Explain dynamic key management mechanism, Computer Networking

Assignment Help:

Question:

a) Consider the following MIP scenario.

915_Why is a dynamic key management mechanism.png


Quite a few enterprise networks use private addresses and NAPT for the communication to the Internet.

i. Discuss the impact of NAPT on MIP for a scenario when the FA and the MN are situated behind a NAPT and the HA in the ‘public' network part.

ii. Which are the potential messages that could be affected?

iii. Propose a solution?

b) Assuming the communication between the MN and the HA in the figure in a) is protected via IPsec in the tunnel mode, tabulate corresponding Policy Database and the Security Association Database.

c) Why is a dynamic key management mechanism in the context of MIP and IPsec essential?

d) Redesign the network topology above in a) to show how the AAA server and the Radius / Diameter protocols could be a solution to c).


Related Discussions:- Explain dynamic key management mechanism

Configuration and cable termination, how can I establish a home net work by...

how can I establish a home net work by using cables and wieless

Describe briefly how the news filtering agent works, QUESTION (a) Conce...

QUESTION (a) Concerning agents that reduce workload, there are four agents developed using a learning approach among which is the News Filtering Agent. Name the other three age

Define tp monitor, There is no commonly accepted meaning for a TP monitor. ...

There is no commonly accepted meaning for a TP monitor. According to Jeri Edwards' a TP Monitor is "an OS for transaction processing".

Enumerate about the star topology, Enumerate about the Star networks C...

Enumerate about the Star networks Comments: 1 - If one connection/station fails the other devices aren't affected 2 - If central hub breaks down, the whole network fail

Connection oriented transport tcp - transport layer, Connection Oriented Tr...

Connection Oriented Transport TCP In addition  to providing  reliable communication transmission control protocols  effects errors  control flow  control  and resequencing of

Building routing tables, There are basically two functions for creating rou...

There are basically two functions for creating routing tables, which are as given: Manual entry Software Further there are two types for computing routing table inf

Show v.32 standard, Q. Show V.32 standard? - ITU-T's V.32 standard was ...

Q. Show V.32 standard? - ITU-T's V.32 standard was issued in 1991 for asynchronous and full-duplex operation at 14.4 Kbps. V.32bis - Is an extension of the V.32 technology?

Ajax, Ajax is a relatively new set of techniques that, in a sense, implemen...

Ajax is a relatively new set of techniques that, in a sense, implement some of the functionalities originally provided by RPC. Ajax is primarily used to build web applications with

Ppp authentication chap pap secret, As the system administrator, you type "...

As the system administrator, you type "ppp authentication chap pap secret". Name the authentication method is used first in setting up a session? Ans)  the authentication method

Reliable data transfer over a channel bit error rdt : 20, Reliable  data...

Reliable  data  transfer over a channel bit error  rdt : 20 A more realist model  of the underlying  channel  is one  in which  bits in packet may be  computed. Such  bit erro

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd