Lectures notes for 2010 - KTH
Lectures notes for 2010 - KTH Lectures notes for 2010 - KTH
Alternative 4 Initially X is located at A1 then it moves to A2. γ Z C MSR-α Mα X A1 α γ Z C MSR-α Mα α R ⇒ R δ MSR-β Mβ β δ MSR-β Mβ X A2 β Figure 13. X sends a message to MSR-β, to get it’s new address A2 and says it’s old MSR was MSR-α. ✘ MSR-α must now perform host specific routing to MSR-β (which can provide the local address A2) ✔ Z is now completely unaware of the move - it always sends traffic to MSR-α. ✔ If X moves again, Z does not change where it sends traffic to & traffic need not go via MSR-β - it will go directly from MSR-α to the MSR responsible for the new segment. Maguire Objectives of Mobile IP 11: 18 of 50 maguire@kth.se 2010.03.21 Internetworking/Internetteknik
Alternative 4 continued Initially X is located at A1 then it moves to A2 and then moves to A3. γ Z C MSR-α Mα X A1 α γ Z C MSR-α Mα α R ⇒ R δ MSR-β Mβ β δ R MSR-ε Mε X A3 ε Figure 14. X sends a message to MSR-ε, to get it’s new address A3 and says it’s old MSR was MSR-α. ✔ The traffic from MSR-α to MSR-β or MSR-α to MSR-ε can be encapsulated, using for example IP in IP (written IP-IP) encapsulation. Thus none of the intervening routers needs know about mobility. Maguire Objectives of Mobile IP 11: 19 of 50 maguire@kth.se 2010.03.21 Internetworking/Internetteknik
- Page 667 and 668: Interface ID Must be unique to the
- Page 669 and 670: Link local addresses Link local add
- Page 671 and 672: Permanently assigned groups For exa
- Page 673 and 674: Prefix for IPv6 documentation The I
- Page 675 and 676: IPv6 Routing • all standard routi
- Page 677 and 678: Fragment header Next Header (8 bits
- Page 679 and 680: intermediate relays on the way to t
- Page 681 and 682: Security • Header Authentication
- Page 683 and 684: IPv6 ICMP [13] Type (8 bits) Code (
- Page 685 and 686: IPv6 ICMP Echo Request/Reply (PING)
- Page 687 and 688: Summary of IPv6 ICMP • incorporat
- Page 689 and 690: IPv6 Transition Mechanisms • Incr
- Page 691 and 692: IPv6 networks 6Bone - http://www.6b
- Page 693 and 694: If things are to be connected they
- Page 695 and 696: Where are ISPs? “… There is evi
- Page 697 and 698: This lecture we have discussed: •
- Page 699 and 700: [13] A. Conta and S. Deering, “In
- Page 701 and 702: IK1550 Internetworking/Internettekn
- Page 703 and 704: Emerging Network Architecture H …
- Page 705 and 706: Updating after a move Host name:
- Page 707 and 708: Communication from Z to X γ Z C X
- Page 709 and 710: Identification γ Z C Y B α γ Z C
- Page 711 and 712: How did it know to send the “I am
- Page 713 and 714: Getting Service Once it’s identit
- Page 715 and 716: Alternative 1 Initially X is locate
- Page 717: Alternative 3 Initially X is locate
- Page 721 and 722: What happens in the case of wireles
- Page 723 and 724: Wireless WANs BS-a cell a BS-a cell
- Page 725 and 726: Mobile IP Standardization Effort
- Page 727 and 728: A Mobile-IP(V6) Scenario Home Agent
- Page 729 and 730: Tunneling IP Datagrams Both home ag
- Page 731 and 732: Why Agent Discovery? Agent Discover
- Page 733 and 734: Registration Message Format 0 8 16
- Page 735 and 736: FA Requirements (v4) • Each FA mu
- Page 737 and 738: Optimization Problem Home site Inte
- Page 739 and 740: Mobile IP Problems and Development
- Page 741 and 742: Wireless IP Network Architecture Ho
- Page 743 and 744: HAWAII extension is similar to Cell
- Page 745 and 746: Hierarchical FA and Regional Tunnel
- Page 747 and 748: Hierarchical FA and Regional Tunnel
- Page 749 and 750: This lecture we have discussed: •
- Page 751 and 752: IK1550 Internetworking/Internettekn
- Page 753 and 754: Private networks Private Networks a
- Page 755 and 756: Security Protocols, APIs, etc. •
- Page 757 and 758: IPSec IPSec in three parts: • enc
- Page 759 and 760: AH header For authentication purpos
- Page 761 and 762: Where can you run IPSec? Mode Where
- Page 763 and 764: Linux firewall For example, for the
- Page 765 and 766: Proxy Access Through A Firewall ext
- Page 767 and 768: Newping http://ftp.cerias.purdue.ed
Alternative 4 continued<br />
Initially X is located at A1 then it moves to A2 and then moves to A3.<br />
γ<br />
Z<br />
C<br />
MSR-α<br />
Mα<br />
X<br />
A1<br />
α<br />
γ<br />
Z<br />
C<br />
MSR-α<br />
Mα<br />
α<br />
R<br />
⇒<br />
R<br />
δ<br />
MSR-β<br />
Mβ<br />
β<br />
δ<br />
R<br />
MSR-ε<br />
Mε<br />
X<br />
A3<br />
ε<br />
Figure 14. X sends a message to MSR-ε, to get it’s new address A3 and says it’s old MSR was MSR-α.<br />
✔ The traffic from MSR-α to MSR-β or MSR-α to MSR-ε can be encapsulated, using <strong>for</strong> example IP in IP<br />
(written IP-IP) encapsulation. Thus none of the intervening routers needs know about mobility.<br />
Maguire Objectives of Mobile IP 11: 19 of 50<br />
maguire@kth.se <strong>2010</strong>.03.21 Internetworking/Internetteknik