You are on page 1of 12
L. Is registration required if the mobile host acts as a foreign agent? Explain your answer. sepa y + Theragstraton requests the eau which santo the oven agent om the mabe hatte fegserte caret sasess itso announces acne ofthe home agent ane shone res step272 a + etile hast can move om one pace to anther lace nts ase, the adios fF needs tobe henge + rhemttautabe spores for mole hoe et use tap adcresees onal aasse ofl host {eome address nd tear adds of oblehost Le caresses ‘when nestor rode moveste another lace the are of dese must be changes. Ns alate to foreign newor, an deterinas moves host + To make the sdtess changes ransparet to heures, the network wer uses: foralgn agent an home agent theorem ane +The foreign accepts nd raefrs acketto the mobile host ach seen the home gen ‘obi hact mut beat as frign agent. + However tact foreign agent mabe host mt rece cae of adress by elf the el of + rose hast needs axa softvarete communicate wth the home agent step 5 es rgstratonsrequredf mob aesasfraign agent must egstertsl + tobi hac to act as feign newark, neato communicate wth home agent ard ao + Regration required forthe matte host because moe hoa needs ie tft the home 2, Redraw Figure 10.7 if the mobile host acts as a foreign agent. ‘etfs 0 ome eck ‘egress pat onetime {Zorpia eon to haematoma _ teenie fone se een sperma ora dhe serene CP reome— SD aa 3% Create a home agent advertisement message using 1456 as the sequence number and a lifetime of 3 hours, Select your own values for the bits in the code field, Cal- culate and insert the value for the length field. ome age and enn gent ran Agent bree Samat We iy eed seem a ‘a poraiven deal herle home agen! advertzoment hs therequancs umber LASé nd athe ins owt Stn a stn get wi coven a nh ae +The he fla about the cP aovertsemee hati een orbot home agent ar we ‘eran agen, ‘The second el tls abou he ype that as te 6b led at has heave + Then nest fit tll about the ath that stakes the bi ath a the vase 8 ‘Then nxt fd al bout ne sequence number serge dtl te vaue 16 and tate the ieteeteis ‘Then nest fdas about te tne and as per gen dts the ales Shows intone +The nt ied alls about the code and aks th tag that mea suse rset for feemthahortne rise ‘enone lat tena an be ues for Rear urns in te nome agent The doesnot contain the ae of actress, ICMP. Advertisement Message Te Ta36 T0800 OI] Reserved 4. Create a foreign agent advertisement message using 1672 as the sequence number and a lifetime of 4 hours. Select your own values for the bits in the code field. Use at least three care-of addresses of your choice. Calculate and insert the value for the length field. stop 777 “ {As per aiven deals there Is forelan agent advertisement has the sequence number 1672 and has the lifetime 4 hours. The deseription of the all fields of ferelgn agent with corresponding value which is as follows: 1 The fst field tells about the ICMP advertisement that wil be used for both home agent as well as foraign agent. ‘+ The second field tells about the type that takes the 8-bit filed that has the value 16. + Then next field tells about the length that's takes the &-bit length snd hes the value 20. + Then next feld tells about the sequence number as per given detail the value is 1672 and takes the 16-bit fl «Then next field tell about the ifenme and as per given detalls the value Is 4 hours and has the value 10800 In seconds which can be computed as folaws: | minute 60 seeds since! hour=60m then 60 minute “6060-3600 sec00ds~thours then hours =3600s4=440 seconds “Then next field tale about the code and it takes the &-bit lag that meane Lic use for set and o for reset that has the table value @ ‘and the next fels that can be used for Recerved purpose inthe foreign agent. + And the last field tells about the care-of-address that has the adress which is as follons: 178112 eins ICMP. Advertisement Message evaiia 5, Discuss how the ICMP router solicitation message can also be used for agent solic- itation. Why are there no extra fields? step12 5 ‘hee are tre pisses is sed in mabe communication frst phar s agent ecovery, second phase ISregstation, and td phases dota vanaf [Agent alscoverydoines two types of econ rete soliton and acvertzerent Mobile host ‘Skcoverhame agen and home agent ciszaverheforign ager “Agent soication eta the hat moves toa new network and hae not received agent Soveteamert + agent sabctation uses ntemat Conta Message Protool EMP) to Inform that needs asistance or eb. step22 - ‘hare ae no extra felds because the agent looks fr the Information and agents own address Ine Inthe message «ifthe mee host acts as agent doesnot use ary new pace typeof agent solctation then user eM message cotton phot 6 Which protocol is the carrier of the agent advertisement and solicitation messages? step 1/5 Z ‘There are three phases is used in mobile communication, frst phase is agent discovery, second phase ‘© registration, and third phase is data transfer. Step 2/5 a ‘Agent discovery have two phases, first, before leaving its hame network, the mobile host must ‘etermine the heme agent. + Second, afterit has been moved to foreign network, the mobile host must determine foreign agent. + The diecovary contains two types of mescagas: advertisement and solicitation Step 2/5 “ ‘The router acvertises its presence on networkusing internet Control Message Protocol ICMP) router savertcemert. + Itcan also make changes to the agent advertisement tothe packets if, it acts as an agent, Step 4/5 2 Agent sollltation i initiated ifthe host maves to a new network and hat not received agent advertisement ‘agent solictation uses ICMP to Inform that neede aesistance or help. step 5/5 x Hence, the earlar of the agent colleitaton and adverticement message Is Internet Central Message Protocol (ICMP). 7. Show the encapsulation of the advertisement message in Exercise 3 in an IP data- ‘gram, What is the value for the protocol field? step2/4 A “The format of agen vertisement of ntemet Control Message Protocol (IMP) sas follows: Te [tees ‘Ssgeene Namior ite Code | Resel Cacotalie oregn agency) Thee Type fled ic set26, ‘The bien ld represents extension messages enath + Message suis old by the 16-bit Sequence Number +The numberof seconds ung which agent wllaccep the request deine by tfetine ‘Te 6 Cae lei erst 0 oF + Care of stess shows the et of adress ued as care-ofadees. ‘sap ~ “The fs ar fiw oeeed values: Thelen ofheaderiss sisnacstone 2 andlongth ef mectago 1 rags 0gesenes an ragrent ote eo. “inthe ven abet, Senunce number dean itn es hou 0600 sean + cose 00 necuseegiatoneque ‘ype est tobe Se tena es + ice, agent acts 3s home agen thee no oreo ass ieee “ ence, he valu of tol is eto which nates EMP, 8. Explain why the registration request and reply are not directly encapsulated in an IP datagram. Why is there a need for the UDP user datagram? step 1/5 z ‘+ A registration request i transierto the foreign agent from the mobile host to reaisterits care-of address. also announces home agent address and Itc home address. ‘+ registration reply s sent to the foreign agent from the home agent and then conveyed to the mobile host. It approves or disapprove the registration request ‘step 2/5 a Upp is an unrelable, connectioniess, transport layer protocol. It sands for user datagram protocol (uve. + Ttis used for the process with the mechanism of error control and flow control + UDP uses 69 port number for the Trivial File Transfer Protocol «The sender sends the data packets tothe receiver while receiver does not send acknowledgement to the sender. That's why itis an unreliable protocol step 3/s A User datagram is the UDP packet, it contains 8 byies of header and data which is sending fo the receiver side. ‘The lenath of UDP packet is maximum to 65525 bytes, + UDP packets are encapsulated with IP datagram with length 65526bytes. IP flelds consist header length and total length. ‘tthe receiver side, to calculate the UDP length of the data from provided information of UDP user cetegram. step 4/5 A ‘The registration request and reply are not directly encapsulated In the program because: ‘The agent runs the server program that is running continuously while waiting for registration message, step 5/5 e ‘There Isa need of UDP user datagram because: «Ths type of server programs needs a well-known port and transport ayer protocols to support i These well-known port and transport laver protocols are avaliable in UDP _gram header sent from the remote host tothe home agent. ‘Mobile host home address: 13045.6.7/16 Mobile host care of address: 14.563.9'8 ‘Remote host address: 200.47.1424 Home agent address: 130.45.102016 Foreign agent address: 14.07.3468 stepa A Versa | Haale | ToS Ta is Fige| —Fagmer ome Das + erin fel dines ne version of ued + Header ea pets te engt a headerin 22: wer +The ype of service fed provides formation about the quay of sens +The 16-bit ent fe gives the length af datagram +The s-beidertcaton le caves Fagment common to patel mesiane + Fags socties whether he fagment reserved a DF shoul not be fragments) or MF about ‘pelse merge. ‘rTmeto be fed represents he te that s alowed to nein the network ‘he protocol species the protected, + Bac pctetion agai coupon in tanamision provided by heer checksum, + Source adeete the sb fee snes the orn ofthe masage + pesonanon message ges the acces ofthe desinton. ce r Ta Tren legal eer oem 10. Using the information in Exercise 9, show the contents of the IP datagram sent by the home agent to the foreign agent. Use tunneling, IP datagram Diagram: ‘This the complete structure ofthe IP datagram Wenion | WL | Wpeoteree To eng Dp entation Iele| Fein oft ce Tee aaksam = Destination ass Option (or more word sep719 “ ‘As per glen detals the from the exercise 3 the Information ls as fllons: Consider the information Mobile host home address: 30.45.6716 Mobile host are oF aderesst4 6.0970, Remote host aderess:200744/24 Home agent addressaz04s.1020/46 Foreign agent addess:4 6734678 step ara ~ + Before startin, nthe IP datagram ther Ic cry two mann Held which is Pheader and data and header wal be aised ito many parts which desertion 1:35 flaws: + inthe below tle the fee fd ell abou the version which has heals & + The net fl tes about the header length and haste vale 8. + The net field es about the tyne of services and has the valve 0 +The net fled els about the total length, «The ne fd tes about the identiaton and has the value 107 that recognize the datagram, +The net fd tells about the OF (Do Not Fragment) and ME (More Fragment and has the value 0. +The net fld tele about the Fragment offeet and thathas the value © + The net field tel about the Time tole and has the ave 15. + Tha nest Hs tele about the Protocol +The net Hal tele about the hancercheckeum. +The nee fides about the home agent adress which 130 45102016 + The net fld tes about the foreign agent adress which 6 18.6734.6/8 ‘ist fad tl abou the verion which has the value step 9/9 “The next teld tele acour the header length and hae the value 6 + The next fet tls about the type of cervces and has the value o + The next filed tls about the total length. + The next fet tells about the identification and has the value 42 that recognize the datagram + The next field tells about he DF (Do Not Fregment| and MF (More Fragment) and hes the value . + The next fel tells about the Fragment offset and that has the value 0 + The next field tells about the Time to ive and has the value 16 + The next field tells about the Protocol + The next field tells about the header checksum. + The next field tls about the remote host address which ¢ 200.4.7214/24, + The next iets als about the mobile host home address which i 120.25.6,7/6, ‘And the last field tells about the only data 415 0 Tenght 107, 0 0 15 Protocol Header Checksum 4 0 Tenght 0 0 15 Protocol Header Checksum 200.4.7.14 130.45.6.7 Data 11, Using the information in Exercise 9, show the contents of the IP datagram sent by ‘the foreign agent to the mobile hos nee = Mobi est heme s6drecs: 1304567146 oblehesteae-ot address 1456970 Roma nos sderecs.2004724/24 ome agent dees 120.4510.20/16 Fran agent aderessi 7345/9, + before sartng, nt ostgram ere leony wo mantic heh header sn data so ‘eacorolbe daca ine many pas Wh descr 5 HONS The net dete sbouthe ype of sie artes the aie 8 1 The ate es abou te etal ent * The at il es abou te Kenttcatin an has the vale 27 that cage the datagram +The et as es abou te DF (Bo Net arn) ad MF ore rzgmet anes thevahe Te av ils ee abou te header chao Te an ld oe abou ade whch 14673420, +The an ies ee abou te noblest cae addres which 4 6898 fot eels sbout the eon whch has the vabe 4 +The rt is ee about the hesderenath andes the vate there Hediste gh ‘Thenoateuet saute demten arches ae epee aM. Fest | Weer aa Tae SEE 12. Using the information in Exercise 9, show the contents of the IP datagram sent by the mobile host to the remote host. step “ Refers tothe exercise 9 of cater ofthe tentbokto complet information st0p213 a “The gona format af I datagram format as eles: Vesa | Handa [Trpesteme = Teen Fie] Fase Oe Taceie | Boba Tater Gram, Sous Ade s veion ald defies te version of1P used ‘Header especies the engin ofheacerin s-b words. ‘The typeof service fet erovides formation about he quay of ence ‘The 1-b length fed gves the length of datagram ‘The 1s-be denutcatn led contains fragment commento partcular message, + Flags spectes whetherthe fragments reserved or DF Should nat be fragmented) or MF tele sboxt thee messag8 ‘Te fagment ote inate et when meszage fragmenta ‘Timetable presents the tne thet alowed tbe inthe networe ‘The potocl pacts the prota se + Basic protection against corso in ansmision is provided by head checksum, + Source adess she 32 fled species the gin ofthe message + Destination message ges the addes ofthe destination ‘Te data fl contain the data eat on eee ‘tep3/2 5 ‘Tho format fhe IP éatagram header sent fromthe meble host oromote hosts as flows: b beret 2 b pb 15 rotocolener Chests + Sine the deviation adresse emote hort dese 200-4744 and courceaddreee mobile host home inoaee7 + Tanto eon network is 15 cond: Vetcon 4c used and header. ‘ype of erica eg Menntentonutes ie 42, 13. What type of inefficiency do we have in Exercise 9? Explain your answer. step 33 a ofr tothe exercize 9 of the chapter 20 ofthe textbook step 2/3 x + neficency n mobile I are of two tybes: double crossing (2X) and tangle outing and ths routng Is ‘eo cals dagleg routing, * Double crossing ineficiency anes if remote hos established connection win a mobile host then this mobile host has placed t9 same network le remate host ‘Tangle routing comes in less severe case + reoccur remote host estabiched connection with mobile host which i not attached to diferent networe + In this case, Tmobile host sends data pack to remote host that means efficiency does not exist ini + But ifremote host sends data packet to the mobile host, then data packet fst received by the home ent an after that treceved By the mobile hast. step3/3 mn Hence, the user has triangle routing types of inefficiency In exereee 9 because: + Whenever mobile host send data packets towards the remote hos, goes normally. + But ifremote host sends data to nent host Le. mobile host, then data received bythe home agent {and then i received by the moble host + This inefficiency i tangle ordog leg routing 1 The packet has to travel the extra distance of two sides of tiangle than one side ofthe triangle. This ‘ave rie to the efcency.

You might also like