EBK COMPUTER NETWORKING
EBK COMPUTER NETWORKING
7th Edition
ISBN: 8220102955479
Author: Ross
Publisher: PEARSON
Expert Solution & Answer
Book Icon
Chapter 7, Problem P14P

Explanation of Solution

Chaining used in direct routing:

As in the section 7.7.2, suppose the chaining is used in indirect routing via home agent, the following events would occur:

  • The node “A” will get the mobile node then “A” alerts the home agent that the mobile node currently visiting “A”. The datagram to the mobile is forwarded to the particular COA (care-of-address).
  • The mobile node is moved to the node “B”. The foreign agent at node “B” will alerts the foreign agent at node “A” and in node “A” the mobile node is no longer stayed, but in fact is resident in node “B” and that has the specified care-of-address in node “B”. Forward the datagrams by the foreign agent in node “A” and it receives that are addressed to the mobile care-of-address in node “A” to the mobile care-of-address in node “B”.
  • The mobile node is moved to the node “C”. The foreign agent at node “C” will alerts the foreign agent at node “B” and in node “b” the mobile node is no longer stayed, but in fact is resident in node “C” and that has the specified care-of-address in node “C”. Forward the datagrams by the foreign agent in node “B” and it receives that are addressed to the mobile care-of-address in node “B” to the mobile care-of-address in node “C”.

If the mobile node returns to the home agent or it goes offline, the datagram forwarding state must be maintained by the foreign agents in “A”, “B” and “C” are removed.

Chaining not used in direct routing:

Suppose the chaining is not used in indirect routing via home agent, the following events would occur:

  • The node “A” will get the mobile node then “A” alerts the home agent that the mobile node currently visiting “A”...

Blurred answer
Students have asked these similar questions
Consider a world on which each individual belongs to a family of six, each family resides in its own home, each house has a specific address and every person in a certain house is given a unique name.Assume that this world has a postal service providing letters from source to destination. The postal service needs (1) the letter to be in an envelope and (2)that the address (and nothing else) of the destination house be clearly shown on the envelope. Suppose each family has a delegated member who receives letters for the other family members and distributes them. The letters do not actually give the receivers of the letters a hint. a. Would the postal service.ever have to open the envelope and inspect the letter and include the service under your protocol?
Consider a world on which each individual belongs to a family of six, each family resides in its own home, each house has a specific address and every person in a certain house is given a unique name. Assume that this world has a postal service providing letters from source to destination. The postal service needs (1) the letter to be in an envelope and (2) that the address (and nothing else) of the destination house be clearly shown on the envelope. Suppose each family has a delegated member who receives letters for the other family members and distributes them. The letters do not actually give the receivers of the letters a hint. a. Define a procedure used by delegates to deliver letters from the transmitting family member to a receiving family member using the approach R1 above.
Electronic mail systems differ in the manner in which multiple recipients are handled. In some systems, the originating mail handler makes all the necessary copies, and these are sent out independently. An alternative approach is to determine the route for each destination first. Then a single message is sent out on a common portion of the route, and copies are made only when the routes diverge, and this process is referred to as ‘mail bagging’.   Leaving aside the considerations of security, discuss the relative advantages and disadvantages of two methods.   Discuss the security requirements and implications of the two methods.
Knowledge Booster
Background pattern image
Similar questions
SEE MORE QUESTIONS
Recommended textbooks for you
Text book image
Database System Concepts
Computer Science
ISBN:9780078022159
Author:Abraham Silberschatz Professor, Henry F. Korth, S. Sudarshan
Publisher:McGraw-Hill Education
Text book image
Starting Out with Python (4th Edition)
Computer Science
ISBN:9780134444321
Author:Tony Gaddis
Publisher:PEARSON
Text book image
Digital Fundamentals (11th Edition)
Computer Science
ISBN:9780132737968
Author:Thomas L. Floyd
Publisher:PEARSON
Text book image
C How to Program (8th Edition)
Computer Science
ISBN:9780133976892
Author:Paul J. Deitel, Harvey Deitel
Publisher:PEARSON
Text book image
Database Systems: Design, Implementation, & Manag...
Computer Science
ISBN:9781337627900
Author:Carlos Coronel, Steven Morris
Publisher:Cengage Learning
Text book image
Programmable Logic Controllers
Computer Science
ISBN:9780073373843
Author:Frank D. Petruzella
Publisher:McGraw-Hill Education