MC Unit 3
MC Unit 3
Mobile IP – DHCP - AdHoc–- Proactive protocol - DSDV, Reactive Routing Protocols - DSR,
AODV, Hybrid routing - ZRP, Multicast Routing - ODMRP, Vehicular Ad Hoc networks (
VANET) - MANET Vs VANET - Security.
3.1 Mobile IP
It allows fast, continuous low‐cost access to corporate networks in remote areas where
there is no public telephone system or cellular coverage.
It supports a wide range of applications from Internet access and e‐mail to e‐commerce.
Users can be permanently connected to their Internet provider and charged only for the
data packets that are sent and received
It can move from one type of medium to another without losing connectivity
Routing inefficiency problem caused by the “triangle routing” formed by the home
agent, correspondent host, and the foreign agent.
Security risks are the most important problem facing Mobile IP.
Problem in making Mobile IP coexist with the security features within the Internet.
1
Requirements of Mobile IP:
Compatibility: A new standard cannot require changes for applications or network
protocols already in use.
Transparency: Mobility should remain “invisible” for many higher layer protocols
and applications.
Scalability and efficiency: Introducing a new mechanism into the Internet must not
degrade the efficiency of the network.
Security: All messages used to transmit information to another node about the
location of a mobile node must be authenticated to protect against remote redirection
attacks
Home Network
Original network the MN was associated with respect to its IP address before moving
to new network. No mobile IP support is needed within the home network.
Disadvantage: "Double crossing of the router" - A packet for the MN comes in via the
router; the HA sends it through the tunnel which again crosses the router.
The HA could be again on the ‘router’ but this time only acting as a manager for MNs
belonging to a virtual home network.
2
Provides several services to MN during its visit to the foreign network:
o Forwards the tunnel datagrams to the MA.
o Provides security services
Foreign Network
A new network that MN visits and which is not the home network
Care-of Address (COA)
A new address of MN in the foreign network.
Two different possibilities for the location of the COA (Types of COA):
Foreign Agent COA - The static IP address of a foreign agent(FA) on a visited network
Co-located COA - Temporary IP address assigned to the MN.
Represents the current position of the MN on the Foreign network & can be used by
only one MN at a time.
A co-located care-of address can be obtained by Dynamic Host Configuration
Protocol (DHCP).
3
3.1.3 IP PACKET DELIVERY (HOW MOBILE IP WORKS?)
a) Agent Discovery
b) Registration
c) Tunneling & Encapsulation
4
3.1.4.1 AGENT DISCOVERY
A MN uses a discovery procedure to identify prospective home and foreign agents.
a) Agent advertisement
Functions:
1. It allows the MN to find whether an agent is its HA or a FA.
2. If it is FA then get the COA.
3. It allows the MN to know the type of services provided by the FA.
4. It allows the MN to know about the allowed registration lifetime or roaming period for visiting
foreign network.
NOTE: Upper part represents ICMP while lower part represents extension needed for mobility.
5
b) Agent solicitation:
Rather than waiting for agent advertisements a MN can sen out an agent solicitation.
This solicitation forces any agents on the link to immediately send an agent
advertisement.
If MN determines that it is connected to a foreign network, then it obtains a COA.
Types of COA:
(i) Foreign Agent COA - The static IP address of a foreign agent (FA) on a visited
network
(ii) Co-located COA - Temporary IP address assigned to the MN.
Represents the current position of the MN on the Foreign network & can be used by
only one MN at a time.
A co-located care-of address can be obtained by Dynamic Host Configuration
Protocol (DHCP).
Steps:
1. MA (HA, FA) broadcast agent advertisement message at regular intervals.
2. The MN receiving the agent advertisement message observes whether the message is from its
own HA & determine whether it is on the home network or on the foreign network.
3. If the MN does not wish to wait for the periodic advertisement, it can send out agent
solicitation message that will be responded to by a MA.
After these steps of advertisements or solicitations the MN can now receive a COA, either one
for an FA or a co-located COA. The MN knows its location (home network or foreign network)
and the capabilities of the agent.
The next step for the MN is the registration with the HA if the MN is in a foreign network
3.1.4.2 REGISTRATION
If the MN discovers that it is on the home network, then it operates normally without Mobile
IP
If the MN has moved to a new network & obtain the COA from a FA, then this address
should be registered with the HA.
Registration – A MN uses an authenticated registration procedure to inform the HA of its
COA.
o Registration messages uses UDP Protocol.
o Registration can be done in two different ways:
6
If the COA is at the FA;
MN sends its registration request containing the COA to the FA which then forward
the request to the HA.
Now HA will do the mobility binding containing the mobile node’s home IP address
and the current COA.
Then finally the HA Acknowledges via FA to MN.
REGISTRATION PROCESS:
The registration process involves the exchange of registration requests and registration
reply messages.
When the mobile node registers by using a foreign agent, the registration process takes
the following steps, which is shown in the figure.
7
1. If MN travels to foreign network, it registers with the FA by sending a registration request
message, which includes permanent IP address of the MN & IP address of HA.
2. The FA in turn performs the registration process on behalf of the MN by sending the
registration request message to HA, which includes permanent IP address of the MN & IP
address of FA(i.e., COA)
3. When the HA receives the registration request, it updates the “mobility Binding Table”.
4. Then HA sends an acknowledgement (registration reply) to the FA.
5-6. The FA in turn updates its “Visitor list” & relays the reply to the MN.
8
Mobility Binding Table:
Maintained on HA of MN.
Maps MN’s home address with its current COA
9
Visitor List:
Maintained on FA.
Maps MN’s home address with its MAC address (address of NIC) & HA’s address.
Fig. IP encapsulation
10
Steps in Encapsulation:
1. When a HA receives a packet addressed to a MN, it forwards the packet to the COA using IP -
within -IP encapsulation
2. Using IP -within -IP , the HA inserts a new IP header in front of the IP header of any
datagram.
3. Destination address is set to the COA.
4. Source address is set to the HA’s address.
5. After stripping out the 1st header, IP processes the packet again.
There are different ways of performing the encapsulation. They are:
1. IP-in-IP Encapsulation
2. Minimal Encapsulation
3. Generic Routing Encapsulation
11
The inner IP header source and destination address identify the original sender and the
receiver.
The new(outer) header contains HA address as source & COA as destination.
12
Minimal Encapsulation & IP-in-IP only works for IP while GRE also supports other
network layer protocols.
Allows the encapsulation of packets of one protocol suite into the payload portion of
a packet of another protocol suite.
The packet of one protocol suite with the original packet header and data is taken and
a new GRE header is prepended.
Together this forms the new data part of the new packet.
Finally, the header of the second protocol suite is put in front.
The outer header is the standard IP header with HA as source address and COA as
destination address.
13
key – used for authentication.
K bit - if set indicates if authentication key is present.
S bit - if set indicates if the Sequence number field is present.
rec – recursion control field. This field represents a counter that shows the number of
allowed recursive encapsulations.
rsv – reserved for future use. Must be zero.
ver = 0 for GRE version.
Lay 4 protocol specifies the protocol of the packet following the GRE header.
14
The HA can check if the MN has allowed broadcasting of its current location.
If the HA is allowed to reveal the location it sends back a binding update.
2. Binding update:
This message sent by the HA to CNs reveals the current location of an MN.
The message contains the fixed IP address of the MN and the COA.
The binding update can request an acknowledgement.
Reverse tunneling is a tunneling from mobile host to home agent, and makes it possible for the
mobile host from foreign network to communication in the network
15
3.2 DHCP - DYNAMIC HOST CONFIGURATION PROTOCOL
DHCP is used to merge the world of mobile phones with the internet and to support
mobility.
Automatically assigns a unique IP address to each device that connects to a network.
Used to simplify the installation and maintenance of networked computers.
o If a new computer is connected to a network, DHCP can provide it with all the
necessary information for full system integration into the network, e.g., addresses
of a DNS server and the default router, the subnet mask, the domain name, and an
IP address.
DHCP is based on a client/server model.
1. DHCP clients send a request to a server (DHCPDISCOVER) to which the server responds.
2. A client sends requests using MAC broadcasts to reach all devices in the LAN.
3. A DHCP relay might be needed to forward requests across inter-working units to a DHCP
server.
16
The above figure shows one client and two servers.
1. The client broadcasts a DHCPDISCOVER into the subnet.
2. Two servers receive this broadcast and find the configuration they can offer to the client.
3. Servers reply to the client’s request with DHCPOFFER and offer a list of configuration
parameters.
4. Then the client can choose one of the configurations offered.
5. Then the client in turn replies to the servers, accepting one of the configurations and rejecting
the others using DHCP REQUEST.
6. If a server receives a DHCP REQUEST with a rejection, it can free the reserved
configuration for other possible clients.
7. The server with the configuration accepted by the client now confirms the configuration with
DHCP ACK. This completes the initialization phase.
8. If a client leaves a subnet, it should release the configuration received by the server using
DHCP RELEASE.
9. The configuration a client gets from a server is only leased for a certain amount of time, it has
to be reconfirmed from time to time.
17
Infrastructureless or Mobile ad-hoc (MANET):
The MN can move while communicating
There are no fixed BSs.
All the nodes in the network need to act as routers.
Used to simplify the installation and maintenance of networked computers.
MANET are formed dynamically by an autonomous system of mobile nodes that are
connected via wireless links.
No existing fixed infrastructure or centralized administration
Mobile nodes are free to move randomly i.e., network topology changes frequently.
