SlideShare a Scribd company logo
AGENT DISCOVRY IN MOBILE IP
AGENT DISCOVERY
 A mobile node uses a method known as agent discovery to determine
the following information.
 When the node has moved from one network to another
 Whether the network is the node’s home or a foreign network
 What is the foreign agent care-of-address offered by each foreign agent on that
network
 Mobility agents transmit agent advertisement to advertise their
services on a network. In the absence of agent advertisements, a
mobile node can solicit advertisements. This is known as agent
solicitation.
Agent Advertisement
 HA and FA periodically send advertisement messages into their physical
subnets
 Usually, the FA periodically broadcast the IRDP (Internet Router
Discovery Protocol) message in its own network to let the visited MN
know the FA is here and what services the FA provides (Agent
Advertisement).
 MN listens to these messages and detects, if it is in the home or a foreign
network (standard case for home network)
 MN reads a COA from the FA advertisement messages
Agent Advertisement Packet
ICMP
Mobility
Extension
type = 16
length = 6 + 4 * #COAs
R: registration required
B: busy, no more registrations
H: home agent
F: foreign agent
M: minimal encapsulation
G: GRE (Generic Routing Encapsulation)
r: =0, ignored (former Van Jacobson compression)
T
: FA supports reverse tunneling
reserved: =0, ignored
 Type  set to 9,
 Code  0 if the agent also routes traffic from non-mobile nodes or else 16
 Checksum  simple error detection mechanism to determine the integrity of the data
transmitted over network
 #addresses  The number of router addresses advertised in this message
 Addr. Size  The number of 32-bit words of information per each router address
 Lifetime  length of time this advertisement is valid.
 Router Address [i = 1, 2 ,3…]  The sending router’s IP address on the ith
interface from which this message is sent
 Preference levels  each address help a node to choose the router that is the most
eager one to get a new node.
Agent Advertisement Packet
ICMP
Mobility
Extension
type = 16
length = 6 + 4 * #COAs
R: registration required
B: busy, no more registrations
H: home agent
F: foreign agent
M: minimal encapsulation
G: GRE (Generic Routing Encapsulation)
r: =0, ignored (former Van Jacobson compression)
T
: FA supports reverse tunneling
reserved: =0, ignored
 Sequence number  The count of agent advertisement messages sent since the agent
was initialized.
 Registration lifetime  maximum lifetime in seconds a node can request during
registration
 R bit (registration) shows, if a registration with this agent is required even when using
a colocated COA at the MN.
 If the agent is currently too busy to accept new registrations it can set the B bit.
 The following two bits denote if the agent offers services as a home agent (H) or
foreign agent (F) on the link where the advertisement has been sent.
 Bits M and G specify the method of encapsulation, M can specify minimal
encapsulation and G generic routing encapsulation.
 The new field T indicates that reverse tunneling is supported by the FA
 A foreign agent setting the F bit must advertise at least one COA.
Agent Solicitation
 If no agent advertisements are present or the inter-arrival time is too high, and an MN
has not received a COA by other means, the mobile node must send agent solicitations.
 Care must be taken to ensure that these solicitation messages do not flood the network
 Typically, a mobile node can send out three solicitations, one per second, as soon as it
enters a new network.
 If a node does not receive an answer to its solicitations it must decrease the rate of
solicitations exponentially to avoid flooding the network until it reaches a maximum
interval between solicitations (typically one minute).
 After these steps of advertisements or solicitations the MN can now receive a COA,
either one for an FA or a co-located COA.
 The MN knows its location (home network or foreign network) and the capabilities of
the agent (if needed).

More Related Content

What's hot

Agent discovery& registration
Agent discovery& registrationAgent discovery& registration
Agent discovery& registration
rajisri2
 
GSM Network - Distributed Service Model
GSM Network - Distributed Service ModelGSM Network - Distributed Service Model
GSM Network - Distributed Service ModelReni Sagayaraj
 
UMTS core network and its evolution
UMTS core network and its evolutionUMTS core network and its evolution
UMTS core network and its evolution
Naveen Jakhar, I.T.S
 
SDN 101
SDN 101SDN 101
SDN 101
Hazzim Anaya
 
Firewall & types of Firewall
Firewall & types of Firewall Firewall & types of Firewall
Firewall & types of Firewall
BharathiKrishna6
 
LTE :Mobile Network Security
LTE :Mobile Network SecurityLTE :Mobile Network Security
LTE :Mobile Network Security
Satish Chavan
 
T C P I P Weaknesses And Solutions
T C P I P Weaknesses And SolutionsT C P I P Weaknesses And Solutions
T C P I P Weaknesses And Solutionseroglu
 
Mobile Phone Cloning By: Ritik Nagar
Mobile Phone Cloning By: Ritik NagarMobile Phone Cloning By: Ritik Nagar
Mobile Phone Cloning By: Ritik Nagar
Ritik Nagar
 
Wireless networks & cellular wireless networks
Wireless networks & cellular wireless networksWireless networks & cellular wireless networks
Wireless networks & cellular wireless networks
Sweta Kumari Barnwal
 
Gsm architecture
Gsm architectureGsm architecture
Gsm architecture
Mustahid Ali
 
Wireless Communications - Presentation.pdf
Wireless Communications - Presentation.pdfWireless Communications - Presentation.pdf
Wireless Communications - Presentation.pdf
Eshwar Prasad
 
CS-Core Mobile Network (General)
CS-Core Mobile Network (General)CS-Core Mobile Network (General)
CS-Core Mobile Network (General)
Hamidreza Bolhasani
 
Firewall and It's Types
Firewall and It's TypesFirewall and It's Types
Firewall and It's Types
Hem Pokhrel
 
Presentation on 5G security
Presentation on 5G securityPresentation on 5G security
Presentation on 5G security
RanjitUpadhyay4
 
Multiplexing
MultiplexingMultiplexing
Multiplexing
Aman Jaiswal
 
2G / 3G / 4G / IMS / 5G Overview with Focus on Core Network
2G / 3G / 4G / IMS / 5G Overview with Focus on Core Network2G / 3G / 4G / IMS / 5G Overview with Focus on Core Network
2G / 3G / 4G / IMS / 5G Overview with Focus on Core Network
Hamidreza Bolhasani
 
Hiperlan
HiperlanHiperlan

What's hot (20)

Agent discovery& registration
Agent discovery& registrationAgent discovery& registration
Agent discovery& registration
 
GSM Network - Distributed Service Model
GSM Network - Distributed Service ModelGSM Network - Distributed Service Model
GSM Network - Distributed Service Model
 
UMTS core network and its evolution
UMTS core network and its evolutionUMTS core network and its evolution
UMTS core network and its evolution
 
Gprs ppt
Gprs pptGprs ppt
Gprs ppt
 
SDN 101
SDN 101SDN 101
SDN 101
 
Firewall & types of Firewall
Firewall & types of Firewall Firewall & types of Firewall
Firewall & types of Firewall
 
LTE :Mobile Network Security
LTE :Mobile Network SecurityLTE :Mobile Network Security
LTE :Mobile Network Security
 
T C P I P Weaknesses And Solutions
T C P I P Weaknesses And SolutionsT C P I P Weaknesses And Solutions
T C P I P Weaknesses And Solutions
 
Mobile Phone Cloning By: Ritik Nagar
Mobile Phone Cloning By: Ritik NagarMobile Phone Cloning By: Ritik Nagar
Mobile Phone Cloning By: Ritik Nagar
 
Wireless networks & cellular wireless networks
Wireless networks & cellular wireless networksWireless networks & cellular wireless networks
Wireless networks & cellular wireless networks
 
Gsm architecture
Gsm architectureGsm architecture
Gsm architecture
 
Wireless Communications - Presentation.pdf
Wireless Communications - Presentation.pdfWireless Communications - Presentation.pdf
Wireless Communications - Presentation.pdf
 
CS-Core Mobile Network (General)
CS-Core Mobile Network (General)CS-Core Mobile Network (General)
CS-Core Mobile Network (General)
 
Firewall and It's Types
Firewall and It's TypesFirewall and It's Types
Firewall and It's Types
 
Presentation on 5G security
Presentation on 5G securityPresentation on 5G security
Presentation on 5G security
 
Multiplexing
MultiplexingMultiplexing
Multiplexing
 
2G / 3G / 4G / IMS / 5G Overview with Focus on Core Network
2G / 3G / 4G / IMS / 5G Overview with Focus on Core Network2G / 3G / 4G / IMS / 5G Overview with Focus on Core Network
2G / 3G / 4G / IMS / 5G Overview with Focus on Core Network
 
Gsm ppt
Gsm pptGsm ppt
Gsm ppt
 
Hiperlan
HiperlanHiperlan
Hiperlan
 
Security in WSN
Security in WSNSecurity in WSN
Security in WSN
 

Similar to Ec8004 wireless networks unit 2 agent discovery

Ip packet delivery
Ip packet deliveryIp packet delivery
Ip packet delivery
SOURABH KUMAR
 
Mobile ip presented by nafiz
Mobile ip   presented by nafizMobile ip   presented by nafiz
Mobile ip presented by nafiz
Nafiz Ishtiaque Ahmed
 
Mobile internet protocol
Mobile internet protocolMobile internet protocol
Mobile internet protocol
SaranyaK68
 
PERFORMANCE EVALUATION OF A NEW ROUTE OPTIMIZATION TECHNIQUE FOR MOBILE IP
PERFORMANCE EVALUATION OF A NEW ROUTE OPTIMIZATION TECHNIQUE FOR MOBILE IPPERFORMANCE EVALUATION OF A NEW ROUTE OPTIMIZATION TECHNIQUE FOR MOBILE IP
PERFORMANCE EVALUATION OF A NEW ROUTE OPTIMIZATION TECHNIQUE FOR MOBILE IP
IJNSA Journal
 
Lecture 15
Lecture 15Lecture 15
Lecture 15
Joe Christensen
 
Unit 4 MC QA.pdf
Unit 4 MC  QA.pdfUnit 4 MC  QA.pdf
Unit 4 MC QA.pdf
CSEHOD11
 
UNIT-IV.pptx
UNIT-IV.pptxUNIT-IV.pptx
UNIT-IV.pptx
pbrinda
 
Chapter 7 - Wireless and Mobile Networks
Chapter 7 - Wireless and Mobile NetworksChapter 7 - Wireless and Mobile Networks
Chapter 7 - Wireless and Mobile Networks
Andy Juan Sarango Veliz
 
SS7: Locate -Track - Manipulate Attack - SPY24™.pdf
SS7: Locate -Track - Manipulate Attack - SPY24™.pdfSS7: Locate -Track - Manipulate Attack - SPY24™.pdf
SS7: Locate -Track - Manipulate Attack - SPY24™.pdf
SPY24
 
Unit 2
Unit 2Unit 2
Unit 2
RadhikaM42
 
Roaming VAS (optimal routing)
Roaming VAS (optimal routing)Roaming VAS (optimal routing)
Roaming VAS (optimal routing)
Rawand Jaf
 
It6601 mobile computing unit2
It6601 mobile computing unit2It6601 mobile computing unit2
It6601 mobile computing unit2
RMK ENGINEERING COLLEGE, CHENNAI
 
PERFORMANCE EVALUATION OF MOBILE IP ON MOBILE AD HOC NETWORKS USING NS2
PERFORMANCE EVALUATION OF MOBILE IP ON MOBILE AD HOC NETWORKS USING NS2PERFORMANCE EVALUATION OF MOBILE IP ON MOBILE AD HOC NETWORKS USING NS2
PERFORMANCE EVALUATION OF MOBILE IP ON MOBILE AD HOC NETWORKS USING NS2
cscpconf
 
CN UNIT IV ..pptx
CN UNIT IV ..pptxCN UNIT IV ..pptx
CN UNIT IV ..pptx
VISWANATHAN R V
 
Mobile IP
Mobile IPMobile IP
Mobile IP
shankul07
 
mobile ip, Mobile COmmunication Internet Protocol
mobile ip, Mobile COmmunication Internet Protocolmobile ip, Mobile COmmunication Internet Protocol
mobile ip, Mobile COmmunication Internet Protocol
Gaurav Dwivedi
 
Mobility And Mobile I Pv4
Mobility And Mobile I Pv4Mobility And Mobile I Pv4
Mobility And Mobile I Pv4
Ram Dutt Shukla
 
Presentation antrax 30.10.13
Presentation antrax 30.10.13Presentation antrax 30.10.13
Presentation antrax 30.10.13Olya Saiko
 

Similar to Ec8004 wireless networks unit 2 agent discovery (20)

Ip packet delivery
Ip packet deliveryIp packet delivery
Ip packet delivery
 
Mobile ip group_3
Mobile ip group_3Mobile ip group_3
Mobile ip group_3
 
Mobile ip presented by nafiz
Mobile ip   presented by nafizMobile ip   presented by nafiz
Mobile ip presented by nafiz
 
Mobile internet protocol
Mobile internet protocolMobile internet protocol
Mobile internet protocol
 
PERFORMANCE EVALUATION OF A NEW ROUTE OPTIMIZATION TECHNIQUE FOR MOBILE IP
PERFORMANCE EVALUATION OF A NEW ROUTE OPTIMIZATION TECHNIQUE FOR MOBILE IPPERFORMANCE EVALUATION OF A NEW ROUTE OPTIMIZATION TECHNIQUE FOR MOBILE IP
PERFORMANCE EVALUATION OF A NEW ROUTE OPTIMIZATION TECHNIQUE FOR MOBILE IP
 
Lecture 15
Lecture 15Lecture 15
Lecture 15
 
Unit 4 MC QA.pdf
Unit 4 MC  QA.pdfUnit 4 MC  QA.pdf
Unit 4 MC QA.pdf
 
UNIT-IV.pptx
UNIT-IV.pptxUNIT-IV.pptx
UNIT-IV.pptx
 
Chapter 7 - Wireless and Mobile Networks
Chapter 7 - Wireless and Mobile NetworksChapter 7 - Wireless and Mobile Networks
Chapter 7 - Wireless and Mobile Networks
 
Report
ReportReport
Report
 
SS7: Locate -Track - Manipulate Attack - SPY24™.pdf
SS7: Locate -Track - Manipulate Attack - SPY24™.pdfSS7: Locate -Track - Manipulate Attack - SPY24™.pdf
SS7: Locate -Track - Manipulate Attack - SPY24™.pdf
 
Unit 2
Unit 2Unit 2
Unit 2
 
Roaming VAS (optimal routing)
Roaming VAS (optimal routing)Roaming VAS (optimal routing)
Roaming VAS (optimal routing)
 
It6601 mobile computing unit2
It6601 mobile computing unit2It6601 mobile computing unit2
It6601 mobile computing unit2
 
PERFORMANCE EVALUATION OF MOBILE IP ON MOBILE AD HOC NETWORKS USING NS2
PERFORMANCE EVALUATION OF MOBILE IP ON MOBILE AD HOC NETWORKS USING NS2PERFORMANCE EVALUATION OF MOBILE IP ON MOBILE AD HOC NETWORKS USING NS2
PERFORMANCE EVALUATION OF MOBILE IP ON MOBILE AD HOC NETWORKS USING NS2
 
CN UNIT IV ..pptx
CN UNIT IV ..pptxCN UNIT IV ..pptx
CN UNIT IV ..pptx
 
Mobile IP
Mobile IPMobile IP
Mobile IP
 
mobile ip, Mobile COmmunication Internet Protocol
mobile ip, Mobile COmmunication Internet Protocolmobile ip, Mobile COmmunication Internet Protocol
mobile ip, Mobile COmmunication Internet Protocol
 
Mobility And Mobile I Pv4
Mobility And Mobile I Pv4Mobility And Mobile I Pv4
Mobility And Mobile I Pv4
 
Presentation antrax 30.10.13
Presentation antrax 30.10.13Presentation antrax 30.10.13
Presentation antrax 30.10.13
 

More from HemalathaR31

EC8004 WIRELESS NETWORKS UNIT 5 - IMS
EC8004 WIRELESS NETWORKS UNIT 5 - IMS EC8004 WIRELESS NETWORKS UNIT 5 - IMS
EC8004 WIRELESS NETWORKS UNIT 5 - IMS
HemalathaR31
 
EC8004 WIRELESS NETWORKS UNIT 5 - LTE
EC8004 WIRELESS NETWORKS UNIT 5 - LTE EC8004 WIRELESS NETWORKS UNIT 5 - LTE
EC8004 WIRELESS NETWORKS UNIT 5 - LTE
HemalathaR31
 
EC8004 WIRELESS NETWORKS UNIT 5 - 4G TECHNOLOGIES
EC8004 WIRELESS NETWORKS UNIT 5 - 4G TECHNOLOGIESEC8004 WIRELESS NETWORKS UNIT 5 - 4G TECHNOLOGIES
EC8004 WIRELESS NETWORKS UNIT 5 - 4G TECHNOLOGIES
HemalathaR31
 
EC8004 WIRELESS NETWORKS UNIT 5 - 4G TECHNOLOGIES
EC8004 WIRELESS NETWORKS UNIT 5 - 4G TECHNOLOGIESEC8004 WIRELESS NETWORKS UNIT 5 - 4G TECHNOLOGIES
EC8004 WIRELESS NETWORKS UNIT 5 - 4G TECHNOLOGIES
HemalathaR31
 
EC8004 WIRELESS NETWORK UNIT 5 - 4G
EC8004 WIRELESS NETWORK UNIT 5 - 4GEC8004 WIRELESS NETWORK UNIT 5 - 4G
EC8004 WIRELESS NETWORK UNIT 5 - 4G
HemalathaR31
 
EC8002 Unit 4 Interworking objectives and requirements
EC8002 Unit 4 Interworking objectives and requirementsEC8002 Unit 4 Interworking objectives and requirements
EC8002 Unit 4 Interworking objectives and requirements
HemalathaR31
 
EC8004 wireless networks unit 3 UTRAN
EC8004 wireless networks unit 3 UTRANEC8004 wireless networks unit 3 UTRAN
EC8004 wireless networks unit 3 UTRAN
HemalathaR31
 
EC8004 wireless networks unit 1
EC8004 wireless networks unit 1 EC8004 wireless networks unit 1
EC8004 wireless networks unit 1
HemalathaR31
 
Ec8004 wireless networks unit 1 bluetooth
Ec8004 wireless networks unit 1 bluetoothEc8004 wireless networks unit 1 bluetooth
Ec8004 wireless networks unit 1 bluetooth
HemalathaR31
 
Ec8004 wireless networks unit 1 hiperlan 2
Ec8004 wireless networks unit 1 hiperlan 2Ec8004 wireless networks unit 1 hiperlan 2
Ec8004 wireless networks unit 1 hiperlan 2
HemalathaR31
 
Ec8004 wireless networks unit 1 hiperlan1
Ec8004 wireless networks unit 1 hiperlan1Ec8004 wireless networks unit 1 hiperlan1
Ec8004 wireless networks unit 1 hiperlan1
HemalathaR31
 
Ec8004 wireless networks unit 1 ieee 802.11a and ieee 802.11b
Ec8004 wireless networks unit 1 ieee 802.11a and ieee 802.11bEc8004 wireless networks unit 1 ieee 802.11a and ieee 802.11b
Ec8004 wireless networks unit 1 ieee 802.11a and ieee 802.11b
HemalathaR31
 
Ec8004 wireless networks unit 1 watm
Ec8004 wireless networks unit 1 watmEc8004 wireless networks unit 1 watm
Ec8004 wireless networks unit 1 watm
HemalathaR31
 
UNIT 2 WIRELESS NETWORKS - MANET and DSDV
UNIT 2 WIRELESS NETWORKS - MANET and DSDVUNIT 2 WIRELESS NETWORKS - MANET and DSDV
UNIT 2 WIRELESS NETWORKS - MANET and DSDV
HemalathaR31
 
Ec8004 wireless networks unit 2 mobile ip
Ec8004 wireless networks unit 2 mobile ipEc8004 wireless networks unit 2 mobile ip
Ec8004 wireless networks unit 2 mobile ip
HemalathaR31
 
EC8004 wireless networks unit 1 IEEE802.11
EC8004 wireless networks unit 1 IEEE802.11EC8004 wireless networks unit 1 IEEE802.11
EC8004 wireless networks unit 1 IEEE802.11
HemalathaR31
 
Ec8004 wireless networks unit 1 introduction
Ec8004 wireless networks unit 1 introductionEc8004 wireless networks unit 1 introduction
Ec8004 wireless networks unit 1 introduction
HemalathaR31
 

More from HemalathaR31 (17)

EC8004 WIRELESS NETWORKS UNIT 5 - IMS
EC8004 WIRELESS NETWORKS UNIT 5 - IMS EC8004 WIRELESS NETWORKS UNIT 5 - IMS
EC8004 WIRELESS NETWORKS UNIT 5 - IMS
 
EC8004 WIRELESS NETWORKS UNIT 5 - LTE
EC8004 WIRELESS NETWORKS UNIT 5 - LTE EC8004 WIRELESS NETWORKS UNIT 5 - LTE
EC8004 WIRELESS NETWORKS UNIT 5 - LTE
 
EC8004 WIRELESS NETWORKS UNIT 5 - 4G TECHNOLOGIES
EC8004 WIRELESS NETWORKS UNIT 5 - 4G TECHNOLOGIESEC8004 WIRELESS NETWORKS UNIT 5 - 4G TECHNOLOGIES
EC8004 WIRELESS NETWORKS UNIT 5 - 4G TECHNOLOGIES
 
EC8004 WIRELESS NETWORKS UNIT 5 - 4G TECHNOLOGIES
EC8004 WIRELESS NETWORKS UNIT 5 - 4G TECHNOLOGIESEC8004 WIRELESS NETWORKS UNIT 5 - 4G TECHNOLOGIES
EC8004 WIRELESS NETWORKS UNIT 5 - 4G TECHNOLOGIES
 
EC8004 WIRELESS NETWORK UNIT 5 - 4G
EC8004 WIRELESS NETWORK UNIT 5 - 4GEC8004 WIRELESS NETWORK UNIT 5 - 4G
EC8004 WIRELESS NETWORK UNIT 5 - 4G
 
EC8002 Unit 4 Interworking objectives and requirements
EC8002 Unit 4 Interworking objectives and requirementsEC8002 Unit 4 Interworking objectives and requirements
EC8002 Unit 4 Interworking objectives and requirements
 
EC8004 wireless networks unit 3 UTRAN
EC8004 wireless networks unit 3 UTRANEC8004 wireless networks unit 3 UTRAN
EC8004 wireless networks unit 3 UTRAN
 
EC8004 wireless networks unit 1
EC8004 wireless networks unit 1 EC8004 wireless networks unit 1
EC8004 wireless networks unit 1
 
Ec8004 wireless networks unit 1 bluetooth
Ec8004 wireless networks unit 1 bluetoothEc8004 wireless networks unit 1 bluetooth
Ec8004 wireless networks unit 1 bluetooth
 
Ec8004 wireless networks unit 1 hiperlan 2
Ec8004 wireless networks unit 1 hiperlan 2Ec8004 wireless networks unit 1 hiperlan 2
Ec8004 wireless networks unit 1 hiperlan 2
 
Ec8004 wireless networks unit 1 hiperlan1
Ec8004 wireless networks unit 1 hiperlan1Ec8004 wireless networks unit 1 hiperlan1
Ec8004 wireless networks unit 1 hiperlan1
 
Ec8004 wireless networks unit 1 ieee 802.11a and ieee 802.11b
Ec8004 wireless networks unit 1 ieee 802.11a and ieee 802.11bEc8004 wireless networks unit 1 ieee 802.11a and ieee 802.11b
Ec8004 wireless networks unit 1 ieee 802.11a and ieee 802.11b
 
Ec8004 wireless networks unit 1 watm
Ec8004 wireless networks unit 1 watmEc8004 wireless networks unit 1 watm
Ec8004 wireless networks unit 1 watm
 
UNIT 2 WIRELESS NETWORKS - MANET and DSDV
UNIT 2 WIRELESS NETWORKS - MANET and DSDVUNIT 2 WIRELESS NETWORKS - MANET and DSDV
UNIT 2 WIRELESS NETWORKS - MANET and DSDV
 
Ec8004 wireless networks unit 2 mobile ip
Ec8004 wireless networks unit 2 mobile ipEc8004 wireless networks unit 2 mobile ip
Ec8004 wireless networks unit 2 mobile ip
 
EC8004 wireless networks unit 1 IEEE802.11
EC8004 wireless networks unit 1 IEEE802.11EC8004 wireless networks unit 1 IEEE802.11
EC8004 wireless networks unit 1 IEEE802.11
 
Ec8004 wireless networks unit 1 introduction
Ec8004 wireless networks unit 1 introductionEc8004 wireless networks unit 1 introduction
Ec8004 wireless networks unit 1 introduction
 

Recently uploaded

Sha'Carri Richardson Presentation 202345
Sha'Carri Richardson Presentation 202345Sha'Carri Richardson Presentation 202345
Sha'Carri Richardson Presentation 202345
beazzy04
 
Unit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdfUnit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdf
Thiyagu K
 
Chapter 3 - Islamic Banking Products and Services.pptx
Chapter 3 - Islamic Banking Products and Services.pptxChapter 3 - Islamic Banking Products and Services.pptx
Chapter 3 - Islamic Banking Products and Services.pptx
Mohd Adib Abd Muin, Senior Lecturer at Universiti Utara Malaysia
 
Home assignment II on Spectroscopy 2024 Answers.pdf
Home assignment II on Spectroscopy 2024 Answers.pdfHome assignment II on Spectroscopy 2024 Answers.pdf
Home assignment II on Spectroscopy 2024 Answers.pdf
Tamralipta Mahavidyalaya
 
Embracing GenAI - A Strategic Imperative
Embracing GenAI - A Strategic ImperativeEmbracing GenAI - A Strategic Imperative
Embracing GenAI - A Strategic Imperative
Peter Windle
 
The approach at University of Liverpool.pptx
The approach at University of Liverpool.pptxThe approach at University of Liverpool.pptx
The approach at University of Liverpool.pptx
Jisc
 
Guidance_and_Counselling.pdf B.Ed. 4th Semester
Guidance_and_Counselling.pdf B.Ed. 4th SemesterGuidance_and_Counselling.pdf B.Ed. 4th Semester
Guidance_and_Counselling.pdf B.Ed. 4th Semester
Atul Kumar Singh
 
Francesca Gottschalk - How can education support child empowerment.pptx
Francesca Gottschalk - How can education support child empowerment.pptxFrancesca Gottschalk - How can education support child empowerment.pptx
Francesca Gottschalk - How can education support child empowerment.pptx
EduSkills OECD
 
CACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdfCACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdf
camakaiclarkmusic
 
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
siemaillard
 
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdf
Welcome to TechSoup   New Member Orientation and Q&A (May 2024).pdfWelcome to TechSoup   New Member Orientation and Q&A (May 2024).pdf
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdf
TechSoup
 
"Protectable subject matters, Protection in biotechnology, Protection of othe...
"Protectable subject matters, Protection in biotechnology, Protection of othe..."Protectable subject matters, Protection in biotechnology, Protection of othe...
"Protectable subject matters, Protection in biotechnology, Protection of othe...
SACHIN R KONDAGURI
 
Lapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdfLapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdf
Jean Carlos Nunes Paixão
 
Overview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with MechanismOverview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with Mechanism
DeeptiGupta154
 
Language Across the Curriculm LAC B.Ed.
Language Across the  Curriculm LAC B.Ed.Language Across the  Curriculm LAC B.Ed.
Language Across the Curriculm LAC B.Ed.
Atul Kumar Singh
 
1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx
JosvitaDsouza2
 
The Accursed House by Émile Gaboriau.pptx
The Accursed House by Émile Gaboriau.pptxThe Accursed House by Émile Gaboriau.pptx
The Accursed House by Émile Gaboriau.pptx
DhatriParmar
 
The basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptxThe basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptx
heathfieldcps1
 
How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17
Celine George
 
CLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCE
CLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCECLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCE
CLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCE
BhavyaRajput3
 

Recently uploaded (20)

Sha'Carri Richardson Presentation 202345
Sha'Carri Richardson Presentation 202345Sha'Carri Richardson Presentation 202345
Sha'Carri Richardson Presentation 202345
 
Unit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdfUnit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdf
 
Chapter 3 - Islamic Banking Products and Services.pptx
Chapter 3 - Islamic Banking Products and Services.pptxChapter 3 - Islamic Banking Products and Services.pptx
Chapter 3 - Islamic Banking Products and Services.pptx
 
Home assignment II on Spectroscopy 2024 Answers.pdf
Home assignment II on Spectroscopy 2024 Answers.pdfHome assignment II on Spectroscopy 2024 Answers.pdf
Home assignment II on Spectroscopy 2024 Answers.pdf
 
Embracing GenAI - A Strategic Imperative
Embracing GenAI - A Strategic ImperativeEmbracing GenAI - A Strategic Imperative
Embracing GenAI - A Strategic Imperative
 
The approach at University of Liverpool.pptx
The approach at University of Liverpool.pptxThe approach at University of Liverpool.pptx
The approach at University of Liverpool.pptx
 
Guidance_and_Counselling.pdf B.Ed. 4th Semester
Guidance_and_Counselling.pdf B.Ed. 4th SemesterGuidance_and_Counselling.pdf B.Ed. 4th Semester
Guidance_and_Counselling.pdf B.Ed. 4th Semester
 
Francesca Gottschalk - How can education support child empowerment.pptx
Francesca Gottschalk - How can education support child empowerment.pptxFrancesca Gottschalk - How can education support child empowerment.pptx
Francesca Gottschalk - How can education support child empowerment.pptx
 
CACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdfCACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdf
 
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
 
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdf
Welcome to TechSoup   New Member Orientation and Q&A (May 2024).pdfWelcome to TechSoup   New Member Orientation and Q&A (May 2024).pdf
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdf
 
"Protectable subject matters, Protection in biotechnology, Protection of othe...
"Protectable subject matters, Protection in biotechnology, Protection of othe..."Protectable subject matters, Protection in biotechnology, Protection of othe...
"Protectable subject matters, Protection in biotechnology, Protection of othe...
 
Lapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdfLapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdf
 
Overview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with MechanismOverview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with Mechanism
 
Language Across the Curriculm LAC B.Ed.
Language Across the  Curriculm LAC B.Ed.Language Across the  Curriculm LAC B.Ed.
Language Across the Curriculm LAC B.Ed.
 
1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx
 
The Accursed House by Émile Gaboriau.pptx
The Accursed House by Émile Gaboriau.pptxThe Accursed House by Émile Gaboriau.pptx
The Accursed House by Émile Gaboriau.pptx
 
The basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptxThe basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptx
 
How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17
 
CLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCE
CLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCECLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCE
CLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCE
 

Ec8004 wireless networks unit 2 agent discovery

  • 1. AGENT DISCOVRY IN MOBILE IP
  • 2. AGENT DISCOVERY  A mobile node uses a method known as agent discovery to determine the following information.  When the node has moved from one network to another  Whether the network is the node’s home or a foreign network  What is the foreign agent care-of-address offered by each foreign agent on that network  Mobility agents transmit agent advertisement to advertise their services on a network. In the absence of agent advertisements, a mobile node can solicit advertisements. This is known as agent solicitation.
  • 3. Agent Advertisement  HA and FA periodically send advertisement messages into their physical subnets  Usually, the FA periodically broadcast the IRDP (Internet Router Discovery Protocol) message in its own network to let the visited MN know the FA is here and what services the FA provides (Agent Advertisement).  MN listens to these messages and detects, if it is in the home or a foreign network (standard case for home network)  MN reads a COA from the FA advertisement messages
  • 4. Agent Advertisement Packet ICMP Mobility Extension type = 16 length = 6 + 4 * #COAs R: registration required B: busy, no more registrations H: home agent F: foreign agent M: minimal encapsulation G: GRE (Generic Routing Encapsulation) r: =0, ignored (former Van Jacobson compression) T : FA supports reverse tunneling reserved: =0, ignored
  • 5.  Type  set to 9,  Code  0 if the agent also routes traffic from non-mobile nodes or else 16  Checksum  simple error detection mechanism to determine the integrity of the data transmitted over network  #addresses  The number of router addresses advertised in this message  Addr. Size  The number of 32-bit words of information per each router address  Lifetime  length of time this advertisement is valid.  Router Address [i = 1, 2 ,3…]  The sending router’s IP address on the ith interface from which this message is sent  Preference levels  each address help a node to choose the router that is the most eager one to get a new node.
  • 6. Agent Advertisement Packet ICMP Mobility Extension type = 16 length = 6 + 4 * #COAs R: registration required B: busy, no more registrations H: home agent F: foreign agent M: minimal encapsulation G: GRE (Generic Routing Encapsulation) r: =0, ignored (former Van Jacobson compression) T : FA supports reverse tunneling reserved: =0, ignored
  • 7.  Sequence number  The count of agent advertisement messages sent since the agent was initialized.  Registration lifetime  maximum lifetime in seconds a node can request during registration  R bit (registration) shows, if a registration with this agent is required even when using a colocated COA at the MN.  If the agent is currently too busy to accept new registrations it can set the B bit.  The following two bits denote if the agent offers services as a home agent (H) or foreign agent (F) on the link where the advertisement has been sent.  Bits M and G specify the method of encapsulation, M can specify minimal encapsulation and G generic routing encapsulation.  The new field T indicates that reverse tunneling is supported by the FA  A foreign agent setting the F bit must advertise at least one COA.
  • 8. Agent Solicitation  If no agent advertisements are present or the inter-arrival time is too high, and an MN has not received a COA by other means, the mobile node must send agent solicitations.  Care must be taken to ensure that these solicitation messages do not flood the network  Typically, a mobile node can send out three solicitations, one per second, as soon as it enters a new network.  If a node does not receive an answer to its solicitations it must decrease the rate of solicitations exponentially to avoid flooding the network until it reaches a maximum interval between solicitations (typically one minute).  After these steps of advertisements or solicitations the MN can now receive a COA, either one for an FA or a co-located COA.  The MN knows its location (home network or foreign network) and the capabilities of the agent (if needed).