Lectures notes for 2010 - KTH
Lectures notes for 2010 - KTH Lectures notes for 2010 - KTH
Back to the original problem: Z wants to send a message to X Initially X is located at A1 then it moves to A2. γ Z C X A1 α γ Z C α R ⇒ R δ Figure 9. X moves from A1 to A2, Z not aware of Mobility There are several alternatives. β δ X A2 β Maguire Objectives of Mobile IP 11: 14 of 50 maguire@kth.se 2010.03.21 Internetworking/Internetteknik
Alternative 1 Initially X is located at A1 then it moves to A2. γ Z C X A1 α γ Z C α δ WAN R R ⇒ β δ WAN R R Redirect X A2 β Figure 10. X must send a redirect message to Z, to tell it it’s new address A2. ✘ Z must be aware of where X currently is. ✘ X must get a new local address A2 (How? perhaps DHCP) Maguire Objectives of Mobile IP 11: 15 of 50 maguire@kth.se 2010.03.21 Internetworking/Internetteknik
- Page 663 and 664: Writing an IPv6 address The 128 bit
- Page 665 and 666: Binary prefix Hex. prefix Fraction
- Page 667 and 668: Interface ID Must be unique to the
- Page 669 and 670: Link local addresses Link local add
- Page 671 and 672: Permanently assigned groups For exa
- Page 673 and 674: Prefix for IPv6 documentation The I
- Page 675 and 676: IPv6 Routing • all standard routi
- Page 677 and 678: Fragment header Next Header (8 bits
- Page 679 and 680: intermediate relays on the way to t
- Page 681 and 682: Security • Header Authentication
- Page 683 and 684: IPv6 ICMP [13] Type (8 bits) Code (
- Page 685 and 686: IPv6 ICMP Echo Request/Reply (PING)
- Page 687 and 688: Summary of IPv6 ICMP • incorporat
- Page 689 and 690: IPv6 Transition Mechanisms • Incr
- Page 691 and 692: IPv6 networks 6Bone - http://www.6b
- Page 693 and 694: If things are to be connected they
- Page 695 and 696: Where are ISPs? “… There is evi
- Page 697 and 698: This lecture we have discussed: •
- Page 699 and 700: [13] A. Conta and S. Deering, “In
- Page 701 and 702: IK1550 Internetworking/Internettekn
- Page 703 and 704: Emerging Network Architecture H …
- Page 705 and 706: Updating after a move Host name:
- Page 707 and 708: Communication from Z to X γ Z C X
- Page 709 and 710: Identification γ Z C Y B α γ Z C
- Page 711 and 712: How did it know to send the “I am
- Page 713: Getting Service Once it’s identit
- Page 717 and 718: Alternative 3 Initially X is locate
- Page 719 and 720: Alternative 4 continued Initially X
- Page 721 and 722: What happens in the case of wireles
- Page 723 and 724: Wireless WANs BS-a cell a BS-a cell
- Page 725 and 726: Mobile IP Standardization Effort
- Page 727 and 728: A Mobile-IP(V6) Scenario Home Agent
- Page 729 and 730: Tunneling IP Datagrams Both home ag
- Page 731 and 732: Why Agent Discovery? Agent Discover
- Page 733 and 734: Registration Message Format 0 8 16
- Page 735 and 736: FA Requirements (v4) • Each FA mu
- Page 737 and 738: Optimization Problem Home site Inte
- Page 739 and 740: Mobile IP Problems and Development
- Page 741 and 742: Wireless IP Network Architecture Ho
- Page 743 and 744: HAWAII extension is similar to Cell
- Page 745 and 746: Hierarchical FA and Regional Tunnel
- Page 747 and 748: Hierarchical FA and Regional Tunnel
- Page 749 and 750: This lecture we have discussed: •
- Page 751 and 752: IK1550 Internetworking/Internettekn
- Page 753 and 754: Private networks Private Networks a
- Page 755 and 756: Security Protocols, APIs, etc. •
- Page 757 and 758: IPSec IPSec in three parts: • enc
- Page 759 and 760: AH header For authentication purpos
- Page 761 and 762: Where can you run IPSec? Mode Where
- Page 763 and 764: Linux firewall For example, for the
Back to the original problem: Z wants to send a message to X<br />
Initially X is located at A1 then it moves to A2.<br />
γ<br />
Z<br />
C<br />
X<br />
A1<br />
α<br />
γ<br />
Z<br />
C<br />
α<br />
R<br />
⇒<br />
R<br />
δ<br />
Figure 9. X moves from A1 to A2, Z not aware of Mobility<br />
There are several alternatives.<br />
β<br />
δ<br />
X<br />
A2<br />
β<br />
Maguire Objectives of Mobile IP 11: 14 of 50<br />
maguire@kth.se <strong>2010</strong>.03.21 Internetworking/Internetteknik