0% found this document useful (0 votes)
8 views16 pages

WMC-4

Mobile IP is a protocol that enables mobile devices to maintain a permanent IP address while moving across different networks. DHCP is a protocol for automatically assigning IP addresses and configuration parameters to devices. Mobile Ad-Hoc Networks (MANETs) are self-configuring networks of mobile devices without fixed infrastructure, and Wireless Sensor Networks (WSNs) consist of distributed sensors monitoring environmental conditions.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
8 views16 pages

WMC-4

Mobile IP is a protocol that enables mobile devices to maintain a permanent IP address while moving across different networks. DHCP is a protocol for automatically assigning IP addresses and configuration parameters to devices. Mobile Ad-Hoc Networks (MANETs) are self-configuring networks of mobile devices without fixed infrastructure, and Wireless Sensor Networks (WSNs) consist of distributed sensors monitoring environmental conditions.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 16

Mobile-IP

Definition:
Mobile IP is a protocol developed by the IETF (Internet
Engineering Task Force) to allow mobile devices to move
between networks while maintaining a permanent IP
address.
It Enables uninterrupted network connectivity when
moving across different IP networks.
Key Terminologies
• Home Agent (HA):
A router in the home network that tunnels packets to the
mobile node.
• Foreign Agent (FA):
A router in the visited network that helps deliver data to the
mobile node.
• Mobile Node (MN):
A device that moves across networks while maintaining
communication.
• Care-of Address (CoA):
Temporary address assigned to the mobile node while visiting
another network.
Fig: Mobile IP example network
Fig: Packet delivery to and from the mobile node

Working of Mobile-ip:
• Mobile Node moves to a foreign network.
• Mobile Node registers its new Care-of Address with the Home Agent.
• Home Agent intercepts packets and tunnels them to the CoA via FA.
• Foreign Agent receives and delivers the packets to the Mobile Node.
Dynamic host configuration protocol
(DHCP)
• Definition:
DHCP is a network protocol used to automatically assign
IP addresses and other network configuration
parameters to devices on a network. Developed by
Internet Engineering Task Force (IETF)
• Protocol Port: UDP ports 67 (server) and 68 (client)
DHCP Components
DHCP Server: Assigns and manages IP addresses.
DHCP Client: Device that requests IP settings.
IP Address Pool: Range of addresses the server can assign.
Lease: Duration an IP address is assigned to a client.
Fig: Basic DHCP configuration

DHCP Works (Basic Steps):


DHCP Discover: Client broadcasts a request for configuration.
DHCP Offer: Server responds with an available IP address.
DHCP Request: Client accepts the offer.
DHCP Acknowledgment: Server confirms and leases the IP address.
Fig: Client initialization via DHCP
Mobile ad-hoc networks
Definition:
A Mobile Ad-Hoc Network (MANET) is a self-configuring, infrastructure-
less network of mobile devices connected wirelessly. MANET have No
fixed routers or centralized control; every node can act as a router .

Characteristics of MANET
• Instant infrastructure
• Disaster relief
• Remote areas
• Effectiveness
• Dynamic topologies
• Infrastructure-less and decentralized
• Multi-hop routing
• Limited bandwidth and battery
• Autonomous and self-organizing
Fig: MANETs and mobile IP
Routing in
Mobile Host

These are the basic algorithms for routing in mobile host.


1. Link state: In link-state, routing each router first obtains a view of the complete
topology of the network with a cost for each link and then computes the shortest path
to every other router by using , for instance, Dijkstra's algorithm. Hybrid Routing
protocol.
2. Distance vector: In distance vector, every node only monitors the cost of its
outgoing links and periodically broadcasts an estimation of the shortest distance to
every other node in the network. The receiving nodes then use this information to
recalculate the routing tables. Proactive (Table-Driven) routing protocol
3. Source routing: In source, routing each packet carries the complete path it has
to follow around the network, which requires great overhead if the route has many
hops. Given that the routing decision is made at the source, it is easy to avoid routing
loops. Reactive (On-Demand) routing protocol
Applications of MANETs

• Military operations – Communication in battlefield


environments
• Disaster recovery – Quick deployment in natural disasters
• Vehicular networks – Vehicle-to-vehicle (V2V)
communication
• IoT and smart environments – Sensor data sharing
• Remote area connectivity – Communication in rural areas
WSNs
• A Wireless Sensor Network (WSN) consists of spatially
distributed autonomous sensors.(Sensor Nodes)
• These sensors monitor physical or environmental conditions
such as temperature, sound, pressure, etc.
• Data is collected and transmitted wirelessly (radio, infrared)
to a central location (Sink/Base Station) for analysis.
• Use Power Source – Usually batteries or energy harvesting.
• Some of the available standards include 2.4 GHz radios
based on either IEEE 802.15.4 or IEEE 802.11 (Wi-Fi)
standards or proprietary radios, which are usually 900 MHz.
Architecture
• Flat Architecture: All nodes are equal, communicate
directly.
• Hierarchical Architecture: Nodes organized in clusters, with
Indirect TCP (I-TCP)
Fig: Socket and state migration after handover of a mobile host
Snooping TCP

Fig: Snooping TCP as a transparent TCP extension


Mobile-TCP

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy