SlideShare a Scribd company logo
ENTITIES & TERMINOLOGY
R.PAVITHRA
II-MSc-(IT)
DEPARTMENT OF CS&IT
NADAR SARASWATHI COLLEGE OF ARTS AND SCIENCE
THENI.
ENTITIES & TERMINOLOGY
 Mobile node(M N)
-A mobile node is an end-system or router that can
change its point of attachment to the internet using
mobile IP.
-The MN keeps its IP address and can continuously
communicate with any other system in the internet as
long as link-layer connectivity is given.
 Correspondent Node(CN)
-At least one partner is needed for communication.
-In the following the CN represents this partner for
the MN. The CN can be a fixed or mobile node.
CONT…
 Home Network
-The home network is the subnet the MN belongs to
with respect to its ip address.
-No mobile IP support is needed within the home
network.
 Foreign Network
-The foreign network is the current subnet the MN
visits and which is not the home network.
FOREIGN AGENT(FA)
 The FA can provide several services to the MN during its
visit to the foreign network.
 The FA can have the COA acting as tunnel endpoint and
forwarding packets to the MN.
 The FA can be the default router for the MN.FAs can
also provide security services because they belong to the
foreign network as opposed to the MN which is only
visiting.
CARE OF ADDRESS(COA)
 The COA defines the current location of the MN from an
IP point of view.
 All IP packets sent to the MN are delivered to the COA,
not directly to the IP address of the MN. Packet delivery
toward the MN is done using a tunnel, as explained later.
CONT….
 There are two different possibilites for the location of the
COA:
 Foreign Agent COA:
-The COA could be located at the FA, i.e., the COA is an
IP address of the FA.
-The FA is the tunnel end –point and forwards packets
to the MN.
-Many MN using the FA can share this COA as common
COA.
 Co-lated COA:
-The COA is co-lated if the MN temporarily acquires an
additional IP address which acts as COA.
-This address is now topologically correct , and the
tunnel endpoint is at the MN.
HOME AGENT(HA)
 The HA provides several services for the MN and is located in
the home network. The tunnel for packets towards the MN
starts at the HA.
 The HA can be implemented on a router that is responsible for
the home network. This is obviously the best position, because
without optimizations to mobile IP, all packets for the MN
have to go through the router anyway.
 if changing the router’s software is not possible ,the HA could
also be implemented on an arbitrary node in the subnet. One
disadvantage of this solution is the double crossing of the
router by the packet if the MN is in a foreign network. A
packet for the MN comes in via the router; the HA sends it
through the tunnel which again crosses the router.
CONT…..
 Crossing of the router by the Packet if the MN is in a
foreign network. A packet for the MN comes in via the
router; the HA sends it through the tunnel which again
cross the router.
 Finally , a home network is not necessary at all. The HA
could be again on the ‘router’ but this time only acting as
a manager for MNs belonging to a virtual home
network. All MNs are always in a foreign network with
this solution.
CONT…..
 A CN is connected via a router to the internet, as are th
homework and the foreign network. The HA is
implemented on the router connecting the home
network with the internet, an FA is implemented on the
router to the foreign network. The MN is currently in the
foreign network.
T
H
A
N
K
Y
O
U

More Related Content

What's hot

Transport layer
Transport layer Transport layer
Transport layer
Mukesh Chinta
 
Transport layer services
Transport layer servicesTransport layer services
Transport layer services
Melvin Cabatuan
 
Routing in Mobile Ad hoc Networks
Routing in Mobile Ad hoc NetworksRouting in Mobile Ad hoc Networks
Routing in Mobile Ad hoc Networks
Sayed Chhattan Shah
 
Transport layer protocol
Transport layer protocolTransport layer protocol
Transport layer protocol
N.Jagadish Kumar
 
Internet control message protocol
Internet control message protocolInternet control message protocol
Internet control message protocolasimnawaz54
 
Data Communication And Networking - DATA RATE LIMITS
Data Communication And Networking - DATA RATE LIMITSData Communication And Networking - DATA RATE LIMITS
Data Communication And Networking - DATA RATE LIMITS
Avijeet Negel
 
Domain name system
Domain name systemDomain name system
Domain name system
Siddique Ibrahim
 
Network layer logical addressing
Network layer logical addressingNetwork layer logical addressing
Network layer logical addressing
Sri Manakula Vinayagar Engineering College
 
Computer network switching
Computer network switchingComputer network switching
Computer network switching
Shivani Godha
 
Wireless transmission
Wireless transmissionWireless transmission
Wireless transmission
Rajapriya82
 
Cellular network
Cellular networkCellular network
Cellular networkshreb
 
Issues in routing protocol
Issues in routing protocolIssues in routing protocol
Issues in routing protocol
Pradeep Kumar TS
 
TCP-IP Reference Model
TCP-IP Reference ModelTCP-IP Reference Model
TCP-IP Reference Model
Mukesh Tekwani
 
Twisted pair cable
Twisted pair cableTwisted pair cable
Twisted pair cableilakkiya
 
WLAN
WLANWLAN
Networking devices
Networking devicesNetworking devices
Networking devicesrupinderj
 
Mobile ip overview
Mobile ip overviewMobile ip overview
Mobile ip overview
priya Nithya
 
Lecture 23 27. quality of services in ad hoc wireless networks
Lecture 23 27. quality of services in ad hoc wireless networksLecture 23 27. quality of services in ad hoc wireless networks
Lecture 23 27. quality of services in ad hoc wireless networksChandra Meena
 

What's hot (20)

Transport layer
Transport layer Transport layer
Transport layer
 
Transport layer services
Transport layer servicesTransport layer services
Transport layer services
 
Routing in Mobile Ad hoc Networks
Routing in Mobile Ad hoc NetworksRouting in Mobile Ad hoc Networks
Routing in Mobile Ad hoc Networks
 
Transport layer protocol
Transport layer protocolTransport layer protocol
Transport layer protocol
 
Internet control message protocol
Internet control message protocolInternet control message protocol
Internet control message protocol
 
Data Communication And Networking - DATA RATE LIMITS
Data Communication And Networking - DATA RATE LIMITSData Communication And Networking - DATA RATE LIMITS
Data Communication And Networking - DATA RATE LIMITS
 
Guided media
Guided mediaGuided media
Guided media
 
Domain name system
Domain name systemDomain name system
Domain name system
 
Network layer logical addressing
Network layer logical addressingNetwork layer logical addressing
Network layer logical addressing
 
Computer network switching
Computer network switchingComputer network switching
Computer network switching
 
Wireless transmission
Wireless transmissionWireless transmission
Wireless transmission
 
Cellular network
Cellular networkCellular network
Cellular network
 
Issues in routing protocol
Issues in routing protocolIssues in routing protocol
Issues in routing protocol
 
TCP-IP Reference Model
TCP-IP Reference ModelTCP-IP Reference Model
TCP-IP Reference Model
 
Twisted pair cable
Twisted pair cableTwisted pair cable
Twisted pair cable
 
WLAN
WLANWLAN
WLAN
 
Osi model
Osi modelOsi model
Osi model
 
Networking devices
Networking devicesNetworking devices
Networking devices
 
Mobile ip overview
Mobile ip overviewMobile ip overview
Mobile ip overview
 
Lecture 23 27. quality of services in ad hoc wireless networks
Lecture 23 27. quality of services in ad hoc wireless networksLecture 23 27. quality of services in ad hoc wireless networks
Lecture 23 27. quality of services in ad hoc wireless networks
 

Similar to entities terminology

Unit 3
Unit 3Unit 3
Unit 3
Unit 3Unit 3
Lecture 15
Lecture 15Lecture 15
Lecture 15
Joe Christensen
 
Ip packet delivery
Ip packet deliveryIp packet delivery
Ip packet delivery
rajisri2
 
Mobile IP
Mobile IPMobile IP
Mobile IP
shankul07
 
IT6601 MOBILE COMPUTING
IT6601 MOBILE COMPUTINGIT6601 MOBILE COMPUTING
IT6601 MOBILE COMPUTING
Kathirvel Ayyaswamy
 
Mobile Communication
Mobile CommunicationMobile Communication
Mobile Communication
Kathirvel Ayyaswamy
 
Mobile IP 1
Mobile IP 1Mobile IP 1
Mobile IP 1
NULL CREATION
 
Mobile
MobileMobile
MobileLE RUE
 
Mobile
MobileMobile
MobileLE RUE
 
Module 05 mobility management (1)
Module 05   mobility management (1)Module 05   mobility management (1)
Module 05 mobility management (1)
JIGNESH PATEL
 
Mobile IP
Mobile IPMobile IP
Mobile IP
Nijo Job
 
MOBILE COMPUTING Unit 2.pptx
MOBILE COMPUTING Unit 2.pptxMOBILE COMPUTING Unit 2.pptx
MOBILE COMPUTING Unit 2.pptx
karthiksmart21
 
Mobile ip
Mobile ipMobile ip
Mobile ip
Sravani Tholam
 
MOBILE IP,DHCP,ADHOC ROUTING PROTOCOLS
MOBILE IP,DHCP,ADHOC ROUTING PROTOCOLSMOBILE IP,DHCP,ADHOC ROUTING PROTOCOLS
MOBILE IP,DHCP,ADHOC ROUTING PROTOCOLS
Manju La
 
Mobile internet protocol
Mobile internet protocolMobile internet protocol
Mobile internet protocol
SaranyaK68
 

Similar to entities terminology (20)

Unit 3
Unit 3Unit 3
Unit 3
 
Unit 3
Unit 3Unit 3
Unit 3
 
Unit 3
Unit 3Unit 3
Unit 3
 
Lecture 15
Lecture 15Lecture 15
Lecture 15
 
Mobile network layer (mobile comm.)
Mobile network layer (mobile comm.)Mobile network layer (mobile comm.)
Mobile network layer (mobile comm.)
 
Ip packet delivery
Ip packet deliveryIp packet delivery
Ip packet delivery
 
Mobile IP
Mobile IPMobile IP
Mobile IP
 
IT6601 MOBILE COMPUTING
IT6601 MOBILE COMPUTINGIT6601 MOBILE COMPUTING
IT6601 MOBILE COMPUTING
 
Mobileip 161105154557
Mobileip 161105154557Mobileip 161105154557
Mobileip 161105154557
 
Mobileip 161105154557
Mobileip 161105154557Mobileip 161105154557
Mobileip 161105154557
 
Mobile Communication
Mobile CommunicationMobile Communication
Mobile Communication
 
Mobile IP 1
Mobile IP 1Mobile IP 1
Mobile IP 1
 
Mobile
MobileMobile
Mobile
 
Mobile
MobileMobile
Mobile
 
Module 05 mobility management (1)
Module 05   mobility management (1)Module 05   mobility management (1)
Module 05 mobility management (1)
 
Mobile IP
Mobile IPMobile IP
Mobile IP
 
MOBILE COMPUTING Unit 2.pptx
MOBILE COMPUTING Unit 2.pptxMOBILE COMPUTING Unit 2.pptx
MOBILE COMPUTING Unit 2.pptx
 
Mobile ip
Mobile ipMobile ip
Mobile ip
 
MOBILE IP,DHCP,ADHOC ROUTING PROTOCOLS
MOBILE IP,DHCP,ADHOC ROUTING PROTOCOLSMOBILE IP,DHCP,ADHOC ROUTING PROTOCOLS
MOBILE IP,DHCP,ADHOC ROUTING PROTOCOLS
 
Mobile internet protocol
Mobile internet protocolMobile internet protocol
Mobile internet protocol
 

More from rajisri2

region discription
region discriptionregion discription
region discription
rajisri2
 
Image classification & retrieval
Image classification & retrievalImage classification & retrieval
Image classification & retrieval
rajisri2
 
Agent discovery& registration
Agent discovery& registrationAgent discovery& registration
Agent discovery& registration
rajisri2
 
video motion analysis
video motion analysisvideo motion analysis
video motion analysis
rajisri2
 
Texture,pattern and pattern classes
Texture,pattern and pattern classesTexture,pattern and pattern classes
Texture,pattern and pattern classes
rajisri2
 
topological features
topological featurestopological features
topological features
rajisri2
 
ipgoals,assumption requirements
ipgoals,assumption requirementsipgoals,assumption requirements
ipgoals,assumption requirements
rajisri2
 
Fourier descriptors & moments
Fourier descriptors & momentsFourier descriptors & moments
Fourier descriptors & moments
rajisri2
 
Congestion control, slow start, fast retransmit
Congestion control, slow start, fast retransmit   Congestion control, slow start, fast retransmit
Congestion control, slow start, fast retransmit
rajisri2
 
dynamichost configuration protocol
dynamichost configuration protocoldynamichost configuration protocol
dynamichost configuration protocol
rajisri2
 

More from rajisri2 (10)

region discription
region discriptionregion discription
region discription
 
Image classification & retrieval
Image classification & retrievalImage classification & retrieval
Image classification & retrieval
 
Agent discovery& registration
Agent discovery& registrationAgent discovery& registration
Agent discovery& registration
 
video motion analysis
video motion analysisvideo motion analysis
video motion analysis
 
Texture,pattern and pattern classes
Texture,pattern and pattern classesTexture,pattern and pattern classes
Texture,pattern and pattern classes
 
topological features
topological featurestopological features
topological features
 
ipgoals,assumption requirements
ipgoals,assumption requirementsipgoals,assumption requirements
ipgoals,assumption requirements
 
Fourier descriptors & moments
Fourier descriptors & momentsFourier descriptors & moments
Fourier descriptors & moments
 
Congestion control, slow start, fast retransmit
Congestion control, slow start, fast retransmit   Congestion control, slow start, fast retransmit
Congestion control, slow start, fast retransmit
 
dynamichost configuration protocol
dynamichost configuration protocoldynamichost configuration protocol
dynamichost configuration protocol
 

