Explain dynamic key management mechanism, Computer Networking

Assignment Help:

Question:

a) Consider the following MIP scenario.

915_Why is a dynamic key management mechanism.png


Quite a few enterprise networks use private addresses and NAPT for the communication to the Internet.

i. Discuss the impact of NAPT on MIP for a scenario when the FA and the MN are situated behind a NAPT and the HA in the ‘public' network part.

ii. Which are the potential messages that could be affected?

iii. Propose a solution?

b) Assuming the communication between the MN and the HA in the figure in a) is protected via IPsec in the tunnel mode, tabulate corresponding Policy Database and the Security Association Database.

c) Why is a dynamic key management mechanism in the context of MIP and IPsec essential?

d) Redesign the network topology above in a) to show how the AAA server and the Radius / Diameter protocols could be a solution to c).


Related Discussions:- Explain dynamic key management mechanism

Wireless Networks, Is a complete OSI/TCPIP network architecture available i...

Is a complete OSI/TCPIP network architecture available in MATLAB?

Transport layer protocols , TCP (Transmission Control Protocol) and UDP are...

TCP (Transmission Control Protocol) and UDP are used by TCP/IP. SPX (Sequenced Packet Exchange) is used with IPX. NBP (Name Binding Protocol) is used with Appletalk.

Tcp connection management , TCP Connection Management TCP connection ...

TCP Connection Management TCP connection management encompasses the procedures for establishing and  terminating connection (FTCP is  connection oriented protocols). In TCP c

Explain about congestion control, Q. Explain about Congestion control? ...

Q. Explain about Congestion control? Congestion control Open-loop congestion control - prevent congestion before it happens retransmission policy - Ret

What is tdm, What is TDM? TDM is a digital process that can be applied ...

What is TDM? TDM is a digital process that can be applied when the data rate capacity of the transmission medium is greater than the data rate needed by the sending and receivi

The size of a broadcast domain, Which switching technology can decrease the...

Which switching technology can decrease the size of a broadcast domain? Ans) VLAN's are logical ways to break up a huge broadcast domain. To get from VLAN to VLAN you must ha

Determine how many bits are used for the page number, 1.  A virtual memory ...

1.  A virtual memory system has a virtual address space of 4 Gigabytes and a page size of 8 Kilobytes.  Each page table entry occupies 4 bytes.   a)  How many bits remain unchanged

Comp architecture, In reg-mem architecture, clock cycle is 10 ns wide. It i...

In reg-mem architecture, clock cycle is 10 ns wide. It is proposed that reg-reg architecture be used instead, that reduces the clock cycle by 2 ns. However, it requires an addition

What are ip addresses, What are IP addresses? IP address refers to the ...

What are IP addresses? IP address refers to the name of a computer on a network, like the Internet. An Identifier for a computer or device on a TCP/IP network, like the

Whitney houston, contribution to afican American history

contribution to afican American history

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd