0% found this document useful (0 votes)
38 views

Network - Protocols Mobile Ip

1. Mobile IP protocols allow mobile nodes to change their point of connection to the network without changing their IP address. This is achieved through registration with the home agent and tunneling of data packets. 2. Key requirements for Mobile IP include transparency, compatibility, security, and efficiency to support mobility of a large number of nodes worldwide. 3. The home agent intercepts data packets destined for the mobile node's home address and tunnels them via encapsulation to the node's current care-of address registered with the foreign agent.

Uploaded by

vigu93
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
38 views

Network - Protocols Mobile Ip

1. Mobile IP protocols allow mobile nodes to change their point of connection to the network without changing their IP address. This is achieved through registration with the home agent and tunneling of data packets. 2. Key requirements for Mobile IP include transparency, compatibility, security, and efficiency to support mobility of a large number of nodes worldwide. 3. The home agent intercepts data packets destined for the mobile node's home address and tunnels them via encapsulation to the node's current care-of address registered with the foreign agent.

Uploaded by

vigu93
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 50

8.1 courtesy from Prof. Dr.-Ing. Jochen H.

Schiller
Mobile Communications
Chapter 8: Network Protocols/Mobile IP

Motivation

Data transfer , ncaps!lation

"ec!rit#, IPv$, Proble%s

D&CP

'()hoc networks, *o!tin+ protocols


Prof. J Ueyama
8., courtesy from Prof. Dr.-Ing. Jochen H. Schiller
Motivation for Mobile IP

*o!tin+
base( on IP (estination a((ress, network prefi- .e.+.
1,/.10.1,2 (eter%ines ph#sical s!bnet
chan+e of ph#sical s!bnet i%plies chan+e of IP a((ress to
have a topolo+ical correct a((ress .stan(ar( IP2 or nee(s
special entries in the ro!tin+ tables

"pecific ro!tes to en()s#ste%s3


chan+e of all ro!tin+ table entries to forwar( packets to the
ri+ht (estination
(oes not scale with the n!%ber of %obile hosts an( fre4!ent
chan+es in the location, sec!rit# proble%s

Chan+in+ the IP)a((ress3


a(5!st the host IP a((ress (epen(in+ on the c!rrent location
al%ost i%possible to fin( a %obile s#ste%, DN" !p(ates take
too lon+ ti%e
6CP connections break, sec!rit# proble%s
8.0 courtesy from Prof. Dr.-Ing. Jochen H. Schiller
*e4!ire%ents for Mobile IPv1 .*7C 0011,
was: 0,,8, was: ,88, , !p(ate( b#: 19,12

6ransparenc#
%obile en()s#ste%s keep their IP a((ress
contin!ation of co%%!nication after interr!ption of link
possible
point of connection to the fi-e( network can be chan+e(

Co%patibilit#
s!pport of the sa%e la#er , protocols as IP
no chan+es to c!rrent en()s#ste%s an( ro!ters re4!ire(
%obile en()s#ste%s can co%%!nicate with fi-e( s#ste%s

"ec!rit#
a!thentication of all re+istration %essa+es

fficienc# an( scalabilit#


onl# little a((itional %essa+es to the %obile s#ste% re4!ire(
.connection t#picall# via a low ban(wi(th ra(io link2
worl()wi(e s!pport of a lar+e n!%ber of %obile s#ste%s in
the whole Internet
8.1 courtesy from Prof. Dr.-Ing. Jochen H. Schiller
6er%inolo+#

Mobile No(e .MN2


s#ste% .no(e2 that can chan+e the point of connection
to the network witho!t chan+in+ its IP a((ress

&o%e '+ent .&'2


s#ste% in the ho%e network of the MN, t#picall# a ro!ter
re+isters the location of the MN, t!nnels IP (ata+ra%s to the C:'

7orei+n '+ent .7'2


s#ste% in the c!rrent forei+n network of the MN, t#picall# a ro!ter
forwar(s the t!nnele( (ata+ra%s to the MN, t#picall# also the
(efa!lt ro!ter for the MN

Care)of '((ress .C:'2


a((ress of the c!rrent t!nnel en()point for the MN .at 7' or MN2
Co)locate( C:'
act!al location of the MN fro% an IP point of view
can be chosen, e.+., via D&CP

Correspon(ent No(e .CN2


co%%!nication partner
8.; courtesy from Prof. Dr.-Ing. Jochen H. Schiller
-a%ple network
mobile end-system
Internet
router
router
router
end-system
FA
HA
MN
home network
foreign
network
(physical home network
for the MN)
(current physical network
for the MN)
CN
8.$ courtesy from Prof. Dr.-Ing. Jochen H. Schiller
Data transfer to the %obile s#ste%
Internet
sender
FA
HA
MN
home network
foreign
network
receiver
1
2
3
1. Sender sends to the I address of MN!
"# intercepts packet (pro$y #%)
&. "# tunnels packet to '(#! here )#!
by encapsulation
*. )# forwards the packet
to the MN
CN
8.9 courtesy from Prof. Dr.-Ing. Jochen H. Schiller
Data transfer fro% the %obile s#ste%
Internet
receiver
FA
HA
MN
home network
foreign
network
sender
1
1. Sender sends to the I address
of the receiver as usual!
)# works as default router
CN
8.8 courtesy from Prof. Dr.-Ing. Jochen H. Schiller
:verview
'N
router
"#
router
)#
Internet
router
1.
&.
*.
home
network
MN
forei+n
network
,.
'N
router
"#
router
)#
Internet
router
home
network
MN
forei+n
network
'(#
8./ courtesy from Prof. Dr.-Ing. Jochen H. Schiller
Network inte+ration

'+ent '(vertise%ent
&' an( 7' perio(icall# sen( a(vertise%ent %essa+es into their
ph#sical s!bnets
MN listens to these %essa+es an( (etects, if it is in the ho%e or a
forei+n network .stan(ar( case for ho%e network2
MN rea(s a C:' fro% the 7' a(vertise%ent %essa+es

*e+istration .alwa#s li%ite( lifeti%e<2


MN si+nals C:' to the &' via the 7', &' acknowle(+es via 7' to
MN
these actions have to be sec!re( b# a!thentication

'(vertise%ent
&' a(vertises the IP a((ress of the MN .as for fi-e( s#ste%s2, i.e.
stan(ar( ro!tin+ infor%ation
ro!ters a(5!st their entries, these are stable for a lon+er ti%e .&'
responsible for a MN over a lon+er perio( of ti%e2
packets to the MN are sent to the &',
in(epen(ent of chan+es in C:'/7'
8.18 courtesy from Prof. Dr.-Ing. Jochen H. Schiller
type - 1.
len+th - . / , 0 1'(#s
%2 re+istration re3uired
42 busy! no more re+istrations
"2 home a+ent
)2 forei+n a+ent
M2 minimal encapsulation
52 5%6 encapsulation
r2 -7! i+nored (former 8an 9acobson compression)
:2 )# supports reverse tunnelin+
reserved2 -7! i+nored
'+ent a(vertise%ent
preference level 1
router address 1
1addresses
type
addr. si;e lifetime
checksum
'(# 1
'(# &
type - 1. se3uence number len+th
7
< = 1> 1. *1 &, &*
code
preference level &
router address &
. . .
re+istration lifetime
. . .
% 4 " ) M5 r reserved :
8.11 courtesy from Prof. Dr.-Ing. Jochen H. Schiller
*e+istration
t
MN
"#
r
e
+
is
t
r
a
t
io
n
r
e
3
u
e
s
t
r
e
+
is
t
r
a
t
io
n
r
e
p
ly
t
MN
)# "#
r
e
+
is
t
r
a
t
io
n
r
e
3
u
e
s
t
r
e
+
is
t
r
a
t
io
n
r
e
3
u
e
s
t
r
e
+
is
t
r
a
t
io
n
r
e
p
ly
r
e
+
is
t
r
a
t
io
n
r
e
p
ly
8.1, courtesy from Prof. Dr.-Ing. Jochen H. Schiller
Mobile IP re+istration re4!est
home a+ent
home address
type - 1 lifetime
7
< = 1> 1. *1 &, &*
: $
identification
'(#
6$tensions (e.+. authentication) . . .
S4?M5 r
S2 simultaneous bindin+s (re+istra todos os '(#s anteriores)
42 broadcast data+rams
?2 decapsulation by MN (If 'o-located '(# is adopted)
M mininal encapsulation
52 5%6 encapsulation
r2 -7! i+nored
:2 reverse tunnelin+ re3uested
$2 -7! i+nored
:ype 1 @ re+istration re3uest
8.10 courtesy from Prof. Dr.-Ing. Jochen H. Schiller
Mobile IP re+istration repl#
home a+ent
home address
type - * lifetime
7
< = 1> 1. *1
code
identification
e$tensions . . .
Example codes:
re+istration successful
7 re+istration accepted
1 re+istration accepted! but simultaneous mobility bindin+s unsupported
re+istration denied by )#
.> administratively prohibited
.. insufficient resources
.< mobile node failed authentication
.= home a+ent failed authentication
.A re3uested Bifetime too lon+
re+istration denied by "#
1&A administratively prohibited
1*1 mobile node failed authentication
1** re+istration Identification mismatch
1*> too many simultaneous mobility bindin+s
:ype * @ resposta do home a+ente
8.11 courtesy from Prof. Dr.-Ing. Jochen H. Schiller
ncaps!lation
ori+inal I header ori+inal data
new data new I header
outer header inner header ori+inal data
8.1; courtesy from Prof. Dr.-Ing. Jochen H. Schiller
ncaps!lation I

ncaps!lation of one packet into another as pa#loa(


e.+. IPv$ in IPv1 .$=one2, M!lticast in >nicast .Mbone2
here: e.+. IP)in)IP)encaps!lation, %ini%al encaps!lation or
?* .?eneric *ecor( ncaps!lation2

IP)in)IP)encaps!lation .%an(ator#, *7C ,8802


t!nnel between &' an( C:'
Careof address C!A
"# address of HA
::B
I identification
IP-in-IP I checksum
fla+s fra+ment offset
len+th ?S (:(S) ver. I"B
"# address of MN
"# address of CN
::B
I identification
lay. , prot. I checksum
fla+s fra+ment offset
len+th ?S (:(S) ver. I"B
:'CD?C ... payload
8.1$ courtesy from Prof. Dr.-Ing. Jochen H. Schiller
ncaps!lation II

Mini%al encaps!lation .optional2


avoi(s repetition of i(entical fiel(s
e.+. 66@, I&@, version, D" .*7C ,191, ol(: 6:"2
onl# applicable for non fra+%ente( packets, no space left for
fra+%ent i(entification
careof address C!A
"# address of HA
::B
I identification
min. encap. I checksum
fla+s fra+ment offset
len+th ?S (:(S) ver. I"B
"# address of MN
original sender "# address (if S-1)
S lay. , protoc. I checksum
:'CD?C ... payload
reserved
8.19 courtesy from Prof. Dr.-Ing. Jochen H. Schiller
?eneric *o!tin+ ncaps!lation
ori+inal
header
ori+inal data
new data new header
outer header
5%6
header
ori+inal data
ori+inal
header
Careof address C!A
"# address of HA
::B
I identification
GRE I checksum
fla+s fra+ment offset
len+th ?S (:(S) ver. I"B
"# address of MN
"# address of CN
::B
I identification
lay. , prot. I checksum
fla+s fra+ment offset
len+th ?S (:(S) ver. I"B
:'CD?C ... payload
routin+ (optional)
se3uence number (optional)
key (optional)
offset (optional) checksum (optional)
protocol rec. rsv. ver. '%ES s
%)' 1<71
%)' &<=, (updated by &=A7)
reserved1 (-7) checksum (optional)
protocol reserved7 ver. '
8.18 courtesy from Prof. Dr.-Ing. Jochen H. Schiller
:pti%iAation of packet forwar(in+

Proble%: 6rian+!lar *o!tin+


sen(er sen(s all packets via &' to MN
hi+her latenc# an( network loa(

B"ol!tionsC
sen(er learns the c!rrent location of MN
(irect t!nnelin+ to this location
&' infor%s a sen(er abo!t the location of MN
bi+ sec!rit# proble%s<

Chan+e of 7'
packets on)the)fl# (!rin+ the chan+e can be lost
new 7' infor%s ol( 7' to avoi( packet loss, ol( 7' now
forwar(s re%ainin+ packets to new 7'
this infor%ation also enables the ol( 7' to release reso!rces
for the MN
8.1/ courtesy from Prof. Dr.-Ing. Jochen H. Schiller
Chan+e of forei+n a+ent
'N "# )#
old
)#
new
MN
MN chan+es
location
t
?ata
?ata
?ata
Dpdate
#'E
?ata
?ata
%e+istration
Dpdate
#'E
?ata
?ata
?ata
Farnin+
%e3uest
Dpdate
#'E
?ata
?ata
8.,8 courtesy from Prof. Dr.-Ing. Jochen H. Schiller
*everse t!nnelin+ .*7C 08,1, was:
,0112
Internet
receiver
FA
HA
MN
home network
foreign
network
sender
3
2
1
1. MN sends to )#
&. )# tunnels packets to "#
by encapsulation
*. "# forwards the packet to the
receiver (standard case)
CN
8.,1 courtesy from Prof. Dr.-Ing. Jochen H. Schiller
Mobile IP with reverse t!nnelin+

*o!ter accepts often onl# Btopolo+ical correctB a((resses


.firewall<2
a packet fro% the MN encaps!late( b# the 7' is now topolo+ical
correct
f!rther%ore %!lticast an( 66@ proble%s solve( .66@ in the ho%e
network correct, b!t MN is to far awa# fro% the receiver2

*everse t!nnelin+ (oes not solve


proble%s with firewalls, the reverse t!nnel can be ab!se( to
circ!%vent sec!rit# %echanis%s .t!nnel hi5ackin+2
opti%iAation of (ata paths, i.e. packets will be forwar(e( thro!+h
the t!nnel via the &' to a sen(er .(o!ble trian+!lar ro!tin+2

6he stan(ar( is backwar(s co%patible


the e-tensions can be i%ple%ente( easil# an( cooperate with
c!rrent i%ple%entations witho!t these e-tensions
'+ent '(vertise%ents can carr# re4!ests for reverse t!nnelin+
8.,, courtesy from Prof. Dr.-Ing. Jochen H. Schiller
Mobile IP an( IPv$ .*7C 099;2

Mobile IP was (evelope( for IPv1, b!t IPv$ si%plifies the


protocols
sec!rit# is inte+rate( an( not an a(()on, a!thentication of
re+istration is incl!(e(
C:' can be assi+ne( via a!to)confi+!ration .D&CPv$ is one
can(i(ate2, ever# no(e has a((ress a!to)confi+!ration
no nee( for a separate 7', all ro!ters perfor% ro!ter
a(vertise%ent which can be !se( instea( of the special a+ent
a(vertise%entD a((resses are alwa#s co)locate(
MN can si+nal a sen(er (irectl# the C:', sen(in+ via &' not
nee(e( in this case .a!to%atic path opti%iAationEC:' to MN2
FsoftB han()over, i.e. witho!t packet loss, between two
s!bnets is s!pporte(
MN sen(s the new C:' to its ol( ro!ter
the ol( ro!ter encaps!lates all inco%in+ packets for the MN an(
forwar(s the% to the new C:'
a!thentication is alwa#s +rante(
8.,0 courtesy from Prof. Dr.-Ing. Jochen H. Schiller
Proble%s with %obile IP

"ec!rit#
a!thentication with 7' proble%atic, for the 7' t#picall#
belon+s to another or+aniAation
no protocol for ke# %ana+e%ent an( ke# (istrib!tion has
been stan(ar(iAe( in the Internet

7irewalls
t#picall# %obile IP cannot be !se( to+ether with firewalls,
special set)!ps are nee(e( .s!ch as reverse t!nnelin+2

Go"
%an# new reservations in case of *"HP
t!nnelin+ %akes it har( to +ive a flow of packets a special
treat%ent nee(e( for the Go"

"ec!rit#, firewalls, Go" etc. are topics of research an(


(isc!ssions
8.,1 courtesy from Prof. Dr.-Ing. Jochen H. Schiller
D&CP: D#na%ic &ost Confi+!ration
Protocol

'pplication
si%plification of installation an( %aintenance of networke(
co%p!ters
s!pplies s#ste%s with all necessar# infor%ation, s!ch as IP
a((ress, DN" server a((ress, (o%ain na%e, s!bnet %ask,
(efa!lt ro!ter etc.
enables a!to%atic inte+ration of s#ste%s into an Intranet or
the Internet, can be !se( to ac4!ire a C:' for Mobile IP

Client/"erver)Mo(el
the client sen(s via a M'C broa(cast a re4!est to the D&CP
server .%i+ht be via a D&CP rela#2
client relay
client server
?"'?IS'(86%
?"'?IS'(86%
8.,; courtesy from Prof. Dr.-Ing. Jochen H. Schiller
D&CP ) protocol %echanis%s
t
i
m
e
server
(not selected)
client
server
(selected)
initiali;ation
collection of replies
selection of confi+uration
initiali;ation completed
release
confirmation of
confi+uration
delete conte$t
determine the
confi+uration
?"'?IS'(86%
?"'())6%
?"'%6GD6S:
(reHect)
?"'#'E
?"'%6B6#S6
?"'?IS'(86%
?"'())6%
?"'%6GD6S:
(options)
determine the
confi+uration
8.,$ courtesy from Prof. Dr.-Ing. Jochen H. Schiller
D&CP characteristics

"erver
several servers can be confi+!re( for D&CP, coor(ination not
#et stan(ar(iAe( .i.e., %an!al confi+!ration2

*enewal of confi+!rations
IP a((resses have to be re4!este( perio(icall#, si%plifie(
protocol

:ptions
available for ro!ters, s!bnet %ask, N6P .network ti%e
protocol2 ti%eserver, "@P .service location protocol2
(irector#, DN" .(o%ain na%e s#ste%2
8.,9 courtesy from Prof. Dr.-Ing. Jochen H. Schiller
Mobile a( hoc networks

"tan(ar( Mobile IP nee(s an infrastr!ct!re


&o%e '+ent/7orei+n '+ent in the fi-e( network
DN", ro!tin+ etc. are not (esi+ne( for %obilit#

"o%eti%es there is no infrastr!ct!re<


re%ote areas, a()hoc %eetin+s, (isaster areas
cost can also be an ar+!%ent a+ainst an infrastr!ct!re<

Main topic: ro!tin+


no (efa!lt ro!ter available
ever# no(e sho!l( be able to forwar(
# 4 '
8.,8 courtesy from Prof. Dr.-Ing. Jochen H. Schiller
"ol!tion: Iireless a()hoc networks

Network witho!t infrastr!ct!re


>se co%ponents of participants for networkin+

-a%ples
"in+le)hop: 'll partners %a-. one hop apart
=l!etooth piconet, PD's in a roo%,
+a%in+ (evicesJ
M!lti)hop: Cover lar+er (istances,
circ!%vent obstacles
=l!etooth scatternet, 66*' police network,
car)to)car networksJ

Internet: M'N6 .Mobile '()hoc Networkin+2 +ro!p


8.,/ courtesy from Prof. Dr.-Ing. Jochen H. Schiller
Manet: Mobile '()hoc Networkin+
)i$ed
Network
Mobile
?evices
Mobile
%outer
Manet
Mobile I!
?"'
%outer 6nd system
8.08 courtesy from Prof. Dr.-Ing. Jochen H. Schiller
Proble% No. 1: *o!tin+

&i+hl# (#na%ic network topolo+#


Device %obilit# pl!s var#in+ channel 4!alit#
"eparation an( %er+in+ of networks possible
's#%%etric connections possible
+ood link
weak link
time - t
1
time - t
&
N
1
N
,
N
&
N
>
N
*
N
1
N
,
N
&
N
>
N
*
N
.
N
<
N
.
N
<
8.01 courtesy from Prof. Dr.-Ing. Jochen H. Schiller
6ra(itional ro!tin+ al+orith%s

Distance Hector
perio(ic e-chan+e of %essa+es with all ph#sical nei+hbors
that contain infor%ation abo!t who can be reache( at what
(istance
selection of the shortest path if several paths available

@ink "tate
perio(ic notification of all ro!ters abo!t the c!rrent state of
all ph#sical links
ro!ter +et a co%plete pict!re of the network

-a%ple
'*P' packet ra(io network .1/902, DH)*o!tin+
ever# 9.;s e-chan+e of ro!tin+ tables incl!(in+ link 4!alit#
!p(atin+ of tables also b# reception of packets
ro!tin+ proble%s solve( with li%ite( floo(in+
8.0, courtesy from Prof. Dr.-Ing. Jochen H. Schiller
*o!tin+ in a()hoc networks

6& bi+ topic in %an# research pro5ects


7ar %ore than ;8 (ifferent proposals e-ist
6he %ost si%plest one: 7loo(in+<

*easons
Classical approaches fro% fi-e( networks fail
Her# slow conver+ence, lar+e overhea(
&i+h (#na%icit#, low ban(wi(th, low co%p!tin+ power

Metrics for ro!tin+


Mini%al
N!%ber of no(es, loss rate, (ela#, con+estion, interference J
Ma-i%al
"tabilit# of the lo+ical network, batter# r!n)ti%e, ti%e of
connectivit# J
8.00 courtesy from Prof. Dr.-Ing. Jochen H. Schiller
Proble%s of tra(itional ro!tin+
al+orith%s

D#na%ic of the topolo+#


fre4!ent chan+es of connections, connection 4!alit#,
participants

@i%ite( perfor%ance of %obile s#ste%s


perio(ic !p(ates of ro!tin+ tables nee( ener+# witho!t
contrib!tin+ to the trans%ission of !ser (ata, sleep %o(es
(iffic!lt to realiAe
li%ite( ban(wi(th of the s#ste% is re(!ce( even %ore (!e
to the e-chan+e of ro!tin+ infor%ation
links can be as#%%etric, i.e., the# can have a (irection
(epen(ent trans%ission 4!alit#
8.01 courtesy from Prof. Dr.-Ing. Jochen H. Schiller
D"DH .Destination "e4!ence(
Distance Hector, historical2

arl# work
on (e%an( version: ':DH

-pansion of (istance vector ro!tin+

"e4!ence n!%bers for all ro!tin+ !p(ates


ass!res in)or(er e-ec!tion of all !p(ates
avoi(s loops an( inconsistencies

Decrease of !p(ate fre4!enc#


store ti%e between first an( best anno!nce%ent of a path
inhibit !p(ate if it see%s to be !nstable .base( on the store(
ti%e val!es2
8.0; courtesy from Prof. Dr.-Ing. Jochen H. Schiller
D#na%ic so!rce ro!tin+ I

"plit ro!tin+ into (iscoverin+ a path an( %aintainin+ a


path

Discover a path
onl# if a path for sen(in+ packets to a certain (estination is
nee(e( an( no path is c!rrentl# available

Maintainin+ a path
onl# while the path is in !se one has to %ake s!re that it can
be !se( contin!o!sl#

No perio(ic !p(ates nee(e(<


8.0$ courtesy from Prof. Dr.-Ing. Jochen H. Schiller
D#na%ic so!rce ro!tin+ II

Path (iscover#
broa(cast a packet with (estination a((ress an( !ni4!e ID
if a station receives a broa(cast packet
if the station is the receiver .i.e., has the correct (estination a((ress2
then ret!rn the packet to the sen(er .path was collecte( in the packet2
if the packet has alrea(# been receive( earlier .i(entifie( via ID2 then
(iscar( the packet
otherwise, appen( own a((ress an( broa(cast packet
sen(er receives packet with the c!rrent path .a((ress list2

