在本篇論文中,我們探究將Mobile IP網路中之群播繞送協定延展至Cellular IP網路中的可行性,並且同時地Cellular IP將可能成為第三代無線網路架構中與Mobile IP協同合作以提供micro-mobility的可能解決方案。在IETF所規範的Mobile IP中,已提出兩種可在其架構內達成行動群播服務之方式,分別是remote subscription與bi-directional tunneling。Remote subscription 採取了一種可讓使用者直接訂閱其所感興趣群組之群播服務且具簡單並直覺性之做法,此種做法俱備了最佳繞送路徑之優點。而至於bi-directional tunneling,其為一種依賴從Mobile IP之Home Agent單點投射封包的做法。也就是說群播封包首先先被繞送到Home Agent,然後在此處先以使用者之care-of-address封裝好後,再傳送到使用者所在之子網路中。然而儘管bi-directional tunneling具有低封包丟失率的優點,但其繞送路徑卻缺乏效率且延遲時間也過長,除此之外,其還另有重覆的封包也會浪費網路頻寬等缺點。因此在本篇論文裡,將提出整合以上remote subscription與bi-directional tunneling 之主要特點以設計一可在Cellular IP網路中運作的群播繞送機制。而在整個Cellular IP網路中流動之封包個數將是此方法機制的主要分析之處。另外當此群播繞送機制應用在下一代IPv6網際網路之適用性也將被探討。最後,此機制之效能表現將會以程式模擬與數學上之分析來評量。 This article explores the possibility to extend the multicast services from Mobile IP network to Cellular IP network, a complementary solution for supporting micro-mobility with Mobile IP in the 3GPP2 architecture. In IETF Mobile IP, two approaches, remote subscription and bi-directional tunneling, are proposed to achieve the mobile multicast services. Remote subscription, a simple but intuitional approach allows mobile hosts to participate in the multicast group of interest directly and takes advantage of optimal routing path and simplicity. As to bi-directional tunneling, it relies on unicast Mobile IP tunneling from the home agent of mobile hosts. Namely, Multicast datagrams are routed to the home agent first and from where those packets are encapsulated with care-of-address of the mobile host and tunneled to the visited subnet. However, bi-directional tunneling isn’t suitable for multimedia service delivery due to its inefficient routing path and delay while it suffers from no packet loss. Besides, duplicated datagrams waste network resources as well. We propose a novel approach integrating the main features of remote subscription and bi-directional tunneling to make multicast enable in Cellular IP network by considering the numbers of datagrams flowing in Cellular IP network. The feasibility is also surveyed while this approach is applied to IPv6 environment. The performance was evaluated by simulations and mathematical analysis.