MC Notes
MC Notes
Ad-hoc On-Demand Distance Vector Routing (AODV) is a In the hybrid routing protocols, each node maintains the
stateless on-demand protocol. Two major functions of
AODV protocols are route discovery and route network topology information up to m hops.
maintenance. The performance of the protocol is improved Following are the Hybrid Routing Protocols:
by keeping the routing information in each node. 1. Core Extraction Distributed Adhoc Routing (CEDAR).
2. Zone Routing Protocol (ZRP).
AODV is a distance vector routing protocol, which means 3. Zone Based Hierarchical Link State Routing (ZHLS).
routing decisions will be taken depending on the number of
hops to the destination. A particularity of this network is to Zone Routing Protocol (ZRP):
support both multicast and unicast routing. Zone Routing Protocol (ZRP) is a hybrid routing protocol that
effectively combines the best qualities of proactive and
Algorithm: reactive routing protocols. The concept behind this protocol
When a route is needed to reach a destination, the protocol is to use a proactive routing protocol within a limited zone in
initiates route discovery. The source node sends a route the r-hop neighborhood of each node and use a reactive
request message (RREQ) to its neighboring nodes, using routing protocol for nodes beyond this zone.
flooding. If these nodes don't have information about the There are two types of protocols:
destination, they forward the message to all their
neighboring nodes, and so on.
1. Intra-Zone Routing Protocol (IARP):
If any neighboring node has information about the 2. Inter-Zone Routing Protocol (IERP).
destination node, it sends a route reply message to the An Intra-Zone Routing Protocol (IARP) is the protocol used in
initiator of the route request message. The path is recorded the region where a particular node uses proactive routing,
in the intermediate nodes, identifying the route, and is and Inter-Zone Routing Protocol (IERP) is the reactive routing
called the reverse path. protocol used beyond the region.
MANET:
A network in which the locations of the switches,
hubs, or routers can be mobile is referred to as Mobile
Ad-hoc Network or MANET.
• In MANET, the number of routers available at an
instant can increase or decrease, and the available
routing paths can change.
• The mobile devices or wireless sensors as well as the
access points can have switches or routers. Each
mobile device or sensor functions as a node with a
switch or router.
The operation: • An important characteristic of ad-hoc network
The DHCP server sends a passive open command on port architecture is that they are self-organizing, i.e., their
67 of UDP and waits for client's response. organization can change due to the movement of a
The DHCP client sends an active open command on port 68 device or sensor.
of UDP. This message is encapsulated in the UDP datagram Important characteristics of MANET are as follows:
with port 67 as the destination port and port 68 as the 1. Seamless interaction and ubiquitous mobile
source port. The UDP datagram is then encapsulated in an computing environment.
IP datagram. Note that the client at this time does not 2. Seamless connectivity maintained between the
know its own IP address (i.e., the source address) and the devices when they move with the nearby wireless
server's IP address (destination address). Therefore, the nodes, sensor nodes, and embedded devices in
client uses an all-zero address as the source address and an automobiles.
all-one address as the destination address. Either a 3. One of the important characteristics of a MANET
broadcast or a unicast message using port 67 is used. Port node is neighbor discovery.
68 is used as the destination port. Broadcast address is 4. Data routing abilities: Data can be routed from a
used only for those systems which do not allow the source node to a neighboring node.
bypassing of ARP.
Multi cast routing:
On-Demand Multicast Routing Protocol (ODMRP) is a
multicast routing protocol designed for ad-hoc networks
with mobile hosts.
ODMRP is a mesh-based, rather than a conventional
tree-based, multicast scheme and uses a Forwarding
Group concept.
ODMRP is a flooding-based multicast routing protocol
for mobile ad-hoc networks. Unlike the pure flooding
scheme, data is not flooded throughout the network in
ODMRP. Instead, data is flooded only throughout the
forwarding group, which is continually maintained by
VANET: periodic flooding of control messages.
The forwarding group, which was first introduced in
Vehicle ad-hoc networks (VANETs) are a promising FGMP (Forwarding Group Multicast Protocol), is a set of
technology for increasing the efficiency and security ad-hoc nodes specially chosen to forward multicast
of transportation systems. traffic for a particular multicast group. The formation
• Vehicles connected to each other through an ad-hoc and maintenance of this forwarding group ensure that
formation form a wireless network called "vehicular ad-hoc all these forwarding group nodes provide at least one
network (VANET)." path from the multicast sender to all receivers.
• Vehicular ad-hoc networks are a subgroup of mobile ad-
hoc networks (MANETs). To establish and maintain such a forwarding group,
• VANETs consist of network entities, mainly including ODMRP depends on the following operations: Multicast
vehicles and roadside infrastructure units (RSUs). sender advertisement.
• The communications in VANET are classified into three JOIN-ABLE broadcast by multicast receivers.
categories:
The communications between vehicles (V2V or vehicle-to-
vehicle communication). Dynamic Source Routing (DSR):
The communications between one vehicle and RSUs (V2R). • The Dynamic Source Routing protocol (DSR) is a simple
The broadcast of the vehicles. and efficient routing protocol designed specifically for
• VANETs can be applied in electronic toll system collection use in multi-hop wireless ad hoc networks of mobile
and broadcast of traffic information; access to roadside nodes.
devices. • DSR allows the network to be completely self-
• Every participating car is a wireless router or node. The organizing and self-configuring, without the need for any
range of connection is approximately 100 to 300 meters. existing network infrastructure or administration.
Cars/vehicles may fall out of the signal range and drop out of • It is a reactive protocol, and all aspects of the protocol
the network. operate entirely on-demand basis.
• DSR protocol uses the concept of source routing
approach (every data packet carries the whole path
information in its header) to forward packets.
• The protocol is composed of the two main mechanisms
of "Route Discovery" and "Route Maintenance". DSR
requires each node to maintain a route cache of all
known self-to-destination pairs. If a node has a packet to
send, it attempts to use the cache to deliver the packet.
Advantages of DSR:
1. DSR uses a reactive approach, which eliminates the
need for periodic network-wide table update messages
required in a table-driven approach. Intermediate nodes
also utilize the route cache efficiently to reduce the
control overhead.
2. DSR is simple and loop-free.
Characteristics of VANET: Disadvantages:
1. High mobility at nodes. 1. The disadvantage of DSR is that the route
2. Rapidly changing network topology. maintenance mechanism does not repair a broken-down
3. Unbound network size. link.
4. Potential support from infrastructure. 2. The connection setup delay is higher than in table-
5. Real-time data exchange. driven protocols. Even though the protocol performs
6. Crucial effect of security and privacy. well in static and low-mobility environments,
7. Multihop wireless network. performance degrades rapidly with increasing mobility.
Proactive vs Reactive
MANET VS VANET
Proactive: DSDV
Reactive: DSR, AODV
IP Packet Delivery: Indirect TCP:
Indirect TCP, segments divide a TCP connection into a fixed
Suppose a mobile node (A) wants to connect to another part and a wireless part. Figure 4.6 illustrates an example
host (server X). Fig. 4.2.J illustrates the working of Mobile with a mobile host connected via a wireless access point to
IP. the wired internet where the corresponding host resides.
• Host (server X) wants to transmit an IP datagram to
mobile node A. The home address of A is known to X. The
host X does not know whether A is in home
Figure 4.6.5 illustrates the snooping TCP packet delivery Advantages of M-TCP:
timing, where the foreign agent detects missing packets 1. It maintains the TCP end-to-end semantics. The SH does
and signals the mobile host to retransmit them promptly, not send any ACK itself but forwards the ACKs from the MH.
with TCP handling packet reordering at the 2. If the MH is disconnected, it avoids useless
correspondent host. retransmissions, slow start, or breaking connections by
simply shrinking the sender's window to 0.
Advantages of snooping TCP: 3. As no buffering is done as in I-TCP, there is no need to
1. The end-to-end TCP semantic is preserved. forward buffers to a new SH. Lost packets will be
2. It is not necessary to change the correspondent host. automatically retransmitted to the SH.
3. It does not need a handover of state as soon as the
mobile host moves to another foreign agent. Disadvantages of M-TCP:
4. It does not matter if the next foreign agent uses the 1. As the SH does not act as a proxy as in I-TCP, packet loss
enhancement or not. on the wireless link due to bit errors is propagated to the
sender. M-TCP assumes low bit error rates, which is not
Disadvantages of snooping TCP: always a valid assumption.
2. A modified TCP on the wireless link not only requires
1. Snooping TCP does not isolate the behavior of the modifications to the MH protocol software but also new
wireless link from the wired connection as well as I-TCP. network elements like the bandwidth manager.
2. Due to the use of negative acknowledgments between
the foreign agent and the mobile host, additional Registration process of a mobile node via foreign
mechanisms are added on the mobile host. agent (FA) and directly with home agent (HA).
3. The snooping and buffering of data may be useless if
certain encryption schemes are applied between the After receiving a COA, the MN needs to register with the HA.
correspondent host and mobile host. The purpose of the registration is to inform the HA of the
current location of MN so that HA can correctly forward
Mobile TCP: packets to MN.
It is possible to carry out registration in the following two
When a mobile host gets disconnected, both I-TCP and different ways depending on the location of the COA.
Snooping TCP do not help much. The M-TCP (Mobile TCP)
approach has the same goals as I-TCP and snooping TCP, If the COA is at the FA:
i.e., to prevent the sender window from shrinking if bit
errors or disconnections but not congestion cause current
problems. M-TCP helps to improve overall throughput, to
lower the delay, to maintain end-to-end semantics of TCP,
and to provide a more efficient handover. M-TCP is
especially adapted to the problems arising from lengthy or
frequent disconnections.
Tunneling:
Mobility Problems
Most severely faced problems for support of
mobility are:
PDF:
The probability density function (PDF) of the Rayleigh
distribution can be expressed using the following
expression.
FSK:
Frequency Shift Keying (FSK) is a digital modulation technique
where the frequency of the carrier signal is varied in
accordance with the digital data being transmitted. Each
distinct frequency represents a different binary state.
Benefits:
1. **Convenience**: Enables shopping and
transactions from anywhere via mobile devices.
2. **Personalization**: Offers tailored experiences Needs:
through location-based services. The OS enables the assignment of priorities for requests to the
3. **Speed**: Facilitates quick transactions with one- system and controls I/O devices and networks.
click payments and mobile wallets. Mobile OS enables running application tasks, taking into
4. **Reach**: Expands market reach and customer account hardware and network constraints.
engagement via mobile apps and notifications. Mobile OS allows a programmer to develop applications
5. **Consumer Alignment**: Matches the increasing without considering the specifications, drivers, and
trend of mobile usage, boosting sales potential. functionalities of the hardware of the system.
6. **Cost Efficiency**: Reduces overhead costs for It enables an application to run by abstracting the mobile
businesses with mobile-based operations. system hardware.
Mobile OS enables the programmer to abstract the devices,
Applications of M-Commerce: such that the application need not know the full details of the
M-commerce applications can be categorized into the font and font size of the mobile device display.
following two applications:
Types of Mobile os:
1. Business-to-Consumer (B2C) applications. 1. Java ME Platform ·
2. Business-to-Business (B2B) applications. 2. Palm OS
3. Symbian OS
A. Business-to-Consumer (B2C) applications : 4. Windows Mobile OS
In · Business-to-consumer (B2() applications the 5. BlackBerry OS
products or services are sold by a business firm to a 6. iPhone OS - Google Android Platform.
consumer.
Features of Mobile OS:
B. Business-to-Business (B2B) applications: Multitasking: The OS handles multitasking by managing
In Business-to-Business (B2B) applications, products or multiple program executions simultaneously.
services are sold by a company to its dealers. Process Scheduling: Schedulers are special system software
For example, a TV manufacturing company will which handle process scheduling in various ways. Their main
typically sell its products through a dealer network task is to select the jobs to be submitted into the system and to
instead of selling the product directly to the decide which process to runMemory Allocation: The main
consumers. memory must accommodate both the operating system and
the various user processes. Therefore, we need to allocate
More applications: different parts of the main memory in the most efficient way
1. **Mobile Banking: possible.
2. **Mobile Payments: File System Interface: A frequent use of streams is to
3. **Mobile Shopping: communicate with a file system to which groups of data (files)
4. **Mobile Ticketing: can be written and from which files can be retrieved.
6. **Location-Based Services: Keypad Interface: Provides an efficient keyboard interface.
B2B Model:
In B2B commerce, commercial transactions occur between
organizations, meaning companies conduct business with each
other.
B2B commerce involves the use of Information and
Communication Technology (ICT) to facilitate credit terms and The examples of B2C commerce are:
recurring transactions between a company and its suppliers. 1. E-tailors: The companies offering multimedia
The examples of B2B commerce are: websites that provide shopping malls.
2. Portal: Interactive order processing and secure
1. Business-to-Business (B2B) Buyer: electronic payment systems.
- Many companies offer a variety of marketing and product 3. Transaction broker/market creator.
information on the World Wide Web. 4. Mobile Ticketing
- Marketplaces/hubs.
- B2B service providers. Mobile Ticketing:
With the help of mobile phones, movie tickets can be
purchased (called m-tickets) by using credit cards,
debit cards, Paytm, UPI, etc.
After receiving the payment, a unique barcode is sent
to the customer's mobile phone by an SMS.
The purchaser can enter the movie hall by simply
showing the barcode downloaded into the mobile
device.
Microkernel OS:
• A multi-server design divides the OS functionality into
several independent user-level processes. The ability of A microkernel with a small privileged core surrounded by
user-mode services would deliver unprecedented
each single process is also tightly controlled. The kernel only modularity, flexibility, and portability. An operating
maintains a minimum set of basic functionality that cannot system designed using microkernel technology has the
be done in user space. This type of design is called following structure:
microkernel. OS = Microkernel + User subsystems (Servers)
• The microkernel implements essential core-operating • Microkernel does not necessarily mean a small system.
The term "micro-" suggests that the kernel provides only
system functions. The functions typically encompass minimal functionality that allows user-level system
process management, inter-process communication, processes to perform OS services efficiently.
address space management, and hardware abstraction.