Mobile Network Layer protocols and mechanisms allow nodes to change their point of attachment to different networks while maintaining ongoing communication. Key concepts include:
- Mobile IP adds mobility support to IP, allowing nodes to use the same IP address even when changing networks. It relies on home agents and care-of addresses.
- Registration allows mobile nodes to inform their home agent of their current location when visiting foreign networks. Tunneling and encapsulation techniques are used to forward packets to mobile nodes' current locations.
- Various routing protocols like DSDV have been developed for mobile ad hoc networks which have no fixed infrastructure and dynamic topologies.
Motivation for a specialized MAC (Hidden and exposed terminals, Near and far terminals), SDMA, FDMA, TDMA, CDMA, Wireless LAN/(IEEE 802.11)
Mobile Network Layer: IP and Mobile IP Network Layers, Packet Delivery and Handover Management, Location Management, Registration, Tunneling and Encapsulation, Route Optimization, DHCP
Motivation for a specialized MAC (Hidden and exposed terminals, Near and far terminals), SDMA, FDMA, TDMA, CDMA, Wireless LAN/(IEEE 802.11)
Mobile Network Layer: IP and Mobile IP Network Layers, Packet Delivery and Handover Management, Location Management, Registration, Tunneling and Encapsulation, Route Optimization, DHCP
Wireless communication is the transfer of information between two or more points that are not connected by an electrical conductor.
The most common wireless technologies use radio
In the seven-layer OSI model of computer networking, media access control (MAC) data communication protocol is a sublayer of the data link layer (layer 2). The MAC sublayer provides addressing and channel access control mechanisms that make it possible for several terminals or network nodes to communicate within a multiple access network that incorporates a shared medium, e.g. an Ethernet network. The hardware that implements the MAC is referred to as a media access controller.
The MAC sublayer acts as an interface between the logical link control (LLC) sublayer and the network's physical layer. The MAC layer emulates a full-duplex logical communication channel in a multi-point network. This channel may provide unicast, multicast or broadcast communication service.
Network layer - design Issues ,Store-and-Forward Packet Switching, Services Provided to the Transport Layer, Which service is the best , Implementation of Service , Implementation of Connectionless Service , Implementation of Connection-Oriented Service
Unit - I
Mobile Computing – Mobile Computing Vs wireless Networking – Mobile Computing Applications – Characteristics of Mobile computing – Structure of Mobile Computing Application. MAC Protocols – Wireless MAC Issues – Fixed Assignment Schemes – Random Assignment Schemes – Reservation Based Schemes.
Wireless communication is the transfer of information between two or more points that are not connected by an electrical conductor.
The most common wireless technologies use radio
In the seven-layer OSI model of computer networking, media access control (MAC) data communication protocol is a sublayer of the data link layer (layer 2). The MAC sublayer provides addressing and channel access control mechanisms that make it possible for several terminals or network nodes to communicate within a multiple access network that incorporates a shared medium, e.g. an Ethernet network. The hardware that implements the MAC is referred to as a media access controller.
The MAC sublayer acts as an interface between the logical link control (LLC) sublayer and the network's physical layer. The MAC layer emulates a full-duplex logical communication channel in a multi-point network. This channel may provide unicast, multicast or broadcast communication service.
Network layer - design Issues ,Store-and-Forward Packet Switching, Services Provided to the Transport Layer, Which service is the best , Implementation of Service , Implementation of Connectionless Service , Implementation of Connection-Oriented Service
Unit - I
Mobile Computing – Mobile Computing Vs wireless Networking – Mobile Computing Applications – Characteristics of Mobile computing – Structure of Mobile Computing Application. MAC Protocols – Wireless MAC Issues – Fixed Assignment Schemes – Random Assignment Schemes – Reservation Based Schemes.
UNIT IV MOBILE NETWORK AND TRANSPORT LAYERS
Mobile IP – Dynamic Host Configuration Protocol-Mobile Ad Hoc Routing Protocols–Multicast routing-TCP over Wireless Networks – Indirect TCP – Snooping TCP – Mobile TCP – Fast Retransmit / Fast Recovery – Transmission/Timeout Freezing-Selective Retransmission – Transaction Oriented TCP- TCP over 2.5 / 3G wireless Networks
MOBILE INTERNET PROTOCOL AND TRANSPORT LAYER
Overview of Mobile IP – Features of Mobile IP – Key Mechanism in Mobile IP – route Optimization. Overview of TCP/IP – Architecture of TCP/IP- Adaptation of TCP Window – Improvement in TCP Performance.
This slides will provide viewers a complete understanding of all the different virtualization techniques.
The main reference for the presentation is taken from Mastering cloud computing By Rajkumar Buyya.
presentation will make you aware about the programming techniques in shell , and will help you to build more strong foundation into the world of shell programming.
Unit 8 - Information and Communication Technology (Paper I).pdfThiyagu K
This slides describes the basic concepts of ICT, basics of Email, Emerging Technology and Digital Initiatives in Education. This presentations aligns with the UGC Paper I syllabus.
Biological screening of herbal drugs: Introduction and Need for
Phyto-Pharmacological Screening, New Strategies for evaluating
Natural Products, In vitro evaluation techniques for Antioxidants, Antimicrobial and Anticancer drugs. In vivo evaluation techniques
for Anti-inflammatory, Antiulcer, Anticancer, Wound healing, Antidiabetic, Hepatoprotective, Cardio protective, Diuretics and
Antifertility, Toxicity studies as per OECD guidelines
Synthetic Fiber Construction in lab .pptxPavel ( NSTU)
Synthetic fiber production is a fascinating and complex field that blends chemistry, engineering, and environmental science. By understanding these aspects, students can gain a comprehensive view of synthetic fiber production, its impact on society and the environment, and the potential for future innovations. Synthetic fibers play a crucial role in modern society, impacting various aspects of daily life, industry, and the environment. ynthetic fibers are integral to modern life, offering a range of benefits from cost-effectiveness and versatility to innovative applications and performance characteristics. While they pose environmental challenges, ongoing research and development aim to create more sustainable and eco-friendly alternatives. Understanding the importance of synthetic fibers helps in appreciating their role in the economy, industry, and daily life, while also emphasizing the need for sustainable practices and innovation.
The Roman Empire A Historical Colossus.pdfkaushalkr1407
The Roman Empire, a vast and enduring power, stands as one of history's most remarkable civilizations, leaving an indelible imprint on the world. It emerged from the Roman Republic, transitioning into an imperial powerhouse under the leadership of Augustus Caesar in 27 BCE. This transformation marked the beginning of an era defined by unprecedented territorial expansion, architectural marvels, and profound cultural influence.
The empire's roots lie in the city of Rome, founded, according to legend, by Romulus in 753 BCE. Over centuries, Rome evolved from a small settlement to a formidable republic, characterized by a complex political system with elected officials and checks on power. However, internal strife, class conflicts, and military ambitions paved the way for the end of the Republic. Julius Caesar’s dictatorship and subsequent assassination in 44 BCE created a power vacuum, leading to a civil war. Octavian, later Augustus, emerged victorious, heralding the Roman Empire’s birth.
Under Augustus, the empire experienced the Pax Romana, a 200-year period of relative peace and stability. Augustus reformed the military, established efficient administrative systems, and initiated grand construction projects. The empire's borders expanded, encompassing territories from Britain to Egypt and from Spain to the Euphrates. Roman legions, renowned for their discipline and engineering prowess, secured and maintained these vast territories, building roads, fortifications, and cities that facilitated control and integration.
The Roman Empire’s society was hierarchical, with a rigid class system. At the top were the patricians, wealthy elites who held significant political power. Below them were the plebeians, free citizens with limited political influence, and the vast numbers of slaves who formed the backbone of the economy. The family unit was central, governed by the paterfamilias, the male head who held absolute authority.
Culturally, the Romans were eclectic, absorbing and adapting elements from the civilizations they encountered, particularly the Greeks. Roman art, literature, and philosophy reflected this synthesis, creating a rich cultural tapestry. Latin, the Roman language, became the lingua franca of the Western world, influencing numerous modern languages.
Roman architecture and engineering achievements were monumental. They perfected the arch, vault, and dome, constructing enduring structures like the Colosseum, Pantheon, and aqueducts. These engineering marvels not only showcased Roman ingenuity but also served practical purposes, from public entertainment to water supply.
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdfTechSoup
In this webinar you will learn how your organization can access TechSoup's wide variety of product discount and donation programs. From hardware to software, we'll give you a tour of the tools available to help your nonprofit with productivity, collaboration, financial management, donor tracking, security, and more.
Operation “Blue Star” is the only event in the history of Independent India where the state went into war with its own people. Even after about 40 years it is not clear if it was culmination of states anger over people of the region, a political game of power or start of dictatorial chapter in the democratic setup.
The people of Punjab felt alienated from main stream due to denial of their just demands during a long democratic struggle since independence. As it happen all over the word, it led to militant struggle with great loss of lives of military, police and civilian personnel. Killing of Indira Gandhi and massacre of innocent Sikhs in Delhi and other India cities was also associated with this movement.
How to Make a Field invisible in Odoo 17Celine George
It is possible to hide or invisible some fields in odoo. Commonly using “invisible” attribute in the field definition to invisible the fields. This slide will show how to make a field invisible in odoo 17.
2. Introduction
●
●
●
●
In this protocols and mechanisms developed for
the network layer to support mobility.
It provides protocol enhancement that allows
transparent routing of IP datagrams to mobile
nodes in the internet.
Mobile IP – Adds mobility support to the
internet network layer protocol IP.
RFC 2002 is a reference document for the
complete detail about the mobile IP.
3. Goals, Assumptions and
Requirements
●
Receving of IP datagram after leaving your home network.
●
Now nodes needs a so-called topologically correct address.
Quick Solution
–
–
Assign new IP address when enter into new location.
● Increase problem with higher layer protocols like TCP , as
they rely on IP layer.
● Routers are built for fast forwarding but not for fast update
of routing table.
Quick solution not working.
4. Entities and Terminology
●
Mobile Nodes – a host or router that changes its point of attachment from one
network or subnetwork to another.
–
●
Home Agent – a router on a mobile node's home network which tunnels
datagrams for delivery to the mobile node when it is away from home.
–
●
Mobile node change its location without changing its IP address.
Also, maintain current location information for the mobile node.
Foreign Agent – router on a mobile node's visited network which provides routing
services to the mobile node while registered.
–
It detunnel and deliver the datagram to the mobile node that were tunneled by
the mobile node's home agent
5. Entities and Terminology(Cont.)
●
●
●
●
Correspondent Node (CN) – partner through which MN is connected. It can be
a fixed or mobile node.
Home network – it is subnet the MN belongs to.
Foreign network – it is a current subnet the MN visits and which is not a home
network.
Care-of Address – it defines the current location of the MN from an IP point of
view.
–
All the packets sent to the MN are delivered to the COA,not directly to the IP
address of the MN
–
Marks the tunnel endpoint (i.e address where packets exit the tunnel)
–
Location of COA:●
●
Foreign agent COA – COA could be located at the FA, i.e COA is an IP
address of the FA.
Co-located COA – if the MN temporarily acquired an additional IP
address which acts a COA.This address is topologically correct , and the
tunnel endpoint is at MN.
6. IP packet delivery
●
●
CN wants to send an IP packet to the MN.
Internet , not having info on the current location of MN, routes the packet to the
router(Home Agent) responsible for the home network of MN.
