Please Whitelist This Site?
I know everyone hates ads. But please understand that I am providing premium content for free that takes hundreds of hours of time to research and write. I don't want to go to a pay-only model like some sites, but when more and more people block ads, I end up working for free. And I have a family to support, just like you. :)
If you like The TCP/IP Guide, please consider the download version. It's priced very economically and you can read all of it in a convenient format without ads.
If you want to use this site for free, I'd be grateful if you could add the site to the whitelist for Adblock. To do so, just open the Adblock menu and select "Disable on tcpipguide.com". Or go to the Tools menu and select "Adblock Plus Preferences...". Then click "Add Filter..." at the bottom, and add this string: "@@||tcpipguide.com^$document". Then just click OK.
Thanks for your understanding!
Sincerely, Charles Kozierok
Author and Publisher, The TCP/IP Guide
|
NOTE: Using software to mass-download the site degrades the server and is prohibited. If you want to read The TCP/IP Guide offline, please consider licensing it. Thank you.
|
|
|
|
Mobile IP Data Encapsulation and Tunneling
(Page 2 of 3)
Mobile IP Conventional Tunneling
Normally, the tunnel described above
is used only for datagrams that have been sent to the mobile node and
captured by the home agent. When the mobile nodes wants to send a datagram,
it doesn't tunnel it back to the home agent; this would be needlessly
inefficient. Instead it just sends out the datagram directly using whatever
router it can find on its current network, which may or may not be a
foreign agent. When it does this, it uses its own home address as the
source address for any requests it sends. As a result, any response
to those requests will go back to the home network. This sets up a triangle
of sorts for these kinds of transactions:
- The mobile node sends a request from
the foreign network to some third party device somewhere on the internetwork.
- The third party device responds back
to the mobile node. However, this sends the reply back to the mobile
node's home address on its home network.
- The home agent intercepts the response
on the home network and tunnels it back to the mobile node.
This process is illustrated in Figure 134.
The reverse transaction would be pretty much the same, just in the reverse
order. In that case the third party (Internet) device would send a request
to mobile node, which would be received and forwarded by the home agent.
The mobile node would reply back directly to the Internet host.
Figure 134: Mobile IP Encapsulation and Tunneling This example illustrates how a typical request/reply message exchange in Mobile IP results in a triangle of communication. In step #1, the mobile node sends a request to a remote server somewhere on the Internet. It uses its own home address as the source for this request, so in step #2 the reply goes back to the home agent. Step #3 consists of the home agent tunneling the reply back to the mobile node.
|
Key Concept: Once Mobile IP is set up and operational, it works by having the home agent encapsulate and tunnel received datagrams to the mobile node. The mobile device normally sends datagrams directly to Internet hosts, which respond back to the mobiles home agent which forwards those datagrams to the mobile node. This means a request/reply communication takes three transmissions. |
If you find The TCP/IP Guide useful, please consider making a small Paypal donation to help the site, using one of the buttons below. You can also donate a custom amount using the far right button (not less than $1 please, or PayPal gets most/all of your money!) In lieu of a larger donation, you may wish to consider purchasing a download license of The TCP/IP Guide. Thanks for your support! |
|
|
Home -
Table Of Contents - Contact Us
The TCP/IP Guide (http://www.TCPIPGuide.com)
Version 3.0 - Version Date: September 20, 2005
© Copyright 2001-2005 Charles M. Kozierok. All Rights Reserved.
Not responsible for any loss resulting from the use of this site.
|