m one network to another, the old foreign network withdraws its route as the new foreign network advertises the specific route to the mobile user. Take into consideration how routing information propagates in a distance-vector algorithm or inter-AS routing protocols like BGP. Also think about interdomain routing among networks that span the globe. Are datagrams routed immediately to the n

A+ Guide To It Technical Support
10th Edition
ISBN:9780357108291
Author:ANDREWS, Jean.
Publisher:ANDREWS, Jean.
Chapter8: Network Infrastructure And Troubleshooting
Section: Chapter Questions
Problem 8TC
icon
Related questions
Question

One approach that might be used in a mobile network architecture that would allow a datagram sent by the correspondent to reach a destination mobile device is to allow mobile users to maintain their IP addresses as they moved among foreign networks. The foreign network would advertise a highly specific route to the mobile user and use the existing routing infrastructure to propagate this information throughout the network. Scalability is a concern in this approach.

Suppose as the mobile user moves from one network to another, the old foreign network withdraws its route as the new foreign network advertises the specific route to the mobile user. Take into consideration how routing information propagates in a distance-vector algorithm or inter-AS routing protocols like BGP. Also think about interdomain routing among networks that span the globe.

  1. Are datagrams routed immediately to the new foreign network as soon as the foreign network begins advertising its route?   
  2. Would a situation ever occur where different routers think that different foreign networks contain the mobile user? Explain. 
  3. Describe over what time period other routers in the network will eventually learn the path to the mobile users that have moved to a new foreign network. 
Expert Solution
trending now

Trending now

This is a popular solution!

steps

Step by step

Solved in 2 steps

Blurred answer
Knowledge Booster
Types of Protocols
Learn more about
Need a deep-dive on the concept behind this application? Look no further. Learn more about this topic, computer-science and related others by exploring similar questions and additional content below.
Similar questions
  • SEE MORE QUESTIONS
Recommended textbooks for you
A+ Guide To It Technical Support
A+ Guide To It Technical Support
Computer Science
ISBN:
9780357108291
Author:
ANDREWS, Jean.
Publisher:
Cengage,
Systems Architecture
Systems Architecture
Computer Science
ISBN:
9781305080195
Author:
Stephen D. Burd
Publisher:
Cengage Learning
Principles of Information Security (MindTap Cours…
Principles of Information Security (MindTap Cours…
Computer Science
ISBN:
9781337102063
Author:
Michael E. Whitman, Herbert J. Mattord
Publisher:
Cengage Learning