SlideShare a Scribd company logo
1 of 10
AGENT DISCOVERY &
REGISTRATION
By
C.Rajeswari,
II M.Sc(IT),
Nadar saraswathi college of arts and science,
Theni.
INTRODUCTION
• Current versions of the internet protocol(IP) assume that the
point at which a computer attaches to the internet or a network
is fixed and its IP address identifies the network to which it is
attached.
• If a mobile computer or mobile node moves to a new network
while keeping its IP address unchanged its address does not
reflect the new point of attachment.
AGENT DISCOVERY
• A mobile node uses a method known as agent discovery to determine the
following information:
 When the node has moved from one network to another
 Whether the network is the nodes home or a foreign network
 What is the foreign agent care-of address offered by each foreign
agent on the network
• Mobility agents transmit agent advertisements to advertise their services on
a network. In the absence of agent advertisements, a mobile node can
solicit advertisements. This is known as agent solicitation.
Continue….
I. Agent Advertisement:
• Mobile nodes use agent advertisements to determine their current point of
attachment to the internet or to an organizations networks.
• An agent advertisement is an internet control message protocol(ICMP) router
advertisement that has been extended to also carry a mobility agent
advertisement extension.
• A foreign agent can be too busy to serve additional mobile nodes. A foreign agent
must continue to send agent advertisements.
• This way, mobile nodes that are already registered with it will know that they
have not moved out of range of the foreign agent and that the foreign agent has
not failed.
Continue....
II. Agent Solicitation
• Every mobile node should implement agent solicitation.
• The mobile node uses the same procedures defaults and constants for
agent solicitation as specified for ICMP router solicitation messages.
• The rate at which a mobile node sends solicitation is limited by the
mobile node.
• The mobile node can send three initial solicitations at a maximum rate of
one per second while searching for an agent.
• After registering with an agent the rate at which solicitations are sent is
reduced to limit the overhead on the local network.
REGISTRATION
• Registration used by a MN to inform the FA that it is visiting.
 The new care of address of the MN is sent to the HA.
 Registration expires duration is negotiated during registration. Mobile
must re-register before it expires
 All registrations are authenticated
 The MN sends a registration request in to the FA which passes it along
to the home agent.
 The HA responds to the FA which then informs the MN that all is in
order and registration is complete.
Continue….
• When the mobile node receives an agent advertisement the mobile node
registers through the foreign agent even when the mobile node might be
able to acquire its own co-located care-of address.
• This feature enables sites to restrict access to mobility services.
• Through agent advertisements, mobile nodes detect when they have moved
from one subnet to another.
• Mobile IP registration provides a flexible mechanism for mobile nodes to
communicate their current reachability information to their home agent.
Continue….
• The registration process enables mobile nodes to perform the following tasks:
 Request forwarding services when visiting a foreign network
 Inform their home agent of their current care-of address
 Renew a registration that is due to expire
• Deregister when they return home The registration process also enables
mobile nodes to:
 Registration with multiple foreign agents
 Deregister specific care-of addresses while retaining other mobility
bindings
 Discover the address of a home agent if the mobile node is not
configured with this information.
Continue….
• When the mobile node registers directly with its home agent the
registration process requires only the following steps:
• The mobile node sends a deregistration request to the home agent
• The home agent sends a registration reply to the mobile node granting or
denying the request.
Agent discovery& registration

More Related Content

What's hot

WSN network architecture -Sensor Network Scenarios & Transceiver Design Consi...
WSN network architecture -Sensor Network Scenarios & Transceiver Design Consi...WSN network architecture -Sensor Network Scenarios & Transceiver Design Consi...
WSN network architecture -Sensor Network Scenarios & Transceiver Design Consi...ArunChokkalingam
 
Demand Assigned Multiple Access
Demand Assigned Multiple AccessDemand Assigned Multiple Access
Demand Assigned Multiple Accessanushkashastri
 
Routing in Mobile Ad hoc Networks
Routing in Mobile Ad hoc NetworksRouting in Mobile Ad hoc Networks
Routing in Mobile Ad hoc NetworksSayed Chhattan Shah
 
Chapter 4 data link layer
Chapter 4 data link layerChapter 4 data link layer
Chapter 4 data link layerNaiyan Noor
 
Fisheye State Routing (FSR) - Protocol Overview
Fisheye State Routing (FSR) - Protocol OverviewFisheye State Routing (FSR) - Protocol Overview
Fisheye State Routing (FSR) - Protocol OverviewYoav Francis
 
WIRELESS TRANSMISSION
WIRELESS TRANSMISSIONWIRELESS TRANSMISSION
WIRELESS TRANSMISSIONjunnubabu
 
Cellular network
Cellular networkCellular network
Cellular networkshreb
 
Application layer protocols
Application layer protocolsApplication layer protocols
Application layer protocolsFabMinds
 
Localization & calling
Localization  & callingLocalization  & calling
Localization & callingRUpaliLohar
 
Wireless communication and its standards
Wireless communication and its standardsWireless communication and its standards
Wireless communication and its standardsM.k. Praveen
 
Network Layer,Computer Networks
Network Layer,Computer NetworksNetwork Layer,Computer Networks
Network Layer,Computer Networksguesta81d4b
 
IEEE 802.11 Architecture and Services
IEEE 802.11 Architecture and ServicesIEEE 802.11 Architecture and Services
IEEE 802.11 Architecture and ServicesSayed Chhattan Shah
 
MOBILE COMMUNICATION
MOBILE COMMUNICATIONMOBILE COMMUNICATION
MOBILE COMMUNICATIONjunnubabu
 

What's hot (20)

WSN network architecture -Sensor Network Scenarios & Transceiver Design Consi...
WSN network architecture -Sensor Network Scenarios & Transceiver Design Consi...WSN network architecture -Sensor Network Scenarios & Transceiver Design Consi...
WSN network architecture -Sensor Network Scenarios & Transceiver Design Consi...
 
Demand Assigned Multiple Access
Demand Assigned Multiple AccessDemand Assigned Multiple Access
Demand Assigned Multiple Access
 
Routing algorithms
Routing algorithmsRouting algorithms
Routing algorithms
 
Mobile Transport layer
Mobile Transport layerMobile Transport layer
Mobile Transport layer
 
Routing in Mobile Ad hoc Networks
Routing in Mobile Ad hoc NetworksRouting in Mobile Ad hoc Networks
Routing in Mobile Ad hoc Networks
 
CELLULAR MOBILE RADIO SYSTEMS
CELLULAR MOBILE RADIO SYSTEMSCELLULAR MOBILE RADIO SYSTEMS
CELLULAR MOBILE RADIO SYSTEMS
 
Routing protocols
Routing protocolsRouting protocols
Routing protocols
 
Chapter 4 data link layer
Chapter 4 data link layerChapter 4 data link layer
Chapter 4 data link layer
 
Gprs architecture
Gprs architectureGprs architecture
Gprs architecture
 
Fisheye State Routing (FSR) - Protocol Overview
Fisheye State Routing (FSR) - Protocol OverviewFisheye State Routing (FSR) - Protocol Overview
Fisheye State Routing (FSR) - Protocol Overview
 
WIRELESS TRANSMISSION
WIRELESS TRANSMISSIONWIRELESS TRANSMISSION
WIRELESS TRANSMISSION
 
Cellular network
Cellular networkCellular network
Cellular network
 
Mobile IP
Mobile IPMobile IP
Mobile IP
 
Application layer protocols
Application layer protocolsApplication layer protocols
Application layer protocols
 
Localization & calling
Localization  & callingLocalization  & calling
Localization & calling
 
Wireless communication and its standards
Wireless communication and its standardsWireless communication and its standards
Wireless communication and its standards
 
Wireless networking_ASRao
Wireless networking_ASRaoWireless networking_ASRao
Wireless networking_ASRao
 
Network Layer,Computer Networks
Network Layer,Computer NetworksNetwork Layer,Computer Networks
Network Layer,Computer Networks
 
IEEE 802.11 Architecture and Services
IEEE 802.11 Architecture and ServicesIEEE 802.11 Architecture and Services
IEEE 802.11 Architecture and Services
 
MOBILE COMMUNICATION
MOBILE COMMUNICATIONMOBILE COMMUNICATION
MOBILE COMMUNICATION
 

Similar to Agent discovery& registration

Key mechanism of mobile ip
Key mechanism of mobile ipKey mechanism of mobile ip
Key mechanism of mobile ipMKalpanaDevi
 
Key mechanism of mobile ip
Key mechanism of mobile ip Key mechanism of mobile ip
Key mechanism of mobile ip priya Nithya
 
IT6601 Mobile Computing Unit II
IT6601 Mobile Computing Unit IIIT6601 Mobile Computing Unit II
IT6601 Mobile Computing Unit IIpkaviya
 
Mobile number portability with IEEE Material
Mobile number portability with IEEE MaterialMobile number portability with IEEE Material
Mobile number portability with IEEE MaterialSachin Saini
 
Unit iii - mobile ip and wireless access protocol
Unit iii - mobile ip and wireless access protocolUnit iii - mobile ip and wireless access protocol
Unit iii - mobile ip and wireless access protocolRamannagariKeerthana
 
Mobility And Mobile I Pv4
Mobility And Mobile I Pv4Mobility And Mobile I Pv4
Mobility And Mobile I Pv4Ram Dutt Shukla
 
Mobile computing - SARASWATHI RAMALINGAM
Mobile computing - SARASWATHI RAMALINGAMMobile computing - SARASWATHI RAMALINGAM
Mobile computing - SARASWATHI RAMALINGAMSaraswathiRamalingam
 
IT8602 - Mobile Communication Unit IV
IT8602 - Mobile Communication   Unit IV IT8602 - Mobile Communication   Unit IV
IT8602 - Mobile Communication Unit IV pkaviya
 
Performance of Various Mobile IP Protocols and Security Considerations
Performance of Various Mobile IP Protocols and Security ConsiderationsPerformance of Various Mobile IP Protocols and Security Considerations
Performance of Various Mobile IP Protocols and Security ConsiderationsCSCJournals
 
Unit 2.design mobile computing architecture
Unit 2.design mobile computing architectureUnit 2.design mobile computing architecture
Unit 2.design mobile computing architectureSwapnali Pawar
 
International Revenue Share Fraud webinar
International Revenue Share Fraud webinarInternational Revenue Share Fraud webinar
International Revenue Share Fraud webinarXINTEC
 

Similar to Agent discovery& registration (20)

Key mechanism of mobile ip
Key mechanism of mobile ipKey mechanism of mobile ip
Key mechanism of mobile ip
 
Key mechanism of mobile ip
Key mechanism of mobile ip Key mechanism of mobile ip
Key mechanism of mobile ip
 
IT6601 Mobile Computing Unit II
IT6601 Mobile Computing Unit IIIT6601 Mobile Computing Unit II
IT6601 Mobile Computing Unit II
 
Mobile IP
Mobile IP Mobile IP
Mobile IP
 
Mobile computing Unit III MANET Notes
Mobile computing Unit III MANET NotesMobile computing Unit III MANET Notes
Mobile computing Unit III MANET Notes
 
Mobile ip group_3
Mobile ip group_3Mobile ip group_3
Mobile ip group_3
 
Mobile number portability with IEEE Material
Mobile number portability with IEEE MaterialMobile number portability with IEEE Material
Mobile number portability with IEEE Material
 
Unit iii - mobile ip and wireless access protocol
Unit iii - mobile ip and wireless access protocolUnit iii - mobile ip and wireless access protocol
Unit iii - mobile ip and wireless access protocol
 
Mobility And Mobile I Pv4
Mobility And Mobile I Pv4Mobility And Mobile I Pv4
Mobility And Mobile I Pv4
 
Report
ReportReport
Report
 
Mobile computing - SARASWATHI RAMALINGAM
Mobile computing - SARASWATHI RAMALINGAMMobile computing - SARASWATHI RAMALINGAM
Mobile computing - SARASWATHI RAMALINGAM
 
Ip packet delivery
Ip packet deliveryIp packet delivery
Ip packet delivery
 
IT8602 - Mobile Communication Unit IV
IT8602 - Mobile Communication   Unit IV IT8602 - Mobile Communication   Unit IV
IT8602 - Mobile Communication Unit IV
 
Performance of Various Mobile IP Protocols and Security Considerations
Performance of Various Mobile IP Protocols and Security ConsiderationsPerformance of Various Mobile IP Protocols and Security Considerations
Performance of Various Mobile IP Protocols and Security Considerations
 
Mobile ip presented by nafiz
Mobile ip   presented by nafizMobile ip   presented by nafiz
Mobile ip presented by nafiz
 
Unit 2.design mobile computing architecture
Unit 2.design mobile computing architectureUnit 2.design mobile computing architecture
Unit 2.design mobile computing architecture
 
Final jyo ppt
Final jyo pptFinal jyo ppt
Final jyo ppt
 
Mobile number portability1
Mobile number portability1Mobile number portability1
Mobile number portability1
 
International Revenue Share Fraud webinar
International Revenue Share Fraud webinarInternational Revenue Share Fraud webinar
International Revenue Share Fraud webinar
 
G0333039041
G0333039041G0333039041
G0333039041
 

More from rajisri2

region discription
region discriptionregion discription
region discriptionrajisri2
 
Image classification & retrieval
Image classification & retrievalImage classification & retrieval
Image classification & retrievalrajisri2
 
video motion analysis
video motion analysisvideo motion analysis
video motion analysisrajisri2
 
Ip packet delivery
Ip packet deliveryIp packet delivery
Ip packet deliveryrajisri2
 
Texture,pattern and pattern classes
Texture,pattern and pattern classesTexture,pattern and pattern classes
Texture,pattern and pattern classesrajisri2
 
entities terminology
entities terminologyentities terminology
entities terminologyrajisri2
 
topological features
topological featurestopological features
topological featuresrajisri2
 
ipgoals,assumption requirements
ipgoals,assumption requirementsipgoals,assumption requirements
ipgoals,assumption requirementsrajisri2
 
Fourier descriptors & moments
Fourier descriptors & momentsFourier descriptors & moments
Fourier descriptors & momentsrajisri2
 
Congestion control, slow start, fast retransmit
Congestion control, slow start, fast retransmit   Congestion control, slow start, fast retransmit
Congestion control, slow start, fast retransmit rajisri2
 
dynamichost configuration protocol
dynamichost configuration protocoldynamichost configuration protocol
dynamichost configuration protocolrajisri2
 

More from rajisri2 (11)

region discription
region discriptionregion discription
region discription
 
Image classification & retrieval
Image classification & retrievalImage classification & retrieval
Image classification & retrieval
 
video motion analysis
video motion analysisvideo motion analysis
video motion analysis
 
Ip packet delivery
Ip packet deliveryIp packet delivery
Ip packet delivery
 
Texture,pattern and pattern classes
Texture,pattern and pattern classesTexture,pattern and pattern classes
Texture,pattern and pattern classes
 
entities terminology
entities terminologyentities terminology
entities terminology
 
topological features
topological featurestopological features
topological features
 
ipgoals,assumption requirements
ipgoals,assumption requirementsipgoals,assumption requirements
ipgoals,assumption requirements
 
Fourier descriptors & moments
Fourier descriptors & momentsFourier descriptors & moments
Fourier descriptors & moments
 
Congestion control, slow start, fast retransmit
Congestion control, slow start, fast retransmit   Congestion control, slow start, fast retransmit
Congestion control, slow start, fast retransmit
 
dynamichost configuration protocol
dynamichost configuration protocoldynamichost configuration protocol
dynamichost configuration protocol
 

Recently uploaded

Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Scott Keck-Warren
 
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024BookNet Canada
 
Science&tech:THE INFORMATION AGE STS.pdf
Science&tech:THE INFORMATION AGE STS.pdfScience&tech:THE INFORMATION AGE STS.pdf
Science&tech:THE INFORMATION AGE STS.pdfjimielynbastida
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptxLBM Solutions
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Commit University
 
APIForce Zurich 5 April Automation LPDG
APIForce Zurich 5 April  Automation LPDGAPIForce Zurich 5 April  Automation LPDG
APIForce Zurich 5 April Automation LPDGMarianaLemus7
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Patryk Bandurski
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
Bluetooth Controlled Car with Arduino.pdf
Bluetooth Controlled Car with Arduino.pdfBluetooth Controlled Car with Arduino.pdf
Bluetooth Controlled Car with Arduino.pdfngoud9212
 
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Wonjun Hwang
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfAlex Barbosa Coqueiro
 
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024BookNet Canada
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr LapshynFwdays
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brandgvaughan
 

Recently uploaded (20)

Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024
 
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
 
Science&tech:THE INFORMATION AGE STS.pdf
Science&tech:THE INFORMATION AGE STS.pdfScience&tech:THE INFORMATION AGE STS.pdf
Science&tech:THE INFORMATION AGE STS.pdf
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptx
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!
 
APIForce Zurich 5 April Automation LPDG
APIForce Zurich 5 April  Automation LPDGAPIForce Zurich 5 April  Automation LPDG
APIForce Zurich 5 April Automation LPDG
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
Bluetooth Controlled Car with Arduino.pdf
Bluetooth Controlled Car with Arduino.pdfBluetooth Controlled Car with Arduino.pdf
Bluetooth Controlled Car with Arduino.pdf
 
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
 
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brand
 
Hot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort Service
Hot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort ServiceHot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort Service
Hot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort Service
 

Agent discovery& registration

  • 1. AGENT DISCOVERY & REGISTRATION By C.Rajeswari, II M.Sc(IT), Nadar saraswathi college of arts and science, Theni.
  • 2. INTRODUCTION • Current versions of the internet protocol(IP) assume that the point at which a computer attaches to the internet or a network is fixed and its IP address identifies the network to which it is attached. • If a mobile computer or mobile node moves to a new network while keeping its IP address unchanged its address does not reflect the new point of attachment.
  • 3. AGENT DISCOVERY • A mobile node uses a method known as agent discovery to determine the following information:  When the node has moved from one network to another  Whether the network is the nodes home or a foreign network  What is the foreign agent care-of address offered by each foreign agent on the network • Mobility agents transmit agent advertisements to advertise their services on a network. In the absence of agent advertisements, a mobile node can solicit advertisements. This is known as agent solicitation.
  • 4. Continue…. I. Agent Advertisement: • Mobile nodes use agent advertisements to determine their current point of attachment to the internet or to an organizations networks. • An agent advertisement is an internet control message protocol(ICMP) router advertisement that has been extended to also carry a mobility agent advertisement extension. • A foreign agent can be too busy to serve additional mobile nodes. A foreign agent must continue to send agent advertisements. • This way, mobile nodes that are already registered with it will know that they have not moved out of range of the foreign agent and that the foreign agent has not failed.
  • 5. Continue.... II. Agent Solicitation • Every mobile node should implement agent solicitation. • The mobile node uses the same procedures defaults and constants for agent solicitation as specified for ICMP router solicitation messages. • The rate at which a mobile node sends solicitation is limited by the mobile node. • The mobile node can send three initial solicitations at a maximum rate of one per second while searching for an agent. • After registering with an agent the rate at which solicitations are sent is reduced to limit the overhead on the local network.
  • 6. REGISTRATION • Registration used by a MN to inform the FA that it is visiting.  The new care of address of the MN is sent to the HA.  Registration expires duration is negotiated during registration. Mobile must re-register before it expires  All registrations are authenticated  The MN sends a registration request in to the FA which passes it along to the home agent.  The HA responds to the FA which then informs the MN that all is in order and registration is complete.
  • 7. Continue…. • When the mobile node receives an agent advertisement the mobile node registers through the foreign agent even when the mobile node might be able to acquire its own co-located care-of address. • This feature enables sites to restrict access to mobility services. • Through agent advertisements, mobile nodes detect when they have moved from one subnet to another. • Mobile IP registration provides a flexible mechanism for mobile nodes to communicate their current reachability information to their home agent.
  • 8. Continue…. • The registration process enables mobile nodes to perform the following tasks:  Request forwarding services when visiting a foreign network  Inform their home agent of their current care-of address  Renew a registration that is due to expire • Deregister when they return home The registration process also enables mobile nodes to:  Registration with multiple foreign agents  Deregister specific care-of addresses while retaining other mobility bindings  Discover the address of a home agent if the mobile node is not configured with this information.
  • 9. Continue…. • When the mobile node registers directly with its home agent the registration process requires only the following steps: • The mobile node sends a deregistration request to the home agent • The home agent sends a registration reply to the mobile node granting or denying the request.