Explain basic capabilities of mobile ip, Computer Networking

Assignment Help:

Question:

a) Describe the triangular delivery and two crossing problem that appears in Mobile IP.

b) Discovery, Registration and Tunneling are three basic capabilities of Mobile IP. Describe them briefly.

c) Mobile IP: Suppose a remote host sends a datagram to a mobile host. Describe the roles of the home agent and foreign agent in the delivery of the datagram?

d) Mobile IP suffers from inefficiency in the data delivery phase. Why?

e) IPsec uses two modes: tunnel mode and transport mode. Outline in which situations the two different forms are preferably used. Also, describe the encapsulation in the two modes.


Related Discussions:- Explain basic capabilities of mobile ip

Packets in eigrp, What are different kinds of packets in EIGRP?

What are different kinds of packets in EIGRP?

Logged into a router, You are logged into a router, what command would repr...

You are logged into a router, what command would represent you the IP addresses of routers linked to you? Ans)show cdp neighbors detail

Disadvantages - point to point , Disadvantages You typically  would  no...

Disadvantages You typically  would  not use a packet filter  as your  only security solution for your network  packets filters have two  major  disadvantages. a. Low securit

Connect a router and computer with a console cable- ccna, Connect a Router ...

Connect a Router and Computer with a Console Cable Step 1 : Set up a basic physical connection. Connect the console (rollover) cable to the console port on the router. Link

How can you manage a network using a router, How can you manage a network u...

How can you manage a network using a router? Routers have built in console that lets you configure dissimilar settings, like security and data logging. You can allocate restric

Identify three characteristics of switches, Switches operate at layer 2. Th...

Switches operate at layer 2. They enhance bandwidth by decreasing the number of devices sharing the media. They isolate collisions. Like a bridge they forward traffic based upon la

Persistent and no persistent connections, Persistent and No persistent Conn...

Persistent and No persistent Connections HTTP can use  both  persistent  and non persistent connection. By defaults  uses persistent  connections. Persistent Connections

Example of go back - N protocol, Q. Example of go back - N protocol? Th...

Q. Example of go back - N protocol? The window size is 4. A sender has sent frame 6 as well as the timer expires for frame 3 (frame 3 not ACKn'd). The sender goes back as we

The command to show the frame relay map table, Recognize the command to sho...

Recognize the command to show the Frame Relay map table Ans) Router# show frame-relay map is the the command to show the Frame Relay map table

What are mac addresses, What are MAC addresses? MAC, or Media Access Co...

What are MAC addresses? MAC, or Media Access Control, uniquely identifies a device on the network. It is also called as physical address or Ethernet address. A MAC address is m

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd