SlideShare una empresa de Scribd logo
1 de 26
The problem with IP ?     1.   An IP address is associated with a fixed network    location.      2.  When we go to office, university or workplace and access  the internet from a fixed IP address. This IP address may be for a desktop or laptop computer.      3. In IP, if we take computer to a different place, outside our usual network  we have to reconfigure  it with a new IP.
Why MOBILE IP is needed ?   1.Mobile IP is enhancement to IP which allows a computer to roam fully on the internet while still maintaining the same IP address.   2. The applications feel that the mobile computer is connected to its usual IP address even if it is far away from its home network.
 Two Addresses in Mobile IP 1.Home address-The host had its original address, called the Home Address.  It  is associated with the home network. 2.Care of address-The temporary  address  of the host is called as Care of Address. It is associated with the foreign network. The mobile node gets a new care-of address every time it connects to a new point ofattachment.
Home Agent & Home Network    1.The home network contains a network node called Home Agent. The home address of the mobile node is the IP address of the home agent.   2. The home agent is responsible for receiving all the packets sent to the mobile node when the mobile node is away.     3. It is the responsibility of the home agent to deliver the packets to the mobile node at its current point of attachment
Foreign Agent and Foreign Network 1.When a mobile node moves, it first connects to a foreign agent in a foreign network. 2.Next, the mobile node is assigned a care-ofaddress (an IP address) by the foreign network.  3.The  node now registers its care-of address with the home agent.
4.The foreign agent is usually a router attached to the foreign network. 5.The foreign agent recieves and delivers packets sent by the home agent to the mobile hosts.6.When the mobile host acts as a foreign agent the care -of address is called as co-located care of address
Correspondent  Node 1.A correspondent node is a computer that sends packets to the mobile node. A correspondent node is typically connected to its own home network 2. A correspondent node is aware of only the IP address of the mobile node in the home network of the mobile node 3.Any packet from the correspondent node is delivered to the home agent
A Schematic Diagram of Mobile IP Mobile node Foreign agent Correspondent Node Home agent
The Phases
1st phase:  Discovering the care-of Address 1.In mobile IP, both a foreign agent and a home agent periodically broadcast agent advertisement messages 2. A mobile host must discover(learn the address of) a home agent before it leaves the home agent. 3.A mobile host must also discover a foreign agent after it moved to a foreign network.
Agent Advertisement An agent advertisement has the functions  1.It allows mobile nodes to discover foreign agents and get care-of addresses. 2. It allows the mobile node to know the services provided by the foreign agent.  3. It allows the mobile node to determine whether an agent is its home agent or a foreign agent
Agent Advertisement
Solicitation from a Mobile Node 1.When an mobile host has moved to a new network and has not recieved agent advertisements,it can initiate an agent solicitation. 2. A mobile node can generate agent solicitationmessages when it is looking for a foreign agent.
 2nd phase:  Registration 1.When a mobile node receives a care-of address from a foreign agent, its home agent needs to be informed. 2. The mobile node sends a registration request to its home agent through the foreign agent who has provided the new care-of address. 3. When the home agent receives the request, it updates its routing table and sends a registration reply back to the foreign agent.
Registration Request and Reply
Registration request format
Registration  reply format
3rd phase:  Data Transfer 1. When a remote host wants to send a packet to the mobile host, it uses its address as the source address and the home address of the mobile host as the destination address .  2. After receiving the packet , the home agent sends  the packet to the foreign agent . The home agent encapsulates the whole IP packet inside another IP packet using its address as the source  and the foreign agent’s as the destination address.
4. When the foreign agent recieves the packet ,it   removes the original packet. Since  the destination    address is the home address  of the mobile host ,the foreign agent consults a registry table to find the care of address.5. When a mobile host wants to send a packet to a remote host,it sends as it done normally.The mobile host prepares a packet with its home address as the source and the address of the remote host as the destination.
Tunneling and IP within IP The transfer of the packet from the home agent to the care-of address is called tunneling. The home agent is the source of the tunnel. The home agent inserts a new tunnel header in front of the IP header of a packet addressed to the mobile agent and received by the home agent The tunnel header is the care-of IP address of the mobile node. The old header is preserved as it was in the original packet.
4. The foreign agent is the receiver of the tunnel 5 .When the foreign agent receives the tunneled     packet, it has to delete the tunnel header to recover the original packet.  6.The foreign agent delivers the packet to the mobile node after removing the tunnel header
INEFFICIENCY IN MOBILE IP ,[object Object],INEFFICIENCY IN MOBILE IP 1. Double Crossing  2.Triangle Routing
[object Object],[object Object],[object Object]
THANK YOU
Mobile ip np
Mobile ip np

Más contenido relacionado

La actualidad más candente

Key mechanism of mobile ip
Key mechanism of mobile ip Key mechanism of mobile ip
Key mechanism of mobile ip priya Nithya
 
Mobile ad hoc networks (MANET) for KTU
Mobile ad hoc networks (MANET) for KTUMobile ad hoc networks (MANET) for KTU
Mobile ad hoc networks (MANET) for KTUVinish Alikkal
 
Resume mohammad sharifur rahman 15+ years experience huawei telecommunication
Resume mohammad sharifur rahman 15+ years experience   huawei telecommunicationResume mohammad sharifur rahman 15+ years experience   huawei telecommunication
Resume mohammad sharifur rahman 15+ years experience huawei telecommunicationSharifur Rahman
 
VPN (virtual private network)
VPN (virtual private network) VPN (virtual private network)
VPN (virtual private network) Netwax Lab
 
Distributed System-Multicast & Indirect communication
Distributed System-Multicast & Indirect communicationDistributed System-Multicast & Indirect communication
Distributed System-Multicast & Indirect communicationMNM Jain Engineering College
 
Mobile ip overview
Mobile ip overviewMobile ip overview
Mobile ip overviewpriya Nithya
 
Transport control protocols for Wireless sensor networks
Transport control protocols for Wireless sensor networksTransport control protocols for Wireless sensor networks
Transport control protocols for Wireless sensor networksRushin Shah
 
VPN (virtual Private Network)
VPN (virtual Private Network)VPN (virtual Private Network)
VPN (virtual Private Network)Chandan Jha
 
Transport Layer in Computer Networks (TCP / UDP / SCTP)
Transport Layer in Computer Networks (TCP / UDP / SCTP)Transport Layer in Computer Networks (TCP / UDP / SCTP)
Transport Layer in Computer Networks (TCP / UDP / SCTP)Hamidreza Bolhasani
 
Imap(internet massege access protocaols)
Imap(internet massege access protocaols)Imap(internet massege access protocaols)
Imap(internet massege access protocaols)shashikant pabari
 
Adhoc and routing protocols
Adhoc and routing protocolsAdhoc and routing protocols
Adhoc and routing protocolsshashi712
 
Agent discovery& registration
Agent discovery& registrationAgent discovery& registration
Agent discovery& registrationrajisri2
 

La actualidad más candente (20)

Key mechanism of mobile ip
Key mechanism of mobile ip Key mechanism of mobile ip
Key mechanism of mobile ip
 
Mobile IP
Mobile IPMobile IP
Mobile IP
 
Outdoor MIMO Wireless Networks
Outdoor MIMO Wireless NetworksOutdoor MIMO Wireless Networks
Outdoor MIMO Wireless Networks
 
Mobile ad hoc networks (MANET) for KTU
Mobile ad hoc networks (MANET) for KTUMobile ad hoc networks (MANET) for KTU
Mobile ad hoc networks (MANET) for KTU
 
Resume mohammad sharifur rahman 15+ years experience huawei telecommunication
Resume mohammad sharifur rahman 15+ years experience   huawei telecommunicationResume mohammad sharifur rahman 15+ years experience   huawei telecommunication
Resume mohammad sharifur rahman 15+ years experience huawei telecommunication
 
VPN (virtual private network)
VPN (virtual private network) VPN (virtual private network)
VPN (virtual private network)
 
Vpn
VpnVpn
Vpn
 
Distributed System-Multicast & Indirect communication
Distributed System-Multicast & Indirect communicationDistributed System-Multicast & Indirect communication
Distributed System-Multicast & Indirect communication
 
Mobile IP
Mobile IPMobile IP
Mobile IP
 
Mobile ip overview
Mobile ip overviewMobile ip overview
Mobile ip overview
 
Transport control protocols for Wireless sensor networks
Transport control protocols for Wireless sensor networksTransport control protocols for Wireless sensor networks
Transport control protocols for Wireless sensor networks
 
Presentation1
Presentation1Presentation1
Presentation1
 
VPN (virtual Private Network)
VPN (virtual Private Network)VPN (virtual Private Network)
VPN (virtual Private Network)
 
Transport Layer in Computer Networks (TCP / UDP / SCTP)
Transport Layer in Computer Networks (TCP / UDP / SCTP)Transport Layer in Computer Networks (TCP / UDP / SCTP)
Transport Layer in Computer Networks (TCP / UDP / SCTP)
 
Voice-over-Internet Protocol (VoIP) ppt
Voice-over-Internet Protocol (VoIP) pptVoice-over-Internet Protocol (VoIP) ppt
Voice-over-Internet Protocol (VoIP) ppt
 
Imap(internet massege access protocaols)
Imap(internet massege access protocaols)Imap(internet massege access protocaols)
Imap(internet massege access protocaols)
 
Virtual Private Network VPN
Virtual Private Network VPNVirtual Private Network VPN
Virtual Private Network VPN
 
Adhoc and routing protocols
Adhoc and routing protocolsAdhoc and routing protocols
Adhoc and routing protocols
 
Agent discovery& registration
Agent discovery& registrationAgent discovery& registration
Agent discovery& registration
 
Mobile number portability
Mobile number portabilityMobile number portability
Mobile number portability
 

Similar a Mobile ip np (20)

IT6601 Mobile Computing Unit II
IT6601 Mobile Computing Unit IIIT6601 Mobile Computing Unit II
IT6601 Mobile Computing Unit II
 
IT8602 - Mobile Communication Unit IV
IT8602 - Mobile Communication   Unit IV IT8602 - Mobile Communication   Unit IV
IT8602 - Mobile Communication Unit IV
 
Mobile ip group_3
Mobile ip group_3Mobile ip group_3
Mobile ip group_3
 
Mobility And Mobile I Pv4
Mobility And Mobile I Pv4Mobility And Mobile I Pv4
Mobility And Mobile I Pv4
 
Report
ReportReport
Report
 
Computer networks final presentation
Computer networks final presentationComputer networks final presentation
Computer networks final presentation
 
Mobile IP
Mobile IP Mobile IP
Mobile IP
 
Mobile IP
Mobile IPMobile IP
Mobile IP
 
Mobile ip
Mobile ipMobile ip
Mobile ip
 
Unit 2
Unit 2Unit 2
Unit 2
 
Mobile ip presented by nafiz
Mobile ip   presented by nafizMobile ip   presented by nafiz
Mobile ip presented by nafiz
 
Unit 3
Unit 3Unit 3
Unit 3
 
Mobile internet protocol
Mobile internet protocolMobile internet protocol
Mobile internet protocol
 
Mobile ip presentation
Mobile ip presentationMobile ip presentation
Mobile ip presentation
 
Mobile computing Unit III MANET Notes
Mobile computing Unit III MANET NotesMobile computing Unit III MANET Notes
Mobile computing Unit III MANET Notes
 
Mobileip 161105154557
Mobileip 161105154557Mobileip 161105154557
Mobileip 161105154557
 
Mobileip 161105154557
Mobileip 161105154557Mobileip 161105154557
Mobileip 161105154557
 
It2402 mobile communication unit 4
It2402 mobile communication unit 4It2402 mobile communication unit 4
It2402 mobile communication unit 4
 
Performance of Various Mobile IP Protocols and Security Considerations
Performance of Various Mobile IP Protocols and Security ConsiderationsPerformance of Various Mobile IP Protocols and Security Considerations
Performance of Various Mobile IP Protocols and Security Considerations
 
Mobile computing - SARASWATHI RAMALINGAM
Mobile computing - SARASWATHI RAMALINGAMMobile computing - SARASWATHI RAMALINGAM
Mobile computing - SARASWATHI RAMALINGAM
 

Último

Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Patryk Bandurski
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationSlibray Presentation
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr BaganFwdays
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsSergiu Bodiu
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsMemoori
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Commit University
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxhariprasad279825
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsMiki Katsuragi
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brandgvaughan
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024Lorenzo Miniero
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenHervé Boutemy
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
Training state-of-the-art general text embedding
Training state-of-the-art general text embeddingTraining state-of-the-art general text embedding
Training state-of-the-art general text embeddingZilliz
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii SoldatenkoFwdays
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Manik S Magar
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek SchlawackFwdays
 

Último (20)

E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial Buildings
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptx
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering Tips
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brand
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache Maven
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
Training state-of-the-art general text embedding
Training state-of-the-art general text embeddingTraining state-of-the-art general text embedding
Training state-of-the-art general text embedding
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
 