Each node work as a router.
18
– Pair of nodes can either communicate directly when they are in within the range or can
communicate via multi-hop communication.
2. Dynamic topologies :
– n/w topology can change unpredictably because of the mobility of devices in MANET
– Rate of topology change depends on the speed of mobile movement
3. Bandwidth constrained, variable capacity link:
– Wireless link have lower capacity compare to wired link
– Factors affecting Bandwidth: Noise, Interference…….
4. Energy constrained operation:
– Nodes depends on battery power
– Small battery – limited amount of energy
– Need more energy during Routing
– “Energy Conservation” – important objective of MANET routing protocol
5. Increased vulnerability:
– New type of security threats
– Increased the possibility of eavesdropping, spoofing, DOS attacks.
– Difficult to identify the attacker because:
• Devices keeps on moving
• Do not have global Identifier
19
7) Battery constraints:
Devices used in these networks have restrictions on the power source in order to maintain
portability, size and weight of the device.
8) Security threats:
Brings new security challenges to the network design. As the wireless medium is
vulnerable to eavesdropping.
20
3.3.6 AD-HOC MOBILE ROUTING PROTOCOLS
Routing is a process of finding an efficient, reliable and secure path from a source node
to a destination node via intermediate nodes in a network.
Efficiency of the path is measured in various metrics like, Number of hops, traffic,
security, etc.
21
Exchange of HELLO messages - to learn its direct neighbors
Flooding LSP – for example Router E sends its LSP on all its links and routers D, B and C
insert the LSP in their LSDB and forward it over their other links.
Link state databases received by all routers- By combining the received LSPs with its own
LSP, each router can compute the entire network topology.
22
Each router computes the spanning tree by using Dijkstra’s shortest path algorithm
23
24
3.3.6.2 PROACTIVE PROTOCOLS (Table-driven routing protocol)
Maintain the global topology information in the form of tables at every node.
These tables are updated frequently in order to maintain consistent and accurate network
state information.
EX: DSDV, WRP, and STAR.
Damping:
Transient changes in topology that are of short duration should not weaken the
routing mechanisms.
Unstable changes in the topology are not forwarded
25
o For each node N1 maintain a table that contain;
o The next hop toward this node
o The metric (number of hops)
o The sequence number
o The time at which the path has been installed first.
o Important steps in the operation of DSDV:
1. Each router(node) in the network collects route information from its neighbours.
2. After gathering information, the node determines the shortest path to the destination based on
the gathered information.
3. Based on the gathered information, a new routing table is generated.
4. The router broadcasts this table to its neighbours. On receipt by neighbours, the neighbour
nodes recompute their respective routing tables.
5. This process continues till the routing information becomes stable.
Advantages
o Simple
o Loop free through destination seq. numbers
o No latency caused by route discovery
Disadvantages
o No sleeping nodes
o Overhead: most routing information never used
26
o Route Discovery
o Route Maintenance
Route discovery is expensive
Example: Dynamic Source Routing (DSR), Ad hoc On-demand Distance Vector (AODV)
27
Fig. Broadcasting the RREQ packets
28
2. As Soon as source node receives the RERR message it deletes the broken link route
from its cache.
3. If it has another route to the destination, it starts to retransmit the packet using the
alternative route.
4. Otherwise it initiates the route discovery process again.
The basic message set consists of:
o RREQ – Route request
o RREP – Route reply
o RERR – Route error
o HELLO – For link status monitoring
Advantages:
A perfect route is discovered always.
Highly efficient.
Low bandwidth Consumption.
Drawback:
Packet header size (Non Uniform Packet Size) grows when intermediate node
increases.
Flood of route requests may potentially reach all nodes in the network
29
3. When the request reaches a node with route to destination, it generates a route reply
(RREP) containing the number of hops required to reach the destination.
4. All nodes that participate in forwarding this reply to the source node create a forward route
to destination.
5. This route created from each node from source to destination is a hop-by-hop route.
30
4. Node A creates a RREP & uncast RREP to S
5. Set forward path in A's routing table
31
Difference between DSR, DSDV & AODV
32
In the diagram the routing zone of S includes the nodes A-I, but not K.
The nodes are divided into peripheral nodes and interior nodes.
Peripheral nodes: Nodes whose minimum distance is less than the radius.
Interior nodes - Nodes A-F
Peripheral nodes - Nodes G-J
Node K is outside the routing zone
Within the zone table driven is used
Outside the zone On demand Route Discovery is used
Procedure:
1. The source sends a Route Request packet (RREQ) to the border nodes of its
zone, containing its own address, destination address and the unique sequence
no.
2. Each border nodes checks its local zone for the destination.
3. If the destination is not a member of local zone, then the border node adds its
own address to the route request packet and forwards the packet to its own
border nodes.
4. When the destination node is reached in this process, a route reply (RREP) is
sent on the reverse path back to the source.
5. The source saves the path which is mentioned in Route Reply to send data
packets to the destination
33
For node u, the packet transmission is relayed through two tree links, that is, from r to q and
then q to u.
To maintain the tree structure even when nodes move, group members periodically send Join
Request message.
34
o Drawback of this scheme is that multiple copies of the same packet are forwarded through the
mesh.
35
3. A multicast receiver getting the JOIN REQUEST creates or updates the source entry in its
member table.
4. As long as valid entries in receiver's member table, JOIN TABLE are broadcasted periodically.
5. An intermediate node, receiving the JOINT TABLE, compares it's Node ID with the entries of
that table.
36
6. If there's a match, it is a member of the forwarding group. Then it sets FG-FLAG & broadcasts its
JOIN TABLE.
7. This process is going to create a mesh between all forwarding group members.
8. JOIN TABLE is propagated by each forwarding Group member until it reaches source via a
shortest path.
9. Routes from source to receivers builds a mesh of nodes called "Forwarding Group"
37
The term VANET became mostly synonymous with the more generic term inter-vehicle
communication (IVC).
VANET is an application of mobile ad hoc network. More precisely a VANET is self-organised
network that can be formed by connecting vehicle aiming to improve driving safety and traffic
management with internet access by drivers and programmers.
WORKING OF VANET
VANET turns every participating car into a wireless router or node, allowing cars approximately 100
to 300 meters of each other to connect and, in turn, create a network with a wide range.
As cars fall out of the signal range and drop out of the network, other cars can join in, connecting
vehicles to one another so that a mobile Internet is created.
It is estimated that the first systems that will integrate this technology are police and fire vehicles to
communicate with each other for safety purposes.
COMMUNICATION IN VANET
Two types of communication are provided in the VANET.
First a pure wireless ad hoc network where vehicle to vehicle without any support of
infrastructure.
Second is communication between the road side units (RSU), a fixed infrastructure, and
vehicle.
38
ARCHITECTURE OF VANET
Each node in VANET is equipped with two types of unit i.e. On Board Unit (OBU) and Application
Unit (AU). OBU has the communicational capability whereas AU executes the program making
OBU‘s communicational capabilities. An RSU can be attached to the infrastructure network which is
connected to the Internet.
CHARACTERISTICS OF VANET
High Mobility: The nodes in VANETs usually are moving at high speed. This makes harder
to predict a node’s position and making protection of node privacy
39
Rapidly changing network topology: Due to high node mobility and random speed of
vehicles, the position of node changes frequently. As a result of this, network topology in
VANETs tends to change frequently.
Unbounded network size: VANET can be implemented for one city, several cities or for
countries. This means that network size in VANET is geographically unbounded.
Frequent exchange of information: The ad hoc nature of VANET motivates the nodes to
gather information from the other vehicles and road side units. Hence the information
exchange among node becomes frequent.
Wireless Communication: VANET is designed for the wireless environment. Nodes are
connected and exchange their information via wireless. Therefore some security measure
must be considered in communication.
Time Critical: The information in VANET must be delivered to the nodes with in time limit
so that a decision can be made by the node and perform action accordingly.
APPLICATIONS OF VANET
40
Other services: VANET can be utilised in other user based application such as payment
service to collect the tall taxes, to locate the fuel station, restaurant etc.
41
Limited power supply: Since nodes normally rely on battery power, an attacker might
attempt to exhaust batteries by causing unnecessary transmissions to take place at the
targeted node or might cause excessive computations to be carried out by the targeted nodes.
Real time Constraint: VANET is time critical where safety related message should be
delivered with 100ms transmission delay. So to achieve real time constraint, fast
cryptographic algorithm should be used. Message and entity authentication must be done in
time.
Data Consistency Liability: In VANET even authenticate node can perform malicious
activities that can cause accidents or disturb the network. Hence a mechanism should be
designed to avoid this inconsistency. Correlation among the received data from different
node on particular information may avoid this type of inconsistency.
Low tolerance for error: Some protocols are designed on the basis of probability. VANET
uses life critical information on which action is performed in very short time. A small error in
probabilistic algorithm may cause harm.
MANET Vs VANET
MANET VANET
Collection of mobile nodes that Nodes(vehicles) can communicate with
communicate with each other over certain roadside infrastructures or base
bandwidth constrained wireless links stations.
without any infrastructure support.
The node movement is more random in The node mobility is constrained to the
nature road topologies.
Power is a major constrained The battery power available in a vehicle is
quite adequate.
Cost of production is cheap Expensive
Change in network topology is slow Frequent & very fast
Node lifetime depends on power resource depends on lifetime of vehicles
Multi-hop routing is available. Weakly available.
Attribute based addressing scheme Location-based
42