Limited-time offer! Save up to 50% Off | Solutions starting at $6 each  

Network System Security PDF

Added on - 02 Nov 2021

Trusted by +2 million users,
1000+ happy students everyday
Showing pages 1 to 3 of 8 pages
Running Head: NETWORK SYSTEM SECURITY0
Network System
SecurityIndividual Assignment
Student Name
Network System Security1
Table of Contents
Ans-1...........................................................................................................................................................2
Ans-2...........................................................................................................................................................4
Ans-3...........................................................................................................................................................6
Works Cited.................................................................................................................................................7
Network System Security2
Ans-1
Mobile network is having different parts for data and voice transfer. There are some key
elements for communication for mobile devices, such as Mobile Node (MN), Mobile Agent (MA), Home
Agent(HA), Foreign Agent (FA), Correspondent Node (CN), Home Address (HoA), care-of address (CoA),
Mobile Internet Protocol version 4 (MIPv4), and Mobile Internet Protocol Version 6 (MIPv6). All are
shown in bellow figure.

Source:[ CITATION Dar11 \l 1033 ]
A mobile network is used MIPv4 and MIPv6 for datagram transfer between home networks to foreign
Network. Basic terminology of mobility is based on the paths of datagram transformation. Every MN is
having a home address and a CoA for information transformation. CoA is changed when a MN is transfer
from one location to another location. First step is start when a CN send datagram to a MN via standard
IP routing. Second step is done by home agent, in which it intercepted datagram and is tunneled to the
CoA. FA is detunneled the datagram and delivered to the mobile node. After that, a connection is
stabilized between MN and destination and they transfer data through a standard IP routing.
desklib-logo
You’re reading a preview
Preview Documents

To View Complete Document

Click the button to download
Subscribe to our plans

Download This Document