●
HA now intercept the packet(to find current location)
●
Not found in home n/w then encapsulated and tunnelled to the COA.
●
●
●
A new header put in front of the old header showing the (FA) COA as the new
destination.
FA now decapsulates the packets (remove additional header)
Last, MN sends the packets as usual with its own fixed IP address as source and
CN's address as the destination.
7. Agent Discovery
●
●
One initial problem of an MN after moving is
how to find a foreign agent ?.
Two types of methods:
–
–
Agent advertisement – in this HA and FA
advertise their presence.
Agent solicitation – the mobile node send agent
solicitations messages.
8. Agent Advertisement
●
●
●
FA and HA advertise their presence
periodically using special agent
advertisement message.
ICMP messages are used with some mobility
extensions.
Upper part represent ICMP while lower part
represent extention needed for mobility.
9. Agent Advertisement Packet
●
ICMP part
–
–
Code – 0 or 16
–
#addresses – no. of addresses advertised
with this packet
–
Lifetime – length of time this advr. is valid
–
●
Type – 9
Preference – most eager router to get new
node
Extension part – for mobility
–
Type – 16
–
Length – depends on no. of COAs provided
with the msg.
–
Seq. No
–
Reg. Lifetime – max. lifetime in sec. a node
can request during reg.
–
R – reg. , B – busy , H – HA , F – FA ,
M & G – method of encapsulation , V version
10. Agent Solicitation
●
No agent advertisement
●
Mobile node must send agent solicitations.
●
Sould not flood the network
●
●
MN can send three solicitations msgs. , one
per sec. , as soon as enter in new network.
Discovery of new agent can be done
anytime.
11. Registration
●
●
●
Objective – is to inform the HA of the current
location for correct forwarding of packets
After receving COA address the MN has to
register with the HA.
Registration can be done in two ways:–
–
Registration of mobile node via the FA
Or , directly with the HA
12. Registration (COA is the FA)
●
If the COA is at the FA then,
–
–
MN sends its registration request containing the
COA to the FA which then forward the request to the
HA.
Now HA will do the mobility binding containing the
mobile node's home IP adress with the current
COA.
13. Registration (COA is co-locted)
●
●
●
If the COA is co-located.
MN send the request directly to the
HA and vice versa.
Also , a registration procedure for MNs
returning to their home network.
14. Registration request
●
●
●
UDP packets are used for registration requests.
IP source address is the MN interface address and IP destination address is
the FA or HA address.
Type – 1 , S – an MN wants the HA to retain prior mobility binding
B – MN want to receive broadcast packets received by HA in home n/w
●
M & G – minimal or generic routing encapsulation.
●
Destnation port – 434
●
UDP is used because of low overheads and better performance.
15. Registration Reply
●
Type – 3
●
code – result of the registration request
●
lifetime – validity of the registration ,
●
Home IP address
●
Home Agent address
●
64-bit identification used to match the registration request with reply
16. Tunneling & Encpsulation
●
●
●
●
●
It is mechanisms used for forwrding packets between the HA and
COA.
Packets entering a tunnel are forwarded inside the tunnel and leave the
tunnel unchanged.
It can be achieved by using encapsulation.
Encapsulation is the mechanism of taking a packet consisting of
packet header and data and putting it into the data part of a new
packet.
The reverse of encapsulation is decapsulation.
17. Encapsulation Methods
IP-in-IP encapsulation
●
Ver – IP protocol version no.
●
IHL – internet header length
●
●
●
●
TOS – type of services (copied from
inner header)
Length – complete encapsulated
packet length.
IP id. , flags , frag. offset – used
for fragments
TTL -time to live
●
IP-in-IP – upper layer protocol
●
IP checksum – error detection
IP-in-IP encapsulation packet format
18. Minimal Routing Encapsulation
●
In IP-in-IP several fields re redundant
●
Minimal encapsulation will remove these redundancy
●
Type – 55
●
If S bit is set , the original sender address of the CN is
included.
19. Generic Routing Encapsulation
●
Minimal and IP-in-IP only works for IP while
generic routing also supports other
network layer protocols
●
GRE header starts with several flags
●
C – checksum is present
●
R – offset and routing info present
●
K – key field , used for the aunthentication
●
S – sequence number present
●
●
●
s – strict source source routing is used
rsv. - is used to distinguishes GRE from IPin-IP and minimal encapsulation
Protocol – the protocol of the packet
following the GRE.
20. Optimization
●
●
●
●
●
Mobile IP is having inefficient behavior which is
known to be as a triangular routing
HA
To optimize the route is to inform the CN of the
current location of the MN.
And , CN will cache it in a binding chache.
1
2
The entity to inform the CN of the location is the
HA.
Optimized mobile IP protocol needs four
additional messages :–
Binding request
–
Binding update
–
Binding acknowledgement
–
Binding warning
CN
COA/MN
3
21. Optimized mobile IP
●
●
CN request current location from HA using
binding request.
HA return the COA address using binding
update.
●
Now CN directly send to FA old.
●
Tunnel is formed between CN nd FA old.
MN now change its location
●
●
●
●
Register with FA new
This info is forwarded to HA to update its
location.
FA new will inform FA old about the new
registration.
Still CN send data to FA old which forward the
data to FA new.
●
FA old will send the binding warning to CN.
●
then , CN sends binding request to HA
●
and get the updated FA of the MN.
23. Mobile Ad-hoc networks
●
●
●
●
●
Till now mobility of the nodes is supported by the at least some
infrastructure.(home agent, tunnel etc.)
Their are situations where their no infrastructure.
Mobiles nodes in an ad-hoc scenario comprise routing and end
system functionality.
Under those conditions we use multi-hop ad-hoc network when
describing ad-hoc networking.
Use of such network
–
–
–
Instant infrastructure
Disaster relief
Remote areas
24. Routing
Differences between wired n/w and ad-hoc n/w
●
●
●
●
Asymmetric link – signal quality uneven in both direction
of the link.
Redundant links – wired n/w have few redundant links
while ad-hoc will have many redundant links.
Interference – it is very high in case of wireless ad-hoc
n/w
Dynamic topology – change in topology is very frequent
which affects the routing table and routing methods.
25. DSDV Routing
●
●
Destination Sequence Distance Vector is an enhancement
to ditance vector routing for ad-hoc network.
Distance Vector – exchange distance vector to its
neighbors for all destination.
●
Problem with DV is the cout-to-infinity.
●
DSDV adds two things to the DV
–
–
Sequence No. - each routing adv. comes with a seq. no. Seq. no.
help to apply the advertisement in correct order.
Damping – Transient change in topology that re of short
duration should not destabilize the routing mechanisms.
26. DSDV Routing
●
If the sequence number of one node in the
newly received same as the corresponding
sequence number in the routing table , then
the metric will be compared and the route
with the smallest metric will be used.
29. DSR
●
Dynamic Source Routing
Problem associated with DSDV
●
Previous routing exchange routing information with all nodes ,
although currently their may be no data to exchange.
●
Cause unnecessary traffic and consumes more battery power.
●
DSR , divides the task into two :–
–
●
Route discovery – a node only discover route to a destination
want to send somthing to this destination.
Route maintenance – if a node is continuously sending packet
via a route, it has to make sure that the route is held upright.
DSR eliminates all periodic routing updates.
30. DSR
●
If the node receive a route request:If the node has already received the request (which is
identified using the unique identifier) , it drops the request
packet.
– If node recognizes its own address as the destination , the
request has reached its target.
– Otherwise, the node appends its own address to a list of
traversed hops in the packets and broadcast this update
request.
Destination may receive several list containing different paths
from the initiator.It could return the best path, the first path or
several path.
–
●