You are on page 1of 34

Lecture - 5

Mobile Networking
Course outline
 Mobile IP
 Dynamic Host Configuration Protocol
 Mobile Ad Hoc Routing
 Protocols, TCP over Wireless Networks
 Indirect TCP
 Snooping TCP, Mobile TCP
 Fast Retransmit / Fast Recovery
 Transmission/Timeout Freezing-Selective Retransmission
– Transaction Oriented TCP- TCP over 2.5 / 3G wireless Networks
MOBILE IP
IP is a number that identifies each device on a network. Static and dynamic.

The goal of mobile IP is to enable packet transmission efficiently without any

packet loss and disruption in the presence of host and or destination mobility.

Mobile IP is an ICTF (Internet Engineering Task Force) standard

communication protocol designed to allow mobile device (such as laptop, PDA,

mobile phone, etc. ) users to move from one network to another while

maintaining their permanent IP address.


Mobile IP Technology
 MN (Mobile Node) – a device (cell phone, PDAs, laptop, etc.)
 HNN (Host Network) – the home network of mobile device.
 HA (Home Agent) – stores info about all mobile nodes.
 FA (Foreign Agent ) - is a router in a foreign network that function as a point of
attachment for mobile node.
 FN (Foreign Network) - mobile node has a registered IP.
 CN (Corresponding Node) – partner node used for communication with the mobile node.
 COA (Care of Address) - is an address that identifies the mobile node’s current location.
 Tunnel – it is the path taken by the encapsulated packets.
How does Mobile IP Work?
Mobile IP enables routing of IP datagrams to mobile nodes.
The home address of the mobile node always identifies the mobile node
regardless of where the mobile node is attached.
 When away from home, a care-of address is associated with the mobile
node's home address.
 The care-of address provides information about the current point of
attachment of the mobile node.
Mobile IP uses a registration mechanism to register the care-of address
with a home agent.
The home agent redirects datagrams from the home network to the care-
of address by constructing a new IP header that contains the mobile
node's care-of address as the destination IP address.
A foreign agent adds all registered
HA is a router in-home mobile nodes to its visitor table.
network to which the Foreign Network is the current
mobile node was network to which the mobile node is
originally connected. visiting.

Fig. Mobile IP Architecture


Purpose of an IP Address
Identifies a machine’s connection to a network

Uniquely assigned in a hierarchical format.


 IANA (Internet Assigned Number Authority)
 IANA to RIRs (AfriNIC, ARIN, RIPE, APNIC, LACNIC)
 RIR to ISPs and large organisations
 ISP or company IT department to end users

 IPv4 uses unique 32-bit addresses

 IPv6 uses unique 128-bit addresses


Internet Protocol (IPv4)
 IPv4 is an IP version widely used to identify devices on a
network using an addressing system.
 It was the first version of IP deployed for production in the
ARPANET in 1983.
 It uses a 32-bit address scheme to store 2^32 addresses which is
more than 4 billion addresses.
 It is considered the primary Internet Protocol and carries 94%
of Internet traffic.
Basic Structure of an IPv4 Address
32 bit number (4 octet number):
(e.g. 133.27.162.125)
Features of IPv4

Connectionless Protocol

Allow creating a simple virtual communication layer over


diversified devices

It requires less memory, and ease of remembering addresses

Already supported protocol by millions of devices

Offers video libraries and conferences


IP version 6 (IPv6)
IPv6 designed as successor to IPv4
IPv6 is more advanced and has better features compared to IPv4.
It has the capability to provide an infinite number of addresses.
 It is replacing IPv4 to accommodate the growing number of networks
worldwide and help solve the IP address exhaustion problem.
Their differences is the appearance of the IP addresses.
IPv4 uses four 1 byte decimal numbers, separated by a dot (i.e. 192.168.1.1),
while IPv6 uses hexadecimal numbers that are separated by colons (i.e.
fe80::d4a8:6435:d2d8:d9f3b11).
IPv6 Security
 IPSec(Internet Protocol Security) is built into the IPv6 protocol, usable with a
proper key infrastructure.

 Security solutions for the mobile IP protocol are still in progress.

 IP Security (IPsec) in the IPv6 protocol can secure Mobile IPv6 more than IPv4.

 IPsec presents security services for the application and transportation layer
protocols of the TCP/IP stack.

 there are several unsolved concerns and problems with Mobile IPv6 in most cases
which justifies development of new methods to provide acceptable level of security.
Features of IPv6

Hierarchical addressing and routing infrastructure

Stateful and Stateless configuration

Support for quality of service (QoS)

An ideal protocol for neighboring node interaction


Difference between IPv4 and IPv6
IPv4
IPv4 vs IPv6
addresses are 32 bits long, consisting of four
IPv6
It addresses are 128 bits long, consisting of 8
octets, each eight bits long. fields or octets, each 16 bits long.
does not support encryption or authentication. IPv6 includes encryption and authentication.
- IPv6 allows unique address of 2128
It addresses are four octets long and written in It is made up of eight fields, each with two octets.
decimal format. As a result, IPv6 has 16 octets in total. In this
- (232) unique addresses case, the address is written in hexadecimal.
The broadcast information transfer mechanism It uses a multicasting transmission technique,
of IPv4 is used. ensuring that network services are delivered
quickly.
Checksum fields are present in IPv4. Checksum fields are not included in IPv6.
In IPv4, end-to-end connection integrity is it allows for end-to-end connection integrity.
unattainable.
DHCP and manual address settings are both DHCP, manual, auto-configuration, and
supported by IPv4. renumbering are all supported in IPv6.
Dynamic Host Configuration Protocol
DHCP is an under-the-covers mechanism that automates the
assignment of IP addresses to fixed and mobile hosts that are
connected wired or wirelessly.
When a device wants access to a network that’s using DHCP, it
sends a request for an IP address that is picked up by a DHCP server.
The server responds be delivering an IP address to the device, then
monitors the use of the address and takes it back after a specified
time or when the device shuts down.
 The IP address is then returned to the pool of addresses managed
by the DHCP server to be reassigned to another device as it seeks
access to the network.
DHCP components
DHCP server - This is a networked device running the DCHP service
that holds IP addresses and related configuration information.
DHCP client - This endpoint end point software requests and receives
configuration information from a DHCP server. This can be installed on a
computer, mobile device, computer, IoT, …
IP address pool -The range of IP addresses that are available to DHCP clients is
the IP address. Addresses are typically handed out sequentially from lowest to
highest.
• Subnet: IP networks can be partitioned into segments known as subnets.
Subnets help keep networks manageable.
• Lease : The length of time for which a DHCP client holds the IP address
information is known as the lease. When a lease expires, the client must renew it.
DHCP components
DHCP relay - A router or host that listens for client messages
being broadcast on that network and then forwards them to a
configured server is the DHCP relay.
Assigning IP addresses
Controlling lease time
DHCP networking functionality
DHCP security concerns
DHCP networking functionality
• To providing the client with the ability to connect to network and
internet resources through the IP address, the DHCP server
assigns additional networking parameters that provide efficiency
and security. These includes:
Default gateway : it is responsible for transferring data back and
forth between the local network and Internet.
Subnet mask : IP networking uses a subnet mask for separate the
host address and the network address portions of an IP address.
DNS server : Translates domain names (networkworld.com) into
IP addresses, which are represented by long strings of numbers.
Benefits of DHCP
Reliable IP address configuration

- You can’t have two users with the same IP address

Reduced network administration - DHCP provides centralized and automated


TCP/IP configuration.

Mobility - DHCP efficiently handles IP address changes for users on portable devices
who move to different locations on wired or wireless networks.

IP address optimization

Efficient change management- DHCP makes it simple for an organization to change


its IP address scheme from one range of addresses to another
Mobile Ad Hoc networks
In Latin, ad hoc literally means “for this purpose”.
An ad-hoc network is a local area network (LAN) that is built
spontaneously as devices connect.
Mobile Ad hoc Network (MANET) which is a self-organizing
infrastructure less system of cell phones communicated through remote
connection.
Ad hoc networks refer to networks created for a particular purpose.
Ad hoc networks are comprised of a group of workstations or other
wireless devices which communicate directly with each other to exchange
information.
Mobile Ad Hoc networks
Infrastructure networks pass information through a central information
hub which can be a hardware device or software on a computer.
Office networks, for example, generally use a server to which company
workstations connect to receive their information.
A Simple example for Ad Hoc Network
Nodes or devices can join together to make up a simple ad-hoc network.
Every device owes an equal status or designation in the network.
Mobile Ad hoc Network nodes can be mobile phones, tablets, laptops,
smart sensors, and automobile embedded systems.
mobile ad hoc network (MANET) is a decentralized type of wireless
network.
Wireless LAN in Ad hoc Mode
Mobile Ad-hoc Networks Routing Protocols
• Ad-hoc Networks require efficient routing protocols.

• Because determining successful routing paths and

• delivering messages in a centralized environment where

• network topology fluctuates is not a well defined problem.

• An optimal route at a certain time may not work seconds Later.


Types of mobile Ad hoc network application
Military
Hospital – medical application – for monitoring patients
Personal area network
Crisis condition
Environmental application
Problems with mobile ad hoc networks
Limited wireless range, Packet losses
Energy conservation because of limited batteries.
Low-quality communications.
Hidden-node problem creates collision if two device try to
communicate with same receiver.
Key Benefits of Mobile Ad-hoc Networks
 No expensive infrastructure must be installed.
 Use of unlicensed frequency spectrum.
 Quick distribution of information around sender.
 Use of ad-hoc networks can increase mobility and
flexibility, as ad-hoc networks can be brought up
and torn down in a very short time.
 Ad-hoc networks can be more economical in some
cases, as they eliminate fixed infrastructure costs and
reduce power consumption at mobile nodes.
Summary of ad hoc networking
Ad hoc networking will play an important role in this evolution.
Its intrinsic flexibility and ease of maintenance.

lack of needed infrastructure and auto configuration.

 self-administration capabilities and significant cost.

Advantages make it a prime candidate for becoming the stalwart


technology for personal pervasive Communication.
Protocols, TCP over Wireless Networks
Network Protocols are a set of rules governing exchange of
information in an easy, reliable and secure way.
TCP Over Wireless
 Link Layer Mechanisms
 Split TCP Solutions
 TCP Aware Link Layer Protocols
 Explicit Notification Schemes
 TCP Over Satellite
 Our Results for Satellite and Wireless Networks
Indirect TCP

I-TCP, which is an indirect transport layer protocol for mobile hosts.


 Two TCP connections:
• Fixed host to Base
• Base to Mobile
 Independent flow control on two connections
 Packets buffered in the base
Snooping TCP
• Transmission Control Protocol (TCP) is the transport layer
protocol that serves as an interface between client and server.

• Snooping TCP offers a transparent design which leave the end-end


connection of TCP intact.

• Basic idea is to buffer packets close to mobile host and perform local
retransmission in case of packet loss.
Snooping TCP, Mobile TCP
Snoop Protocol
Split connection and link level retransmission
Base monitors returning acks. Retransmits on duplicate acks and drops
the duplicate ack.
Advantages: Only soft state at BS. Only BS modified.
If wireless link delay is less than 4 packets, 3 duplicate acks will not
happen and a simple link-level retransmission without dropping duplicate
ack will also work.
Disadvantages: Does not work with encrypted packets
Does not work on asymmetric paths
Fast Retransmit / Fast Recovery
Change of foreign agent often results in packet loss.

Forced fast retransmit: as soon as the mobile host has registered


with a new foreign agent the MH sends duplicate acknowledgement
on purpose.

Advantage: simple changes result in significant higher performance.

Disadvantage: further mix of IP and TCP, no transparent approach.


Transmission/Timeout Freezing-Selective
Retransmission
Mobile hosts can be disconnected for a long time.
- no packet exchange possible.
- TCP disconnects after time-out completely.
Advantage
Scheme is independent of data
It offers a way of resume CP connection
It can be used together with encrypted data
Disadvantage
Lots of changes have to be made in software of Mobile host .
General Question
1. Difference between Cellular and Ad-hoc Networks.
2. Define Mobile Ad-hoc Network Routing Protocols.
3. What are Pros and Cons of mobile ad hoc network?
4. Why ad hoc networks?
5.

You might also like