Computer Communications, 22:2, (144-155), Online publication date: 1-Jan-1999.
- Chikarmane V, Williamson C, Bunt R and Mackrell W (1998). Multicast support for mobile hosts using mobile IP, Mobile Networks and Applications, 3:4, (365-379), Online publication date: 30-Dec-1999.
- Gupta V and Montenegro G (1998). Secure and mobile networking, Mobile Networks and Applications, 3:4, (381-390), Online publication date: 30-Dec-1999.
- Perkins C (1998). Mobile networking in the Internet, Mobile Networks and Applications, 3:4, (319-334), Online publication date: 30-Dec-1999.
- Zhao X, Castelluccia C and Baker M Flexible network support for mobility Proceedings of the 4th annual ACM/IEEE international conference on Mobile computing and networking, (145-156)
- Perkins C and Johnson D (1998). Route Optimization for Mobile IP, Cluster Computing, 1:2, (161-176), Online publication date: 1-Apr-1998.
- Perkins C (1998). Mobile Networking Through Mobile IP, IEEE Internet Computing, 2:1, (58-69), Online publication date: 1-Jan-1998.
- Geiger R, Solomon J and Crisler K (1997). Wireless Network Extension Using Mobile IP, IEEE Micro, 17:6, (63-68), Online publication date: 1-Nov-1997.
- Inoue A, Ishiyama M, Fukumoto A and Okamoto T Secure Mobile IP using IP Security Primitives Proceedings of the 6th Workshop on Enabling Technologies on Infrastructure for Collaborative Enterprises, (235-241)
- Cheshire S and Baker M (1996). Internet mobility 4×4, ACM SIGCOMM Computer Communication Review, 26:4, (318-329), Online publication date: 1-Oct-1996.
- Cheshire S and Baker M Internet mobility 4×4 Conference proceedings on Applications, technologies, architectures, and protocols for computer communications, (318-329)
Recommendations
TCP-Jersey for wireless IP communications
Improving the performance of the transmission control protocol (TCP) in wireless Internet protocol (IP) communications has been an active research area. The performance degradation of TCP in wireless and wired-wireless hybrid networks is mainly due to ...