Professional Documents
Culture Documents
• The destination address not only determines the receiver of the packet, but
physical subnet with the
also the physical subnet of the receiver. network prefix
1.
CN router
3.
home router router
2. MN
network HA FA
4.
foreign
Internet network
1.
CN router
3.
home router router
2. MN
network HA FA
4.
foreign
Internet network
1.
CN router
3.
home router router
2. MN
network HA FA
4.
foreign
Internet network
1.
CN router
3.
home router router
2. MN
network HA FA
4.
foreign
Internet network
1.
CN router
3.
home router router
2. MN
network HA FA
4.
foreign
Internet network
1.
CN router
HA
1 MN
receiver
¤ The new header is also called the outer header. Additionally, there is an
inner header which can be identical to the original header as this is the case
original IP header original data
for IP-in-IP encapsulation
new IP header new data
¤ The FA is not needed any more. A CN only has to be able to process binding
updates, i.e., to create or to update an entry in the routing cache.
¤ However, IPv6 does not solve any firewall or privacy problems. Additional
mechanisms on higher layers are needed for this.
¤ Mobile IPv6 route optimization can operate securely even without pre-arranged security
associations
¤ Route optimization coexists efficiently with routers that perform "ingress filtering"
¤ Most packets sent to a mobile node while away from home in Mobile IPv6 are sent using
an IPv6 routing header rather than IP encapsulation
provide access to other networks, but also include forwarding functions, medium access
control etc.
between the wireless nodes and the access point , but not directly between the wireless nodes.
Infrastructure-based wireless networks
The access point does not just control medium access, but also acts as a bridge to other wireless or wired networks.
Several wireless networks may form one logical wireless network, so the access points together with the fixed network in
between can connect several wireless networks to form a larger network beyond actual radio coverage. Design of
This structure is reminiscent of switched Ethernet or other star-based networks, where a central element (e.g., a switch)
Typical cellular phone networks are infrastructure-based networks for a wide area . Also satellite-based cellular phones
Nodes within an ad-hoc network can only communicate if they can reach each other physically, i.e., if they are within
each others radio range or if other nodes can forward the message.
In ad-hoc networks, the complexity of each node is higher because every node has to implement medium access
mechanisms
IEEE 802.11 and HiperLAN2 are typically infrastructure-based networks, which additionally support ad-hoc
B
A A
B
• Ad hoc networks:
• Do not need backbone infrastructure support
• Are easy to deploy
• Useful when infrastructure is absent, destroyed or impractical
Characteristics of Ad Hoc Networks
39
Three Main Issues in Ants’ Life
Route Discovery:
• searching for the places with food
Packet Forwarding:
• delivering foods back home
Route Maintenance:
• when foods move to new place
tseng:40
Proactive vs. Reactive Routing
Proactive Routing Protocol:
continuously evaluate the routes
attempt to maintain consistent, up-to-date routing information
when a route is needed, one may be ready immediately
when the network topology changes
the protocol responds by propagating updates throughout the network to maintain a consistent view
Reactive Routing Protocol:
on-demand
Ex: DSR, AODV
tseng:41
Ad hoc routing protocols
AD-HOC MOBILE ROUTING
PROTOCOLS
ZRP
tseng:42
Routing in MANETS - Goals
• Provide the maximum possible reliability - use alternative routes if an intermediate node
fails.
• Choose a route with the least cost metric.
• Give the nodes the best possible response time and throughput.
• Route computation must be distributed. Centralized routing in a dynamic network is
usually very expensive.
• Every node must have quick access to routes on demand.
• Each node must be only concerned about the routes to its destination.
• Broadcasts should be avoided (highly unreliable)
• It is desirable to have a backup route when the primary route has become stale.
43
• While in wireless networks with infrastructure support a base station always
reaches all mobile nodes, this is not always the case in an ad-hoc network.
N1 N1
N2 N3
N3 N2
N4 N4
N5 N5
A A A
B B B
Asymmetric links
N1 N2
Ad-hoc networks
N3
N1 N2 N5
N4
• Each node exchanges its neighbor table periodically with its neighbors. Changes
at one node in the network propagate slowly through the network.
• The strategies to avoid this problem which are used in fixed networks do not help
in the case of wireless ad-hoc networks, due to the rapidly changing topology.
EC6802 WIRELESS NETWORKS 50
DSDV now adds two things to the distance vector algorithm:
Sequence numbers: Each routing advertisement comes with a sequence number. Within
ad-hoc networks, advertisements may propagate along many paths. Sequence numbers
help to apply the advertisements in correct order. This avoids the loops that are likely
with the unchanged distance vector algorithm.
Damping: Transient changes in topology that are of short duration should not
destabilize the routing mechanisms. Advertisements containing changes in the topology
currently stored are therefore not disseminated further. A node waits with
dissemination if these changes are probably unstable. Waiting time depends on the time
between the first and the best announcement of a path to a certain destination.
EC6802 WIRELESS NETWORKS 51
N1
N2
N3
N4
N5
• When node S wants to send a packet to node D, but does not know a
route to D, node S initiates a route discovery
Z
S E
F
B
C M L
J
A G
H D
K
I N
[S] Z
S E
F
B
C M L
J
A G
H D
K
I N
Z
S [S,E]
E
F
B
C M L
J
A [S,C] G
H D
K
I N
Z
S E
F [S,E,F]
B
C M L
J
A G
H D
[S,C,G] K
I N
Z
S E
F [S,E,F,J]
B
C M L
J
A G
H D
K
I [S,C,G,K] N
Z
S E
[S,E,F,J,M]
F
B
C M L
J
A G
H D
K
I N
Z
S RREP [S,E,F,J,D]
E
F
B
C M L
J
A G
H D
K
I N
Route Reply can be sent by reversing the route in Route Request (RREQ) only if links are
guaranteed to be bi-directional
• To ensure this, RREQ should be forwarded only if it received on a link that is known to
be bi-directional
If unidirectional (asymmetric) links are allowed, then RREP may need a route discovery for
S from node D
• Unless node D already knows a route to node S
• If a route discovery is initiated by D for a route to S, then the Route Reply is
piggybacked on the Route Request from D.
• Packet header size grows with route length due to source routing
• Flood of route requests may potentially reach all nodes in the network
• Care must be taken to avoid collisions between route requests propagated by
neighboring nodes
• insertion of random delays before forwarding RREQ
• Increased contention if too many route replies come back due to nodes replying using
their local cache
• Route Reply Storm problem
• Reply storm may be eased by preventing a node from sending RREP if it hears
another RREP with a shorter route