We are building EduLadder(ELADR) - Protocol

The Eladr Protocol is a decentralized, security and efficiency enhanced Web3 noSQL database powered by IPFS as the data storage layer https://ipfs.io/, and the Cardano block chain as the rewards token platform, https://cardano.org/. It provides a JSON based, IPFS layer 2 solution for data indexing and retrieval in an 'append only' file system built with open source Node.js API libraries.

The ELADR token was designed to incentivize and reward community members as a proof of contribution. Token holders are also granted access to EduLadder.com premium features as well as associated ELADR token enabled apps.


Real Problems! Real Experts!

Join Our Telegram Channel !

The Eduladder is a community of students, teachers, and programmers. We help you to solve your academic and programming questions fast.
In eduladder you can Ask,Answer,Listen,Earn and Download Questions and Question papers.
Watch related videos of your favorite subject.
Connect with students from different parts of the world.
Apply or Post Jobs, Courses ,Internships and Volunteering opportunity. For FREE
See Our team
Wondering how we keep quality?
Got unsolved questions? Ask Questions

You are here:Open notes-->Seminar-topics-and-ppt-for-engineering-->Mobile-IP-for-Wireless-Devices

Mobile IP for Wireless Devices

How to study this subject

The convergence of three technology paradigms, viz. light-weight portable computers, the spread of wireless networks and services, and the ubiquitous Internet, aimed at allowing users the freedom to connect to the Internet at any time and in any place, to read email, query databases, retrieve information from the web or to entertain themselves, makes mobile computing a very promising prospect as well as a very formidable challenge. This paper details the mechanism of operation of Mobile IP network protocol, designed and developed to enable efficient and effective communication between a mobile host and a remote server. The paper then also looks at the efficiency versus effectiveness trade-off, the issues of network security against malicious masqueraders and other areas of current research interest.

A mobile node is assigned to a particular network known as its home network. Its IP address on that network, known as its home address, is static. When the mobile node moves its attachment point to another network, that is considered a foreign network for this host. When the mobile node is reattached, it makes its presence known by registering with a network node, typically a router, on the foreign network known as a foreign agent. The mobile node then communicates with a similar agent on the users home network, known as home agent, giving the home agent the care-of address of the mobile node ; the care-of address identifies the foreign agents location. Generally, one or more routers implement the roles of both home and foreign agents.

The exchange of IP datagrams between such a mobile node ,let us say A, and a sever S, takes place as the following sequence of events :

Server S transmits an IP datagram destined for mobile node A, with As home address in the IP header.The IP datagram is routed to As home netowrk.

At the home network, the incoming IP datagram is intercepted by the home agent.
The home agent encapsulates the entire datagram inside a new IP datagram, which has the As care-of address in the header, and retransmits the datagram. The use of an outer IP datagram with a different destination IP address is known as tunneling.

The foreign agent strips off the outer IP header, encapsulates the original IP datagram in a network-level Protocol Data Unit (PDU) (for example, a LAN Logical Link Control [LLC] frame), and delivers the original datagram to A across the foreign network.

When A sends IP traffic to S, it uses Ss IP address. In this example, this is a fixed address; that is, S is not a mobile node. Each IP datagram is sent by A to a router on the foreign network for routing to S.

The IP datagram from A to S travels directly across the Internet to S using Xs IP address.

To support these operations, Mobile IP includes three basic capabilities Discovery, Registration and Tunneling.

Official Notes

Add contents here

Notes from other sources

mobile ip.doc

Model question papers

Add contents here

Previous year question papers

Add contents here

Useful links

Add contents here



You might like this video:Watch more here

Watch more videos from this user Here

Learn how to upload a video over here