0 ratings0% found this document useful (0 votes) 279 views12 pagesChapter 10
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content,
claim it here.
Available Formats
Download as PDF or read online on Scribd
L. Is registration required if the mobile host acts as a foreign agent? Explain your
answer.
sepa y
+ Theragstraton requests the eau which santo the oven agent om the mabe hatte
fegserte caret sasess
itso announces acne ofthe home agent ane shone res
step272 a
+ etile hast can move om one pace to anther lace nts ase, the adios fF needs tobe
henge
+ rhemttautabe spores for mole hoe et use tap adcresees onal aasse ofl host
{eome address nd tear adds of oblehost Le caresses
‘when nestor rode moveste another lace the are of dese must be changes. Ns alate to
foreign newor, an deterinas moves host
+ To make the sdtess changes ransparet to heures, the network wer uses: foralgn agent an
home agent
theorem ane
+The foreign accepts nd raefrs acketto the mobile host ach seen the home gen
‘obi hact mut beat as frign agent.
+ However tact foreign agent mabe host mt rece cae of adress by elf the el of
+ rose hast needs axa softvarete communicate wth the home agent
step 5
es rgstratonsrequredf mob aesasfraign agent must egstertsl
+ tobi hac to act as feign newark, neato communicate wth home agent ard ao
+ Regration required forthe matte host because moe hoa needs ie tft the home
2, Redraw Figure 10.7 if the mobile host acts as a foreign agent.
‘etfs 0 ome eck
‘egress pat onetime
{Zorpia eon to haematoma
_ teenie fone se een sperma ora dhe
serene
CP reome— SD
aa3% Create a home agent advertisement message using 1456 as the sequence number
and a lifetime of 3 hours, Select your own values for the bits in the code field, Cal-
culate and insert the value for the length field.
ome age and enn gent ran
Agent bree Samat
We iy eed
seem a
‘a poraiven deal herle home agen! advertzoment hs therequancs umber LASé nd athe
ins owt Stn a stn get wi coven a nh ae
+The he fla about the cP aovertsemee hati een orbot home agent ar we
‘eran agen,
‘The second el tls abou he ype that as te 6b led at has heave
+ Then nest fit tll about the ath that stakes the bi ath a the vase 8
‘Then nxt fd al bout ne sequence number serge dtl te vaue 16 and tate the
ieteeteis
‘Then nest fdas about te tne and as per gen dts the ales Shows
intone
+The nt ied alls about the code and aks th tag that mea suse rset for
feemthahortne rise
‘enone lat tena an be ues for Rear urns in te nome agent
The doesnot contain the ae of actress,
ICMP.
Advertisement Message
Te Ta36
T0800 OI] Reserved4. Create a foreign agent advertisement message using 1672 as the sequence number
and a lifetime of 4 hours. Select your own values for the bits in the code field. Use
at least three care-of addresses of your choice. Calculate and insert the value for
the length field.
stop 777 “
{As per aiven deals there Is forelan agent advertisement has the sequence number 1672 and has the
lifetime 4 hours. The deseription of the all fields of ferelgn agent with corresponding value which is
as follows:
1 The fst field tells about the ICMP advertisement that wil be used for both home agent as well as
foraign agent.
‘+ The second field tells about the type that takes the 8-bit filed that has the value 16.
+ Then next field tells about the length that's takes the &-bit length snd hes the value 20.
+ Then next feld tells about the sequence number as per given detail the value is 1672 and takes the
16-bit fl
«Then next field tell about the ifenme and as per given detalls the value Is 4 hours and has the value
10800 In seconds which can be computed as folaws:
| minute 60 seeds
since! hour=60m
then 60 minute “6060-3600 sec00ds~thours
then hours =3600s4=440 seconds
“Then next field tale about the code and it takes the &-bit lag that meane Lic use for set and o for
reset that has the table value @
‘and the next fels that can be used for Recerved purpose inthe foreign agent.
+ And the last field tells about the care-of-address that has the adress which is as follons:
178112
eins
ICMP.
Advertisement Message
evaiia5, Discuss how the ICMP router solicitation message can also be used for agent solic-
itation. Why are there no extra fields?
step12 5
‘hee are tre pisses is sed in mabe communication frst phar s agent ecovery, second phase
ISregstation, and td phases dota vanaf
[Agent alscoverydoines two types of econ rete soliton and acvertzerent Mobile host
‘Skcoverhame agen and home agent ciszaverheforign ager
“Agent soication eta the hat moves toa new network and hae not received agent
Soveteamert
+ agent sabctation uses ntemat Conta Message Protool EMP) to Inform that needs asistance or
eb.
step22 -
‘hare ae no extra felds because the agent looks fr the Information and agents own address
Ine Inthe message
«ifthe mee host acts as agent doesnot use ary new pace typeof agent solctation then user
eM message cotton phot
6 Which protocol is the carrier of the agent advertisement and solicitation messages?
step 1/5 Z
‘There are three phases is used in mobile communication, frst phase is agent discovery, second phase
‘© registration, and third phase is data transfer.
Step 2/5 a
‘Agent discovery have two phases, first, before leaving its hame network, the mobile host must
‘etermine the heme agent.
+ Second, afterit has been moved to foreign network, the mobile host must determine foreign agent.
+ The diecovary contains two types of mescagas: advertisement and solicitation
Step 2/5 “
‘The router acvertises its presence on networkusing internet Control Message Protocol ICMP) router
savertcemert.
+ Itcan also make changes to the agent advertisement tothe packets if, it acts as an agent,
Step 4/5 2
Agent sollltation i initiated ifthe host maves to a new network and hat not received agent
advertisement
‘agent solictation uses ICMP to Inform that neede aesistance or help.
step 5/5 x
Hence, the earlar of the agent colleitaton and adverticement message Is Internet Central Message
Protocol (ICMP).7. Show the encapsulation of the advertisement message in Exercise 3 in an IP data-
‘gram, What is the value for the protocol field?
step2/4 A
“The format of agen vertisement of ntemet Control Message Protocol (IMP) sas follows:
Te [tees ‘Ssgeene Namior
ite Code | Resel
Cacotalie
oregn agency)
Thee Type fled ic set26,
‘The bien ld represents extension messages enath
+ Message suis old by the 16-bit Sequence Number
+The numberof seconds ung which agent wllaccep the request deine by tfetine
‘Te 6 Cae lei erst 0 oF
+ Care of stess shows the et of adress ued as care-ofadees.
‘sap ~
“The fs ar fiw oeeed values:
Thelen ofheaderiss
sisnacstone 2 andlongth ef mectago
1 rags 0gesenes an ragrent ote eo.
“inthe ven abet, Senunce number dean itn es hou 0600 sean
+ cose 00 necuseegiatoneque
‘ype est tobe Se tena es
+ ice, agent acts 3s home agen thee no oreo ass
ieee “
ence, he valu of tol is eto which nates EMP,8. Explain why the registration request and reply are not directly encapsulated in an
IP datagram. Why is there a need for the UDP user datagram?
step 1/5 z
‘+ A registration request i transierto the foreign agent from the mobile host to reaisterits care-of
address. also announces home agent address and Itc home address.
‘+ registration reply s sent to the foreign agent from the home agent and then conveyed to the
mobile host. It approves or disapprove the registration request
‘step 2/5 a
Upp is an unrelable, connectioniess, transport layer protocol. It sands for user datagram protocol
(uve.
+ Ttis used for the process with the mechanism of error control and flow control
+ UDP uses 69 port number for the Trivial File Transfer Protocol
«The sender sends the data packets tothe receiver while receiver does not send acknowledgement to
the sender. That's why itis an unreliable protocol
step 3/s A
User datagram is the UDP packet, it contains 8 byies of header and data which is sending fo the
receiver side.
‘The lenath of UDP packet is maximum to 65525 bytes,
+ UDP packets are encapsulated with IP datagram with length 65526bytes. IP flelds consist header
length and total length.
‘tthe receiver side, to calculate the UDP length of the data from provided information of UDP user
cetegram.
step 4/5 A
‘The registration request and reply are not directly encapsulated In the program because:
‘The agent runs the server program that is running continuously while waiting for registration
message,
step 5/5 e
‘There Isa need of UDP user datagram because:
«Ths type of server programs needs a well-known port and transport ayer protocols to support i
These well-known port and transport laver protocols are avaliable in UDP_gram header sent from the remote host tothe home agent.
‘Mobile host home address: 13045.6.7/16
Mobile host care of address: 14.563.9'8
‘Remote host address: 200.47.1424
Home agent address: 130.45.102016
Foreign agent address: 14.07.3468
stepa A
Versa | Haale | ToS Ta
is Fige| —Fagmer ome
Das
+ erin fel dines ne version of ued
+ Header ea pets te engt a headerin 22: wer
+The ype of service fed provides formation about the quay of sens
+The 16-bit ent fe gives the length af datagram
+The s-beidertcaton le caves Fagment common to patel mesiane
+ Fags socties whether he fagment reserved a DF shoul not be fragments) or MF about
‘pelse merge.
‘rTmeto be fed represents he te that s alowed to nein the network
‘he protocol species the protected,
+ Bac pctetion agai coupon in tanamision provided by heer checksum,
+ Source adeete the sb fee snes the orn ofthe masage
+ pesonanon message ges the acces ofthe desinton.
ce r Ta
Tren legal eer
oem10. Using the information in Exercise 9, show the contents of the IP datagram sent by
the home agent to the foreign agent. Use tunneling,
IP datagram Diagram:
‘This the complete structure ofthe IP datagram
Wenion | WL | Wpeoteree To eng
Dp
entation Iele| Fein oft
ce Tee aaksam
=
Destination ass
Option (or more word
sep719 “
‘As per glen detals the from the exercise 3 the Information ls as fllons:
Consider the information
Mobile host home address: 30.45.6716
Mobile host are oF aderesst4 6.0970,
Remote host aderess:200744/24
Home agent addressaz04s.1020/46
Foreign agent addess:4 6734678
step ara ~
+ Before startin, nthe IP datagram ther Ic cry two mann Held which is Pheader and data and
header wal be aised ito many parts which desertion 1:35 flaws:
+ inthe below tle the fee fd ell abou the version which has heals &
+ The net fl tes about the header length and haste vale 8.
+ The net field es about the tyne of services and has the valve 0
+The net fled els about the total length,
«The ne fd tes about the identiaton and has the value 107 that recognize the datagram,
+The net fd tells about the OF (Do Not Fragment) and ME (More Fragment and has the value 0.
+The net fld tele about the Fragment offeet and thathas the value ©
+ The net field tel about the Time tole and has the ave 15.
+ Tha nest Hs tele about the Protocol
+The net Hal tele about the hancercheckeum.
+The nee fides about the home agent adress which 130 45102016
+ The net fld tes about the foreign agent adress which 6 18.6734.6/8
‘ist fad tl abou the verion which has the valuestep 9/9
“The next teld tele acour the header length and hae the value 6
+ The next fet tls about the type of cervces and has the value o
+ The next filed tls about the total length.
+ The next fet tells about the identification and has the value 42 that recognize the datagram
+ The next field tells about he DF (Do Not Fregment| and MF (More Fragment) and hes the value .
+ The next fel tells about the Fragment offset and that has the value 0
+ The next field tells about the Time to ive and has the value 16
+ The next field tells about the Protocol
+ The next field tells about the header checksum.
+ The next field tls about the remote host address which ¢ 200.4.7214/24,
+ The next iets als about the mobile host home address which i 120.25.6,7/6,
‘And the last field tells about the only data
415 0 Tenght
107, 0 0
15 Protocol Header Checksum
4 0 Tenght
0 0
15 Protocol Header Checksum
200.4.7.14
130.45.6.7
Data11, Using the information in Exercise 9, show the contents of the IP datagram sent by
‘the foreign agent to the mobile hos
nee =
Mobi est heme s6drecs: 1304567146
oblehesteae-ot address 1456970
Roma nos sderecs.2004724/24
ome agent dees 120.4510.20/16
Fran agent aderessi 7345/9,
+ before sartng, nt ostgram ere leony wo mantic heh header sn data so
‘eacorolbe daca ine many pas Wh descr 5 HONS
The net dete sbouthe ype of sie artes the aie 8
1 The ate es abou te etal ent
* The at il es abou te Kenttcatin an has the vale 27 that cage the datagram
+The et as es abou te DF (Bo Net arn) ad MF ore rzgmet anes thevahe
Te av ils ee abou te header chao
Te an ld oe abou ade whch 14673420,
+The an ies ee abou te noblest cae addres which 4 6898
fot eels sbout the eon whch has the vabe 4
+The rt is ee about the hesderenath andes the vate
there Hediste gh
‘Thenoateuet saute demten arches ae epee aM.
Fest | Weer aa
Tae
SEE12. Using the information in Exercise 9, show the contents of the IP datagram sent by
the mobile host to the remote host.
step “
Refers tothe exercise 9 of cater ofthe tentbokto complet information
st0p213 a
“The gona format af I datagram format as eles:
Vesa | Handa [Trpesteme =
Teen Fie] Fase Oe
Taceie | Boba Tater Gram,
Sous Ade
s veion ald defies te version of1P used
‘Header especies the engin ofheacerin s-b words.
‘The typeof service fet erovides formation about he quay of ence
‘The 1-b length fed gves the length of datagram
‘The 1s-be denutcatn led contains fragment commento partcular message,
+ Flags spectes whetherthe fragments reserved or DF Should nat be fragmented) or MF tele sboxt
thee messag8
‘Te fagment ote inate et when meszage fragmenta
‘Timetable presents the tne thet alowed tbe inthe networe
‘The potocl pacts the prota se
+ Basic protection against corso in ansmision is provided by head checksum,
+ Source adess she 32 fled species the gin ofthe message
+ Destination message ges the addes ofthe destination
‘Te data fl contain the data eat on eee
‘tep3/2 5
‘Tho format fhe IP éatagram header sent fromthe meble host oromote hosts as flows:
b beret
2 b pb
15 rotocolener Chests
+ Sine the deviation adresse emote hort dese 200-4744 and courceaddreee mobile host
home inoaee7
+ Tanto eon network is 15 cond: Vetcon 4c used and header.
‘ype of erica eg Menntentonutes ie 42,13. What type of inefficiency do we have in Exercise 9? Explain your answer.
step 33 a
ofr tothe exercize 9 of the chapter 20 ofthe textbook
step 2/3 x
+ neficency n mobile I are of two tybes: double crossing (2X) and tangle outing and ths routng Is
‘eo cals dagleg routing,
* Double crossing ineficiency anes if remote hos established connection win a mobile host then this
mobile host has placed t9 same network le remate host
‘Tangle routing comes in less severe case
+ reoccur remote host estabiched connection with mobile host which i not attached to diferent
networe
+ In this case, Tmobile host sends data pack to remote host that means efficiency does not exist ini
+ But ifremote host sends data packet to the mobile host, then data packet fst received by the home
ent an after that treceved By the mobile hast.
step3/3 mn
Hence, the user has triangle routing types of inefficiency In exereee 9 because:
+ Whenever mobile host send data packets towards the remote hos, goes normally.
+ But ifremote host sends data to nent host Le. mobile host, then data received bythe home agent
{and then i received by the moble host
+ This inefficiency i tangle ordog leg routing
1 The packet has to travel the extra distance of two sides of tiangle than one side ofthe triangle. This
‘ave rie to the efcency.