:pti%iAations
li%it broa(castin+ if %a-i%!% (ia%eter of the network is known
cachin+ of a((ress lists .i.e. paths2 with help of passin+ packets
stations can !se the cache( infor%ation for path (iscover# .own paths
or paths for other hosts2
8.09 courtesy from Prof. Dr.-Ing. Jochen H. Schiller
D"*: *o!te Discover#
$
A
C
%
"
&
'
(
E
H
F )
*
#
M
N
!
+
Sendin+ from ' to (
8.08 courtesy from Prof. Dr.-Ing. Jochen H. Schiller
D"*: *o!te Discover#
$roadcast
$
A
C
%
"
&
'
(
E
H
F )
*
#
M
N
!
+
I(!'!,<11J
I(!'!,<11J
8.0/ courtesy from Prof. Dr.-Ing. Jochen H. Schiller
D"*: *o!te Discover#
$
A
C
%
"
&
'
(
E
H
F )
*
#
M
N
!
+
I(!'C5!,<11J
I(!'C5!,<11J
I(!'C4!,<11J
I(!'C6!,<11J
8.18 courtesy from Prof. Dr.-Ing. Jochen H. Schiller
D"*: *o!te Discover#
$
A
C
%
"
&
'
(
E
H
F )
*
#
M
N
!
+
I(!'C5CI!,<11J
I(!'C4C#!,<11J
I(!'C4C?!,<11J
I(!'C6C"!,<11J
(alternatively2 I(!'C6C?!,<11J)
8.11 courtesy from Prof. Dr.-Ing. Jochen H. Schiller
D"*: *o!te Discover#
$
A
C
%
"
&
'
(
E
H
F )
*
#
M
N
!
+
I(!'C4C?C)!,<11J
I(!'C5CICE!,<11J
I(!'C6C"C9!,<11J
8.1, courtesy from Prof. Dr.-Ing. Jochen H. Schiller
D"*: *o!te Discover#
$
A
C
%
"
&
'
(
E
H
F )
*
#
M
N
!
+
I(!'C6C"C9CB!,<11J
(alternatively2 I(!'C5CICECB!,<11J)
I(!'C5CICECM!,<11J
8.10 courtesy from Prof. Dr.-Ing. Jochen H. Schiller
D"*: *o!te Discover#
$
A
C
%
"
&
'
(
E
H
F )
*
#
M
N
!
+
I(!'C6C"C9CBCN!,<11J
8.11 courtesy from Prof. Dr.-Ing. Jochen H. Schiller
D"*: *o!te Discover#
$
A
C
%
"
&
'
(
E
H
F )
*
#
M
N
!
+
ath2 M! E! I! 5
8.1; courtesy from Prof. Dr.-Ing. Jochen H. Schiller
D#na%ic "o!rce *o!tin+ III

Maintainin+ paths
after sen(in+ a packet
wait for a la#er , acknowle(+e%ent .if applicable2
listen into the %e(i!% to (etect if other stations forwar( the
packet .if possible2
re4!est an e-plicit acknowle(+e%ent
if a station enco!nters proble%s it can infor% the sen(er of a
packet or look)!p a new path locall#
8.1$ courtesy from Prof. Dr.-Ing. Jochen H. Schiller
Interference)base( ro!tin+

*o!tin+ base( on ass!%ptions abo!t interference between


si+nals
S
1
N
>
N
*
N
,
N
1
N
&
%
1
%
&
N
.
N
=
S
&
N
A
N
<
nei+hbors
(i.e. within radio ran+e)
8.19 courtesy from Prof. Dr.-Ing. Jochen H. Schiller
-a%ples for interference base(
ro!tin+

@east Interference *o!tin+ .@I*2


calc!late the cost of a path base( on the n!%ber of stations
that can receive a trans%ission

Ma-)Min *esi(!al Capacit# *o!tin+ .MM*C*2


calc!late the cost of a path base( on a probabilit# f!nction of
s!ccessf!l trans%issions an( interference

@east *esistance *o!tin+ .@**2


calc!late the cost of a path base( on interference, 5a%%in+
an( other trans%issions

@I* is ver# si%ple to i%ple%ent, onl# infor%ation fro%


(irect nei+hbors is necessar#
8.18 courtesy from Prof. Dr.-Ing. Jochen H. Schiller
7!rther (iffic!lties an( research areas

'!to)Confi+!ration
'ssi+n%ent of a((resses, f!nction, profile, pro+ra%, J

"ervice (iscover#
Discover# of services an( service provi(ers

M!lticast
6rans%ission to a selecte( +ro!p of receivers

G!alit#)of)"ervice
Maintenance of a certain trans%ission 4!alit#

Power control
Mini%iAin+ interference, ener+# conservation %echanis%s

"ec!rit#
Data inte+rit#, protection fro% attacks .e.+. Denial of "ervice2

"calabilit#
18 no(es3 188 no(es3 1888 no(es3 18888 no(es3

Inte+ration with fi-e( networks


8.1/ courtesy from Prof. Dr.-Ing. Jochen H. Schiller
Cl!sterin+ of a()hoc networks .a(vanta+es32
Internet
Super cluster
'luster
4ase station
'luster head
8.;8 courtesy from Prof. Dr.-Ing. Jochen H. Schiller
7inaliAan(o...

7i% (o capKt!lo Mobile network la#er

@eia% o capKt!lo 8

PrL-i%a a!la tratare%os sobre a ca%a(a (e transporte e%


a%bientes %Lveis

You might also like