SlideShare ist ein Scribd-Unternehmen logo
1 von 26
The problem with IP ?     1.   An IP address is associated with a fixed network    location.      2.  When we go to office, university or workplace and access  the internet from a fixed IP address. This IP address may be for a desktop or laptop computer.      3. In IP, if we take computer to a different place, outside our usual network  we have to reconfigure  it with a new IP.
Why MOBILE IP is needed ?   1.Mobile IP is enhancement to IP which allows a computer to roam fully on the internet while still maintaining the same IP address.   2. The applications feel that the mobile computer is connected to its usual IP address even if it is far away from its home network.
 Two Addresses in Mobile IP 1.Home address-The host had its original address, called the Home Address.  It  is associated with the home network. 2.Care of address-The temporary  address  of the host is called as Care of Address. It is associated with the foreign network. The mobile node gets a new care-of address every time it connects to a new point ofattachment.
Home Agent & Home Network    1.The home network contains a network node called Home Agent. The home address of the mobile node is the IP address of the home agent.   2. The home agent is responsible for receiving all the packets sent to the mobile node when the mobile node is away.     3. It is the responsibility of the home agent to deliver the packets to the mobile node at its current point of attachment
Foreign Agent and Foreign Network 1.When a mobile node moves, it first connects to a foreign agent in a foreign network. 2.Next, the mobile node is assigned a care-ofaddress (an IP address) by the foreign network.  3.The  node now registers its care-of address with the home agent.
4.The foreign agent is usually a router attached to the foreign network. 5.The foreign agent recieves and delivers packets sent by the home agent to the mobile hosts.6.When the mobile host acts as a foreign agent the care -of address is called as co-located care of address
Correspondent  Node 1.A correspondent node is a computer that sends packets to the mobile node. A correspondent node is typically connected to its own home network 2. A correspondent node is aware of only the IP address of the mobile node in the home network of the mobile node 3.Any packet from the correspondent node is delivered to the home agent
A Schematic Diagram of Mobile IP Mobile node Foreign agent Correspondent Node Home agent
The Phases
1st phase:  Discovering the care-of Address 1.In mobile IP, both a foreign agent and a home agent periodically broadcast agent advertisement messages 2. A mobile host must discover(learn the address of) a home agent before it leaves the home agent. 3.A mobile host must also discover a foreign agent after it moved to a foreign network.
Agent Advertisement An agent advertisement has the functions  1.It allows mobile nodes to discover foreign agents and get care-of addresses. 2. It allows the mobile node to know the services provided by the foreign agent.  3. It allows the mobile node to determine whether an agent is its home agent or a foreign agent
Agent Advertisement
Solicitation from a Mobile Node 1.When an mobile host has moved to a new network and has not recieved agent advertisements,it can initiate an agent solicitation. 2. A mobile node can generate agent solicitationmessages when it is looking for a foreign agent.
 2nd phase:  Registration 1.When a mobile node receives a care-of address from a foreign agent, its home agent needs to be informed. 2. The mobile node sends a registration request to its home agent through the foreign agent who has provided the new care-of address. 3. When the home agent receives the request, it updates its routing table and sends a registration reply back to the foreign agent.
Registration Request and Reply
Registration request format
Registration  reply format
3rd phase:  Data Transfer 1. When a remote host wants to send a packet to the mobile host, it uses its address as the source address and the home address of the mobile host as the destination address .  2. After receiving the packet , the home agent sends  the packet to the foreign agent . The home agent encapsulates the whole IP packet inside another IP packet using its address as the source  and the foreign agent’s as the destination address.
4. When the foreign agent recieves the packet ,it   removes the original packet. Since  the destination    address is the home address  of the mobile host ,the foreign agent consults a registry table to find the care of address.5. When a mobile host wants to send a packet to a remote host,it sends as it done normally.The mobile host prepares a packet with its home address as the source and the address of the remote host as the destination.
Tunneling and IP within IP The transfer of the packet from the home agent to the care-of address is called tunneling. The home agent is the source of the tunnel. The home agent inserts a new tunnel header in front of the IP header of a packet addressed to the mobile agent and received by the home agent The tunnel header is the care-of IP address of the mobile node. The old header is preserved as it was in the original packet.
4. The foreign agent is the receiver of the tunnel 5 .When the foreign agent receives the tunneled     packet, it has to delete the tunnel header to recover the original packet.  6.The foreign agent delivers the packet to the mobile node after removing the tunnel header
INEFFICIENCY IN MOBILE IP ,[object Object],INEFFICIENCY IN MOBILE IP 1. Double Crossing  2.Triangle Routing
[object Object],[object Object],[object Object]
THANK YOU
Mobile ip np
Mobile ip np

Weitere ähnliche Inhalte

Was ist angesagt?

network Addressing
network Addressingnetwork Addressing
network AddressingTauseef khan
 
SMTP Simple Mail Transfer Protocol
SMTP Simple Mail Transfer ProtocolSMTP Simple Mail Transfer Protocol
SMTP Simple Mail Transfer ProtocolSIDDARAMAIAHMC
 
BGP (border gateway routing protocol)
BGP (border gateway routing protocol)BGP (border gateway routing protocol)
BGP (border gateway routing protocol)Netwax Lab
 
mobile ip, Mobile COmmunication Internet Protocol
mobile ip, Mobile COmmunication Internet Protocolmobile ip, Mobile COmmunication Internet Protocol
mobile ip, Mobile COmmunication Internet ProtocolGaurav Dwivedi
 
Extending the Life of your SS7 Network with SIGTRAN
Extending the Life of your SS7 Network with SIGTRANExtending the Life of your SS7 Network with SIGTRAN
Extending the Life of your SS7 Network with SIGTRANAlan Percy
 
MIMO-OFDM for 4G network
MIMO-OFDM for 4G networkMIMO-OFDM for 4G network
MIMO-OFDM for 4G networknimay1
 
IT8602 Mobile Communication - Unit I Introduction
IT8602 Mobile Communication - Unit I IntroductionIT8602 Mobile Communication - Unit I Introduction
IT8602 Mobile Communication - Unit I Introductionpkaviya
 
Network address translation
Network address translationNetwork address translation
Network address translationVarsha Honde
 
Introduction & Wireless Transmission
Introduction & Wireless TransmissionIntroduction & Wireless Transmission
Introduction & Wireless TransmissionJoe Christensen
 
Intorduction to cellular communication
Intorduction to cellular communicationIntorduction to cellular communication
Intorduction to cellular communicationZaahir Salam
 
Tcp congestion control
Tcp congestion controlTcp congestion control
Tcp congestion controlAbdo sayed
 
Mobile computing-Unit 1,GSM
Mobile computing-Unit 1,GSMMobile computing-Unit 1,GSM
Mobile computing-Unit 1,GSMPallepati Vasavi
 

Was ist angesagt? (20)

Ip header
Ip headerIp header
Ip header
 
network Addressing
network Addressingnetwork Addressing
network Addressing
 
Trace route
Trace routeTrace route
Trace route
 
SMTP Simple Mail Transfer Protocol
SMTP Simple Mail Transfer ProtocolSMTP Simple Mail Transfer Protocol
SMTP Simple Mail Transfer Protocol
 
stop and wait
stop and waitstop and wait
stop and wait
 
BGP (border gateway routing protocol)
BGP (border gateway routing protocol)BGP (border gateway routing protocol)
BGP (border gateway routing protocol)
 
Dns
DnsDns
Dns
 
mobile ip, Mobile COmmunication Internet Protocol
mobile ip, Mobile COmmunication Internet Protocolmobile ip, Mobile COmmunication Internet Protocol
mobile ip, Mobile COmmunication Internet Protocol
 
Extending the Life of your SS7 Network with SIGTRAN
Extending the Life of your SS7 Network with SIGTRANExtending the Life of your SS7 Network with SIGTRAN
Extending the Life of your SS7 Network with SIGTRAN
 
MIMO-OFDM for 4G network
MIMO-OFDM for 4G networkMIMO-OFDM for 4G network
MIMO-OFDM for 4G network
 
IT8602 Mobile Communication - Unit I Introduction
IT8602 Mobile Communication - Unit I IntroductionIT8602 Mobile Communication - Unit I Introduction
IT8602 Mobile Communication - Unit I Introduction
 
IPV6 ADDRESS
IPV6 ADDRESSIPV6 ADDRESS
IPV6 ADDRESS
 
Network address translation
Network address translationNetwork address translation
Network address translation
 
Traffic analysis
Traffic analysisTraffic analysis
Traffic analysis
 
Introduction & Wireless Transmission
Introduction & Wireless TransmissionIntroduction & Wireless Transmission
Introduction & Wireless Transmission
 
Intorduction to cellular communication
Intorduction to cellular communicationIntorduction to cellular communication
Intorduction to cellular communication
 
Tcp congestion control
Tcp congestion controlTcp congestion control
Tcp congestion control
 
Mobile computing-Unit 1,GSM
Mobile computing-Unit 1,GSMMobile computing-Unit 1,GSM
Mobile computing-Unit 1,GSM
 
Fm transmitter
Fm transmitterFm transmitter
Fm transmitter
 
IGMP
IGMPIGMP
IGMP
 

Ähnlich wie Mobile ip np (20)

Mobile IP
Mobile IPMobile IP
Mobile IP
 
IT6601 Mobile Computing Unit II
IT6601 Mobile Computing Unit IIIT6601 Mobile Computing Unit II
IT6601 Mobile Computing Unit II
 
Ip packet delivery
Ip packet deliveryIp packet delivery
Ip packet delivery
 
IT8602 - Mobile Communication Unit IV
IT8602 - Mobile Communication   Unit IV IT8602 - Mobile Communication   Unit IV
IT8602 - Mobile Communication Unit IV
 
Mobility And Mobile I Pv4
Mobility And Mobile I Pv4Mobility And Mobile I Pv4
Mobility And Mobile I Pv4
 
Report
ReportReport
Report
 
Computer networks final presentation
Computer networks final presentationComputer networks final presentation
Computer networks final presentation
 
Mobile IP
Mobile IP Mobile IP
Mobile IP
 
Key mechanism of mobile ip
Key mechanism of mobile ip Key mechanism of mobile ip
Key mechanism of mobile ip
 
Mobile ip
Mobile ipMobile ip
Mobile ip
 
Unit 2
Unit 2Unit 2
Unit 2
 
Mobile ip presented by nafiz
Mobile ip   presented by nafizMobile ip   presented by nafiz
Mobile ip presented by nafiz
 
Unit 3
Unit 3Unit 3
Unit 3
 
Mobile internet protocol
Mobile internet protocolMobile internet protocol
Mobile internet protocol
 
Mobile ip presentation
Mobile ip presentationMobile ip presentation
Mobile ip presentation
 
Mobile computing Unit III MANET Notes
Mobile computing Unit III MANET NotesMobile computing Unit III MANET Notes
Mobile computing Unit III MANET Notes
 
Mobileip 161105154557
Mobileip 161105154557Mobileip 161105154557
Mobileip 161105154557
 
Mobile IP
Mobile IPMobile IP
Mobile IP
 
Mobileip 161105154557
Mobileip 161105154557Mobileip 161105154557
Mobileip 161105154557
 
It2402 mobile communication unit 4
It2402 mobile communication unit 4It2402 mobile communication unit 4
It2402 mobile communication unit 4
 

Kürzlich hochgeladen

The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsPixlogix Infotech
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc
 
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostLeverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostZilliz
 
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo Day
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo DayH2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo Day
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo DaySri Ambati
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brandgvaughan
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Mattias Andersson
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .Alan Dix
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyAlfredo García Lavilla
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Scott Keck-Warren
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii SoldatenkoFwdays
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.Curtis Poe
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):comworks
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024Lonnie McRorey
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek SchlawackFwdays
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity PlanDatabarracks
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfAlex Barbosa Coqueiro
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfHyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfPrecisely
 

Kürzlich hochgeladen (20)

The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and Cons
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
 
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostLeverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
 
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo Day
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo DayH2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo Day
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo Day
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brand
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easy
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
 
DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity Plan
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfHyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
 

Mobile ip np

  • 1. The problem with IP ? 1. An IP address is associated with a fixed network location. 2. When we go to office, university or workplace and access the internet from a fixed IP address. This IP address may be for a desktop or laptop computer. 3. In IP, if we take computer to a different place, outside our usual network we have to reconfigure it with a new IP.
  • 2. Why MOBILE IP is needed ? 1.Mobile IP is enhancement to IP which allows a computer to roam fully on the internet while still maintaining the same IP address. 2. The applications feel that the mobile computer is connected to its usual IP address even if it is far away from its home network.
  • 3. Two Addresses in Mobile IP 1.Home address-The host had its original address, called the Home Address. It is associated with the home network. 2.Care of address-The temporary address of the host is called as Care of Address. It is associated with the foreign network. The mobile node gets a new care-of address every time it connects to a new point ofattachment.
  • 4. Home Agent & Home Network 1.The home network contains a network node called Home Agent. The home address of the mobile node is the IP address of the home agent. 2. The home agent is responsible for receiving all the packets sent to the mobile node when the mobile node is away. 3. It is the responsibility of the home agent to deliver the packets to the mobile node at its current point of attachment
  • 5. Foreign Agent and Foreign Network 1.When a mobile node moves, it first connects to a foreign agent in a foreign network. 2.Next, the mobile node is assigned a care-ofaddress (an IP address) by the foreign network. 3.The node now registers its care-of address with the home agent.
  • 6. 4.The foreign agent is usually a router attached to the foreign network. 5.The foreign agent recieves and delivers packets sent by the home agent to the mobile hosts.6.When the mobile host acts as a foreign agent the care -of address is called as co-located care of address
  • 7. Correspondent Node 1.A correspondent node is a computer that sends packets to the mobile node. A correspondent node is typically connected to its own home network 2. A correspondent node is aware of only the IP address of the mobile node in the home network of the mobile node 3.Any packet from the correspondent node is delivered to the home agent
  • 8. A Schematic Diagram of Mobile IP Mobile node Foreign agent Correspondent Node Home agent
  • 10. 1st phase: Discovering the care-of Address 1.In mobile IP, both a foreign agent and a home agent periodically broadcast agent advertisement messages 2. A mobile host must discover(learn the address of) a home agent before it leaves the home agent. 3.A mobile host must also discover a foreign agent after it moved to a foreign network.
  • 11. Agent Advertisement An agent advertisement has the functions 1.It allows mobile nodes to discover foreign agents and get care-of addresses. 2. It allows the mobile node to know the services provided by the foreign agent. 3. It allows the mobile node to determine whether an agent is its home agent or a foreign agent
  • 13. Solicitation from a Mobile Node 1.When an mobile host has moved to a new network and has not recieved agent advertisements,it can initiate an agent solicitation. 2. A mobile node can generate agent solicitationmessages when it is looking for a foreign agent.
  • 14. 2nd phase: Registration 1.When a mobile node receives a care-of address from a foreign agent, its home agent needs to be informed. 2. The mobile node sends a registration request to its home agent through the foreign agent who has provided the new care-of address. 3. When the home agent receives the request, it updates its routing table and sends a registration reply back to the foreign agent.
  • 18. 3rd phase: Data Transfer 1. When a remote host wants to send a packet to the mobile host, it uses its address as the source address and the home address of the mobile host as the destination address . 2. After receiving the packet , the home agent sends the packet to the foreign agent . The home agent encapsulates the whole IP packet inside another IP packet using its address as the source and the foreign agent’s as the destination address.
  • 19. 4. When the foreign agent recieves the packet ,it removes the original packet. Since the destination address is the home address of the mobile host ,the foreign agent consults a registry table to find the care of address.5. When a mobile host wants to send a packet to a remote host,it sends as it done normally.The mobile host prepares a packet with its home address as the source and the address of the remote host as the destination.
  • 20. Tunneling and IP within IP The transfer of the packet from the home agent to the care-of address is called tunneling. The home agent is the source of the tunnel. The home agent inserts a new tunnel header in front of the IP header of a packet addressed to the mobile agent and received by the home agent The tunnel header is the care-of IP address of the mobile node. The old header is preserved as it was in the original packet.
  • 21. 4. The foreign agent is the receiver of the tunnel 5 .When the foreign agent receives the tunneled packet, it has to delete the tunnel header to recover the original packet. 6.The foreign agent delivers the packet to the mobile node after removing the tunnel header
  • 22.
  • 23.

Hinweis der Redaktion

  1. Correspondent NodeCorrespondent Node