SlideShare a Scribd company logo
Mobile Network Layer
Introduction
●

●

●

●

In this protocols and mechanisms developed for
the network layer to support mobility.
It provides protocol enhancement that allows
transparent routing of IP datagrams to mobile
nodes in the internet.
Mobile IP – Adds mobility support to the
internet network layer protocol IP.
RFC 2002 is a reference document for the
complete detail about the mobile IP.
Goals, Assumptions and
Requirements
●

Receving of IP datagram after leaving your home network.

●

Now nodes needs a so-called topologically correct address.
Quick Solution
–

–

Assign new IP address when enter into new location.
● Increase problem with higher layer protocols like TCP , as
they rely on IP layer.
● Routers are built for fast forwarding but not for fast update
of routing table.
Quick solution not working.
Entities and Terminology

●

Mobile Nodes – a host or router that changes its point of attachment from one
network or subnetwork to another.
–

●

Home Agent – a router on a mobile node's home network which tunnels
datagrams for delivery to the mobile node when it is away from home.
–

●

Mobile node change its location without changing its IP address.

Also, maintain current location information for the mobile node.

Foreign Agent – router on a mobile node's visited network which provides routing
services to the mobile node while registered.
–

It detunnel and deliver the datagram to the mobile node that were tunneled by
the mobile node's home agent
Entities and Terminology(Cont.)
●

●

●

●

Correspondent Node (CN) – partner through which MN is connected. It can be
a fixed or mobile node.
Home network – it is subnet the MN belongs to.
Foreign network – it is a current subnet the MN visits and which is not a home
network.
Care-of Address – it defines the current location of the MN from an IP point of
view.
–

All the packets sent to the MN are delivered to the COA,not directly to the IP
address of the MN

–

Marks the tunnel endpoint (i.e address where packets exit the tunnel)

–

Location of COA:●

●

Foreign agent COA – COA could be located at the FA, i.e COA is an IP
address of the FA.
Co-located COA – if the MN temporarily acquired an additional IP
address which acts a COA.This address is topologically correct , and the
tunnel endpoint is at MN.
IP packet delivery

●

●

CN wants to send an IP packet to the MN.
Internet , not having info on the current location of MN, routes the packet to the
router(Home Agent) responsible for the home network of MN.

●

HA now intercept the packet(to find current location)

●

Not found in home n/w then encapsulated and tunnelled to the COA.

●

●

●

A new header put in front of the old header showing the (FA) COA as the new
destination.
FA now decapsulates the packets (remove additional header)
Last, MN sends the packets as usual with its own fixed IP address as source and
CN's address as the destination.
Agent Discovery
●

●

One initial problem of an MN after moving is
how to find a foreign agent ?.
Two types of methods:
–
–

Agent advertisement – in this HA and FA
advertise their presence.
Agent solicitation – the mobile node send agent
solicitations messages.
Agent Advertisement
●

●

●

FA and HA advertise their presence
periodically using special agent
advertisement message.
ICMP messages are used with some mobility
extensions.
Upper part represent ICMP while lower part
represent extention needed for mobility.
Agent Advertisement Packet
●

ICMP part
–
–

Code – 0 or 16

–

#addresses – no. of addresses advertised
with this packet

–

Lifetime – length of time this advr. is valid

–

●

Type – 9

Preference – most eager router to get new
node

Extension part – for mobility
–

Type – 16

–

Length – depends on no. of COAs provided
with the msg.

–

Seq. No

–

Reg. Lifetime – max. lifetime in sec. a node
can request during reg.

–

R – reg. , B – busy , H – HA , F – FA ,
M & G – method of encapsulation , V version
Agent Solicitation
●

No agent advertisement

●

Mobile node must send agent solicitations.

●

Sould not flood the network

●

●

MN can send three solicitations msgs. , one
per sec. , as soon as enter in new network.
Discovery of new agent can be done
anytime.
Registration
●

●

●

Objective – is to inform the HA of the current
location for correct forwarding of packets
After receving COA address the MN has to
register with the HA.
Registration can be done in two ways:–
–

Registration of mobile node via the FA
Or , directly with the HA
Registration (COA is the FA)

●

If the COA is at the FA then,
–

–

MN sends its registration request containing the
COA to the FA which then forward the request to the
HA.
Now HA will do the mobility binding containing the
mobile node's home IP adress with the current
COA.
Registration (COA is co-locted)
●
●

●

If the COA is co-located.
MN send the request directly to the
HA and vice versa.
Also , a registration procedure for MNs
returning to their home network.
Registration request

●

●

●

UDP packets are used for registration requests.
IP source address is the MN interface address and IP destination address is
the FA or HA address.
Type – 1 , S – an MN wants the HA to retain prior mobility binding
B – MN want to receive broadcast packets received by HA in home n/w

●

M & G – minimal or generic routing encapsulation.

●

Destnation port – 434

●

UDP is used because of low overheads and better performance.
Registration Reply

●

Type – 3

●

code – result of the registration request

●

lifetime – validity of the registration ,

●

Home IP address

●

Home Agent address

●

64-bit identification used to match the registration request with reply
Tunneling & Encpsulation

●

●

●

●

●

It is mechanisms used for forwrding packets between the HA and
COA.
Packets entering a tunnel are forwarded inside the tunnel and leave the
tunnel unchanged.
It can be achieved by using encapsulation.
Encapsulation is the mechanism of taking a packet consisting of
packet header and data and putting it into the data part of a new
packet.
The reverse of encapsulation is decapsulation.
Encapsulation Methods
IP-in-IP encapsulation
●

Ver – IP protocol version no.

●

IHL – internet header length

●

●

●

●

TOS – type of services (copied from
inner header)
Length – complete encapsulated
packet length.
IP id. , flags , frag. offset – used
for fragments
TTL -time to live

●

IP-in-IP – upper layer protocol

●

IP checksum – error detection

IP-in-IP encapsulation packet format
Minimal Routing Encapsulation

●

In IP-in-IP several fields re redundant

●

Minimal encapsulation will remove these redundancy

●

Type – 55

●

If S bit is set , the original sender address of the CN is
included.
Generic Routing Encapsulation
●

Minimal and IP-in-IP only works for IP while
generic routing also supports other
network layer protocols

●

GRE header starts with several flags

●

C – checksum is present

●

R – offset and routing info present

●

K – key field , used for the aunthentication

●

S – sequence number present

●

●

●

s – strict source source routing is used
rsv. - is used to distinguishes GRE from IPin-IP and minimal encapsulation
Protocol – the protocol of the packet
following the GRE.
Optimization
●

●

●

●

●

Mobile IP is having inefficient behavior which is
known to be as a triangular routing
HA

To optimize the route is to inform the CN of the
current location of the MN.
And , CN will cache it in a binding chache.

1

2

The entity to inform the CN of the location is the
HA.
Optimized mobile IP protocol needs four
additional messages :–

Binding request

–

Binding update

–

Binding acknowledgement

–

Binding warning

CN

COA/MN
3
Optimized mobile IP
●

●

CN request current location from HA using
binding request.
HA return the COA address using binding
update.

●

Now CN directly send to FA old.

●

Tunnel is formed between CN nd FA old.
MN now change its location

●

●

●

●

Register with FA new
This info is forwarded to HA to update its
location.
FA new will inform FA old about the new
registration.
Still CN send data to FA old which forward the
data to FA new.

●

FA old will send the binding warning to CN.

●

then , CN sends binding request to HA

●

and get the updated FA of the MN.
DHCP
●

Dynamic Host Configuration Protocol

●

Self Study
Mobile Ad-hoc networks
●

●

●

●

●

Till now mobility of the nodes is supported by the at least some
infrastructure.(home agent, tunnel etc.)
Their are situations where their no infrastructure.
Mobiles nodes in an ad-hoc scenario comprise routing and end
system functionality.
Under those conditions we use multi-hop ad-hoc network when
describing ad-hoc networking.
Use of such network
–
–
–

Instant infrastructure
Disaster relief
Remote areas
Routing
Differences between wired n/w and ad-hoc n/w
●

●

●

●

Asymmetric link – signal quality uneven in both direction
of the link.
Redundant links – wired n/w have few redundant links
while ad-hoc will have many redundant links.
Interference – it is very high in case of wireless ad-hoc
n/w
Dynamic topology – change in topology is very frequent
which affects the routing table and routing methods.
DSDV Routing
●

●

Destination Sequence Distance Vector is an enhancement
to ditance vector routing for ad-hoc network.
Distance Vector – exchange distance vector to its
neighbors for all destination.

●

Problem with DV is the cout-to-infinity.

●

DSDV adds two things to the DV
–
–

Sequence No. - each routing adv. comes with a seq. no. Seq. no.
help to apply the advertisement in correct order.
Damping – Transient change in topology that re of short
duration should not destabilize the routing mechanisms.
DSDV Routing
●

If the sequence number of one node in the
newly received same as the corresponding
sequence number in the routing table , then
the metric will be compared and the route
with the smallest metric will be used.
DSDV Example
DSDV Example
DSR
●

Dynamic Source Routing
Problem associated with DSDV

●

Previous routing exchange routing information with all nodes ,
although currently their may be no data to exchange.

●

Cause unnecessary traffic and consumes more battery power.

●

DSR , divides the task into two :–
–

●

Route discovery – a node only discover route to a destination
want to send somthing to this destination.
Route maintenance – if a node is continuously sending packet
via a route, it has to make sure that the route is held upright.

DSR eliminates all periodic routing updates.
DSR
●

If the node receive a route request:If the node has already received the request (which is
identified using the unique identifier) , it drops the request
packet.
– If node recognizes its own address as the destination , the
request has reached its target.
– Otherwise, the node appends its own address to a list of
traversed hops in the packets and broadcast this update
request.
Destination may receive several list containing different paths
from the initiator.It could return the best path, the first path or
several path.
–

●
AODV

More Related Content

What's hot

Communication primitives
Communication primitivesCommunication primitives
Communication primitives
Student
 
WIRELESS TRANSMISSION
WIRELESS TRANSMISSIONWIRELESS TRANSMISSION
WIRELESS TRANSMISSION
junnubabu
 
Mobile IP
Mobile IPMobile IP
Mobile IP
Mukesh Chinta
 
Gprs architecture ppt
Gprs architecture pptGprs architecture ppt
Gprs architecture ppt
Arpita Sanghani
 
TCP over wireless slides
TCP over wireless slidesTCP over wireless slides
TCP over wireless slidesMahesh Rajawat
 
MEDIUM ACCESS CONTROL
MEDIUM ACCESS CONTROLMEDIUM ACCESS CONTROL
MEDIUM ACCESS CONTROL
junnubabu
 
Routing in Mobile Ad hoc Networks
Routing in Mobile Ad hoc NetworksRouting in Mobile Ad hoc Networks
Routing in Mobile Ad hoc Networks
Sayed Chhattan Shah
 
Mobile computing unit2,SDMA,FDMA,CDMA,TDMA Space Division Multi Access,Frequ...
Mobile computing unit2,SDMA,FDMA,CDMA,TDMA  Space Division Multi Access,Frequ...Mobile computing unit2,SDMA,FDMA,CDMA,TDMA  Space Division Multi Access,Frequ...
Mobile computing unit2,SDMA,FDMA,CDMA,TDMA Space Division Multi Access,Frequ...
Pallepati Vasavi
 
Umts system architecture
Umts system architectureUmts system architecture
Umts system architecture
Midhun S
 
Multiplexing in mobile computing
Multiplexing in mobile computingMultiplexing in mobile computing
Multiplexing in mobile computing
ZituSahu
 
Transport layer services
Transport layer servicesTransport layer services
Transport layer services
Melvin Cabatuan
 
Mac protocols
Mac protocolsMac protocols
Mac protocols
juno susi
 
Computer Networks Unit 2 UNIT II DATA-LINK LAYER & MEDIA ACCESS
Computer Networks Unit 2 UNIT II DATA-LINK LAYER & MEDIA ACCESSComputer Networks Unit 2 UNIT II DATA-LINK LAYER & MEDIA ACCESS
Computer Networks Unit 2 UNIT II DATA-LINK LAYER & MEDIA ACCESS
Dr. SELVAGANESAN S
 
Mobile ip overview
Mobile ip overviewMobile ip overview
Mobile ip overview
priya Nithya
 
Agent discovery& registration
Agent discovery& registrationAgent discovery& registration
Agent discovery& registration
rajisri2
 
Network layer - design Issues
Network layer - design IssuesNetwork layer - design Issues
Network layer - design Issues
قصي نسور
 
IT6601 MOBILE COMPUTING
IT6601 MOBILE COMPUTINGIT6601 MOBILE COMPUTING
IT6601 MOBILE COMPUTING
Kathirvel Ayyaswamy
 
TCP-IP Reference Model
TCP-IP Reference ModelTCP-IP Reference Model
TCP-IP Reference Model
Mukesh Tekwani
 
Handover in Mobile Computing
Handover in Mobile ComputingHandover in Mobile Computing
Handover in Mobile Computing
KABILESH RAMAR
 

What's hot (20)

Communication primitives
Communication primitivesCommunication primitives
Communication primitives
 
WIRELESS TRANSMISSION
WIRELESS TRANSMISSIONWIRELESS TRANSMISSION
WIRELESS TRANSMISSION
 
Mobile IP
Mobile IPMobile IP
Mobile IP
 
Gprs architecture ppt
Gprs architecture pptGprs architecture ppt
Gprs architecture ppt
 
TCP over wireless slides
TCP over wireless slidesTCP over wireless slides
TCP over wireless slides
 
MEDIUM ACCESS CONTROL
MEDIUM ACCESS CONTROLMEDIUM ACCESS CONTROL
MEDIUM ACCESS CONTROL
 
Routing in Mobile Ad hoc Networks
Routing in Mobile Ad hoc NetworksRouting in Mobile Ad hoc Networks
Routing in Mobile Ad hoc Networks
 
Mobile computing unit2,SDMA,FDMA,CDMA,TDMA Space Division Multi Access,Frequ...
Mobile computing unit2,SDMA,FDMA,CDMA,TDMA  Space Division Multi Access,Frequ...Mobile computing unit2,SDMA,FDMA,CDMA,TDMA  Space Division Multi Access,Frequ...
Mobile computing unit2,SDMA,FDMA,CDMA,TDMA Space Division Multi Access,Frequ...
 
Umts system architecture
Umts system architectureUmts system architecture
Umts system architecture
 
Multiplexing in mobile computing
Multiplexing in mobile computingMultiplexing in mobile computing
Multiplexing in mobile computing
 
Transport layer services
Transport layer servicesTransport layer services
Transport layer services
 
Mac protocols
Mac protocolsMac protocols
Mac protocols
 
Computer Networks Unit 2 UNIT II DATA-LINK LAYER & MEDIA ACCESS
Computer Networks Unit 2 UNIT II DATA-LINK LAYER & MEDIA ACCESSComputer Networks Unit 2 UNIT II DATA-LINK LAYER & MEDIA ACCESS
Computer Networks Unit 2 UNIT II DATA-LINK LAYER & MEDIA ACCESS
 
Mobile ip overview
Mobile ip overviewMobile ip overview
Mobile ip overview
 
Agent discovery& registration
Agent discovery& registrationAgent discovery& registration
Agent discovery& registration
 
Network layer - design Issues
Network layer - design IssuesNetwork layer - design Issues
Network layer - design Issues
 
IT6601 MOBILE COMPUTING
IT6601 MOBILE COMPUTINGIT6601 MOBILE COMPUTING
IT6601 MOBILE COMPUTING
 
TCP-IP Reference Model
TCP-IP Reference ModelTCP-IP Reference Model
TCP-IP Reference Model
 
Tcp
TcpTcp
Tcp
 
Handover in Mobile Computing
Handover in Mobile ComputingHandover in Mobile Computing
Handover in Mobile Computing
 

Viewers also liked

Basic WDM Optical Network
Basic WDM Optical NetworkBasic WDM Optical Network
Basic WDM Optical Network
daraaulia Feryando
 
Unit 2
Unit 2Unit 2
Cdma ppt for ECE
Cdma ppt for ECECdma ppt for ECE
Cdma ppt for ECE
ajitece
 
Bluetooth technology presentation
Bluetooth technology presentationBluetooth technology presentation
Bluetooth technology presentation
Krishna Kumari
 
W-LAN (Wireless Local Area Network)
W-LAN (Wireless Local Area Network)W-LAN (Wireless Local Area Network)
W-LAN (Wireless Local Area Network)
Parvesh Taneja
 

Viewers also liked (6)

Mobile network layer (mobile comm.)
Mobile network layer (mobile comm.)Mobile network layer (mobile comm.)
Mobile network layer (mobile comm.)
 
Basic WDM Optical Network
Basic WDM Optical NetworkBasic WDM Optical Network
Basic WDM Optical Network
 
Unit 2
Unit 2Unit 2
Unit 2
 
Cdma ppt for ECE
Cdma ppt for ECECdma ppt for ECE
Cdma ppt for ECE
 
Bluetooth technology presentation
Bluetooth technology presentationBluetooth technology presentation
Bluetooth technology presentation
 
W-LAN (Wireless Local Area Network)
W-LAN (Wireless Local Area Network)W-LAN (Wireless Local Area Network)
W-LAN (Wireless Local Area Network)
 

Similar to Mobile Network Layer

Mobile network layer
Mobile network layerMobile network layer
Mobile network layer
Vikram Nandini
 
Mobile computing Mobile Transport Layer
Mobile computing Mobile Transport LayerMobile computing Mobile Transport Layer
Mobile computing Mobile Transport Layer
Jyothishmathi Institute of Technology and Science Karimnagar
 
MOBILE COMPUTING Unit 2.pptx
MOBILE COMPUTING Unit 2.pptxMOBILE COMPUTING Unit 2.pptx
MOBILE COMPUTING Unit 2.pptx
karthiksmart21
 
Unit 3
Unit 3Unit 3
Cs8601 3
Cs8601 3Cs8601 3
Cs8601 3
Cs8601 3Cs8601 3
unit-2 mc.pdf
unit-2 mc.pdfunit-2 mc.pdf
unit-2 mc.pdf
RSathyaPriyaCSEKIOT
 
Mobile IP
Mobile IPMobile IP
Mobile IP
Nijo Job
 
It2402 mobile communication unit 4
It2402 mobile communication unit 4It2402 mobile communication unit 4
It2402 mobile communication unit 4
RMK ENGINEERING COLLEGE, CHENNAI
 
IT6601 MOBILE COMPUTING
IT6601 MOBILE COMPUTINGIT6601 MOBILE COMPUTING
IT6601 MOBILE COMPUTING
Kathirvel Ayyaswamy
 
Mobile IP
Mobile IPMobile IP
Mobile IP
shankul07
 
Module 05 mobility management (1)
Module 05   mobility management (1)Module 05   mobility management (1)
Module 05 mobility management (1)
JIGNESH PATEL
 
Mobile internet protocol
Mobile internet protocolMobile internet protocol
Mobile internet protocol
SaranyaK68
 
MOBILE IP,DHCP,ADHOC ROUTING PROTOCOLS
MOBILE IP,DHCP,ADHOC ROUTING PROTOCOLSMOBILE IP,DHCP,ADHOC ROUTING PROTOCOLS
MOBILE IP,DHCP,ADHOC ROUTING PROTOCOLS
Manju La
 
ACN.pptx
ACN.pptxACN.pptx
ACN.pptx
SrinivaS K
 
entities terminology
entities terminologyentities terminology
entities terminology
rajisri2
 
Mobile Communication
Mobile CommunicationMobile Communication
Mobile Communication
Kathirvel Ayyaswamy
 
Mobile IP.pdf
Mobile IP.pdfMobile IP.pdf
Mobile IP.pdf
Arul Jothi Yuvaraja
 

Similar to Mobile Network Layer (20)

Mobile network layer
Mobile network layerMobile network layer
Mobile network layer
 
Mobile computing Mobile Transport Layer
Mobile computing Mobile Transport LayerMobile computing Mobile Transport Layer
Mobile computing Mobile Transport Layer
 
Mobileip 161105154557
Mobileip 161105154557Mobileip 161105154557
Mobileip 161105154557
 
Mobileip 161105154557
Mobileip 161105154557Mobileip 161105154557
Mobileip 161105154557
 
MOBILE COMPUTING Unit 2.pptx
MOBILE COMPUTING Unit 2.pptxMOBILE COMPUTING Unit 2.pptx
MOBILE COMPUTING Unit 2.pptx
 
Unit 3
Unit 3Unit 3
Unit 3
 
Cs8601 3
Cs8601 3Cs8601 3
Cs8601 3
 
Cs8601 3
Cs8601 3Cs8601 3
Cs8601 3
 
unit-2 mc.pdf
unit-2 mc.pdfunit-2 mc.pdf
unit-2 mc.pdf
 
Mobile IP
Mobile IPMobile IP
Mobile IP
 
It2402 mobile communication unit 4
It2402 mobile communication unit 4It2402 mobile communication unit 4
It2402 mobile communication unit 4
 
IT6601 MOBILE COMPUTING
IT6601 MOBILE COMPUTINGIT6601 MOBILE COMPUTING
IT6601 MOBILE COMPUTING
 
Mobile IP
Mobile IPMobile IP
Mobile IP
 
Module 05 mobility management (1)
Module 05   mobility management (1)Module 05   mobility management (1)
Module 05 mobility management (1)
 
Mobile internet protocol
Mobile internet protocolMobile internet protocol
Mobile internet protocol
 
MOBILE IP,DHCP,ADHOC ROUTING PROTOCOLS
MOBILE IP,DHCP,ADHOC ROUTING PROTOCOLSMOBILE IP,DHCP,ADHOC ROUTING PROTOCOLS
MOBILE IP,DHCP,ADHOC ROUTING PROTOCOLS
 
ACN.pptx
ACN.pptxACN.pptx
ACN.pptx
 
entities terminology
entities terminologyentities terminology
entities terminology
 
Mobile Communication
Mobile CommunicationMobile Communication
Mobile Communication
 
Mobile IP.pdf
Mobile IP.pdfMobile IP.pdf
Mobile IP.pdf
 

More from Rahul Hada

P4 foundation
P4 foundationP4 foundation
P4 foundation
Rahul Hada
 
P4 foundation
P4 foundationP4 foundation
P4 foundation
Rahul Hada
 
Socio-technical System
Socio-technical SystemSocio-technical System
Socio-technical System
Rahul Hada
 
Software Engineering Introduction
Software Engineering IntroductionSoftware Engineering Introduction
Software Engineering Introduction
Rahul Hada
 
Inheritance
InheritanceInheritance
Inheritance
Rahul Hada
 
Socket Programming using Java
Socket Programming using JavaSocket Programming using Java
Socket Programming using JavaRahul Hada
 
Building Complex Topology using NS3
Building Complex Topology using NS3Building Complex Topology using NS3
Building Complex Topology using NS3
Rahul Hada
 
Building Topology in NS3
Building Topology in NS3Building Topology in NS3
Building Topology in NS3
Rahul Hada
 
NS3 Overview
NS3 OverviewNS3 Overview
NS3 Overview
Rahul Hada
 
1 session installation
1 session installation1 session installation
1 session installation
Rahul Hada
 
Introduction to Virtualization
Introduction to VirtualizationIntroduction to Virtualization
Introduction to Virtualization
Rahul Hada
 
Introduction of Cloud Computing
Introduction of Cloud ComputingIntroduction of Cloud Computing
Introduction of Cloud Computing
Rahul Hada
 
Fundamental of Shell Programming
Fundamental of Shell ProgrammingFundamental of Shell Programming
Fundamental of Shell Programming
Rahul Hada
 
Support formobility
Support formobilitySupport formobility
Support formobilityRahul Hada
 
WLAN - IEEE 802.11
WLAN - IEEE 802.11WLAN - IEEE 802.11
WLAN - IEEE 802.11
Rahul Hada
 
Quality planning
Quality planningQuality planning
Quality planning
Rahul Hada
 
Risk
RiskRisk

More from Rahul Hada (18)

P4 foundation
P4 foundationP4 foundation
P4 foundation
 
P4 foundation
P4 foundationP4 foundation
P4 foundation
 
Socio-technical System
Socio-technical SystemSocio-technical System
Socio-technical System
 
Software Engineering Introduction
Software Engineering IntroductionSoftware Engineering Introduction
Software Engineering Introduction
 
Inheritance
InheritanceInheritance
Inheritance
 
Socket Programming using Java
Socket Programming using JavaSocket Programming using Java
Socket Programming using Java
 
Building Complex Topology using NS3
Building Complex Topology using NS3Building Complex Topology using NS3
Building Complex Topology using NS3
 
Building Topology in NS3
Building Topology in NS3Building Topology in NS3
Building Topology in NS3
 
NS3 Overview
NS3 OverviewNS3 Overview
NS3 Overview
 
1 session installation
1 session installation1 session installation
1 session installation
 
Introduction to Virtualization
Introduction to VirtualizationIntroduction to Virtualization
Introduction to Virtualization
 
Introduction of Cloud Computing
Introduction of Cloud ComputingIntroduction of Cloud Computing
Introduction of Cloud Computing
 
Fundamental of Shell Programming
Fundamental of Shell ProgrammingFundamental of Shell Programming
Fundamental of Shell Programming
 
Support formobility
Support formobilitySupport formobility
Support formobility
 
WLAN - IEEE 802.11
WLAN - IEEE 802.11WLAN - IEEE 802.11
WLAN - IEEE 802.11
 
Quality planning
Quality planningQuality planning
Quality planning
 
Risk
RiskRisk
Risk
 
Risk
RiskRisk
Risk
 

Recently uploaded

Unit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdfUnit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdf
Thiyagu K
 
Overview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with MechanismOverview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with Mechanism
DeeptiGupta154
 
Biological Screening of Herbal Drugs in detailed.
Biological Screening of Herbal Drugs in detailed.Biological Screening of Herbal Drugs in detailed.
Biological Screening of Herbal Drugs in detailed.
Ashokrao Mane college of Pharmacy Peth-Vadgaon
 
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
EugeneSaldivar
 
Synthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptxSynthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptx
Pavel ( NSTU)
 
special B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdfspecial B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdf
Special education needs
 
CLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCE
CLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCECLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCE
CLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCE
BhavyaRajput3
 
Unit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdfUnit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdf
Thiyagu K
 
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
siemaillard
 
Home assignment II on Spectroscopy 2024 Answers.pdf
Home assignment II on Spectroscopy 2024 Answers.pdfHome assignment II on Spectroscopy 2024 Answers.pdf
Home assignment II on Spectroscopy 2024 Answers.pdf
Tamralipta Mahavidyalaya
 
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXXPhrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
MIRIAMSALINAS13
 
The Roman Empire A Historical Colossus.pdf
The Roman Empire A Historical Colossus.pdfThe Roman Empire A Historical Colossus.pdf
The Roman Empire A Historical Colossus.pdf
kaushalkr1407
 
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdf
Welcome to TechSoup   New Member Orientation and Q&A (May 2024).pdfWelcome to TechSoup   New Member Orientation and Q&A (May 2024).pdf
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdf
TechSoup
 
Sha'Carri Richardson Presentation 202345
Sha'Carri Richardson Presentation 202345Sha'Carri Richardson Presentation 202345
Sha'Carri Richardson Presentation 202345
beazzy04
 
Lapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdfLapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdf
Jean Carlos Nunes Paixão
 
Operation Blue Star - Saka Neela Tara
Operation Blue Star   -  Saka Neela TaraOperation Blue Star   -  Saka Neela Tara
Operation Blue Star - Saka Neela Tara
Balvir Singh
 
Supporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptxSupporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptx
Jisc
 
Digital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and ResearchDigital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and Research
Vikramjit Singh
 
How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17
Celine George
 
"Protectable subject matters, Protection in biotechnology, Protection of othe...
"Protectable subject matters, Protection in biotechnology, Protection of othe..."Protectable subject matters, Protection in biotechnology, Protection of othe...
"Protectable subject matters, Protection in biotechnology, Protection of othe...
SACHIN R KONDAGURI
 

Recently uploaded (20)

Unit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdfUnit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdf
 
Overview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with MechanismOverview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with Mechanism
 
Biological Screening of Herbal Drugs in detailed.
Biological Screening of Herbal Drugs in detailed.Biological Screening of Herbal Drugs in detailed.
Biological Screening of Herbal Drugs in detailed.
 
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
 
Synthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptxSynthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptx
 
special B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdfspecial B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdf
 
CLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCE
CLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCECLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCE
CLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCE
 
Unit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdfUnit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdf
 
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
 
Home assignment II on Spectroscopy 2024 Answers.pdf
Home assignment II on Spectroscopy 2024 Answers.pdfHome assignment II on Spectroscopy 2024 Answers.pdf
Home assignment II on Spectroscopy 2024 Answers.pdf
 
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXXPhrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
 
The Roman Empire A Historical Colossus.pdf
The Roman Empire A Historical Colossus.pdfThe Roman Empire A Historical Colossus.pdf
The Roman Empire A Historical Colossus.pdf
 
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdf
Welcome to TechSoup   New Member Orientation and Q&A (May 2024).pdfWelcome to TechSoup   New Member Orientation and Q&A (May 2024).pdf
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdf
 
Sha'Carri Richardson Presentation 202345
Sha'Carri Richardson Presentation 202345Sha'Carri Richardson Presentation 202345
Sha'Carri Richardson Presentation 202345
 
Lapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdfLapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdf
 
Operation Blue Star - Saka Neela Tara
Operation Blue Star   -  Saka Neela TaraOperation Blue Star   -  Saka Neela Tara
Operation Blue Star - Saka Neela Tara
 
Supporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptxSupporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptx
 
Digital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and ResearchDigital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and Research
 
How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17
 
"Protectable subject matters, Protection in biotechnology, Protection of othe...
"Protectable subject matters, Protection in biotechnology, Protection of othe..."Protectable subject matters, Protection in biotechnology, Protection of othe...
"Protectable subject matters, Protection in biotechnology, Protection of othe...
 

Mobile Network Layer

  • 2. Introduction ● ● ● ● In this protocols and mechanisms developed for the network layer to support mobility. It provides protocol enhancement that allows transparent routing of IP datagrams to mobile nodes in the internet. Mobile IP – Adds mobility support to the internet network layer protocol IP. RFC 2002 is a reference document for the complete detail about the mobile IP.
  • 3. Goals, Assumptions and Requirements ● Receving of IP datagram after leaving your home network. ● Now nodes needs a so-called topologically correct address. Quick Solution – – Assign new IP address when enter into new location. ● Increase problem with higher layer protocols like TCP , as they rely on IP layer. ● Routers are built for fast forwarding but not for fast update of routing table. Quick solution not working.
  • 4. Entities and Terminology ● Mobile Nodes – a host or router that changes its point of attachment from one network or subnetwork to another. – ● Home Agent – a router on a mobile node's home network which tunnels datagrams for delivery to the mobile node when it is away from home. – ● Mobile node change its location without changing its IP address. Also, maintain current location information for the mobile node. Foreign Agent – router on a mobile node's visited network which provides routing services to the mobile node while registered. – It detunnel and deliver the datagram to the mobile node that were tunneled by the mobile node's home agent
  • 5. Entities and Terminology(Cont.) ● ● ● ● Correspondent Node (CN) – partner through which MN is connected. It can be a fixed or mobile node. Home network – it is subnet the MN belongs to. Foreign network – it is a current subnet the MN visits and which is not a home network. Care-of Address – it defines the current location of the MN from an IP point of view. – All the packets sent to the MN are delivered to the COA,not directly to the IP address of the MN – Marks the tunnel endpoint (i.e address where packets exit the tunnel) – Location of COA:● ● Foreign agent COA – COA could be located at the FA, i.e COA is an IP address of the FA. Co-located COA – if the MN temporarily acquired an additional IP address which acts a COA.This address is topologically correct , and the tunnel endpoint is at MN.
  • 6. IP packet delivery ● ● CN wants to send an IP packet to the MN. Internet , not having info on the current location of MN, routes the packet to the router(Home Agent) responsible for the home network of MN. ● HA now intercept the packet(to find current location) ● Not found in home n/w then encapsulated and tunnelled to the COA. ● ● ● A new header put in front of the old header showing the (FA) COA as the new destination. FA now decapsulates the packets (remove additional header) Last, MN sends the packets as usual with its own fixed IP address as source and CN's address as the destination.
  • 7. Agent Discovery ● ● One initial problem of an MN after moving is how to find a foreign agent ?. Two types of methods: – – Agent advertisement – in this HA and FA advertise their presence. Agent solicitation – the mobile node send agent solicitations messages.
  • 8. Agent Advertisement ● ● ● FA and HA advertise their presence periodically using special agent advertisement message. ICMP messages are used with some mobility extensions. Upper part represent ICMP while lower part represent extention needed for mobility.
  • 9. Agent Advertisement Packet ● ICMP part – – Code – 0 or 16 – #addresses – no. of addresses advertised with this packet – Lifetime – length of time this advr. is valid – ● Type – 9 Preference – most eager router to get new node Extension part – for mobility – Type – 16 – Length – depends on no. of COAs provided with the msg. – Seq. No – Reg. Lifetime – max. lifetime in sec. a node can request during reg. – R – reg. , B – busy , H – HA , F – FA , M & G – method of encapsulation , V version
  • 10. Agent Solicitation ● No agent advertisement ● Mobile node must send agent solicitations. ● Sould not flood the network ● ● MN can send three solicitations msgs. , one per sec. , as soon as enter in new network. Discovery of new agent can be done anytime.
  • 11. Registration ● ● ● Objective – is to inform the HA of the current location for correct forwarding of packets After receving COA address the MN has to register with the HA. Registration can be done in two ways:– – Registration of mobile node via the FA Or , directly with the HA
  • 12. Registration (COA is the FA) ● If the COA is at the FA then, – – MN sends its registration request containing the COA to the FA which then forward the request to the HA. Now HA will do the mobility binding containing the mobile node's home IP adress with the current COA.
  • 13. Registration (COA is co-locted) ● ● ● If the COA is co-located. MN send the request directly to the HA and vice versa. Also , a registration procedure for MNs returning to their home network.
  • 14. Registration request ● ● ● UDP packets are used for registration requests. IP source address is the MN interface address and IP destination address is the FA or HA address. Type – 1 , S – an MN wants the HA to retain prior mobility binding B – MN want to receive broadcast packets received by HA in home n/w ● M & G – minimal or generic routing encapsulation. ● Destnation port – 434 ● UDP is used because of low overheads and better performance.