Recently uploaded

UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3
DianaGray10
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance
 
Free Complete Python - A step towards Data Science
Free Complete Python - A step towards Data ScienceFree Complete Python - A step towards Data Science
Free Complete Python - A step towards Data Science
RinaMondal9
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
Alan Dix
 
How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...
Product School
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
91mobiles
 
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Product School
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
KatiaHIMEUR1
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
ControlCase
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
Guy Korland
 
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Thierry Lestable
 
A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...
sonjaschweigert1
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
Jemma Hussein Allen
 
Quantum Computing: Current Landscape and the Future Role of APIs
Quantum Computing: Current Landscape and the Future Role of APIsQuantum Computing: Current Landscape and the Future Role of APIs
Quantum Computing: Current Landscape and the Future Role of APIs
Vlad Stirbu
 
Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
OnBoard
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
UiPathCommunity
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
Laura Byrne
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
mikeeftimakis1
 
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdfSAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
Peter Spielvogel
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance
 

Recently uploaded (20)

UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
 
Free Complete Python - A step towards Data Science
Free Complete Python - A step towards Data ScienceFree Complete Python - A step towards Data Science
Free Complete Python - A step towards Data Science
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
 
How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
 
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
 
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
 
A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
 
Quantum Computing: Current Landscape and the Future Role of APIs
Quantum Computing: Current Landscape and the Future Role of APIsQuantum Computing: Current Landscape and the Future Role of APIs
Quantum Computing: Current Landscape and the Future Role of APIs
 
Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
 
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdfSAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
 

entities terminology

  • 1. ENTITIES & TERMINOLOGY R.PAVITHRA II-MSc-(IT) DEPARTMENT OF CS&IT NADAR SARASWATHI COLLEGE OF ARTS AND SCIENCE THENI.
  • 2. ENTITIES & TERMINOLOGY  Mobile node(M N) -A mobile node is an end-system or router that can change its point of attachment to the internet using mobile IP. -The MN keeps its IP address and can continuously communicate with any other system in the internet as long as link-layer connectivity is given.  Correspondent Node(CN) -At least one partner is needed for communication. -In the following the CN represents this partner for the MN. The CN can be a fixed or mobile node.
  • 3. CONT…  Home Network -The home network is the subnet the MN belongs to with respect to its ip address. -No mobile IP support is needed within the home network.  Foreign Network -The foreign network is the current subnet the MN visits and which is not the home network.
  • 4. FOREIGN AGENT(FA)  The FA can provide several services to the MN during its visit to the foreign network.  The FA can have the COA acting as tunnel endpoint and forwarding packets to the MN.  The FA can be the default router for the MN.FAs can also provide security services because they belong to the foreign network as opposed to the MN which is only visiting.
  • 5. CARE OF ADDRESS(COA)  The COA defines the current location of the MN from an IP point of view.  All IP packets sent to the MN are delivered to the COA, not directly to the IP address of the MN. Packet delivery toward the MN is done using a tunnel, as explained later.
  • 6. CONT….  There are two different possibilites for the location of the COA:  Foreign Agent COA: -The COA could be located at the FA, i.e., the COA is an IP address of the FA. -The FA is the tunnel end –point and forwards packets to the MN. -Many MN using the FA can share this COA as common COA.  Co-lated COA: -The COA is co-lated if the MN temporarily acquires an additional IP address which acts as COA. -This address is now topologically correct , and the tunnel endpoint is at the MN.
  • 7.
  • 8. HOME AGENT(HA)  The HA provides several services for the MN and is located in the home network. The tunnel for packets towards the MN starts at the HA.  The HA can be implemented on a router that is responsible for the home network. This is obviously the best position, because without optimizations to mobile IP, all packets for the MN have to go through the router anyway.  if changing the router’s software is not possible ,the HA could also be implemented on an arbitrary node in the subnet. One disadvantage of this solution is the double crossing of the router by the packet if the MN is in a foreign network. A packet for the MN comes in via the router; the HA sends it through the tunnel which again crosses the router.
  • 9. CONT…..  Crossing of the router by the Packet if the MN is in a foreign network. A packet for the MN comes in via the router; the HA sends it through the tunnel which again cross the router.  Finally , a home network is not necessary at all. The HA could be again on the ‘router’ but this time only acting as a manager for MNs belonging to a virtual home network. All MNs are always in a foreign network with this solution.
  • 10.
  • 11. CONT…..  A CN is connected via a router to the internet, as are th homework and the foreign network. The HA is implemented on the router connecting the home network with the internet, an FA is implemented on the router to the foreign network. The MN is currently in the foreign network.