Mobile ip np

  • 1. The problem with IP ? 1. An IP address is associated with a fixed network location. 2. When we go to office, university or workplace and access the internet from a fixed IP address. This IP address may be for a desktop or laptop computer. 3. In IP, if we take computer to a different place, outside our usual network we have to reconfigure it with a new IP.
  • 2. Why MOBILE IP is needed ? 1.Mobile IP is enhancement to IP which allows a computer to roam fully on the internet while still maintaining the same IP address. 2. The applications feel that the mobile computer is connected to its usual IP address even if it is far away from its home network.
  • 3. Two Addresses in Mobile IP 1.Home address-The host had its original address, called the Home Address. It is associated with the home network. 2.Care of address-The temporary address of the host is called as Care of Address. It is associated with the foreign network. The mobile node gets a new care-of address every time it connects to a new point ofattachment.
  • 4. Home Agent & Home Network 1.The home network contains a network node called Home Agent. The home address of the mobile node is the IP address of the home agent. 2. The home agent is responsible for receiving all the packets sent to the mobile node when the mobile node is away. 3. It is the responsibility of the home agent to deliver the packets to the mobile node at its current point of attachment
  • 5. Foreign Agent and Foreign Network 1.When a mobile node moves, it first connects to a foreign agent in a foreign network. 2.Next, the mobile node is assigned a care-ofaddress (an IP address) by the foreign network. 3.The node now registers its care-of address with the home agent.
  • 6. 4.The foreign agent is usually a router attached to the foreign network. 5.The foreign agent recieves and delivers packets sent by the home agent to the mobile hosts.6.When the mobile host acts as a foreign agent the care -of address is called as co-located care of address
  • 7. Correspondent Node 1.A correspondent node is a computer that sends packets to the mobile node. A correspondent node is typically connected to its own home network 2. A correspondent node is aware of only the IP address of the mobile node in the home network of the mobile node 3.Any packet from the correspondent node is delivered to the home agent
  • 8. A Schematic Diagram of Mobile IP Mobile node Foreign agent Correspondent Node Home agent
  • 10. 1st phase: Discovering the care-of Address 1.In mobile IP, both a foreign agent and a home agent periodically broadcast agent advertisement messages 2. A mobile host must discover(learn the address of) a home agent before it leaves the home agent. 3.A mobile host must also discover a foreign agent after it moved to a foreign network.
  • 11. Agent Advertisement An agent advertisement has the functions 1.It allows mobile nodes to discover foreign agents and get care-of addresses. 2. It allows the mobile node to know the services provided by the foreign agent. 3. It allows the mobile node to determine whether an agent is its home agent or a foreign agent
  • 13. Solicitation from a Mobile Node 1.When an mobile host has moved to a new network and has not recieved agent advertisements,it can initiate an agent solicitation. 2. A mobile node can generate agent solicitationmessages when it is looking for a foreign agent.
  • 14. 2nd phase: Registration 1.When a mobile node receives a care-of address from a foreign agent, its home agent needs to be informed. 2. The mobile node sends a registration request to its home agent through the foreign agent who has provided the new care-of address. 3. When the home agent receives the request, it updates its routing table and sends a registration reply back to the foreign agent.
  • 18. 3rd phase: Data Transfer 1. When a remote host wants to send a packet to the mobile host, it uses its address as the source address and the home address of the mobile host as the destination address . 2. After receiving the packet , the home agent sends the packet to the foreign agent . The home agent encapsulates the whole IP packet inside another IP packet using its address as the source and the foreign agent’s as the destination address.
  • 19. 4. When the foreign agent recieves the packet ,it removes the original packet. Since the destination address is the home address of the mobile host ,the foreign agent consults a registry table to find the care of address.5. When a mobile host wants to send a packet to a remote host,it sends as it done normally.The mobile host prepares a packet with its home address as the source and the address of the remote host as the destination.
  • 20. Tunneling and IP within IP The transfer of the packet from the home agent to the care-of address is called tunneling. The home agent is the source of the tunnel. The home agent inserts a new tunnel header in front of the IP header of a packet addressed to the mobile agent and received by the home agent The tunnel header is the care-of IP address of the mobile node. The old header is preserved as it was in the original packet.
  • 21. 4. The foreign agent is the receiver of the tunnel 5 .When the foreign agent receives the tunneled packet, it has to delete the tunnel header to recover the original packet. 6.The foreign agent delivers the packet to the mobile node after removing the tunnel header
  • 22.
  • 23.

Notas del editor

  1. Correspondent NodeCorrespondent Node