You are on page 1of 7

DYNAMIC HOST CONFIGURATION PROTOCOL (DHCP)

> The dynamic host configuration protocol is mainly used to simplify the installation
and maintenance of networked computers.
ROUP OF
> DHCP is an extension of BOOTP and compatible with It.ONS 24
> If a new computer is connected to a network, DHCP can provide it with all the
necessary information for full system integration into the network, e.g., addresses
of a DNS server and the default router, the subnet mask, the domain name, and
an IP address.

>Providing an IP address makes DHCP very attractive for mobile IP as a source of


care-of-addresses.

> DHCP is based on a client/server model as shown in Fig.


> DHCP clients send a request to a server (DHCPDISCOVER in the example) to
which the server responds.

RMK
DHCPDIscOVER

DHCPDIScOVER
Server client

Client relay

Fig. 3.8- Basic DHCP Configuration


>A typical initialization of a DHCP dient is shown in the below Figure. The figure
shows one client and two servers.

> The client broadcasts a DHCP DISCOVER into the subnet.


> There might be a relay to forward this broadcast. 24
Two servers receive this broadcast and determine the configuration they can offer
to the client.

>Server will be the checking of available IP addresses and choosing one for the
client.

> Servers reply to the client's request with DHCPOFFER and offer a list of
configuration parameters. INSTITUTONS
> The client can now choose one of the configurations offered.
The client in turn replies to the servers, accepting one of the configurations and
rejecting the others using DHCPREQUEST.
> If a server receives a DHCPREQUEST With a rejection, it can free the reserved
configuration for other possible clients.
> The server with the configuration accepted by the client now confirms the
confiquration with DHCPACK.
Server Clent Server
(not selected) Initialkation (selecte

Determine the DHCPDIScoVER DHCPDISCOVER configuration


Determine the
configuration
DHCPOFFER DHCPOFFER
Coliectior of ropfes
Selection of ponfiguration
DHCPREOUEST DHCPREQUEST Confirmation of
(reject) (options)
configuration
DHCPAK
Initializatior completed
Reltase
DHCPRELEASE
Delete context
25

Fig. 3.9-- Client Initialization wit DHCP

> This completes the initialization phase. RMK


> If a dient leaves a subnet, it should release the configuration received by the
server using DHCPRELEASE.
NSTITUTIONS
> Now the server can free the context stored for the client and offer the

configuration again.
> DHCP supports the following three mechanisms for IP address allocation

* Automatic allocation: Assigns a permanent IP address to a client


Dynamic allocation: Assigns an IP address to a client for a set period of
time

* Manual allocation: Assigns a specific IP address to a client as defined by


the administrator using the client's MAC
Applications of MANET

Some specific applications of ad hoc networks include industrial and


commercial applications involving cooperative mobile data exchange. There are
many existing and future military networking requirements for robust, IP
compliant data services within mobile wireless communication networks, with
many of these networks consist of highly dynamic autonomous topology
segments. Advanced features of Mobile ad hoc networks, including data rates
compatible with multimedia applications global roaming capability, and
coordination with other network structures are enabling new applications.
> Defense applications: Many defense applications require on the fly
communications set-up, and ad hoc/sensor networks are excellent candidates for
use in battlefield management.
> Crisis management applications: These arise, for example, as a result of
natural disasters in which the entire communication infrastructure is in disarray.
Restoring communications quickly is essential.
> Telemedicine: The paramedic assisting the victim of a traffic accident in a
remote location must access medical records (e.g. X-rays) and may need video
conference assistance from a surgeon for an emergency intervention. In fact, the
paramedic may need to instantaneously relay back to the hospital the victim's X
rays and other diagnostic tests from the site of the accident.

> Tele-geoprocessing application: The combination of GPS, GIS


Information Systems), and high-capacity wireless mobile systems
type of application referred to as tele- geo processing. OF
iONS
º Virtual Navigation: A remote database contains the graphical representation of
building, streets, and physical characteristics of a large metropolis. They may also
"virtually" see the internal layout of buildings, incuding an emergency rescue
plan, or find possible points of interest.
>Education via the internet: Educational opportunities available on the internet
or remote areas because of the economic infeasibility of providing expensive last
mile wire line internet access in these areas to all subscribers.

> Vehicular area network: This a growing and very useful application of adhoc
network in providing emergency services and other information. This is equally
effective in both urban and rural setup. The basic and exchange necessary data
that is beneficial in a given situation.

DMK
CHALLENGES/CONSTRAINTS /DESIGN ISSUDS GF O
MANET
1)Limited bandwidth:
" Limited bandwidth because of the effect of multiple access, fading, noise, and interference conditions, etc.,
2) Dynamic topology:
" Dynamic topology membership may disturb the trust relationship among node.
3) Routing Overhead:
" Unnecessary routing overhead since nodes often change their location within network.
4) Hidden terminal problem:
The hidden terminal problem refers to the collision of packts at a reciving node due to the simultaneous transmission of those
nodes that are not within the direct transmission range of the sender, but are within the transmission range of the receiver.
5) Packet losses due to transmission errors:
Much higher packet loss due to façtors such as increased collisions due to the presence of hidden terminals, presence of
interference, unidirectional links, frequent path breaks due to mobility of nodes.
6) Mobility-induced route changes:
hocswi t w r k s n g y aynamic due to the movement of nodes; hence an on-goingsession
in an adThic
nenetwork topolo8y, breake
frequent leads 1 frequent route changes.
7) Battery constraints:
Devices used in these networks have restrictions on the power source in order to maintain portability, size and weight of the
device.

8) Security threats:
" Brings new security challenges to the network design. As the wireless medium is vulnerable to eavesdropping.
CHARACTERISTICS OF MANET
Lack of fixed infrastructure:
" bring new n/w designing challenges.
" Pair of nodes can either communicate directly when they are in within the range or can communicate via multi-hop communication.
Dynamic topologies:
" n/w topology can change unpredictably because of the mobility of devices in MANET
" Rate of topology change depends on the speed of mobile movement
Bandwidth constrained, variable capacity link:
" Wireless link have lower capacity compare to wired link
" Factors affecting Bandwidth: Noise, Interference......
Energy constrained operation:
" Nodes depends on battery power
Small battery- limited amount of energy
" Need more energy during Routing
" "Energy Conservation" - important objective of MANET routing protocol
Increased vulnerability:
" New type of security threats
" Increased the possibility of eavesdropping, spoofing, DOS attacks.
Difficult to identify the attacker because:
Devices keeps on moving
Do not have global ldentifier

You might also like