IT8602 MC UNIT 4 v1
IT8602 MC UNIT 4 v1
This document is confidential and intended solely for the educational purpose of
RMK Group of Educational Institutions. If you have received this document
through email in error, please notify the system manager. This document
contains proprietary information and is intended only to the respective group /
learning community as intended. If you are not the addressee you should not
disseminate, distribute or copy through e-mail. Please notify the sender
immediately by e-mail if you have received this document by mistake and delete
this document from your system. If you are not the intended recipient you are
notified that disclosing, copying, distributing or taking any action in reliance on
the contents of this information is strictly prohibited.
IT8602-MOBILE
COMMUNICATION
UNIT I
Department : Information Technology
Date : 02.05.2022
Table of Contents
S
CONTENTS PAGE NO
NO
1 Contents 5
2 Course Objectives 6
8
3 Pre Requisites (Course Names with Code)
5 Course Outcomes 12
7 Lecture Plan 16
9 Lecture Notes 20
Lecture Slides 78
Lecture Videos 80
10 Assignments 82
11 Part A (Q & A) 84
12 Part B Qs 91
COURSE OBJECTIVES
Understand the basic concepts of mobile computing
Understand Wireless LAN, Bluetooth and WiFi Technologies
Be familiar with the network protocol stack
Learn the basics of mobile telecommunication system
Be exposed to Ad-Hoc networks
Prerequisite
IT 8602 MOBILE COMMUNICATION
PREREQUISITE
CS 8591 Computer Networks
Syllabus
IT 8602 MOBILE COMMUNICATION
SYLLABUS 3003
UNIT I INTRODUCTION 9
CO PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10 PO11 PO12
CO1 3 2 2 - - - - - - - - -
CO2 3 3 2 - - - - - - - - -
CO3 2 2 1 - - - - - - - - -
CO4 3 3 1 - - - - - - - - -
CO5 3 3 1 - - - - - - - - -
CO – PSO MAPPING
CO1 2 - -
CO2 2 - -
CO3 2 - -
CO4 2 - -
CO5 3 1 -
No of Taxo Mode
S No Topics perio Actual Pertainin nom of
Proposed date
ds Lecture Date g CO y delivery
level
ICT
CO4
1 Mobile IP 2 07.04.2021 07.04.2021 K2 Tools
ICT
2 DHCP 1 09.04.2021 09.04.2021 CO4 K2
Tools
AdHoc–
Proactive
and ICT
3 1 12.04.2021 12.04.2021 CO4 K2
Reactive Tools
Routing
Protocols
Multicast ICT
4 1 12.04.2021 12.04.2021 CO4 K2
Routing- Tools
Vehicular
Ad Hoc ICT
5 1 19.04.2021 19.04.2021 CO4 K2
networks Tools
( VANET) –
MANET Vs
ICT
6 VANET – 1 19.04.2021 19.04.2021 CO4 K2
Tools
Security
ICT
7 Revision 1 20.04.2021 20.04.2021 CO4 K2 Tools
Activity Based Learning
ACTIVITY BASED LEARNING
(QUIZ)
Students were asked to prepare ‘Connexions Quiz’ for mobile technology terms
and standards
Link :
h t t p s : / / d r i v e . g o o g l e . c o m / d r i v e / f o l d e r s / 1 o b 2 7 N I Q y C N r g x Y 7 B d R-
TcSxQZHfmrEsm_e9g3fvyaxM7sXxJ4eqloid4ov9lXsKIwuQwTdgS?usp=sharing
Lecture Notes
4.1 Mobile IP
Motivation for Mobile IP
Routing
Ø based on IP destination address
Ø does not scale with the number of mobile hosts and frequent changes in the
location, security problems
Changing the IP-address?
Ø adjust the host IP address depending on the current location
Ø almost impossible to find a mobile system, DNS updates take to long time
TCP connections break, security problems.
The following defines several entities and terms needed as defined in mobile IP
(Figure 4.1).
Ø Mobile node (MN): A mobile node is an end-system or router that can change
its point of attachment to the internet using mobile IP. The MN keeps its IP
address and can continuously communicate with any other system in the internet
as long as link-layer connectivity is given.
21
Fig 4.1 Mobile IP - Entities and terminology
Home network: The home network is the subnet the MN belongs to with respect
to its IP address. No mobile IP support is needed within the home network.
Foreign network: The foreign network is the current subnet the MN visits and
which is not the home network.
Foreign agent (FA): The FA can provide several services to the MN during its
visit to the foreign network. The FA can have the COA (defined below),acting as
tunnel endpoint and forwarding packets to the MN. The FA can be the
default router for the MN. FAs can also provide security services because they
belong to the foreign network as opposed to the MN which is only visiting. For
mobile IP functioning, FAs are not necessarily needed. Typically, an FA is
implemented on a router for the subnet the MN attaches to.
Care-of address (COA): The COA defines the current location of the MN from an
IP point of view. All IP packets sent to the MN are delivered to the COA, not
directly to the IP address of the MN. Packet delivery toward the MN is done using a
tunnel. The COA marks the tunnel endpoint, i.e., the address where packets exit
the tunnel. There are two different possibilities for the location of the COA:
. 22
Ø Foreign agent COA: The COA could be located at the FA, i.e., the COA is an IP
address of the FA. The FA is the tunnel end-point and forwards packets to the MN.
Many MN using the FA can share this COA as common COA.
Home agent (HA): The HA provides several services for the MN and is located in
the home network. The tunnel for packets toward the MN starts at the HA. The
HA maintains a location registry, i.e., it is informed of the MN’s location by the
current COA. Three alternatives for the implementation of an HA exist.
Ø The HA can be implemented on a router that is responsible for the home network.
This is obviously the best position, because without optimizations to mobile IP, all
packets for the MN have to go through the router anyway.
Ø Finally, a home network is not necessary at all. The HA could be again on the
‘router’ but this time only acting as a manager for MNs belonging to a virtual
home network. All MNs are always in a foreign network with this solution.
Reference Video
Working of Mobile IP
23
4.1.2 IP packet delivery
Ø Figure 4.2 illustrates packet delivery to and from the MN using the example
network of Figure 4.1.
Ø CN does not need to know anything about the MN’s current location and sends the
packet as usual to the IP address of MN (step 1).
Ø The internet, not having information on the current location of MN, routes the
packet to the router responsible for the home network of MN. This is done using
the standard routing mechanisms of the internet.
Ø The HA now intercepts the packet, knowing that MN is currently not in its home
n e t w o r k . T h e p a c ke t i s n o t fo r wa rd e d i n t o t h e s u b n e t a s u s u a l , b u t
encapsulated and tunnelled to the COA.
Ø A new header is put in front of the old IP header showing the COA as new
destination and HA as source of the encapsulated packet (step 2).
Ø The foreign agent now decapsulates the packet, i.e., removes the additional
header, and forwards the original packet with CN as source and MN as destination
to the MN (step 3).
Ø Again, for the MN mobility is not visible. It receives the packet with the same
sender and receiver address as it would haved one in the home network.
24
4.1.3 Agent discovery
During call establishment it is necessary for a mobile node to determine its foreign
agent. This task is referred to as Agent Discovery.
The following two discovery methods are popularly used :
Ø Agent Advertisement
Ø Agent Solicitation.
1. Agent advertisement:
Ø Foreign agents and home agents advertise their presence periodically using
special agent advertisement messages. These advertisement messages can be
seen as a beacon broadcast into the subnet or these advertisements Internet
control message protocol (ICMP) messages are used with some mobility
extensions.
Ø The agent advertisement packet according to RFC 1256 with the extension for
mobility is shown in Figure 4.3. The upper part represents the ICMP packet while
the lower part is the extension needed for mobility.
25
Ø This extension for mobility has the following fields defined:
Ø type is set to 16
Ø Length depends on the number of COAs provided with the message and equals 6
+ 4*(number of addresses).
Ø An agent shows the total number of advertisements sent since initialization in the
sequence number.
Ø By the registration lifetime the agent can specify the maximum lifetime in
seconds a node can request during registration
Ø R bit (registration) shows, if a registration with this agent is required even when
using a co-located COA at the MN.
Ø If the agent is currently too busy to accept new registrations it can set the B bit.
Ø The following two bits denote if the agent offers services as a home agent (H) or
foreign agent (F) on the link where the advertisement has been sent.
Ø Bits M and G specify the method of encapsulation used for the tunnel.
Ø the field r at the same bit position is set to zero and must be ignored.
Ø The new field T indicates that reverse tunneling is supported by the FA. The
following fields contain the COAs advertised.
2.Agent solicitation
Ø If no agent advertisements are present or the inter-arrival time is too high, and an
MN has not received a COA, the mobile node must send agent solicitations.
Ø These solicitations are again based on RFC 1256 for router solicitations. Care must
be taken to ensure that these solicitation messages do not flood the network, but
basically an MN can search for an FA endlessly sending out solicitation messages.
26
Ø Typically, a mobile node can send out three solicitations, one per second, as soon
as it enters a new network. The basic purpose of the solicitation messages sent by
a MN is to search for a given FA.
Ø In highly dynamic wireless networks with moving MNs and probably with
applications requiring continuous packet streams even one second intervals
between solicitation messages might be too long.
Ø If a node does not receive an answer to its solicitations it must decrease the rate
of solicitations exponentially to avoid flooding the network until it reaches a
maximum interval between solicitations (typically one minute).
After these steps of advertisements or solicitations the MN can now receive a COA,
either one for an FA or a co-located COA.
1 Discovering Care-of-Address
Ø A mobile node (MN) listens for agent advertisement and then initiates registration.
Ø If responding agent is the home agent (HA), then mobile IP is not necessary
Ø After receiving the registration request from a MN, the HA acknowledges and
registration is complete.
27
Fig 4.4 – Schematic Model of Mobile IP
Ø HA intercepts all packets destined for MN
This is simple unless sending application is on or near the same network as
the MN.
HA masquerades as MN.
28
If a mobile node discovers that it is on the home network, it operates without any
mobility services. If the mobile node is on a new network, it registers with the
foreign agent by sending a Registration Request message which includes the
permanent IP address of the mobile host and the IP address of its home agent.
The foreign agent that receives the registration request message will in turn
perform the registration process on behalf of the mobile host by forwarding the
Registration Request containing the permanent IP address of the mobile node and
the IP address of the foreign agent to the home agent. When the home agent
receives the Registration Request, it updates the mobility binding by associating
the care-of-address of the mobile node with its home address. The home agent
then sends an acknowledgement to the foreign agent. The foreign agent in turn
updates its visitor list by inserting the entry for the mobile node and relays the
reply to the mobile node.
1. If the mobile node travels to a foreign network, it registers with the foreign agent
by sending a registration request messages which include the permanent IP
address of the mobile host and the IP address of its home agent.
2. The foreign agent in turn performs the registration process on behalf of the
mobile host by sending a Registration Request containing the permanent IP
address of the mobile node and the IP address of the foreign agent to the home
agent.
3. When the home agent receives the Registration request, it updates the mobility
binding by associating the COA of the MN with its home address.
5. The foreign agent in turn updates its visitors list by inserting the entry for the
mobile node and relays the reply to the mobile node.
29
Fig. 4.6 – IP Encapsulation
When a home agent receives a packet addressed to a mobile host, it forwards the
packet to the care-of address using IP-within-IP (Encapsulation), (above Fig)
Ø Using IP-within-IP, the home agent inserts a new IP header in from of the IP
header of any datagram.
A tunnel establishes a virtual pipe for data packets between a tunnel entry and a
tunnel endpoint. Packets entering a tunnel are forwarded inside the tunnel and
leave the tunnel unchanged. Tunneling, i.e., sending a packet through a tunnel, is
achieved by using encapsulation.
30
The HA takes the original packet with the MN as destination, puts it into the data
part of a new packet and sets the new IP header in such a way that the packet is
routed to the COA. The new header is also called the outer header for obvious
reasons. There is an inner header which can be identical to the original header
as this is the case for IP-in-IP encapsulation, or the inner header can be computed
during encapsulation.
Fields:
Ø Ver is 4 for IP version 4, internet header length (IHL) denotes the length of the
outer header in 32 bit words.
Ø The fields up to TTL have no special meaning for mobile IP and are set according
to RFC 791. TTL must be high enough so the packet can reach the tunnel
endpoint.
Ø IP checksum is calculated as usual. The next fields are the tunnel entry as
source address (the IP address of the HA) and the tunnel exit point as
destination address (the COA).
31
4.1.5 Route Optimization
In mobile IP all the data packets to the mobile node (MN) have to go through the
home agent (HA). Because of this there will be heavy traffic between HA and CN
in the network causing latency to increase.
Ø Binding Request: If a node wants to know the current location of a mobile node
(MN) it sends a request to home agent (HA)
Ø Binding Warning: If a node encapsulates a packet for a mobile node (MN) but it
is not the current foreign agent (FA) then this node sends a binding warning to
the home agent (HA) of mobile node (MN).
32
4.1.6 Desirable Features of Mobile IP
Ø Transparency: Mobility should remain “invisible” for many higher layer protocols
and applications.
Ø Security: All messages used to transmit information to another node about the
location of a mobile node must be authenticated to protect against remote
redirection attacks.
Ø The dynamic host configuration protocol is mainly used to simplify the installation
and maintenance of networked computers.
Ø If a new computer is connected to a network, DHCP can provide it with all the
necessary information for full system integration into the network, e.g., addresses
of a DNS server and the default router, the subnet mask, the domain name, and
an IP address.
33
Fig. 4.8 – Basic DHCP Configuration
Ø A typical initialization of a DHCP client is shown in the below Figure. The figure
shows one client and two servers.
Ø Two servers receive this broadcast and determine the configuration they can offer
to the client.
Ø Server will be the checking of available IP addresses and choosing one for the
client.
Ø Servers reply to the client‘s request with DHCPOFFER and offer a list of
configuration parameters.
Ø The client in turn replies to the servers, accepting one of the configurations and
rejecting the others using DHCPREQUEST.
Ø The server with the configuration accepted by the client now confirms the
configuration with DHCPACK.
34
Fig . 4.9 – Client Initialization wit DHCP
Ø Now the server can free the context stored for the client and offer the
configuration again.
Reference Video
Working of DHCP
35
4.3 MOBILE Ad Hoc Networks ( MANET)
Ø A mobile ad hoc network (MANET), also known as wireless ad hoc network
or ad hoc wireless network is a continuously self-configuring, infrastructure-
less network of mobile devices connected wirelessly. Each device in a MANET is
free to move independently in any direction, and will therefore change its links to
other devices frequently.
Ø Each node behaves as a router as they forward traffic to other specified node in
the network. MANET may operate as standalone fashion or they can be the part of
larger internet. They form highly dynamic autonomous topology with the presence
of one or multiple different transceivers between nodes. The main challenge for
the MANET is to equip each device to continuously maintain the information
required to properly route traffic. MANET peer-to-peer, self-forming, self-healing
network MANET’s circa 2000-2015 typically communicate at radio frequencies
(30MHz – 5 GHz). This can be used in road safety, ranging from sensors for
environment, home, health, disaster rescue operations, air/land/navy defense,
weapons, robots, etc.
36
Characteristics of MANET
Ø Autonomous Behavior: Each nodes can act as a host and router, which shows
its autonomous behavior.
Advantages of MANET
Ø Each nodes can play both the roles ie. of router and host showing autonomous
nature.
Ø Self configuring and self healing nodes, does not require human intervention.
37
Disadvantages of MANET
Ø Resources are limited due to various constraints like noise, interference conditions,
etc.
Applications of MANET
38
Ø Virtual Navigation: A remote database contains the graphical representation of
building, streets, and physical characteristics of a large metropolis. They may also
"virtually" see the internal layout of buildings, including an emergency rescue
plan, or find possible points of interest.
Ø Vehicular area network: This a growing and very useful application of adhoc
network in providing emergency services and other information. This is equally
effective in both urban and rural setup. The basic and exchange necessary data
that is beneficial in a given situation.
Reference Video
4.3.1.Routing
Ø Routing is the process of finding the best path for traffic in a network, or across
multiple networks. In a MANET, each node or device is expected to serve as a
router, and each router is indistinguishable from another in the sense that all
routers execute the same routing algorithm to compute paths through the entire
network.
Ø Selection of routers,
Ø And specific underlying characteristics that could serve as heuristics in finding the
path effectively.
39
Need for Routing
Ø Since centralized routing in a dynamic and even for small networks is impossible
therefore routing computation must be distributed.
Ø If any host demands for the route, they must have quick access.
Ø Each node should care about their destination node to its route and should not be
involved in frequent topology updates for those portions of the network that have no
traffic.
Ø Since broadcast can be time consuming for MANETs, it must be avoided as much as
possible.
Ø In routing there must have a backup route when the primary route has become stale.
Reference Video
Ø Route computation should not involve maintenance of a global state, or even significant
amounts of volatile nonlocal state. In particular, link state routing is not feasible due to
the enormous state propagation overhead when the network topology changes.
Ø As few nodes as possible must be involved in route computation and state propagation,
as this involves monitoring and updating at least some states in the network. On the
other hand, every host must have quick access to the routes on demand.
40
Ø Each node must care only about the routes to its destination and must not be
involved in frequent topology updates for those portions of the network that have
no traffic.
Ø If the topology stabilizes, then routes must converge to the optimal routes.
Ø It is desirable to have a backup route when the primary route has become stale
and is to be recomputed.
Ø Hybrid Protocols
Ø Proactive Routing Protocol is also called as table driven routing protocol. Each
node in the network maintains routing table ,storing information about routers to
every other node in the network. The tables are periodically updated. Since each
Node knows the entire topology a node itself can determine the best route
41
Advantage:
Ø The advantage of these protocols is that a source node does not need route-
discovery procedures to find a route to a destination node.
Disadvantage:
Ø Not suitable for large networks as the size of the routing table can be enormous
because each node maintains routing table.
Ø There are various types of Table Driven Protocols: Destination Sequenced Distance
Vector routing (DSDV), Wireless routing protocol (WRP), Fish eye State Routing
protocol (FSR), Optimized Link State Routing protocol (OLSR), Cluster Gateway
Switch Routing protocol (CGSR), Topology Dissemination Based on Reverse Path
Forwarding (TBRPF).
Ø Additions are made routing loops and count to infinity avoid suit MANET they
are (1) sequence number and (2) Damping.
42
Damping: Due to changes in topology due to mobility(movement) each nodes
waits for short duration before updating the new route. The waiting time depends
on the time between first and best path announcement to a destination node.
DSDV protocol for MANET generate lot of control traffic in the network, leading to
inefficient utilization of network resources. To overcome this problem DSDV uses
two types of route update packets Full Dump and New route Broadcast
Full Dump: Full dump packets are transmitted infrequently only if the node
experiences major occasional movement. The mobile nodes maintain a separate
additional table to store information about theses incremental routing packets
received from various nodes. This type of update packet contains only the
information that has changed since the latest full dump was sent out by
the node. Hence, incremental packets only consume a fraction of the network
resources compared to a full dump.
Ø Step-1: Each router(node) in the network collects route information from all its
neighbors.
Ø Step-2: After Gathering information, the node determines the shortest path to
destination based on gathered information.
Ø Step-4: The Router broadcasts this table to its neighbors. On receipt of this
information by neighbors, the neighbor nodes re compute their respective routing
table.
Ø Step-5: This process continues till the routing information becomes stable.
43
Fig- 4.11 An Example of MANET topology at a given instance of time T for
Node N4 acting as source
Ø The Metric Field in the routing table helps to determine the number of hops
required for a packet to traverse to its destination.
Ø The install field indicates when the entry was made. It is used to delete stale
entries from the table.
Advantages
Ø The availability of paths to all destinations in network always shows that less delay
is required in the path set up process.
44
Disadvantages
Ø DSDV requires a regular update of its routing tables, which uses up battery power
and a small amount of bandwidth even when the network is idle.
Ø When a node does not have any knowledge about any route to a specific
destination, it uses flooding technique.
Advantage
Ø The Dynamic Source Routing protocol (DSR) is a simple and efficient routing
protocol designed specifically for use in multi-hop wireless ad hoc networks of
mobile nodes.
45
Ø DSR allows the network to be completely self-organizing and self-configuring,
without the need for any existing network infrastructure or administration.
Ø In DSR protocol even when two packets may have the same source, they may
have different routes. For this reason, it is called dynamic source routing.
Ø Each mobile node in MANET maintains the route cache table information, which
contains list of all routes that the node has learnt.
q If a node has a packet to send, it attempts to use this cache to deliver the
packet.
q If the destination does not exist in the cache, then a route discovery phase is
initiated to discover a route to destination, by sending a route request.
q This request includes the destination address, source address and a unique
identification number.
Ø Route Discovery
Ø Route Maintenance
Route Discovery
Route discovery allows any host to dynamically discover route to any destination
in ad hoc network.
46
When a node has a packet to send it first checks its own routing cache. If it finds
a valid route in its own routing cache it sends out packet. Otherwise it initiates a
route discovery process by broadcasting a Route Request Packet (RREQ) to all
its neighbors.
The Route Request Packet contains the source address, request id and a route
record (sequence of hops)
Ø The Route Request packet initiates a Route Reply message (RREP). Either an
intermediate node that knows a route to destination or by destination node itself
will reply. The route information is piggy backed(copied) on the route reply
message, which contains the path information of communication and is sent from
destination to source. In figure for route reply .RREP message starts from
destination node N8 to source N1 as an acknowledgement of the accepted path
for transmission of packet.
47
Fig- 4.12 An Example of the propagation of route reply in DSR
Route Maintenance
Ø A known Route may get broken either due to movement of some nodes or low
battery. Whenever an intermediate node detects that one of its intermediate
nodes is not responding it sends back a route error message containing its own
address and address of next hop that is not working.
Ø Whenever a node finds a new route it adds the new route to its routing cache.
AODV uses routing tables to store routing information. The routing table stores
the following content.
DSR AODV
Dissimilarity In DSR the complete the route is stored No need to carry route information in
in packet headers. The large headers header of the packets sent. AODV
degrade performance. maintains routing table at each node.
Similarity If a link breaks, a route error message is In AODV also if a link breaks, a route
sent to the source node error message is sent to the source node
Dissimilarity In DSDV routes are maintained to all In AODV Routes are discovered and
destinations. maintained only between those nodes
that need to communicate.
Similarity If a link breaks, a route error message is In AODV also if a link breaks, a route
sent to the source node error message is sent to the source node
If a node wants to send a packet to some destination at first it checks its routing
table to determine whether it has a current route to the destination or not.
Ø The node that needs a route to a specific destination generates route request
message(RREQ). The route request is forwarded by intermediate nodes, which
learn a reverse route to source
Ø When the request reaches a node that knows the route to destination it generates
route reply (RREP)containing the number of hops to reach the destination.
BROADCAST ID
DESTINATION IP ADDRESS
DESTINATION SEQUENCE NO
SOURCE IP ADDRESS
SOURCE SEQUENCE NO
TIME STAMP
DESTINATION IP ADDRESS
DESTINATION SEQUENCE NO
SOURCE IP ADDRESS
LIFETIME
The sequence number helps to avoid forwarding the same packet more than once.
The source node can begin transmission upon receiving the first RREP.
50
Illustration of Route discovery in AODV
Node S- Source
Node D -Destination
Node A,B,C -Intermediate nodes
RREQ [ D's IP address, D's SeqNo,S's IP address, S'sSeqNo,hopcount]
RREO Represented shortly as [D,D'seq,S,S'seq,hopcount]
1) Node S, broadcasts RREQ to all its neighbours (in this example only A node).
3) Since node c knows the route to Destination node D ,Node C creates a route reply
packet and forwards to node A and stores the forward path in its routing table.
51
4) Now node A creates a RREP packet to S and stores forward path in its routing
table.
5) The forward path is set in node S's routing table and now data packet can be sent
from S to D.
52
Ø Assume link between C and D breaks
Advantage of AODV:
Ø Routes are established on demand saving battery life and using bandwidth easily.
Disadvantage of AODV:
Ø The intermediate nodes can lead to inconsistent routes if not updated properly.
Ø Most Hybrid protocols are zone-based where network is partitioned into zones.
53
4.6.1 Zone routing Protocol(ZRP)
Ø ZRP is a Hybrid protocol. Combines the best features of both proactive and
reactive routing protocol.
Ø Key concept employed in ZRP is to use proactive routing scheme with closer zone
and reactive routing scheme far away zones.
Ø A routing zone is similar to a cluster. However unlike clusters ,zones can overlap. A
routing zone contains few nodes within a few hops from central zone.
Ø With radius -1 zone ,table driven routing protocol is used. Where each node has
a route to all other nodes within the zone.
Advantage of ZRP:
Disadvantage of ZRP:
Ø ZRP uses an effective query control procedure, if it fails for some reason it
provides more overhead compared to other protocols.
54
4.7 MULTICAST ROUTING PROTOCOL
Meaning of Multicast
55
Tree-based Multicast Routing Protocols
Ø Tree based protocol establishes a single path between any two paths in multicast
group. Tree-based multicasting is a concept used in several wired multicast
protocols to achieve high multicast efficiency. There is only one path between a
source receiver pair in tree-based routing protocols.
56
Tree-based multicast protocols can be categorized into two types:
Ø source-tree-based multicast routing protocols.
Ø This scheme requires minimum number of copies to be sent along the branches of
the tree. Hence they are bandwidth efficient.
Ø It may incur very low overhead for a node to join or rejoin the session.
Ø When there are many sources ,a node either has to maintain a shared tree ,losing
path optimality or maintain multiple trees resulting in storage and control
overhead.
Ø This tree based protocols are not robust enough to operate in high mobility
environments.
57
The most popular tree based multicast protocol is MAODV
MAODV-Multicast Adhoc On-Demand Distance Vector Protocol
Ø The multicast group is identified by the multicast group address, and is associated
with group sequence numbers used for tracing the current group situation.
Ø Group members of the same multicast group compose a tree structure in MADOV.
Ø Non-group tree member : non-group tree member nodes that are not group
members must forward multicast information to group members.
Ø Group leader: When a node wants to join a multicast group that does not
currently exist in the network, that node becomes the multicast group leader. The
group leader is responsible for maintaining the multicast group sequence number
and the tree structure.
Ø All the nodes on the tree can be organized as upstream node or downstream node
from the view of the group leader. The group leader has no upstream node.
58
Ø Multicast Routing Table: An MADOV node keeps a multicast routing table for the
group tree structure. The multicast routing table entry contains fields such as:
multicast group address, multicast group leader address, multicast group
sequence number, hop count to multicast group leader, next hop information, and
lifetime.
Ø Next hops are based on flag value: If the flag is enabled, the next hop is actually
in the tree. The next hop with disabled flag means the node cannot be used for
forwarding or receiving any multicasting information.
Ø At every interior node in a multicast tree, the route entry for the multicast group
should have multiple next hops: one upstream node and at least one downstream
node.
Ø The group leader can only have downstream nodes A leaf node only has one next
hop: its upstream neighbor.
59
RREQ and RREP: A node sends a RREQ (Route Request Packet) message when it
wishes to join a multicast group or when it has data to send to a multicast group. If
the RREQ is for joining the group, a join flag is set in the RREQ (J-RREQ);
otherwise, the flag is unset. Anode can respond to the RREQ with RREP (Route
Reply Packet).
Ø Multicast protocols using mesh networks usually provide multi-path links to nodes
within a multicast group. The mesh-based protocols deliver more data packets as
compared to tree-based due to the presence of multiple paths.
60
Disadvantage of Mesh-based multicast protocol
Ø High storage overhead is incurred for each node due to several maintained data
structures.
Ø ODMRP is well suited for ad hoc wireless networks with mobile hosts where
bandwidth is limited, topology changes frequently and rapidly, and power is
constrained.
61
Ø Node: A device that implements IP.
Ø Join query: The special data packet sent by multicast sources to establish and
update group memberships and routes.
Ø Join reply: The table broadcasted by each multicast receiver and forwarding
node to establish and update group membership and routes
1. Routing Table:
Ø The node stores the source address and the next hop to the destination
Ø The routing table provides the next hop information when transmitting Join
Replies.
Ø In forwarding group table the multicast group ID and the time when the node was
last refreshed are recorded.
Ø When a node receives a new Join Query or data, it stores the source address
and the unique identifier of the packet.
62
Ø When a multicast source has packets to send but no route and group
membership is known, it floods a member advertising packet. This packet, called
"Join Query" and is periodically broadcasted to the entire network to refresh the
membership information and update the routes.
Ø When a node receives a Join Query packet, it stores the source address and the
unique identifier of the packet to its "Message Cache" to detect duplicates.
Ø If the Join Query packet is not a duplicate and the Time-To-Live value is greater
than zero, appropriate fields are updated
Ø When a Join Query packet reaches the multicast receiver, it creates "Join Reply"
message and propagates to its neighbors.
Ø When a node receives a Join Reply, the node realizes that it is on the path to the
source and thus is part of the forwarding group; it sets the FG_FLAG (Forwarding
Group Flag). It then broadcasts its own Join Reply.
Ø This process constructs (or updates) the routes from sources to receivers and
builds a mesh of nodes involving the forwarding group nodes.
Ø Nodes S1 and S2 are multicast sources, and nodesR1 and R2 are multicast
receivers. Node R2 sends its Join Reply to both S1 and S2. Each source S will
periodically MPR-floods JOIN QUERY message to the entire network. When a
forwarding group node F receives a JOIN QUERY, it chooses whether to refresh its
unicast route table and retransmit the message. The algorithm selects the newest
and shortest dual link as its route according to the value of QUERY_SEQ and
HOP_COUNT. When a group member R receives a JOIN QUERY, it adds S to its
Sender List. R periodically broadcasts the JOIN REPLY message.
Reference Video
Introduction to VANET
64
Fig: 4.22 – Vehicular Ad Hoc Network
Ø A VANET can help drivers to get advanced information warnings from a nearby
environment via messages reducing fatalities/injuries on the roads. For example
consider the figure below vehicles can be prevented from collision. The travelling
vehicles get advanced notification of collision ahead on road.
Ø The driver can also get advance information on road condition or warning about
sudden emergency by a vehicle ahead in the lane. Increase overall performance of
the transport systems by reducing travelling time and congestion.
65
Ø Provide comfort applications for travelers like ‘advanced ‘electronic payment
systems’ and ‘electronic toll collection’ etc.
Ø Drivers can have opportunity to engage in other leisurely tasks such as VOIP with
family, watch news highlights, listen to media files, carry some business activities
such as participating in video conferencing.
Ø Stringent Delay Constraints: VANETs are responsible for the delivery of critical
medical emergency messages. These messages must be delivered on time in
order to save human lives.
Ø Use of Other Technology: Most of the vehicles in VANET these days are
capable of integrating with other system like GPS etc.
66
Figure: 4.24– Vehicle to Vehicle communication and Vehicle to
Infrastructure communication
67
MANET Vs VANET
2 MANET cannot communicate with base station VANET cannot communicate with base
or other infrastructure. station or road-side infrastructure.
3 Movement of nodes in MANET are not Node Mobility in VANET is constraint
constraint to any topology are random in nature to road topologies
4 MANET undergoes topological changes much VANET undergoes heavy topological
less changes
5 In MANET Battery power is limited In VANET Battery power is quite
adequate comparatively
6 MANETs are small in size and less in speed. VANETs are large in size and work at
great speed relatively.
68
Characteristics of MANET(Mobile Adhoc Network) that leads
to several attacks are….
Ø Low power RF transmission –Due to which can monopolize the entire network
Causing signal jamming and DoS attack.
Ø Limited battery power –Attacker can bring the entire network down by exhausting
batteries.
A good security solution should ensure that the following characteristics are not
compromised…
The various attacks on MANET can be classified into passive and active attacks….
Passive Attacks: Passive attacks monitors and steals data exchanged in the
network, without disrupting the normal network operation. It is difficult to detect
such attacks as they do not show any symptoms. These attacks can be reduced
by encryption techniques.
Active Attacks:
Active attack is destructive and disturbs the normal functionality of the network.
69
Out of large varieties of attacks that are possible in MANET many fall under
routing attacks.
A malicious can be virus, worms, rabbit, trojan horse or spyware. In MANET the
attacker can propogate malicious code to slow down the nodes, or overload the
network or even crash the network.
The attacker can spoof the session ID of a node that has just started a session
and hijack the session from the victim node and perform DoS attack.
70
(6) Man -in -the Middle Attack:
Ø An Attacker might try to get a good node blacklisted, which futher causes other
nodes in the network to add this good node in the blacklist.
Ø In this type of attack, a attacking node can set up a route to any destination via
itself. When actual data packets are received by the attacking node ,the packets
are simply dropped. Such nodes forms a black hole to which data packets enter
but never leaves.
A special case of black hole attack is grey hole attack. In this attack the attacker
selectively drops some kinds of packets that pass through it but not others. For
Eg- Attacker might forward routing packets but not data packets This type of
attack is more difficult to detect compared to black hole attack.
Ø Jellyfish attack is somewhat different from Black-Hole & Gray-Hole attack. Instead
of blindly dropping the data packets, it delays them before finally delivering them.
It may even scramble the order of packets in which they are received and sends it
in random order
Ø In this attack a direct link(tunnel) is formed between two nodes. This link is
referred to as wormhole link. This tunnel or link is comparatively the shortest
route ,so nodes prefer to use it. Once a worm hole link is formed a malicious node
can use it for traffic analysis, eavesdropping or for making denial of service attack.
Ø The attacker partitions the network in such a way that one set of nodes is not
allowed to communicate with other set of nodes. It partitions the n/w in such a
way that it causes most harm to the system.
Reference Video
72
(16) Dropping Routing Traffic:
Ø It is essential in Adhoc network that all nodes participate in the routing process. A
attacking node may act selfishly and process only the routing information that is
related to itself. This behavior causes network instability and may sometimes
divide the network.
Ø Sybil attack manifests itself by faking multiple identities. So one single node can
assume the role of multiple nodes and can monitor or hamper multiple nodes at a
time.
In figure above, node M1 assumes identities of M2, M3, M4, and M5. So, to node B,
M1 is equivalent to those nodes.
73
4.8.1 SECURITY ATTACK COUNTER MEASURES
1.CRYPTOGRAPHIC TECHNIQUE:
Attacks can also be classified according to specific layer of ISO/OSI protocol stack.
Multilayer attacks are those that exploit the vulnerabilities existing at more than
one protocol layer. The below table shows few attacks that are subjected to each
layer and their counter measures.
Lecture Slides
https://docs.google.com/presentation/d/114J1T733_ySMGsodukpG
NO9VJYlMBxlxbb5Q46e9R1M/edit?usp=sharing
https://docs.google.com/presentation/d/1xTNBXaRlQtpArHCq5sFLN
Zi81dfxeHnKDn93HMvmxwg/edit?usp=sharing
https://docs.google.com/presentation/d/13vj423oc-
warXvE0Iq2qRjAmOTx-U0zXFbmYn_SSdrE/edit?usp=sharing
https://docs.google.com/presentation/d/1QuHndmFMo5Qs53Uben
ObSTZr9FLzJudLh41zLQgZhlg/edit?usp=sharing
Lecture Videos
Lecture Videos
Lecture Videos
https://drive.google.com/file/d/180Ga725GAJ_eEbik29JcnHLPw7-
_ROo0/view?usp=sharing
https://drive.google.com/file/d/1ww4v_6cUPqe1fe0cM-
4uxh10xwN26B2O/view?usp=sharing
https://drive.google.com/file/d/1VRmbCB-
drTQ14HHv4oIL6fzGyZ34JH2s/view?usp=sharing
https://drive.google.com/file/d/1UAi-
jjyA71UHeo93Lj22CgAm31tx7rWb/view?usp=sharing
Assignment
Assignment
Students were asked to prepare ‘Connexions Quiz’ for mobile
technology terms and standards
Part A Q & A
1.Define MANET. (CO4, K2)
• Ease of deployment
• Speed of deployment
•Large networks can have excessive latency (time delay), which affects some
applications
•Hidden terminals
•Routes changes
•Devices heterogeneity
84
Part B Q
PART – B
COURSERA
Emerging Technologies: From Smartphones to IoT to Big Data Specialization
https://www.coursera.org/specializations/emerging-technologies
Real life Applications in
day to day life and to
Industry
Real time Applications in day to day life and to Industry
Traffic:
Uber
Ola
Emergencies Situation:
Kaavalan App
Payment app
GPay
Amazon Pay
E-commerce
Amazon
Flipkart
Educational Apps
Coursera
Edwisely
Udemy
Content beyond
Syllabus
Contents beyond the Syllabus
SIAT
Proposed date : 23.04.2021
Actual date 23.04.2021
Prescribed Text books &
Reference books
PRESCRIBED TEXT BOOKS AND REFERENCE BOOKS
TEXT BOOKS
üJochen Schiller, ―Mobile Communications‖, PHI, Second Edition,
2003 [EBOOK -
https://drive.google.com/file/d/1f96Ynce0ErGUXb98_F028t-
wDWlb_f3P/view?usp=sharing ]
üPrasant Kumar Pattnaik, Rajib Mall, ―Fundamentals of Mobile
Computing‖, PHI Learning Pvt.Ltd, New Delhi – 2012
REFERENCE BOOKS
üDharma Prakash Agarval, Qing and An Zeng, "Introduction to
Wireless and Mobile systems",Thomson Asia Pvt Ltd, 2005.
üUwe Hansmann, Lothar Merk, Martin S. Nicklons and Thomas
Stober, ―Principles of Mobile Computing‖, Springer, 2003
üWilliam.C.Y.Lee,―Mobile Cellular Telecommunications-Analog and
Digital Systems‖, Second Edition,Tata Mc Graw Hill Edition ,2006
üC.K.Toh, ―AdHoc Mobile Wireless Networks‖, First Edition, Pearson
Education, 2002
üAndroid Developers : http://developer.android.com/index.html
üApple Developer : https://developer.apple.com/
üWindows Phone Dev Center : http://developer.windowsphone.com
üBlackBerry Developer : http://developer.blackberry.com
Mini Project
Suggestions
MINI PROJECT SUGGESTIONS
D i s c l a i m e r :
This document is confidential and intended solely for the educational purpose of RMK Group of
Educational Institutions. If you have received this document through email in error, please notify the
system manager. This document contains proprietary information and is intended only to the
respective group / learning community as intended. If you are not the addressee you should not
disseminate, distribute or copy through e-mail. Please notify the sender immediately by e-mail if you
have received this document by mistake and delete this document from your system. If you are not
the intended recipient you are notified that disclosing, copying, distributing or taking any action in
reliance on the contents of this information is strictly prohibited.