Unit 3
Unit 3
MOBILE IP
AGENT DISCOVERY:
• It is used whenever mobile node is not in
home network
• Hence then we need to search for foreign
agent.
Agent Discovery methods:
• Agent Advertisement
• Agent Solicitation.
Agent advertisement
Functions:
• It allows the MN to find whether an agent is
its HA or a FA.
• If it is FA then get the COA.
• Generally the foreign agent and home agents
advertise their presence through periodic
agent advertisement messages.
• Agent solicitation:
– In case of MN does not receive any COA, then the
MN should send an agent solicitation message.
– MN can send upto 3 solicitation messages (one
per second) when it enters a new network.
Types of COA:
– Foreign Agent COA - The IP address of a foreign
agent (FA) on a visited network
– Co-located COA - Temporary IP address assigned
to the MN.
REGISTRATION
– If the MN discovers that it is on the home
network, then it operates normally without
Mobile IP
– If the MN has moved to a new network & obtain
the COA from a FA, then this address should be
registered with the HA.
– Registration – A MN uses an authenticated
registration procedure to inform the HA of its
COA.
– Registration messages uses UDP Protocol.
TUNNELING AND ENCAPSULTION
• Tunneling (data transfer) – It is a process of
sending a packets via a tunnel.
• A tunnel establishes a virtual pipe for data
packets between a tunnel entry and a tunnel
endpoint.
Two primary functions:
• Encapsulation
• De-capsulation
OPTIMAIZATIONS(ROUTE OPTIMIZATION)
• One of the problem with the mobile IP -
"Triangular Routing“
• Triangular Routing:
– An inefficient behavior of a non- optimized mobile
IP
– The triangle is made of the three
• segments,
• CN to HA
• HA to COA/MN
• MN back to CN.
– Involves two IP routes - Causes unnecessary
network traffic overhead & higher latency
Reverse tunneling is a tunneling from mobile
host to home agent, and makes it possible for
the mobile host from foreign network to
communication in the network
DHCP: Dynamic Host Configuration Protocol
• Dynamic Host Configuration Protocol (DHCP) is a
network management protocol
• DHCP is used to merge the world of mobile phones
with the internet and to support mobility.
• Automatically assigns a unique IP address to each
device that connects to a network.
• There are many versions of DCHP are available for
use in IPV4 (Internet Protocol Version 4) and IPV6
(Internet Protocol Version 6).
• DHCP was developed based on “Bootstrap
Protocol” (BOOTP).
• BOOTP protocol used for booting the
computer from network
Problems in BOOTP protocol:
BOOTP protocol does not handle the mobility
- related issues when a host moves from one
network to another.
• There is no need to manually assign IP addresses to new
devices.
• Therefore, there is no requirement for any user configuration
to connect to a DHCP based network.
• DHCP can be implemented on local networks as well as large
enterprise networks.
• DHCP is the default protocol used by the most routers and
networking equipment.
DHCP is based on client server model
DHCP Initialization
Important mechanisms that are supported by DHCP
for IP address allocation are:
• Automatic Allocation
Here DHCP assigns a permanent IP address to a
particular client.
• Dynamic Allocation
Here DHCP assigns IP address to a client for a specific
period of time.
• Manual Allocation
Here, client IP address is assigned by the network
administrator, where the DHCP is used to inform the
address assigned to the client
Components of DHCP:
When working with DHCP, it is important to understand
the following components
• DHCP Server
• DHCP Client
• IP address pool
• Lease
• DHCP relay
Ad-hoc Network
🡺 An ad-hoc network is one that is spontaneously
formed when devices connect and communicate with
each other.
The wireless network without any wire is called an
ad-hoc network.
It does not have any fixed infrastructure
Types:
• MANET
• VANET
MOBILE AD-HOC NETWORK (MANET)
Types of wireless network:
• Infrastructured:
– The MN can move while communicating
– The BSs are fixed
-- As the node goes out of the range of a BS, it gets
into the range of another BS.
• Infra structure-less or Mobile ad-hoc
(MANET):
Disadvantages
– No sleeping nodes
– Overhead
REACTIVE PROTOCOLS (On Demand Routing
Protocols)
• They execute the path-finding process and
exchange routing information only when a
path is required by a node to communicate
with a destination.
• i.e., a route is discovered only when it is
necessary.
• Source initiates route discovery
2 step process
1. Route Discovery
2. Route Maintenance
Example:
1. Dynamic Source Routing (DSR)
2. Ad hoc On-demand Distance Vector (AODV)
DYNAMIC SOURCE ROUTING PROTOCOLS (DSR)
• DSR is a source initiated (reactive) routing
protocol for ad-hoc network
• On Demand Routing
• Designed to restrict the bandwidth consumed
by packets by eliminating the periodic
table-update messages.
• Each mobile node participating in the protocol
maintains a “routing cache” which contains
the list of all routes that the node has learnt
Working of DSR:
DSR works in 2 Phases
• Route Discovery
• Route Maintenance
The basic message set consists of:
– RREQ – Route request
– RREP – Route reply 🡺 Route Discovery
Drawback:
– Packet header size (Non Uniform Packet Size)
grows when intermediate node increases.
AD-HOC ON-DEMAND DISTANCE VECTOR
ROUTING (AODV)
• Based on Reactive method (establishes a route only
on –demand)
• It is almost similar to DSR
• When a source requires sending a message to a
destination and does not have a valid route to the
latter, the source initiates a route discovery process.
• Basic messages are:
– RREQ – Route request
– RREP – Route reply
DSR vs AODV:
– Major problem of DSR is its non-uniform packet size
because it includes source routes in its packet header which
degrades the performance. If a packet is large, it has to be
split into smaller packets.
– The packet size in AODV is uniform unlike DSR.
– AODV attempts to improve on DSR by maintaining routing
tables at the nodes, so that data packets do not have to
contain routes.
– AODV holds the desirable feature of DSR that routes are
maintained only between nodes which need to
communicate.
Steps:
• The node that needs a route to a specific destination
generates a route request(RREQ).
• The route request(RREQ) is forwarded by intermediate
nodes which also learn a reverse route from the source to
themselves.
• When the request reaches a node with route to destination, it
generates a route reply(RREP) containing the number of
hops required to reach the destination.
• All nodes that participate in forwarding this reply to the
source node create a forward route to destination.
• This route created from each node from source to
destination is a hop- by-hop route.
Example: Suppose Node S needs a routing path
to Node D
– Node S creates a RREQ packet & broadcasts to its
neighbours. RREQ [Dest, seq no, source, seq no,
hop count]
Sequence number 🡺 Increased by 1
2. Node A rebroadcasts RREQ to all its neighbours.
3. Since, Node C known a route to Node D
• Node C creates a RREP & unicasts RREP to A.
• Set forward path in C's routing table.
4. Node A creates a RREP & unicasts RREP to S
5. Set forward path in A's routing table
6. Set forward path in S's routing table
HYBRID PROTOCOLS
• Combines the best features of both proactive & reactive
routing protocols.
• One of the most popular hybrid routing protocol is Zone
Routing Protocol (ZRP).
ZRP:
• It is Hybrid Protocol
• Based on the concept of zones.
• A routing zone is defined for each node separately and zones
of neighbouring nodes overlap.
• The routing zone has a radius expressed in hops.
i.e., Zone radius: Number of hops
The whole network is divided into different zones and then
the position of source and destination mobile node is
observed.
• Key concept in ZRP to:
– Use a proactive routing scheme within a limited zone
– Use a reactive routing scheme for nodes beyond this
zone.
Routing is divided into two parts:
• Intrazone routing: 1st the packet is sent within
the routing zone of the source node to reach the
peripheral nodes
• Interzone routing: The packet is sent from the
peripheral nodes towards the destination node
Working Procedure:
• The source sends a Route Request packet (RREQ) to the
border nodes of its zone, containing its
(i) own address
(ii) destination address.
• Each border nodes checks its local zone for the destination.
• If the destination is not a member of local zone, then the
border node adds its own address to the route request
packet and forwards the packet to its own border nodes.
• When the destination node is reached in this process, a route
reply (RREP) is sent on the reverse path back to the source.
• The source saves the path which is mentioned in Route Reply
to send data packets to the destination
MULTICAST ROUTING PROTOCOL
• Multicast is the delivery of a message to a
group of destination nodes in a single
transmission.
Multicast Protocols are
Tree based Protocol
Mesh based Protocol
Tree based Protocol
• This establishes a single path between any two nodes
in the multicast group.
• Minimum number of copies are sent along the
branches of the tree, so they are bandwidth efficient.
• When mobility increases, link failures trigger the
reconfiguration of the entire tree
• The complexity is to maintain the shared tree
Mesh Based Protocol
• This establishes a multiple path between source - receiver
pair.
• Example: ODMRP
• Tree based protocols, may not perform well in the presence of
highly mobile nodes because multicast tree structure is fragile
and needs to be frequently readjusted.
• Each node in a mesh can have multiple parents.
• Multiple links exist and other links are immediately available
when the primary link is broken due to node mobility. This
avoids frequent reconfigurations.
Drawback of this scheme is that multiple copies of the
same packet are forwarded through the mesh.
ON-DEMAND MULTICAST ROUTING PROTOCOL
(ODMRP)
• OMDRP creates route on demand, rather that creating routes
proactively.
• It helps to reduce network traffic.
• Supplies multiple route for one particular destination.
• To reduce the route delay, it sends the first data packet along
with the route discovery packet
• Similar to on-demand unicast routing protocols, ODMRP has
both a request phase and a reply phase.
Operation of ODMRP:
• A sender node wishing to send multicast packets periodically
floods a JOIN REQUEST to entire network.
• A Node receiving a non-duplicate JOIN REQUEST, stores the
upstream node ID (i.e. backward learning) into routing table &
rebroadcasts the packet.
• A multicast receiver getting the JOIN REQUEST creates
or updates the source entry in its member table.
• As long as valid entries in receiver's member table, JOIN
TABLE are broadcasted periodically
• An intermediate node, receiving the JOINT TABLE,
compares it's Node ID with the entries of that table.
• If there's a match, it is a member of the forwarding
group. Then it sets FG- FLAG & broadcasts its JOIN
TABLE.
• This process is going to create a mesh between all
forwarding group members.
• JOIN TABLE is propagated by each forwarding
Group member until it reaches source via a shortest
path.
• Routes from source to receivers builds a mesh of
nodes called "Forwarding Group"
Drawbacks:
🡺 Multicast routing is much more difficult to achieve
in MANET compared to any other network. This is due
to
• Host Mobility
• Nature of wireless environment
• Interference from noise
FEATURES OF MANET
• MANET can be formed without any
pre-existing infrastructure.
• Autonomous Terminal.
• It follows dynamic network topology.
• Every node in the MANET can assist in routing
of packets in the network.
• Multi hop Routing.
VANET: VEHICULAR AD-HOC
NETWORK
• The Vehicular Ad-Hoc Network, or VANET, is a technology
that uses moves cars as nodes in a network to create a mobile
network.
• Vehicular Ad Hoc Networks (VANETs) are created by
applying the principles of mobile ad-hoc network (MANETs) -
the spontaneous creation of a wireless network for data
exchange - to the domain of vehicles.
• They are a key component of Intelligent Transportation
System (ITS).
• The term VANET became mostly synonymous with the
more generic term inter-vehicle communication (IVC).
In ITS, each vehicle takes a role of sender, receiver and
router to broadcast information to the vehicular
network.
WORKING OF VANET
• VANET turns every participating car into a wireless
router or node, allowing cars approximately 100 to
300 meters of each other to connect and, in turn,
create a network with a wide range.
• As cars fall out of the signal range and drop out of the
network, other cars can join in, connecting vehicles to
one another so that a mobile Internet is created.
The main uses of VANET are:
• It can help drivers to get advance information and
warnings from a nearby environment via message
exchanges.
• It is estimated that the first systems that will integrate
this technology are police and fire vehicles to
communicate with each other for safety purposes.
COMMUNICATION IN VANET
Three types of communication are provided in the
VANET.
1. Pure wireless ad hoc network where vehicle to
vehicle without any support of infrastructure.
2. Vehicle to Infrastructure Communication (V2I)
3. Inter Infrastructure Communication
Vehicle to vehicle communication
Vehicle to Infrastructure Communication Inter Infrastructure Communication
ARCHITECTURE OF VANET
Each node in VANET is equipped with two
types of unit i.e.
On Board Unit(OBU) and
Application Unit (AU).
• OBU has the communicational capability
• whereas AU executes the program making
OBU‘s communicational capabilities.
TECHNOLOGY USED IN VANET
• To establish a VANET, IEEE has defined the
standard 802.16 (Wi-Max).
• Coverage area: 50 to 90 Kms.
CHARACTERISTICS OF VANET
• High Mobility
• Rapidly changing network topology
• Unbounded network size
• Frequent exchange of information
• Wireless Communication
APPLICATIONS OF VANET
Safety Related Application:
These applications are used to increase the safety on the
roads. These applications can be further categorized in
following way.
• Collision Avoidance
• Cooperative Driving
• Traffic optimization
User Based Application:
These applications provide the user infotainment. A VANET
can be utilized to provide following services for the user apart
from safety:
• Peer to peer application
• Internet Connectivity
• Other services
MANET VANET
Collection of mobile nodes that Nodes(vehicles) can communicate with
communicate with each other over certain roadside infrastructures or base
bandwidth constrained wireless links stations.
without any infrastructure support.
The node movement is more random in The node mobility is constrained to the
nature road topologies.