Explain dynamic key management mechanism, Computer Networking

Assignment Help:

Question:

a) Consider the following MIP scenario.

915_Why is a dynamic key management mechanism.png


Quite a few enterprise networks use private addresses and NAPT for the communication to the Internet.

i. Discuss the impact of NAPT on MIP for a scenario when the FA and the MN are situated behind a NAPT and the HA in the ‘public' network part.

ii. Which are the potential messages that could be affected?

iii. Propose a solution?

b) Assuming the communication between the MN and the HA in the figure in a) is protected via IPsec in the tunnel mode, tabulate corresponding Policy Database and the Security Association Database.

c) Why is a dynamic key management mechanism in the context of MIP and IPsec essential?

d) Redesign the network topology above in a) to show how the AAA server and the Radius / Diameter protocols could be a solution to c).


Related Discussions:- Explain dynamic key management mechanism

Nak free reliable data transfer protocol, Normal 0 false fal...

Normal 0 false false false EN-IN X-NONE X-NONE

What are triggers and rules, What are Triggers and Rules? Triggers are...

What are Triggers and Rules? Triggers are special user defined actions generally in the form of stored processes that are automatically invoked by the server based on data rel

Illustrate return to zero encoding, Q Illustrate Return to Zero encoding? ...

Q Illustrate Return to Zero encoding? - In NRZ-I long strings of 0s may still be a problem - May comprise synchronization as part of the signal for both 1s and 0s - How?

Define topologies other than basic topologies, What are the popular topolog...

What are the popular topologies other than basic Topologies? Apart from basic topologies some other topologies worth considering are: mesh topology (each device linked to all o

Shortest path - network layer and routing , Shortest path  The  dijkst...

Shortest path  The  dijkstra algorithms  four steps to discover what it called  the shortest path  tree . a.The algorithm  beings  to build  the tree identifying  its root.

What is network architecture, What is Network Architecture? When two o...

What is Network Architecture? When two or more computer are linked with one another for the purpose of communicating data electronically, besides physical connection of comput

What is forest, The term "forest" is used to explain a collection of AD dom...

The term "forest" is used to explain a collection of AD domains that share a one schema for the AD. All DC's in the forest share this schema and it is replicated in a hierarchical

Protocol software and ethernet wiring, PROTOCOL SOFTWARE AND ETHERNET WIRIN...

PROTOCOL SOFTWARE AND ETHERNET WIRING:  All wiring methods use identical Ethernet specifications. e.g. they need same message format. They need same CSMA/CD algorithems. They m

Stop service advertisements from flooding a network, To stop Service Adver...

To stop Service Advertisements (SAPs) from flooding a network, Cisco routers do not forward them. How are services advertised to other networks? Ans) Every router builds its own

Require class and how many different types of class exists, Why do we requi...

Why do we require class and how many different parts of class exists?

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd