MC - Unit 3 Notes
MC - Unit 3 Notes
1
Security risks are the most important problem facing Mobile
IP.
Problem in making Mobile IP coexist with the security features
within the Internet.
2
Home Agent (HA)
System in the home network of the MN, typically a router.
Provides several services for the MN :
Tunnels IP datagrams to the COA.
Maintains a location registry of MA
Implementation of an HA:
Implemented on a router that is responsible for the
home network.
Implemented on an arbitrary node in the subnet.
Disadvantage: "Double crossing of the router" - A packet for
the MN comes in via the router; the HA sends it through the
tunnel which again crosses the router.
The HA could be again on the ‘router’ but this time only
acting as a manager for MNs belonging to a virtual home
network.
Foreign Agent (FA)
System in the current foreign network of the MN, typically a
router.
It can have COA
Provides several services to MN during its visit to the foreign
network:
Forwards the tunnel datagrams to the MA.
Provides security services
Foreign Network
A new network that MN visits and which is not the home
network
Correspondent Node (CN)
Communication partner i.e., Node that wants to
communicate with MN
At least one partner is needed for communication.
It can be a fixed or mobile node.
3
Care-of Address (COA)
A new address of MN in the foreign network.
Two different possibilities for the location of the COA (Types
of COA):
(i) Foreign Agent COA - The static IP address of a foreign
agent(FA) on a visited network
(ii) Co-located COA - Temporary IP address assigned to
the MN.
Represents the current position of the MN on the Foreign
network & can be used by only one MN at a time.
A co-located care-of address can be obtained by Dynamic
Host Configuration Protocol (DHCP).
a) Agent Discovery
b) Registration
c) Tunneling & Encapsulation
5
A MN uses a discovery procedure to identify prospective home
and foreign agents.
Task of MN to determine its FA & HA:
i) Both HA & FA periodically broadcast Agent Advertisement
message.
ii) A MN must discover a HA before it leaves to a home network.
iii) A MN must also discover a FA after it moved to a foreign
network
Uses ICMP Router Discovery Protocol (IRDP).
ICMP Router Discovery Protocol (IRDP) - Enables host to
broadcast or multicast to discover the IP address (i.e., COA)
of their neighbouring routers (i.e., FA)
Agent Discovery methods:
(i) Agent Advertisement
(ii) Agent Solicitation.
a) Agent advertisement
Functions:
1. It allows the MN to find whether an agent is its HA or a FA.
2. If it is FA then get the COA.
3. It allows the MN to know the type of services provided by the FA.
4. It allows the MN to know about the allowed registration lifetime
or roaming period for visiting foreign network.
6
b) Agent solicitation:
Rather than waiting for agent advertisements a MN can sen out
an agent solicitation.
This solicitation forces any agents on the link to immediately
send an agent advertisement.
If MN determines that it is connected to a foreign network, then
it obtains a COA.
Types of COA:
(i) Foreign Agent COA - The static IP address of a foreign agent
(FA) on a visited network
(ii) Co-located COA - Temporary IP address assigned to the
MN.
Represents the current position of the MN on the Foreign
network & can be used by only one MN at a time.
A co-located care-of address can be obtained by Dynamic
Host Configuration Protocol (DHCP).
Steps:
1. MA (HA, FA) broadcast agent advertisement message at regular
intervals.
2. The MN receiving the agent advertisement message observes
whether the message is from its own HA & determine whether
it is on the home network or on the foreign network.
3. If the MN does not wish to wait for the periodic advertisement,
it can send out agent solicitation message that will be
responded to by a MA.
After these steps of advertisements or solicitations the MN can
now receive a COA, either one for an FA or a co-located COA. The
MN knows its location (home network or foreign network) and
the capabilities of the agent.
The next step for the MN is the registration with the HA if the
MN is in a foreign network
8
The registration process involves the exchange of registration
requests and registration reply messages.
When the mobile node registers by using a foreign agent, the
registration process takes the following steps, which is shown
in the figure.
9
Mobility Binding Table:
Maintained on HA of MN.
10
Maps MN’s home address with its current COA
Visitor List:
Maintained on FA.
Maps MN’s home address with its MAC address (address of
NIC) & HA’s address.
11
Fig. IP encapsulation
Steps in Encapsulation:
1. When a HA receives a packet addressed to a MN, it forwards
the packet to the COA using IP -within -IP encapsulation
2. Using IP -within -IP , the HA inserts a new IP header in front
of the IP header of any datagram.
3. Destination address is set to the COA.
4. Source address is set to the HA’s address.
5. After stripping out the 1st header, IP processes the packet
again.
There are different ways of performing the encapsulation. They
are:
1. IP-in-IP Encapsulation
2. Minimal Encapsulation
3. Generic Routing Encapsulation
(1) IP-in-IP Encapsulation:
This is the mandatory method for Mobile IP.
12
Full IP header added to the original IP packet.
The inner IP header source and destination address identify the
original sender and the receiver.
The new(outer) header contains HA address as source & COA
as destination.
13
Minimal Encapsulation & IP-in-IP only works for IP while GRE
also supports other network layer protocols.
Allows the encapsulation of packets of one protocol suite into
the payload portion of a packet of another protocol suite.
The packet of one protocol suite with the original packet
header and data is taken and a new GRE header is prepended.
Together this forms the new data part of the new packet.
Finally, the header of the second protocol suite is put in front.
The outer header is the standard IP header with HA as source
address and COA as destination address.
14
rec – recursion control field. This field represents a counter
that
shows the number of allowed recursive encapsulations.
rsv – reserved for future use. Must be zero.
ver = 0 for GRE version.
Lay 4 protocol specifies the protocol of the packet following
the GRE header.
15
If the HA is allowed to reveal the location it sends back a
binding update.
2. Binding update:
This message sent by the HA to CNs reveals the current
location of an MN.
The message contains the fixed IP address of the MN and the
COA.
The binding update can request an acknowledgement.
3. Binding acknowledgement: If requested, a node returns this
acknowledgement after receiving a binding update message.
4. Binding warning: If a node decapsulates a packet for an MN,
but it is not the current FA for this MN, this node sends a
binding warning to the HA of the MN.
16
DHCP is used to merge the world of mobile phones with the
internet and to support mobility.
Automatically assigns a unique IP address to each device that
connects to a network.
Used to simplify the installation and maintenance of networked
computers.
If a new computer is connected to a network, DHCP can
provide it with all the necessary information for full system
integration into the network, e.g., addresses of a DNS
server and the default router, the subnet mask, the
domain name, and an IP address.
DHCP is based on a client/server model.
17
3. Servers reply to the client’s request with DHCPOFFER and
offer a list of configuration parameters.
4. Then the client can choose one of the configurations offered.
5. Then the client in turn replies to the servers, accepting one of
the configurations and rejecting the others using DHCP
REQUEST.
6. If a server receives a DHCP REQUEST with a rejection, it can
free the reserved configuration for other possible clients.
7. The server with the configuration accepted by the client now
confirms the configuration with DHCP ACK. This completes
the initialization phase.
8. If a client leaves a subnet, it should release the configuration
received by the server using DHCP RELEASE.
9. The configuration a client gets from a server is only leased for
a certain amount of time, it has to be reconfirmed from time to
time.
18
Used to simplify the installation and maintenance of
networked computers.
MANET are formed dynamically by an autonomous system
of mobile nodes that are connected via wireless links.
No existing fixed infrastructure or centralized
administration
Mobile nodes are free to move randomly i.e., network
topology changes frequently.
Each node work as a router.
19
– Pair of nodes can either communicate directly when they are in within the
range or can communicate via multi-hop communication.
2. Dynamic topologies :
– n/w topology can change unpredictably because of the mobility of devices
in MANET
– Rate of topology change depends on the speed of mobile movement
3. Bandwidth constrained, variable capacity link:
– Wireless link have lower capacity compare to wired link
– Factors affecting Bandwidth: Noise, Interference…….
4. Energy constrained operation:
– Nodes depends on battery power
– Small battery – limited amount of energy
– Need more energy during Routing
– “Energy Conservation” – important objective of MANET routing protocol
5. Increased vulnerability:
– New type of security threats
– Increased the possibility of eavesdropping, spoofing, DOS attacks.
– Difficult to identify the attacker because:
• Devices keeps on moving
• Do not have global Identifier
1) Limited bandwidth:
Limited bandwidth because of the effect of multiple access, fading, noise,
and interference conditions, etc.,
2) Dynamic topology:
20
Dynamic topology membership may disturb the trust relationship
among node.
3) Routing Overhead:
Unnecessary routing overhead since nodes often change their location
within network.
4) Hidden terminal problem:
The hidden terminal problem refers to the collision of packets at a
receiving node due to the simultaneous transmission of those nodes that
are not within the direct transmission range of the sender, but are within
the transmission range of the receiver.
7) Battery constraints:
Devices used in these networks have restrictions on the power source in
order to maintain portability, size and weight of the device.
8) Security threats:
Brings new security challenges to the network design. As the wireless
medium is vulnerable to eavesdropping.
21
3.3.6 AD-HOC MOBILE ROUTING PROTOCOLS
22
– LSP (Link State Protocol)
– DVP (Distance Vector Protocol)
Both of these needs to find the next hop along the shortest path towards the
destination
Procedure:
23
Flooding LSP – for example Router E sends its LSP on all its links and
routers D, B and C insert the LSP in their LSDB and forward it over their
other links.
24
Each router computes the spanning tree by using Dijkstra’s shortest path
algorithm
25
• Each router maintain routing table.
• All available destination (Dest)
• Next node to reach to destination (Next)
• No. of hops to reach the destination (Metrics)
1. Periodically advertises its routing table to its neighbors
2. Neighbors updates its own routing table by examining the received
information, which in inform its neighbors.
3. Computes shortest path to each host based on the information advertised
by its neighbours.
26
3.3.6.2 PROACTIVE PROTOCOLS (Table-driven routing protocol)
Maintain the global topology information in the form of tables at every node.
Sequence Number:
Each routing advertisement comes with a sequence number.
Within ad-hoc networks, advertisements may propagate along many
paths.
Sequence numbers help to apply the advertisements in correct order.
This avoid the loops in the network.
Damping:
Transient changes in topology that are of short duration should not
weaken the routing mechanisms.
Unstable changes in the topology are not forwarded
27
For each node N1 maintain a table that contain;
The next hop toward this node
The metric (number of hops)
The sequence number
The time at which the path has been installed first.
Important steps in the operation of DSDV:
1. Each router(node) in the network collects route information from its
neighbours.
2. After gathering information, the node determines the shortest path to the
destination based on the gathered information.
3. Based on the gathered information, a new routing table is generated.
4. The router broadcasts this table to its neighbours. On receipt by
neighbours, the neighbour nodes recompute their respective routing
tables.
5. This process continues till the routing information becomes stable.
Advantages
Simple
Loop free through destination seq. numbers
No latency caused by route discovery
Disadvantages
No sleeping nodes
Overhead: most routing information never used
3.3.6.3 REACTIVE PROTOCOLS (On-demand routing protocol)
28
2 step process
Route Discovery
Route Maintenance
29
2.ii. If the node is the Target (Destination) then
Returns a Route Reply (RREP) message to the sender
Copies the accumulated route record from RREQ into RREP
30
o RREP – Route reply
o RERR – Route error
o HELLO – For link status monitoring
Advantages:
A perfect route is discovered always.
Highly efficient.
Low bandwidth Consumption.
Drawback:
Packet header size (Non Uniform Packet Size) grows when intermediate
node increases.
Flood of route requests may potentially reach all nodes in the network
(b) AD HOC ON-DEMAND DISTANCE VECTOR ROUTING (AODV)
31
Example: Suppose Node S needs a routing path to Node D
32
6. Set forward path in S's routing table
33
3.3.6.4 HYBRID PROTOCOLS
Combines the best features of both proactive & reactive routing protocols.
It is Hybrid Protocol
Based on the concept of zones.
The routing zone has a radius expressed in hops. i.e., Zone radius: Number
of hops
o Intrazone routing: 1st the packet is sent within the routing zone of
the source node to reach the peripheral nodes
In the diagram the routing zone of S includes the nodes A-I, but not K.
The nodes are divided into peripheral nodes and interior nodes.
Peripheral nodes: Nodes whose minimum distance is less than the radius.
34
Interior nodes - Nodes A-F
Peripheral nodes - Nodes G-J
Node K is outside the routing zone
Within the zone table driven is used
Outside the zone On demand Route Discovery is used
Procedure:
1. The source sends a Route Request packet (RREQ) to the border nodes of its
zone, containing its own address, destination address and the unique
sequence no.
2. Each border nodes checks its local zone for the destination.
3. If the destination is not a member of local zone, then the border node adds
its own address to the route request packet and forwards the packet to its
own border nodes.
4. When the destination node is reached in this process, a route reply (RREP)
is sent on the reverse path back to the source.
5. The source saves the path which is mentioned in Route Reply to send data
packets to the destination
3.3.7 MULTICAST ROUTING PROTOCOL
Multicast is the delivery of a message to a group of destination nodes in a
single transmission.
Multicast Protocols are
Tree based Protocol and Mesh based Protocol
a) Tree based Protocol
This establishes a single path between any two nodes in the multicast
group.
Example: AMRoute, AMRIS
The tree consists of root node(r), three intermediate nodes (p,s,t) and seven
group members.
For node u, the packet transmission is relayed through two tree links, that
is, from r to q and then q to u.
o To maintain the tree structure even when nodes move, group members
periodically send Join Request message.
35
b) Mesh Based Protocol
o This establishes a multiple path between source - receiver pair.
o Example: ODMRP, CAMP
o Tree based protocols, may not perform well in the presence of highly mobile
nodes because multicast tree structure is fragile and needs to be frequently
readjusted.
o Each node in a mesh can have multiple parents.
o Multiple links exist and other links are immediately available when the
primary link is broken due to node mobility. This avoids frequent
reconfigurations.
o Sending a Packet from R to U involves three transmissions(R,Q,U) &
fourteen receives(5 neighbours of R,6 neighbours of Q and 3 neighbours of
U).
o For eg, the transmission from node Q is received not only by U but also be
neighbour nodes R,S,T,W and X; the redundant link from Q to W may be
useful when the path from P to W is broken
o Drawback of this scheme is that multiple copies of the same packet are
forwarded through the mesh.
36
ON-DEMAND MULTICAST ROUTING PROTOCOL (ODMRP)
3. A multicast receiver getting the JOIN REQUEST creates or updates the source
entry in its member table.
4. As long as valid entries in receiver's member table, JOIN TABLE are
broadcasted periodically.
5. An intermediate node, receiving the JOINT TABLE, compares it's Node ID with
the entries of that table.
37
6. If there's a match, it is a member of the forwarding group. Then it sets FG-
FLAG & broadcasts its JOIN TABLE.
7. This process is going to create a mesh between all forwarding group
members.
8. JOIN TABLE is propagated by each forwarding Group member until it reaches
source via a shortest path.
9. Routes from source to receivers builds a mesh of nodes called "Forwarding
Group"
38
The term VANET became mostly synonymous with the more generic
term inter-vehicle communication (IVC).
WORKING OF VANET
VANET turns every participating car into a wireless router or node, allowing
cars approximately 100 to 300 meters of each other to connect and, in turn,
create a network with a wide range.
As cars fall out of the signal range and drop out of the network, other cars can
join in, connecting vehicles to one another so that a mobile Internet is created.
It is estimated that the first systems that will integrate this technology are police
and fire vehicles to communicate with each other for safety purposes.
COMMUNICATION IN VANET
39
ARCHITECTURE OF VANET
Each node in VANET is equipped with two types of unit i.e. On Board
Unit(OBU) and Application Unit (AU). OBU has the communicational
capability whereas AU executes the program making OBU‘s communicational
capabilities. An RSU can be attached to the infrastructure network which is
connected to the Internet.
CHARACTERISTICS OF VANET
High Mobility: The nodes in VANETs usually are moving at high speed.
This makes harder to predict a node’s position and making protection of
node privacy
40
Rapidly changing network topology: Due to high node mobility and
random speed of vehicles, the position of node changes frequently. As a
result of this, network topology in VANETs tends to change frequently.
APPLICATIONS OF VANET
These applications are used to increase the safety on the roads. These
applications can be further categorised in following way.
Cooperative Driving: Drivers can get traffic related warning signals & these
signals can co-operate the driver for an uninterrupted and safe driving.
Internet Connectivity: People always want to connect with the Internet all
the time. Hence VANET provides the constant connectivity of the Internet
to the users.
Other services: VANET can be utilised in other user based application such
as payment service to collect the tall taxes, to locate the fuel station,
restaurant etc.
Security: As VANET provides the road safety applications which are life
critical therefore security of these messages must be satisfied
42
Lack of physical boundary: Each mobile node functions as a router &
forwards packets from other nodes. AS a result, network boundaries become
blurred. So it is difficult to deploy firewalls or monitor the incoming traffic.
Real time Constraint: VANET is time critical where safety related message
should be delivered with 100ms transmission delay. So to achieve real time
constraint, fast cryptographic algorithm should be used. Message and entity
authentication must be done in time.
Low tolerance for error: Some protocols are designed on the basis of
probability. VANET uses life critical information on which action is
performed in very short time. A small error in probabilistic algorithm may
cause harm.
MANET Vs VANET
43
MANET VANET
Collection of mobile nodes that Nodes(vehicles) can communicate
communicate with each other over with certain roadside infrastructures
bandwidth constrained wireless links or base stations.
without any infrastructure support.
The node movement is more random The node mobility is constrained to
in nature the road topologies.
Power is a major constrained The battery power available in a
vehicle is quite adequate.
Cost of production is cheap Expensive
Change in network topology is slow Frequent & very fast
Node lifetime depends on power depends on lifetime of vehicles
resource
Multi-hop routing is available. Weakly available.
Attribute based addressing scheme Location-based
44