Explain dynamic key management mechanism, Computer Networking

Assignment Help:

Question:

a) Consider the following MIP scenario.

915_Why is a dynamic key management mechanism.png


Quite a few enterprise networks use private addresses and NAPT for the communication to the Internet.

i. Discuss the impact of NAPT on MIP for a scenario when the FA and the MN are situated behind a NAPT and the HA in the ‘public' network part.

ii. Which are the potential messages that could be affected?

iii. Propose a solution?

b) Assuming the communication between the MN and the HA in the figure in a) is protected via IPsec in the tunnel mode, tabulate corresponding Policy Database and the Security Association Database.

c) Why is a dynamic key management mechanism in the context of MIP and IPsec essential?

d) Redesign the network topology above in a) to show how the AAA server and the Radius / Diameter protocols could be a solution to c).


Related Discussions:- Explain dynamic key management mechanism

Describe the tcp/ip reference model, Computer Networks 1. Differentiate...

Computer Networks 1. Differentiate WAN and LAN. 2. Describe the TCP/IP Reference Model with diagram. 3. Explain Circuit switching and message switching. 4. List the fu

Classes and dotted decimal notation, The relationship between dotted decima...

The relationship between dotted decimal notation and classes is shown as follows. In class A the three octets managed to a host suffix. In class B the last most two octets ar

Describe in detail how rsvp actually works, Normal 0 false fa...

Normal 0 false false false EN-IN X-NONE X-NONE MicrosoftInternetExplorer4

Output port - network layer and routing , Output Port The function of t...

Output Port The function of the  port is  take  the packets that have  been stored in the out  put port  memory and transmits them over the out going  link. The queuing  and bu

What is sap, What is SAP? Series of interface points that permit other ...

What is SAP? Series of interface points that permit other computers to interact with the other layers of network protocol stack is known as SAP.

Design a logical lan topology- ccna, Design a Logical LAN Topology Step...

Design a Logical LAN Topology Step: Design an IP addressing scheme. Given the IP address block of 192.168.7.0 /24, design an IP addressing scheme that states the following r

Performance metrics of networks, The performance of interconnection network...

The performance of interconnection networks is measured on the below parameters.  1) Bandwidth: It determines maximum transfer rate between any two nodes.  It is measured in MB

Type of failures and bathtub curve, AILURES AND BATHTUB CURVE The life ...

AILURES AND BATHTUB CURVE The life of a component system can be grouped into three different phases typical curve depicting these three is called the bathtub curve due to its s

Show the security policy as well integrated security, Q. Show the Security ...

Q. Show the Security Policy as well Integrated Security ? Security policy is on paper statement describing what assets are to be protected and why who is responsible and which

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd