0% found this document useful (0 votes)
36 views26 pages

Unit 2

Mobile IP is a protocol that allows mobile devices to maintain continuous internet connectivity when moving between different networks. It enables seamless communication through key components like home agents, foreign agents, and a care-of address. The care-of address is a temporary IP address assigned to a mobile device visiting a foreign network, allowing it to receive data while away from its home network.

Uploaded by

ghimirekabin060
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
36 views26 pages

Unit 2

Mobile IP is a protocol that allows mobile devices to maintain continuous internet connectivity when moving between different networks. It enables seamless communication through key components like home agents, foreign agents, and a care-of address. The care-of address is a temporary IP address assigned to a mobile device visiting a foreign network, allowing it to receive data while away from its home network.

Uploaded by

ghimirekabin060
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 26

What is Mobile IP

⚫ Mobile IP, or Mobile Internet Protocol, is a protocol that allows a mobile device to maintain a continuous
Internet connection regardless of its physical location. It is a communication standard developed to support
the mobility of users who wish to move their devices (such as laptops, smart phones, or tablets) from one
network to another without losing their connection.
⚫ The primary goal of Mobile IP is to enable seamless communication for mobile devices as they move
across different networks, such as switching from a Wi-Fi network to a cellular network or vice versa. This
is particularly important for users who want to maintain an ongoing session (such as a VoIP call or a data
transfer) while transitioning between different access points.
⚫ Key components of Mobile IP include:
⚫ Home Agent (HA): The home agent is a router on the home network that serves as a permanent point of
contact for the mobile device. It keeps track of the device's current location and forwards data to the
appropriate care-of address (see below) when the device is away from its home network.
⚫ Foreign Agent (FA): The foreign agent is a router on the foreign network that interacts with the mobile
device when it is away from its home network. The foreign agent informs the home agent about the mobile
device's current location and forwards data between the home agent and the mobile device.
⚫ Mobile Node (MN): The mobile node is the mobile device that moves between different networks. It is
assigned a home address on its home network and a care-of address on the foreign network.
⚫ Care-of Address (CoA): The care-of address is the temporary address assigned to the mobile device when
it is away from its home network. This address allows the mobile node to receive data while connected to
a foreign network.
Mobile IP
Agent Discovery, Registration, and Tunneling
⚫ Mobile IP (Internet Protocol) is a standard that allows mobile devices to maintain continuous Internet connectivity while moving between
different networks. Mobile IP Agent Discovery, Registration, and Tunneling are key processes within the Mobile IP protocol that enable
seamless communication for mobile devices.
⚫ Mobile IP Agent Discovery:
⚫ Definition: When a mobile device moves from one network to another, it needs to find the Mobile IP agents in the new network.
Mobile IP Agent Discovery is the process by which a mobile node discovers the care-of address and the home agent in the foreign
network.
⚫ Procedure: The mobile node sends Agent Advertisement Discovery messages on the new network to locate the care-of address (the
temporary address assigned to the device in the foreign network) and the home agent (a router in the home network that helps in
routing the data to the mobile node).
⚫ Purpose: This process ensures that the mobile device can identify and communicate with the necessary agents in the new network
to maintain its IP connectivity.
⚫ Mobile IP Registration:
⚫ Definition: After discovering the care-of address and home agent, the mobile node needs to register its current location with the
home agent. This process is known as Mobile IP Registration.
⚫ Procedure: The mobile node sends a Registration Request to the home agent, informing it of the current care-of address. The home
agent then updates its visitor list, allowing it to forward packets destined for the mobile node to its new location.
⚫ Purpose: Mobile IP Registration ensures that the home agent is aware of the mobile device's current location, facilitating seamless
communication as data is redirected to the care-of address.
⚫ Mobile IP Tunneling:
⚫ Definition: Once the mobile node has registered its new location, data sent to the mobile node's home address is intercepted by the
home agent and tunneled to the care-of address. This process is known as Mobile IP Tunneling.
⚫ Procedure: The home agent encapsulates the data packets destined for the mobile node within a tunneling protocol (such as IP in IP
or Generic Routing Encapsulation - GRE) and sends them to the care-of address.
⚫ Purpose: Mobile IP Tunneling allows data to reach the mobile node at its current location, despite having a different care-of
address. It ensures that communication is maintained as the mobile device moves across different networks.
CARE-OF ADDRESS
⚫ In the context of Mobile IP, a care-of address is a temporary address assigned to a mobile device when it moves to a foreign
network. This address allows the mobile device to receive packets while it is away from its home network. The care-of
address is associated with the current point of attachment in the foreign network.
⚫ Let's consider an example:
⚫ Home Network:
⚫ Home Address (Permanent Address): 192.168.1.100
⚫ Home Agent: Router in the home network
⚫ Foreign Network:
⚫ The mobile phone, originally with the home address 192.168.1.100, moves to a foreign network.
⚫ Upon entering the foreign network, the mobile phone is assigned a care-of address: 203.0.113.5.
⚫ Agent Discovery and Registration:
⚫ The mobile phone sends Agent Advertisement Discovery messages to discover the care-of address and home
agent in the foreign network.
⚫ After discovering the care-of address (203.0.113.5) and home agent in the foreign network, the mobile phone
registers its current location with the home agent.
⚫ Tunneling:
⚫ The home agent encapsulates data destined for the mobile phone's home address (192.168.1.100) within a
tunneling protocol.
⚫ The encapsulated packets are then sent to the care-of address (203.0.113.5) in the foreign network.
⚫ Communication:
⚫ When someone wants to communicate with the mobile phone, they send data to its home address
(192.168.1.100).
⚫ The home agent intercepts the packets, encapsulates them, and forwards them through the tunnel to the care-of
address (203.0.113.5).
⚫ The mobile phone receives the encapsulated packets, decapsulates them, and processes the original data.
Home Address
⚫ Here's a simplified sequence of events:
⚫ Insert SIM Card:
⚫ You insert a new SIM card into your mobile device.
⚫ Power On or Network Attachment:
⚫ You power on your mobile device, and it attempts to attach to the available mobile network.
⚫ Registration Request:
⚫ The mobile device sends a registration request to the network, indicating its presence and the desire to
establish a connection.
⚫ Authentication and Authorization:
⚫ The network authenticates and authorizes the mobile device based on the information provided by the
SIM card.
⚫ Assignment of Home Address:
⚫ Once authenticated, the network assigns a permanent IP address to your mobile device. This assigned IP
address is known as the Home Address.
⚫ Establishment of Binding:
⚫ A binding is established between the Home Address and the current Care-of Address (temporary
address assigned in the current network).
⚫ Tunnel Setup:
⚫ A tunnel is set up between the network's Home Agent and your mobile device, enabling seamless data
forwarding.
⚫ Communication Establishment:
⚫ With the registration process complete, your mobile device can now communicate using its Home
Address, and the network ensures that data is correctly forwarded to your device's current location.
Mobile DHCP (Dynamic Host Configuration Protocol)
⚫ Mobile DHCP (Dynamic Host Configuration Protocol) is a variant of DHCP that is designed
to support mobile devices in a wireless or cellular network environment. In traditional DHCP,
a device on a network obtains its IP address, subnet mask, gateway, DNS servers, and other
network configuration information when it joins the network. However, in a mobile
environment where devices may move between different networks, Mobile DHCP provides
additional features to support this mobility.
⚫ Here are some key aspects of Mobile DHCP:
⚫ Dynamic IP Assignment: Like traditional DHCP, Mobile DHCP dynamically assigns IP
addresses to devices when they connect to a network. This is particularly useful in mobile
scenarios where devices move between different access points or networks.
⚫ Fast IP Address Renewal: Mobile DHCP often includes mechanisms to facilitate fast IP
address renewal when a device moves to a new network. This helps minimize the interruption
in connectivity when a device changes its point of attachment.
⚫ Support for Roaming: Mobile DHCP is designed to support the roaming of devices across
different subnets or networks. As a device moves, it can acquire a new IP address from the
DHCP server in the new subnet, allowing it to maintain connectivity.
⚫ Integration with Mobile IP: In some cases, Mobile DHCP may work in conjunction with
Mobile IP, a protocol that allows mobile devices to maintain a consistent IP address even as
they move across different networks. Mobile IP involves Home Agents, Foreign Agents, and
care-of addresses, and Mobile DHCP can be part of the overall solution.
CARE-OF ADDRESS
⚫ In Mobile IP, the care-of address is the temporary IP address assigned to a mobile node (device) when it is visiting a
foreign network. The care-of address allows the mobile node to maintain connectivity and receive data while it is
away from its home network. When the mobile device moves to a new network, it may acquire a new care-of address
dynamically, and DHCP is one of the protocols that can be used for this purpose.
⚫ Here's a simplified sequence of events:
⚫ Mobile Device Moves: The mobile device moves to a new network, which is referred to as the foreign network.
⚫ DHCP Request: The mobile device sends a DHCP request to the foreign network's DHCP server, requesting a new
IP address.
⚫ DHCP Response: The foreign network's DHCP server responds with a new IP address, which becomes the care-of
address for the mobile device while it's in that network.
⚫ Mobile IP Registration: The mobile device registers its care-of address with its home network's Home Agent (HA)
using Mobile IP protocols.
⚫ Data Forwarding: The Home Agent keeps track of the mobile device's current care-of address. When data is sent to
the mobile device, the Home Agent forwards the data to the care-of address, ensuring that the mobile device can
receive communications even though it's away from its home network.
⚫ Even though your device is temporarily using a care-of address in the foreign network, the permanent IP
address assigned by the home agent remains unchanged. The home agent keeps track of your device's location
and ensures that data sent to your permanent address is correctly forwarded to your current location in the
foreign network. This way, you can maintain connectivity and consistency in your IP address regardless of the
network you are currently connected to.
⚫ This address remains associated with the mobile node regardless of its current location. The home address allows the
mobile node to be reachable and identified on the Internet, even when it is away from its home network

⚫ This address remains associated with the mobile node regardless of its current location. The home address allows the
mobile node to be reachable and identified on the Internet, even when it is away from its home network
AdHoe- Proactive Protocol-DSDV
⚫ Destination Sequence Distance Vector Routing (DSDV)
⚫ In this each node keeps record of route information in the form of routing table.
⚫ TABLE Consists:
⚫ -Destination ID
⚫ -Next Node
⚫ -Distance (No of Hopes)
⚫ -Sequence No.
⚫ Route Broadcast Message.
⚫ -Destination node
⚫ -Next hop
⚫ -Distance
⚫ Recent sequence no
Table Maintenance in DSDV
⚫ Each node receives the route information with most recent sequence
no from other nodes and update its table.
⚫ Node looks at its routing table in order to determine shortest path to
reach all the destinations.
⚫ Each node constructs another routing table based on shortest path
information.
⚫ New routing table will be broadcast to its neighbor.
⚫ Neighbor nodes updates its routing table.
Each node exchanges its update routing table with each other.
FULL DUMP:
Entire routing table is sent to neighbor.
INCREMENT UPDATE:
Only entries that are change are exchange.
DSDV TABLE
NODE (A) Next Hop Distance Sequence number
Destination
B B 1 340

C C 1 164

D B 2 115

E C 2 20

D B 3 124
Reacting Routing Protocol
Dynamic Source Routing (DSR)
⚫ Discovers the route between source and destination when
required.
⚫ Operation is based on source routing (Sender knows the
complete path).
⚫ Intermediate nodes do not maintain routing information to
route the packets to the destination.
⚫ Less network overhead as the no of message exchanges
between nodes is very low.
PHASE OF DSR PROTOCAL
Routing Discovery (RREQ Source Node ID, Destination Node ID)
Route reply (RREP complete path send to sender )
Route maintenance (RERR it sends information or error message to neighbor node that link is break)
Route cache( RCHE It stores the shortest path to reach destination)
Reacting Routing Protocol
Adhoc On-demand Distance Vector (AODV)
⚫ Source node will not carry the complete path.
⚫ Each node only knows its previous and next hop
information.
⚫ Route Discovery
⚫ RREQ - Source Node ID
⚫ - Destination node ID
⚫ - Recent sequence number
⚫ - Broadcast ID
⚫ - Hop count
Hybrid Routing Protocol
Zone Routing Protocol (ZRP)
⚫ The protocol uses a combination of proactive and reactive routing protocols.
⚫ Proactive:- In the neighborhood of hopes – Intra zone routing protocol.
⚫ Reactive:- Outside this zone – Inter zone routing protocol.
⚫ The protocol operations as follows:
⚫ If the destination is within the zone, the source sends packet directly.
⚫ If not, the destination sends RREQ to peripheral nodes.
⚫ If any peripheral node, has the destination in its zone it replies with route reply.
⚫ If not peripheral node, sends RREQ to their peripheral nodes and so on.
⚫ If multiple route reply are received the best is chosen based on some metric.
Multicast Routing Protocol
On-Demand Multicast Routing Protocol(ODMRP)
⚫ Mesh-Based Structure:
⚫ ODMRP utilizes a mesh-based structure for multicast routing. Nodes in the network form a mesh
through which multicast data can be efficiently propagated.
⚫ Route Discovery:
⚫ When a source node wants to send multicast data, it initiates a route discovery process by
flooding a Route Request (RREQ) message throughout the network.
⚫ Nodes receiving the RREQ message store the path information and forward the message to their
neighbors.
⚫ Mesh Construction:
⚫ As the RREQ messages propagate, a mesh is formed among the nodes that have heard the
request. This mesh is essentially the multicast distribution tree.
⚫ Maintaining Routes:
⚫ ODMRP employs a technique called "soft state" to maintain multicast routes. Routes are
periodically refreshed by retransmitting Route Request messages.
⚫ Nodes that no longer need the route or have moved out of the multicast group stop forwarding
the RREQ messages, leading to a dynamic adaptation of the mesh.
⚫ Efficient Forwarding:
⚫ Once the mesh is established, multicast data is efficiently forwarded along the mesh structure.
Nodes use the stored route information to forward packets.
MANET stands for Mobile Ad hoc Network
⚫ MANET stands for Mobile Ad hoc Network. It is a type of wireless network where mobile devices or
nodes communicate with each other without a fixed infrastructure or centralized control. In MANETs,
each node in the network can act as a router, forwarding data for other nodes in the network.
⚫ Here are some key characteristics and features of MANETs:

⚫ Dynamic Topology: MANETs have a dynamic and rapidly changing topology as nodes move
unpredictably. This requires efficient routing protocols to adapt to changes in the network.
⚫ Infrastructure-less: MANETs operate without a fixed infrastructure, such as base stations or access
points. Nodes in the network communicate directly with each other.
⚫ Self-Configuring: Nodes in a MANET are capable of self-configuring and self-organizing, allowing them
to establish and maintain connections without the need for centralized management.
⚫ Resource Constraints: Nodes in a MANET often have limited resources such as battery power,
processing capability, and bandwidth. Efficient resource management is crucial for the proper functioning
of the network.
⚫ Applications: MANETs are commonly used in scenarios where a fixed infrastructure is impractical or
unavailable, such as military operations, emergency response situations, disaster recovery, and
collaborative communication among mobile devices.
⚫ Routing Protocols: Due to the dynamic nature of MANETs, routing protocols play a crucial role in
ensuring effective communication. Proactive, reactive, and hybrid routing protocols are commonly used to
establish and maintain routes in MANETs.
⚫ Security Challenges: MANETs face unique security challenges, including issues related to node mobility,
lack of a centralized authority, and potential vulnerability to attacks such as eavesdropping, black-hole
attacks, and wormhole attacks.
⚫ Examples: Bridgefy, Meshenger, Serval Mesh, FireChat.
MANET stands for Mobile Ad hoc Network
⚫ MANET consists of number of mobile devices that are connected together to form a network,
without any support from an existing internet infrastructure or any other fixed network station.
It is autonomous system of nodes connected by wireless links. In MANET the network
topology may change dynamically in an unpredictable manner since there is no fixed
infrastructure and the nodes are free to move, but each node have limited transmitting power.
MANET’s are basically peer-to-peer, multi-hop wireless network in which packets are
transmitted in store.
⚫ Uses of MANETs :
⚫ Military Operations: MANETs can be used for secure communication and coordination
between soldiers in the field.
⚫ Emergency Response: MANETs can be set up quickly in disaster or emergency situations
to provide communication networks for rescue and relief operations.
⚫ Conferences and Events: MANETs can be used to provide temporary network
connectivity for attendees at conferences, trade shows, and other events.
⚫ Rural and Remote Areas: MANETs can be used to provide connectivity in rural and
remote areas where traditional communication infrastructure is scarce.
⚫ Healthcare: MANETs can be used in healthcare facilities, such as hospitals and clinics, to
provide secure and reliable communication between medical staff.
Advantages and Disadvantages of MANET

Advantages of MANET Disadvantages of MANET


⚫ Flexibility and Mobility: ⚫ Limited Security:
⚫ MANETs are highly flexible and adaptable since they ⚫ MANETs are susceptible to security threats such as
don't rely on a fixed infrastructure. Devices can move eavesdropping, spoofing, and denial-of-service attacks due to the
absence of a centralized security infrastructure.
freely, making them suitable for dynamic and mobile
environments. ⚫ Routing Challenges:
⚫ Dynamic and changing network topologies in MANETs can lead
⚫ Quick Deployment: to routing challenges. Efficient and reliable routing algorithms are
⚫ MANETs are easy to set up and deploy, especially in essential but can be complex to design and implement.
scenarios where a pre-existing infrastructure is ⚫ Resource Constraints:
unavailable or impractical. ⚫ Devices in a MANET typically have limited resources, including
⚫ Resilience and Fault Tolerance: battery power and processing capability. This can impact the
overall performance and reliability of the network.
⚫ MANETs can be robust in the face of network failures or ⚫ Quality of Service (QoS) Issues:
disruptions. The decentralized nature allows for ⚫ Ensuring a consistent quality of service, such as low latency and
self-organization and adaptability to changing network high throughput, can be challenging in MANETs due to their
topologies. dynamic nature and resource constraints.
⚫ Scalability: ⚫ Network Partitioning:
⚫ MANETs can be easily scaled by adding more devices to ⚫ MANETs may experience network partitioning, where devices are
the network. The lack of a centralized control structure unable to communicate due to their movement or other
environmental factors. This can result in isolated sub-networks
allows for straightforward integration of new devices. within the MANET.
⚫ Cost-Efficiency: ⚫ Configuration and Management Complexity:
⚫ Since there is no need for a fixed infrastructure, ⚫ The lack of a centralized management entity can make
MANETs can be a cost-effective solution in scenarios configuration and maintenance more challenging, especially in
where setting up and maintaining infrastructure is large and complex MANETs.
expensive or impractical.
(VANET)
Vehicular Ad-Hoc Networks
⚫ Vehicular Ad-Hoc Networks (VANETs) refer to a type of mobile ad-hoc network
that enables communication between vehicles (V2V) and between vehicles and
roadside infrastructure (V2I). VANETs are a subset of Mobile Ad-Hoc Networks
(MANETs) and are designed to improve road safety, traffic efficiency, and provide
various applications and services for both drivers and passengers.
⚫ Key characteristics and features of VANETs include:
⚫ Dynamic Topology: The network topology in VANETs is highly dynamic due to
the mobility of vehicles. This dynamic nature requires efficient routing protocols
and communication strategies.
⚫ Communication Types:
⚫ V2V (Vehicle-to-Vehicle): Enables direct communication between nearby vehicles to
exchange information such as speed, location, and other safety-related data.
⚫ V2I (Vehicle-to-Infrastructure): Involves communication between vehicles and
roadside infrastructure, such as traffic lights, road signs, and other fixed infrastructure.
(VANET)
Vehicular Ad-Hoc Networks
⚫ Applications:
⚫ Safety Applications: VANETs facilitate the development of safety applications such as collision warning systems,
adaptive cruise control, and emergency vehicle notification.
⚫ Traffic Management: VANETs can be used for traffic monitoring, congestion detection, and optimization of traffic flow.
⚫ Infotainment Services: VANETs support various infotainment services, including internet access for passengers,
streaming media, and other entertainment applications.
⚫ Security Challenges: Security is a critical concern in VANETs. Issues such as data integrity, authentication,
and privacy protection must be addressed to prevent malicious attacks and ensure the trustworthiness of the
communication.
⚫ Routing Protocols: VANETs require efficient and adaptive routing protocols to cope with the dynamic nature
of the network. Some protocols take into account factors like traffic conditions and network density to
optimize communication.
⚫ Standardization: Various standards, such as IEEE 802.11p, have been developed to define communication
protocols for VANETs, ensuring interoperability among different devices and systems.
⚫ Challenges:
⚫ Reliability: Ensuring reliable communication in a rapidly changing and sometimes harsh vehicular environment is a
challenge.
⚫ Scalability: VANETs need to support communication among a large number of vehicles, which poses scalability
challenges.
⚫ Privacy: Balancing the need for information exchange with the protection of user privacy is a delicate issue in VANETs.
⚫ Examples: CamerAlert, Waze,14, Drive2me
VANET
⚫ VANET is similar to MANET in terms, that is also do not need any infrastructure for data
transmission. VANET play important role in aspect of safe driving, intelligent navigation,
emergency and entertainment applications .It can be defined as an intelligent component of
transport system as vehicle are able to communicate with each other as well as roadside base
station, which are located at critical points of the road. Example :-Intersection and Construction
Sites.

⚫ Uses of VANETs :
⚫ Intelligent Transportation Systems (ITS): VANETs can be used to enhance traffic flow,
reduce congestion, and improve road safety by enabling communication between vehicles and
with road-side infrastructure.
⚫ Navigation and Location-Based Services: VANETs can provide real-time traffic and
navigation information to drivers, allowing them to make informed decisions and avoid
congestion.
⚫ Emergency Services: VANETs can be used to quickly and efficiently relay emergency
messages, such as accidents and road closures, to other vehicles and to emergency services.
⚫ Vehicle-to-Vehicle (V2V) and Vehicle-to-Infrastructure (V2I) Communication: VANETs
can facilitate communication between vehicles and with road-side infrastructure, allowing for a
wide range of applications, such as cooperative driving .
⚫ Entertainment and Infotainment Services: VANETs can provide entertainment and
information services, such as streaming music and video, to passengers in vehicles.
Wi MAX "Worldwide Interoperability for
Microwave Access

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy