20.01.2014 Views

Lectures notes for 2010 - KTH

Lectures notes for 2010 - KTH

Lectures notes for 2010 - KTH

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Establishing Identity<br />

When a node arrives on a network it must identify itself<br />

• mechanism: typically via a challenge response protocol<br />

• Who should it identify itself to? Answer: The MSR ≡½ Mobility Support Router<br />

γ<br />

Z<br />

C<br />

X<br />

A1<br />

Y<br />

B<br />

α<br />

γ<br />

Z<br />

C<br />

Y<br />

B<br />

α<br />

R<br />

⇒<br />

R<br />

δ<br />

Figure 6. How do we know it is the same X?<br />

β<br />

δ<br />

X<br />

A2<br />

I am X<br />

MSR-β<br />

Mβ<br />

β<br />

Maguire Objectives of Mobile IP 11: 10 of 50<br />

maguire@kth.se <strong>2010</strong>.03.21 Internetworking/Internetteknik

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!