unit3 cs8601
unit3 cs8601
MOBILE NETWORK
LAYER
Mobile IP – DHCP – AdHoc– Proactive protocol-DSDV, Reactive
Routing Protocols – DSR, AODV , Hybrid routing –ZRP, Multicast
Routing- ODMRP, Vehicular Ad Hoc networks ( VANET) – MANET
Vs VANET – Security.
3.1 MOBILE IP
a) Agent Discovery
b) Registration
c) Tunneling & Encapsulation
b) Agent solicitation:
Rather than waiting for agent advertisements a MN can sent
out an agent solicitation.
This solicitation forces any agents on the link to immediately
send an agent advertisement.
If MN determines that it is connected to a foreign network,
then it obtains a COA.
Types of COA:
(i)Foreign Agent COA - The static IP address of a foreign
agent (FA) on a visited network
(ii) Co-located COA - Temporary IP address assigned to the
MN.
Represents the current position of the MN on the
Foreign network & can be used by only one MN at a
time.
A co-located care-of address can be obtained by
Dynamic Host Configuration Protocol (DHCP).
Steps:
1. MA (HA, FA) broadcast agent advertisement message at
regular intervals.
2. The MN receiving the agent advertisement message
observes whether the message is from its own HA &
determine whether it is on the home network or on the
foreign network.
3. If the MN does not wish to wait for the periodic
advertisement, it can send out agent solicitation message
that will be responded to by a MA.
After these steps of advertisements or solicitations the MN
can now receive a COA, either one for an FA or a co-located
COA. The MN knows its location (home network or foreign
network) and the capabilities of the agent.
The next step for the MN is the registration with the HA if the
MN is in a foreign network
3.1.4.2 REGISTRATION
If the MN discovers that it is on the home network, then it
operates normally without Mobile IP
If the MN has moved to a new network & obtain the COA
from a FA, then this address should be registered with the
HA.
Registration – A MN uses an authenticated registration
procedure to inform the HA of its COA.
Registration messages uses UDP Protocol.
Registration can be done in two different ways:
(i) Registration of the MN through FA
If the COA is at the FA;
MN sends its registration request containing the COA to the
FA which then forward the request to the HA.
Now HA will do the mobility binding containing the mobile
node’s home IP address and the current COA.
Then finally the HA Acknowledges via FA to MN.
ii) Directly with HA
5-6. The FA in turn updates its “Visitor list” & relays the reply to
the MN.
Mobility Binding Table:
Maintained on HA of MN.
Visitor List:
Maintained on FA.
Fig. IP encapsulation
Steps in Encapsulation:
1. When a HA receives a packet addressed to a MN, it
forwards the packet to the COA using IP -within -IP
encapsulation
2. Using IP -within -IP, the HA inserts a new IP header in front
of the IP header of any datagram.
3. Destination address is set to the COA.
4. Source address is set to the HA’s address.
5. After stripping out the 1st header, IP processes the
packet again.
There are different ways of performing the encapsulation.
They are:
1. IP-in-IP Encapsulation
2. Minimal Encapsulation
3. Generic Routing Encapsulation
(1)IP-in-IP Encapsulation:
This is the mandatory method for Mobile IP.
Full IP header added to the original IP packet.
The inner IP header source and destination address identify
the original sender and the receiver.
The new (outer) header contains HA address as source &
COA as destination.
(2)Minimal Encapsulation :
It is an optional method for mobile IP
In IP-in-IP several fields are redundant.
Minimal Encapsulation will remove these redundancy.
1. Binding request:
Any node that wants to know the current location of an MN
can send a binding request to the HA.
The HA can check if the MN has allowed broadcasting of its
current location.
2. Binding update:
This message sent by the HA to CNs reveals the current
location of an MN.
The message contains the fixed IP address of the MN and the
COA.
The binding update can request an acknowledgement
.
3. Binding acknowledgement: If requested, a node returns
this acknowledgement after receiving a binding update
message.
4. Binding warning: If a node decapsulates a packet for an MN,
but it is not the current FA for this MN, this node sends a binding
warning to the HA of the MN.Reverse tunneling is a tunneling
Infrastructured:
The MN can move while communicating
The BSs are fixed
As the node goes out of the range of a BS, it gets into
the range of another BS.
Infrastructureless or Mobile ad-hoc (MANET):
It follows dynamic topology where nodes may join and leave the
network at any time and the multi-hop routing may keep changing as
nodes join and depart from the network.
It does have very limited physical security, and thus increasing security
is a major concern.
Every node in the MANET can assist in routing of packets in the network.
Limited Bandwidth & Limited Power
– Pair of nodes can either communicate directly when they are in within the
range or can communicate via multi-hop communication.
2. Dynamic topologies :
– N/w topology can change unpredictably because of the mobility of
devices in MANET
– Rate of topology change depends on the speed of mobile movement
1) Limited bandwidth:
Limited bandwidth because of the effect of multiple access, fading, noise,
and interference conditions, etc.,
2) Dynamic topology:
Dynamic topology membership may disturb the trust relationship among
node.
3) Routing Overhead:
Unnecessary routing overhead since nodes often change their location
within network.
4) Hidden terminal problem:
The hidden terminal problem refers to the collision of packets at a
receiving node due to the simultaneous transmission of those nodes that
are not within the direct transmission range of the sender, but are within
the transmission range of the receiver.
5) Packet losses due to transmission errors:
Much higher packet loss due to factors such as increased collisions due
to the presence of hidden terminals, presence of interference, uni-
directional links, frequent path breaks due to mobility of nodes.
6) Mobility-induced route changes:
The network topology in an ad hoc wireless network is highly dynamic
due to the movement of nodes; hence an on-going session suffers
frequent path breaks. This situation often leads to frequent route
changes.
7) Battery constraints:
Devices used in these networks have restrictions on the power source in
order to maintain portability, size and weight of the device.
8) Security threats:
Brings new security challenges to the network design. As the wireless
medium is vulnerable to eavesdropping.
Maintain the global topology information in the form of tables at every node.
Sequence Number:
Each routing advertisement comes with a sequence number.
Within ad-hoc networks, advertisements may propagate along many
paths.
Sequence numbers help to apply the advertisements in correct order.
This avoid the loops in the network.
Damping:
Transient changes in topology that are of short duration should not
weaken the routing mechanisms.
Drawback:
Packet header size (Non Uniform Packet Size) grows when intermediate
node increases.
Flood of route requests may potentially reach all nodes in the network
AODV holds the desirable feature of DSR that routes are maintained only
between nodes which need to communicate.
Route is established only when it is required by a source node for transmitting data
packets
Make use of hop-by-hop routing, sequence numbers and beacons.
Steps:
1.The node that needs a route to a specific destination generates a route
request(RREQ).
2.The route request(RREQ) is forwarded by intermediate nodes which also
learn a reverse route from the source to themselves.
3.When the request reaches a node with route to destination, it generates a
route reply(RREP) containing the number of hops required to reach the
destination.
4.All nodes that participate in forwarding this reply to the source node
create a forward route to destination.
5. This route created from each node from source to destination is a hop- by-hop
route.
It is Hybrid Protocol
Based on the concept of zones.
A routing zone is defined for each node separately and zones of neighboring nodes
overlap.
The routing zone has a radius expressed in hops. i.e., Zone radius: Number of
hops
Key concept in ZRP to:
Use a proactive routing scheme within a limited zone
Use a reactive routing scheme for nodes beyond this zone.
Routing is divided into two parts:
Intrazone routing: 1st the packet is sent within the routing zone of the source
node to reach the peripheral nodes
Interzone routing: The packet is sent from the peripheral nodes towards the
destination node
In the diagram the routing zone of S includes the nodes A-I, but not K.
The nodes are divided into peripheral nodes and interior nodes.
Peripheral nodes: Nodes whose minimum distance is less than the radius.
Interior nodes - Nodes A-F
Peripheral nodes - Nodes G-J
Node K is outside the routing zone
Within the zone table driven is used
Outside the zone On demand Route Discovery is used
Procedure:
1. The source sends a Route Request packet (RREQ) to the border nodes of its zone,
containing its own address, destination address and the unique sequence no.
2. Each border nodes checks its local zone for the destination.
3. If the destination is not a member of local zone, then the border node adds its
own address to the route request packet and forwards the packet to its own border
nodes.
4. When the destination node is reached in this process, a route reply (RREP) is sent
on the reverse path back to the source.
5. The source saves the path which is mentioned in Route Reply to send data
packets to the destination.
The tree consists of root node(r), three intermediate nodes (p,s,t) and seven
group members.
For node u, the packet transmission is relayed through two tree links, that is, from
r to q and then q to u.
To maintain the tree structure even when nodes move, group members periodically
send Join Request message.
o Tree based protocols, may not perform well in the presence of highly mobile
nodes because multicast tree structure is fragile and needs to be frequently
readjusted.
o Each node in a mesh can have multiple parents.
o Multiple links exist and other links are immediately available when the primary
link is broken due to node mobility. This avoids frequent reconfigurations.
o Sending a Packet from R to U involves three transmissions(R,Q,U) & fourteen
receives(5 neighbors of R,6 neighbors of Q and 3 neighbors of U).
o For eg, the transmission from node Q is received not only by U but also be
neighbour nodes R,S,T,W and X; the redundant link from Q to W may be useful
when the path from P to W is broken
o Drawback of this scheme is that multiple copies of the same packet are forwarded
through the mesh.
Operation of ODMRP:
5. An intermediate node, receiving the JOINT TABLE, compares it's Node ID with the
entries of that table.
6. If there's a match, it is a member of the forwarding group. Then it sets FG- FLAG &
broadcasts its JOIN TABLE.
7. This process is going to create a mesh between all forwarding group members.
8. JOIN TABLE is propagated by each forwarding Group member until it reaches
source via a shortest path.
9. Routes from source to receivers builds a mesh of nodes called "Forwarding Group"
3.4 TYPES OF MANET
VANET - VEHICULAR AD HOC NETWORKS: Used for communication between vehicles and
roadside equipment.
The Vehicular Ad-Hoc Network, or VANET, is a technology that uses moves cars
as nodes in a network to create a mobile network.
The term VANET became mostly synonymous with the more generic term inter-
vehicle communication (IVC).
WORKING OF VANET
VANET turns every participating car into a wireless router or node, allowing cars
approximately 100 to 300 meters of each other to connect and, in turn, create a
network with a wide range.
As cars fall out of the signal range and drop out of the network, other cars can join in,
connecting vehicles to one another so that a mobile Internet is created.
It is estimated that the first systems that will integrate this technology are police and
fire vehicles to communicate with each other for safety purposes.
COMMUNICATION IN VANET
ARCHITECTURE OF VANET
Each node in VANET is equipped with two types of unit i.e. On Board
Unit(OBU) and Application Unit (AU). OBU has the communicational
capability whereas AU executes the program making OBU‘s communicational
capabilities. An RSU can be attached to the infrastructure network which is connected
to the Internet.
CHARACTERISTICS OF VANET
High Mobility: The nodes in VANETs usually are moving at high speed. This
makes harder to predict a node’s position and making protection of node
privacy
Rapidly changing network topology: Due to high node mobility and random
speed of vehicles, the position of node changes frequently. As a result of this,
network topology in VANETs tends to change frequently.
Unbounded network size: VANET can be implemented for one city, several
cities or for countries. This means that network size in VANET is
geographically unbounded.
Frequent exchange of information: The ad hoc nature of VANET motivates
the nodes to gather information from the other vehicles and road side units.
Hence the information exchange among node becomes frequent.
Wireless Communication: VANET is designed for the wireless environment.
Nodes are connected and exchange their information via wireless. Therefore
some security measure must be considered in communication.
Time Critical: The information in VANET must be delivered to the nodes with
in time limit so that a decision can be made by the node and perform action
accordingly.
APPLICATIONS OF VANET
These applications are used to increase the safety on the roads. These applications can
be further categorized in following way.
Collision Avoidance: If a driver gets a warning message on time then the collision
can be avoided.
Cooperative Driving: Drivers can get traffic related warning signals & these
signals can co-operate the driver for an uninterrupted and safe driving.
Traffic optimization: Traffic can optimized by the use of sending signals like
jam, accidents etc. to the vehicles so that they can choose their alternate path and
can save time.
User Based Application:
These applications provide the user infotainment. A VANET can be utilized to
provide following services for the user apart from safety:
Peer to peer application: These application are useful to provide services like
sharing music, movies etc. among the vehicles in the network.
Internet Connectivity: People always want to connect with the Internet all the
time. Hence VANET provides the constant connectivity of the Internet to the
users.
Other services: VANET can be utilized in other user based application such as
payment service to collect the tall taxes, to locate the fuel station, restaurant etc.
Network Management: Due to high mobility, the network topology and channel
condition change rapidly.
Congestion and Collision Control: The unbounded network size also creates a
challenge. The traffic load is low in rural areas and night in even urban areas. In
rush hours the traffic load is very high and hence network is congested and
collision occurs in the network.
Environmental Impact: VANETs use the electromagnetic waves for
communication. These waves are affected by the environment.
MAC Design: VANET generally use the shared medium to communicate hence
the MAC design is the key issue.
Security: As VANET provides the road safety applications which are life critical
therefore security of these messages must be satisfied
Low power RF transmission: It if possible for a malicious node having high power
RF transmission capability to continuously transmit & monopolize the medium &
cause its neighboring nodes or the entire targeted MANET to wait endlessly for
transmitting their messages. Also signal jamming can lead to denial-of-service(DOS)
attack.
Limited power supply: Since nodes normally rely on battery power, an attacker
might attempt to exhaust batteries by causing unnecessary transmissions to take
place at the targeted node or might cause excessive computations to be carried out
by the targeted nodes.
Real time Constraint: VANET is time critical where safety related message
should be delivered with 100ms transmission delay. So to achieve real time
constraint, fast cryptographic algorithm should be used. Message and entity
authentication must be done in time.
Low tolerance for error: Some protocols are designed on the basis of probability.
VANET uses life critical information on which action is performed in very short
time. A small error in probabilistic algorithm may cause harm.
MANET Vs VANET
MANET VANET
Collection of mobile nodes that Nodes(vehicles) can communicate
communicate with each other over with certain roadside infrastructures
bandwidth constrained wireless links or base stations.
without any infrastructure support.
Route Reply can be sent by reversing the route in Route Request (RREQ) only if links are
guaranteed to be bi-directional. If Unidirectional (asymmetric) links are allowed, then RREP
may need a route discovery from S to D. Node S on receiving RREP, caches the route
included in the RREP. When node S sends a data packet to D, the entire route is included in
the packet header { hence the name source routing}. Intermediate nodes use the source
route included in a packet to determine to whom a packet should be forwarded.
J sends a route error to S along route J-F-E-S when its attempt to forward the data packet S
(with route SEFJD) on J-D fails. Node shearing RERR update their route cache to remove link
J-D
Advantages of DSR:
Routes maintained only between nodes who need to communicate-- reduces overhead of
route maintenance
Route caching can further reduce route discovery overhead
Asingleroutediscoverymayyieldmanyroutestothedestination,duetointermediate nodes
replying from local caches
Disadvantages of DSR:
Packet header size grows with route length due to source routing
Flood of route requests may potentially reach all nodes in the network
Care must be taken to avoid collisions between route requests propagated by
neighboring nodes—insertion of random delays before forwarding RREQ
Increased contention if too many route replies come back due to nodes replying using
their local cache-- Route Reply Storm problem. Reply storm may be eased by preventing a
node from sending RREP if it hears another RREP with a shorter route
An intermediate node may send Route Reply using a stale cached route, thus polluting other
caches
An optimization for DSR can be done called as Route Caching. Each node caches a new route
it learns by any means. In the above example, When node S finds route [S,E,F,J,D] to
node D, node S also learns route [S,E,F] to node F. When node K receives Route Request
[S,C,G] destined for node, node K learns route [K,G,C,S] to node S. When node F forwards
Route Reply RREP [S,E,F,J,D], node F learns route[F,J,D]to node D. When node E forwards
Data[S,E,F,J,D] it learns route [E,F,J,D] to node D. A node may also learn a route when it
overhears Data packets. Usage of Route cache can speed up route discovery and can also
reduce propagation of route
requests. The disadvantages are, stale caches can adversely affect performance. With passage of time
and host mobility, cached routes may become invalid.
Ad Hoc On-Demand Distance Vector Routing (AODV)
AODV is another reactive protocol as it reacts to changes and maintains only the active
routes in the caches or tables for a pre-specified expiration time. Distance vector means a
set of distant nodes, which defines the path to destination. AODV can be considered as a
descendant of DSR and DSDV algorithms. It uses the same route discovery mechanism used
by DSR. DSR includes source routes in packet headers and resulting large headers can
sometimes degrade performance, particularly when data contents of a packet are small. AODV
attempts to improve on DSR by maintaining routing tables at the nodes, so that data packets
do not have to contain routes. AODV retains the desirable feature of DSR that routes are
maintained only between nodes which need to communicate. However, as opposed to DSR,
which uses source routing, AODV uses hop-by-hop routing by maintaining routing table
entries at intermediate nodes.
Route Discovery. The route discovery process is initiated when a source needs a route to
a destination and it does not have a route in its routing table. To initiate route discovery,
the source floods the network with a RREQ packet specifying the destination for which
the route is requested. When a node receives an RREQ packet, it checks to see whether it is
the destination or whether it has a route to the destination. If either case is true, the node
generates an RREP packet, which is sent back to the source along the reverse path. Each
node along the reverse path sets up a forward pointer to the node it received the RREP
from. This sets up a forward path from the source to the destination. If the node is not the
destination and does not have a route to the destination, it rebroadcasts the RREQ packet.
At intermediate nodes duplicate RREQ packets are discarded. When the source node receives
the first RREP, it can begin sending data to the destination. To determine the relative
degree out-of- datedness of routes, each entry in the node routing table and all RREQ and
RREP packets are tagged with a destination sequence number. A larger destination
sequence number indicates a more current (or more recent) route. Upon receiving an RREQ
or RREP packet, a node updates its routing information to set up the reverse or forward path,
respectively, only if the route contained in the RREQ or RREP packet is more current
than its own route.
Route Maintenance. When a node detects a broken link while attempting to forward a
packet to the next hop, it generates a RERR packet that is sent to all sources using the broken
link. The RERR packet erases all routes using the link along the way. If a source receives a
RERR packet and a route to the destination is still required, it initiates a new route
discovery process. Routes are also deleted from the routing table if they are unused for
a certain amount of time.
An intermediate node (not the destination) may also send a Route Reply (RREP) provided
that it knows a more recent path than the one previously known to sender S. To
determine whether the path known to an intermediate node is more recent, destination
sequence numbers are used. The likelihood that an intermediate node will send a Route
Reply when using AODV is not as high as DSR. A new Route Request by node S for a
destination is assigned a higher destination sequence number. An intermediate node
which knows a route, but with a smaller sequence number, cannot send Route Reply
Sequence numbers are used in AODV to avoid using old/broken routes and to determine
which route is newer. Also, it prevents formation of loops.
Assume that A does not know about failure of link C-D because RERR sent by C is lost.
Now C performs a route discovery for D. Node A receives the RREQ (say, via path C-E-A)
Node A will reply since A knows a route to D via node B resulting in a loop (for instance, C-
E-A-B-C )
Neighboring nodes periodically exchange hello message and absence of hello message
indicates a link failure. When node X is unable to forward packet P (from node S to
node D) on link (X, Y), it generates a RERR message.
Node X increments the destination sequence number for D cached at node X. The
incremented sequence number N is included in the RERR. When node S receives the
RERR, it initiates a new route discovery for D using destination sequence number at least
as large as N.
When node D receives the route request with destination sequence number N, node D
will set its sequence number to N, unless it is already larger than N.
14. Upon receiving, destination sends route reply by setting a sequence number(shown in
pink)
Routing table now contains forward route to the destination. Route reply follows reverse route
back to the source.
The route reply sets the forward table entries on its way back to the source.
Once the route reply reaches the source, it adopts the destination sequence number. Traffic
flows
alongtheforwardroute.Forwardrouteisrefreshedandthereverseroutesgettimedout.Suppose
there has been a failure in one of the links. The node sends a return error message to the source
with incrementing the sequence number.
Once the source receives the route error, it re-initiates the route discovery process.
A routing table entry maintaining a reverse path is purged after a timeout interval.
Timeout should be long enough to allow RREP to come back. A routing table entry
maintaining a forward path is purged if not used for a active route timeout interval. If no
data is being sent using a particular routing table entry, that entry will be deleted from
the routing table (even if the route may actually still be valid).
Cluster-head Gateway Switch Routing (CGSR)
Disadvantages:
The same disadvantage common to all hierarchal algorithms related to cluster formation and
maintenance.
Hierarchal State Routing (HSR)
A hierarchal link state routing protocol that solves the location management problem found in
MMWN by using the logical subnets. A logical subnet is a group of nodes that have common
characteristics (e.g. the subnet of students, the subnet of profs , employees etc. ). Nodes of the same
subnet do not have to be close to each other in the physical distance.
HSR procedure:
1. Based on the physical distance, nodes are grouped into clusters that are supervised by
cluster- heads. There are more than one level of clustering.
2. Every node has two addresses :
I. A hierarchal-ID ,(HID), composed of the node’s MAC address prefixed by the
IDs of its parent clusters.
II. A logical address in the form <subnet, host>.
3. Every logical subnet has a home agent, i.e. a node that keeps track of the HID of all
members of that subnet.
4. The HIDs of the home agents are known to all the cluster-heads, and the cluster-head
can translate the subnet part of the node’s logical address to the HID of the
corresponding home agent.
5. when a node moves to a new cluster, the head of the cluster detects it and informs the
node’s home agents about node’s new HID.
6. When a home agent moves to a new cluster, the head of the cluster detects it and
informs all other cluster-heads about the home agent’s new HID.
To start a session:
1. The source node informs its cluster-head about the logical address of the destination node.
2. The cluster-head looks up the HID of the destination node’s home agent and uses
it to send query to the home agent asking about the destination‘s HID.
3. After knowing the destination’s HID, the cluster-head uses its topology map to find
a route to the destination’s cluster-head.
Disadvantages: cluster formation and maintenance.