Руководство Администратора для Cisco Cisco Packet Data Gateway (PDG)
HA Overview
Network Deployment Configurations ▀
Cisco ASR 5x00 Home Agent Administration Guide ▄
25
Figure 2.
Co-located PDSN/FA and HA Configuration Example
It should be noted that all interfaces defined within the 3GPP2 standards for 1x deployments exist in this configuration
as they are described in the two previous sections. This configuration can support communications to external, or
standalone, HAs and/or PDSNs/FAs using all prescribed standards.
as they are described in the two previous sections. This configuration can support communications to external, or
standalone, HAs and/or PDSNs/FAs using all prescribed standards.
Mobile IP Tunneling Methods
Tunneling by itself is a technology that enables one network to send its data via another network's connections.
Tunneling works by encapsulating a network protocol within a packet, carried by the second network. Tunneling is also
called encapsulation. Service providers typically use tunneling for two purposes; first, to transport otherwise un-routable
packets across the IP network and second, to provide data separation for Virtual Private Networking (VPN) services. In
Mobile IP, tunnels are used to transport data packets between the FA and HA.
Tunneling works by encapsulating a network protocol within a packet, carried by the second network. Tunneling is also
called encapsulation. Service providers typically use tunneling for two purposes; first, to transport otherwise un-routable
packets across the IP network and second, to provide data separation for Virtual Private Networking (VPN) services. In
Mobile IP, tunnels are used to transport data packets between the FA and HA.
The system supports the following tunneling protocols, as defined in the IS-835-A specification and the relevant
Request For Comments (RFCs) for Mobile IP:
Request For Comments (RFCs) for Mobile IP:
IP in IP tunnels
IP in IP tunnels basically encapsulate one IP packet within another using a simple encapsulation technique. To
encapsulate an IP datagram using IP in IP encapsulation, an outer IP header is inserted before the datagram's existing IP
header. Between them are other headers for the path, such as security headers specific to the tunnel configuration. Each
header chains to the next using IP Protocol values. The outer IP header Source and Destination identify the “endpoints”
of the tunnel. The inner IP header Source and Destination identify the original sender and recipient of the datagram,
encapsulate an IP datagram using IP in IP encapsulation, an outer IP header is inserted before the datagram's existing IP
header. Between them are other headers for the path, such as security headers specific to the tunnel configuration. Each
header chains to the next using IP Protocol values. The outer IP header Source and Destination identify the “endpoints”
of the tunnel. The inner IP header Source and Destination identify the original sender and recipient of the datagram,