  • 15. Registration Reply ● Type – 3 ● code – result of the registration request ● lifetime – validity of the registration , ● Home IP address ● Home Agent address ● 64-bit identification used to match the registration request with reply
  • 16. Tunneling & Encpsulation ● ● ● ● ● It is mechanisms used for forwrding packets between the HA and COA. Packets entering a tunnel are forwarded inside the tunnel and leave the tunnel unchanged. It can be achieved by using encapsulation. Encapsulation is the mechanism of taking a packet consisting of packet header and data and putting it into the data part of a new packet. The reverse of encapsulation is decapsulation.
  • 17. Encapsulation Methods IP-in-IP encapsulation ● Ver – IP protocol version no. ● IHL – internet header length ● ● ● ● TOS – type of services (copied from inner header) Length – complete encapsulated packet length. IP id. , flags , frag. offset – used for fragments TTL -time to live ● IP-in-IP – upper layer protocol ● IP checksum – error detection IP-in-IP encapsulation packet format
  • 18. Minimal Routing Encapsulation ● In IP-in-IP several fields re redundant ● Minimal encapsulation will remove these redundancy ● Type – 55 ● If S bit is set , the original sender address of the CN is included.
  • 19. Generic Routing Encapsulation ● Minimal and IP-in-IP only works for IP while generic routing also supports other network layer protocols ● GRE header starts with several flags ● C – checksum is present ● R – offset and routing info present ● K – key field , used for the aunthentication ● S – sequence number present ● ● ● s – strict source source routing is used rsv. - is used to distinguishes GRE from IPin-IP and minimal encapsulation Protocol – the protocol of the packet following the GRE.
  • 20. Optimization ● ● ● ● ● Mobile IP is having inefficient behavior which is known to be as a triangular routing HA To optimize the route is to inform the CN of the current location of the MN. And , CN will cache it in a binding chache. 1 2 The entity to inform the CN of the location is the HA. Optimized mobile IP protocol needs four additional messages :– Binding request – Binding update – Binding acknowledgement – Binding warning CN COA/MN 3
  • 21. Optimized mobile IP ● ● CN request current location from HA using binding request. HA return the COA address using binding update. ● Now CN directly send to FA old. ● Tunnel is formed between CN nd FA old. MN now change its location ● ● ● ● Register with FA new This info is forwarded to HA to update its location. FA new will inform FA old about the new registration. Still CN send data to FA old which forward the data to FA new. ● FA old will send the binding warning to CN. ● then , CN sends binding request to HA ● and get the updated FA of the MN.
  • 22. DHCP ● Dynamic Host Configuration Protocol ● Self Study
  • 23. Mobile Ad-hoc networks ● ● ● ● ● Till now mobility of the nodes is supported by the at least some infrastructure.(home agent, tunnel etc.) Their are situations where their no infrastructure. Mobiles nodes in an ad-hoc scenario comprise routing and end system functionality. Under those conditions we use multi-hop ad-hoc network when describing ad-hoc networking. Use of such network – – – Instant infrastructure Disaster relief Remote areas
  • 24. Routing Differences between wired n/w and ad-hoc n/w ● ● ● ● Asymmetric link – signal quality uneven in both direction of the link. Redundant links – wired n/w have few redundant links while ad-hoc will have many redundant links. Interference – it is very high in case of wireless ad-hoc n/w Dynamic topology – change in topology is very frequent which affects the routing table and routing methods.
  • 25. DSDV Routing ● ● Destination Sequence Distance Vector is an enhancement to ditance vector routing for ad-hoc network. Distance Vector – exchange distance vector to its neighbors for all destination. ● Problem with DV is the cout-to-infinity. ● DSDV adds two things to the DV – – Sequence No. - each routing adv. comes with a seq. no. Seq. no. help to apply the advertisement in correct order. Damping – Transient change in topology that re of short duration should not destabilize the routing mechanisms.
  • 26. DSDV Routing ● If the sequence number of one node in the newly received same as the corresponding sequence number in the routing table , then the metric will be compared and the route with the smallest metric will be used.
  • 29. DSR ● Dynamic Source Routing Problem associated with DSDV ● Previous routing exchange routing information with all nodes , although currently their may be no data to exchange. ● Cause unnecessary traffic and consumes more battery power. ● DSR , divides the task into two :– – ● Route discovery – a node only discover route to a destination want to send somthing to this destination. Route maintenance – if a node is continuously sending packet via a route, it has to make sure that the route is held upright. DSR eliminates all periodic routing updates.
  • 30. DSR ● If the node receive a route request:If the node has already received the request (which is identified using the unique identifier) , it drops the request packet. – If node recognizes its own address as the destination , the request has reached its target. – Otherwise, the node appends its own address to a list of traversed hops in the packets and broadcast this update request. Destination may receive several list containing different paths from the initiator.It could return the best path, the first path or several path. – ●
  • 31. AODV