MC Unit3
MC Unit3
com
UNIT III
3.1 MOBILE IP
Mobile IP is an Internet Engineering Task Force (IETF)
standard communications protocol that enhances the existing
IP to accommodate mobility.
Mobile IP allows mobile computers to stay connected to the
internet regardless of their location & without having to
continually change their IP address.
Every mobile user needs continuous network connectivity
irrespective of his physical location. The traditional IP does not
support user mobility.
Mobile IP was created by extending IP to enable users to keep
the same IP address while travelling to different networks.
Advantages of using Mobile IP :
It allows fast, continuous low‐cost access to corporate
networks in remote areas where there is no public telephone
system or cellular coverage.
It supports a wide range of applications from Internet access
and e‐mail to e‐commerce.
Users can be permanently connected to their Internet
provider and charged only for the data packets that are sent
and received
It can move from one type of medium to another without losing
connectivity
Disadvantage of Mobile IP:
Routing inefficiency problem caused by the “triangle routing”
formed by the home agent, correspondent host, and the
foreign agent.
b) Agent solicitation:
Rather than waiting for agent advertisements a MN can sen out
an agent solicitation.
This solicitation forces any agents on the link to immediately
send an agent advertisement.
If MN determines that it is connected to a foreign network, then
it obtains a COA.
Types of COA:
(i) Foreign Agent COA - The static IP address of a foreign agent
(FA) on a visited network
(ii) Co-located COA - Temporary IP address assigned to the
MN.
Represents the current position of the MN on the Foreign
network & can be used by only one MN at a time.
A co-located care-of address can be obtained by Dynamic
Host Configuration Protocol (DHCP).
Steps:
1. MA (HA, FA) broadcast agent advertisement message at regular
intervals.
2. The MN receiving the agent advertisement message observes
whether the message is from its own HA & determine whether
it is on the home network or on the foreign network.
3. If the MN does not wish to wait for the periodic advertisement,
it can send out agent solicitation message that will be
responded to by a MA.
After these steps of advertisements or solicitations the MN can
now receive a COA, either one for an FA or a co-located COA. The
MN knows its location (home network or foreign network) and
the capabilities of the agent.
The next step for the MN is the registration with the HA if the
MN is in a foreign network
3.1.4.2 REGISTRATION
If the MN discovers that it is on the home network, then it
operates normally without Mobile IP
7
If the MN has moved to a new network & obtain the COA from
a FA, then this address should be registered with the HA.
Registration – A MN uses an authenticated registration
procedure to inform the HA of its COA.
Registration messages uses UDP Protocol.
Registration can be done in two different ways:
(i) Registration of the MN through FA
10
Visitor List:
Maintained on FA.
Maps MN’s home address with its MAC address (address of
NIC) & HA’s address.
11
Fig. IP encapsulation
Steps in Encapsulation:
1. When a HA receives a packet addressed to a MN, it forwards
the packet to the COA using IP -within -IP encapsulation
2. Using IP -within -IP , the HA inserts a new IP header in front
of the IP header of any datagram.
3. Destination address is set to the COA.
4. Source address is set to the HA’s address.
5. After stripping out the 1st header, IP processes the packet
again.
There are different ways of performing the encapsulation. They
are:
1. IP-in-IP Encapsulation
2. Minimal Encapsulation
3. Generic Routing Encapsulation
(1) IP-in-IP Encapsulation:
This is the mandatory method for Mobile IP.
12
13
14
15
16
17
18
19
– Pair of nodes can either communicate directly when they are in within the
range or can communicate via multi-hop communication.
2. Dynamic topologies :
– n/w topology can change unpredictably because of the mobility of devices
in MANET
– Rate of topology change depends on the speed of mobile movement
3. Bandwidth constrained, variable capacity link:
– Wireless link have lower capacity compare to wired link
– Factors affecting Bandwidth: Noise, Interference…….
4. Energy constrained operation:
– Nodes depends on battery power
– Small battery – limited amount of energy
– Need more energy during Routing
– “Energy Conservation” – important objective of MANET routing protocol
5. Increased vulnerability:
– New type of security threats
– Increased the possibility of eavesdropping, spoofing, DOS attacks.
– Difficult to identify the attacker because:
• Devices keeps on moving
• Do not have global Identifier
1) Limited bandwidth:
Limited bandwidth because of the effect of multiple access, fading, noise,
and interference conditions, etc.,
2) Dynamic topology:
20
7) Battery constraints:
Devices used in these networks have restrictions on the power source in
order to maintain portability, size and weight of the device.
8) Security threats:
Brings new security challenges to the network design. As the wireless
medium is vulnerable to eavesdropping.
21
22
Procedure:
23
Flooding LSP – for example Router E sends its LSP on all its links and
routers D, B and C insert the LSP in their LSDB and forward it over their
other links.
24
Each router computes the spanning tree by using Dijkstra’s shortest path
algorithm
25
26
Maintain the global topology information in the form of tables at every node.
Sequence Number:
Each routing advertisement comes with a sequence number.
Within ad-hoc networks, advertisements may propagate along many
paths.
Sequence numbers help to apply the advertisements in correct order.
This avoid the loops in the network.
Damping:
Transient changes in topology that are of short duration should not
weaken the routing mechanisms.
Unstable changes in the topology are not forwarded
27
28
2 step process
Route Discovery
Route Maintenance
29
30
31
32
33
Combines the best features of both proactive & reactive routing protocols.
It is Hybrid Protocol
Based on the concept of zones.
The routing zone has a radius expressed in hops. i.e., Zone radius: Number
of hops
o Intrazone routing: 1st the packet is sent within the routing zone of
the source node to reach the peripheral nodes
In the diagram the routing zone of S includes the nodes A-I, but not K.
The nodes are divided into peripheral nodes and interior nodes.
Peripheral nodes: Nodes whose minimum distance is less than the radius.
34
35
o Drawback of this scheme is that multiple copies of the same packet are
forwarded through the mesh.
36
3. A multicast receiver getting the JOIN REQUEST creates or updates the source
entry in its member table.
4. As long as valid entries in receiver's member table, JOIN TABLE are
broadcasted periodically.
5. An intermediate node, receiving the JOINT TABLE, compares it's Node ID with
the entries of that table.
37
38
The term VANET became mostly synonymous with the more generic
term inter-vehicle communication (IVC).
WORKING OF VANET
VANET turns every participating car into a wireless router or node, allowing
cars approximately 100 to 300 meters of each other to connect and, in turn,
create a network with a wide range.
As cars fall out of the signal range and drop out of the network, other cars can
join in, connecting vehicles to one another so that a mobile Internet is created.
It is estimated that the first systems that will integrate this technology are police
and fire vehicles to communicate with each other for safety purposes.
COMMUNICATION IN VANET
39
ARCHITECTURE OF VANET
Each node in VANET is equipped with two types of unit i.e. On Board
Unit(OBU) and Application Unit (AU). OBU has the communicational
capability whereas AU executes the program making OBU‘s communicational
capabilities. An RSU can be attached to the infrastructure network which is
connected to the Internet.
CHARACTERISTICS OF VANET
High Mobility: The nodes in VANETs usually are moving at high speed.
This makes harder to predict a node’s position and making protection of
node privacy
40
APPLICATIONS OF VANET
These applications are used to increase the safety on the roads. These
applications can be further categorised in following way.
Cooperative Driving: Drivers can get traffic related warning signals & these
signals can co-operate the driver for an uninterrupted and safe driving.
Internet Connectivity: People always want to connect with the Internet all
the time. Hence VANET provides the constant connectivity of the Internet
to the users.
Other services: VANET can be utilised in other user based application such
as payment service to collect the tall taxes, to locate the fuel station,
restaurant etc.
Security: As VANET provides the road safety applications which are life
critical therefore security of these messages must be satisfied
42
Real time Constraint: VANET is time critical where safety related message
should be delivered with 100ms transmission delay. So to achieve real time
constraint, fast cryptographic algorithm should be used. Message and entity
authentication must be done in time.
Low tolerance for error: Some protocols are designed on the basis of
probability. VANET uses life critical information on which action is
performed in very short time. A small error in probabilistic algorithm may
cause harm.
MANET Vs VANET
43
MANET VANET
Collection of mobile nodes that Nodes(vehicles) can communicate
communicate with each other over with certain roadside infrastructures
bandwidth constrained wireless links or base stations.
without any infrastructure support.
The node movement is more random The node mobility is constrained to
in nature the road topologies.
Power is a major constrained The battery power available in a
vehicle is quite adequate.
Cost of production is cheap Expensive
Change in network topology is slow Frequent & very fast
Node lifetime depends on power depends on lifetime of vehicles
resource
Multi-hop routing is available. Weakly available.
Attribute based addressing scheme Location-based
44