ITTC Mobile Wireless Networking The University of Kansas EECS 882 Mobile Ad Hoc Networks Fall 2007

Size: px
Start display at page:

Download "ITTC Mobile Wireless Networking The University of Kansas EECS 882 Mobile Ad Hoc Networks Fall 2007"

Transcription

1 Mobile Wireless Networking The University of Kansas EECS 882 Mobile Ad Hoc Networks Fall 2007 James P.G. Sterbenz Department of Electrical Engineering & Computer Science Information Technology & Telecommunications Research Center The University of Kansas 30 October 2007 rev James P.G. Sterbenz

2 Mobile Wireless Networking Mobile Ad Hoc Networks AH.1 Motivation and application AH.2 Architecture, challenges and issues AH.3 Self-organisation AH.4 Routing overview AH.5 Autonomic control and self-management 30 October 2007 KU EECS 882 Mobile Wireless Nets Ad Hoc Nets MWN-AH-2

3 Mobile Ad Hoc Networks AH.1 Motivation and Application AH.1 Motivation and application AH.2 Architecture, challenges and issues AH.3 Self-organisation AH.4 Routing overview AH.5 Autonomic control and self-management 30 October 2007 KU EECS 882 Mobile Wireless Nets Ad Hoc Nets MWN-AH-3

4 Mobile Ad Hoc Networks Introduction Mobile ad hoc network (MANET) mobile: node and groups of nodes move Lecture LM wireless: mobility implies mostly wireless links ad hoc: little or no reliance on network infrastructure from Latin: for this (purpose) Ad hoc network generalisation of mobile ad hoc network nodes need not be mobile but are typically wireless: e.g. fixed wireless mesh network 30 October 2007 KU EECS 882 Mobile Wireless Nets Ad Hoc Nets MWN-AH-4

5 Mobile Ad Hoc Networks Introduction: MANET MANET: mobile ad hoc network rhymes with planet but accent on 2nd syllable many people pronounce as French painter Édouard Manet MANET can be used in two senses mobile ad hoc network, in general this Lecture AH IETF MANET working group protocols next Lecture MR AODV ad hoc on demand distance vector [RFC 3651] DSR dynamic source routing [RFC 4728] OLSR optimized link state routing [RFC 3626] TBRPF topology broadcast based on RPF [RFC 3684] and other work in progress (NHDP, DYMO, SMF) 30 October 2007 KU EECS 882 Mobile Wireless Nets Ad Hoc Nets MWN-AH-5

6 Mobile Ad Hoc Networks Motivation Untethered operation requires mobile and wireless same motivation as for WLANs and mobile cellular telephony Ubiquitous communication precludes dependence on infrastructure physical infrastructure, e.g. base stations protocol infrastructure, e.g. name servers, topology databases infrastructure may be used when available e.g. gateway from MANET to Internet or PSTN 30 October 2007 KU EECS 882 Mobile Wireless Nets Ad Hoc Nets MWN-AH-6

7 Mobile Ad Hoc Networks Applications Applications for MANETs? 30 October 2007 KU EECS 882 Mobile Wireless Nets Ad Hoc Nets MWN-AH-7

8 Mobile Ad Hoc Networks Applications Local communication when infrastructure unavailable shielded environments caves, faraday cages in corporate and defense facilities remote environments; infrastructure economically infeasible research and rescue in mountains, Arctic and Antarctic disaster and emergency network (re)deployment military operations in hostile environments 30 October 2007 KU EECS 882 Mobile Wireless Nets Ad Hoc Nets MWN-AH-8

9 Mobile Ad Hoc Networks Applications Local communication when infrastructure unavailable shielded environments caves, faraday cages in corporate and defense facilities remote environments; infrastructure economically infeasible research and rescue in mountains, Arctic and Antarctic disaster and emergency network (re)deployment military operations in hostile environments Highly mobile groups communication among vehicles VANETS: vehicle ad hoc nets tactical military networks 30 October 2007 KU EECS 882 Mobile Wireless Nets Ad Hoc Nets MWN-AH-9

10 Mobile Ad Hoc Networks AH.2 Architecture, Challenges and Issues AH.1 Motivation and application AH.2 Architecture, challenges and issues AH.3 Self-organisation AH.4 Routing overview AH.5 Autonomic control and self-management 30 October 2007 KU EECS 882 Mobile Wireless Nets Ad Hoc Nets MWN-AH-10

11 Mobile Ad Hoc Networks Background: Review of Wireless Network Types Wireless Internet: WLANs, WANs, and mobile IP Mobile cellular telephony MANETs: mobile ad hoc networks 30 October 2007 KU EECS 882 Mobile Wireless Nets Ad Hoc Nets MWN-AH-11

12 MANET Background Wireless Internet Wireless Internet wireless nodes use base station or access point BS Internet AP connected to wired Internet perhaps multihop wireless mesh IP WN WN Relationship to MANETs? 30 October 2007 KU EECS 882 Mobile Wireless Nets Ad Hoc Nets MWN-AH-12

13 MANET Background Wireless Internet Wireless Internet wireless nodes use base station or access point connected to wired Internet perhaps multihop wireless mesh Relationship to MANETs + support untethered communication: wireless access links + limited mobility possible if mobile IP deployed problems? BS Internet IP WN AP WN 30 October 2007 KU EECS 882 Mobile Wireless Nets Ad Hoc Nets MWN-AH-13

14 MANET Background Wireless Internet Wireless Internet wireless nodes use base station or access point connected to wired Internet perhaps multihop wireless mesh Relationship to MANETs + support untethered communication: wireless access links + limited mobility possible if mobile IP deployed infrastructure required : APs or BSs no peer-to-peer communication BS Internet IP WN AP WN 30 October 2007 KU EECS 882 Mobile Wireless Nets Ad Hoc Nets MWN-AH-14

15 MANET Background Mobile Cellular Telephone Network Mobile cellular telephone network network divided into cells covered by base stations cells interconnected to PSTN by mobile switching centers mobile terminals move among cells Relationship to MANETs? PSTN (wired) 4 cell BS MSC MT MT 30 October 2007 KU EECS 882 Mobile Wireless Nets Ad Hoc Nets MWN-AH-15

16 MANET Background Mobile Cellular Telephone Network Mobile cellular telephone network network divided into cells covered by base stations cells interconnected to PSTN by mobile switching centers mobile terminals move among cells Relationship to MANETs? PSTN (wired) 4 + support for mobility and roaming among providers problems? cell BS MSC MT MT 30 October 2007 KU EECS 882 Mobile Wireless Nets Ad Hoc Nets MWN-AH-16

17 MANET Background Mobile Cellular Telephone Network Mobile cellular telephone network network divided into cells covered by base stations cells interconnected to PSTN by mobile switching centers mobile terminals move among cells Relationship to MANETs? PSTN (wired) 4 + support for mobility and roaming among providers infrastructure required : BSs and MSCs no peer-to-peer communication not designed for data cell BS MSC MT MT 30 October 2007 KU EECS 882 Mobile Wireless Nets Ad Hoc Nets MWN-AH-17

18 Mobile Ad Hoc Networks Requirements Untethered operation wireless links provided by Wireless Internet and mobile telephony 30 October 2007 KU EECS 882 Mobile Wireless Nets Ad Hoc Nets MWN-AH-18

19 Mobile Ad Hoc Networks Requirements Untethered operation wireless links provided by Wireless Internet and mobile telephony Nomadic operation mobility support provided by mobile telephony limited support provided by mobile IP but rarely deployed What else? 30 October 2007 KU EECS 882 Mobile Wireless Nets Ad Hoc Nets MWN-AH-19

20 Mobile Ad Hoc Networks Requirements Untethered operation Nomadic operation Non-dependence on infrastructure may use when available to improve service 30 October 2007 KU EECS 882 Mobile Wireless Nets Ad Hoc Nets MWN-AH-20

21 Mobile Ad Hoc Networks Requirements Untethered operation Nomadic operation Non-dependence on infrastructure Arbitrary data communication peer-to-peer group communication (multicast, broadcast) multihop: nodes are both ES and IS 30 October 2007 KU EECS 882 Mobile Wireless Nets Ad Hoc Nets MWN-AH-21

22 Mobile Ad Hoc Networks Requirements Untethered operation Nomadic operation Non-dependence on infrastructure Arbitrary data communication Management of constrained resources Lecture EM energy, bandwidth, processing, memory 30 October 2007 KU EECS 882 Mobile Wireless Nets Ad Hoc Nets MWN-AH-22

23 Mobile Ad Hoc Networks Requirements Untethered operation Nomadic operation Non-dependence on infrastructure Arbitrary data communication Management of constrained resources Lecture EM Resilience and security Lecture RS unreliable open channel 30 October 2007 KU EECS 882 Mobile Wireless Nets Ad Hoc Nets MWN-AH-23

24 Mobile Ad Hoc Networks MANET Architecture Mobile ad hoc networks mobile nodes communicate with one another PDAs, laptops, vehicles MN MN MN MN MN 30 October 2007 KU EECS 882 Mobile Wireless Nets Ad Hoc Nets MWN-AH-24

25 Mobile Ad Hoc Networks MANET Architecture Mobile ad hoc networks mobile nodes communicate with one another PDAs, laptops, vehicles MNs relay multhop when necessary MN MN MN MN MN MN 30 October 2007 KU EECS 882 Mobile Wireless Nets Ad Hoc Nets MWN-AH-25

26 Mobile Ad Hoc Networks MANET Architecture Mobile ad hoc networks mobile nodes communicate with one another Internet PDAs, laptops, vehicles IP BS MN MNs relay multhop when necessary without the need for infrastructure MN MN MN MN MN 30 October 2007 KU EECS 882 Mobile Wireless Nets Ad Hoc Nets MWN-AH-26

27 Mobile Ad Hoc Networks MANET Architecture Mobile ad hoc networks mobile nodes communicate with one another Internet PDAs, laptops, vehicles IP BS MN MNs relay multhop when necessary without the need for infrastructure infrastructure used when available MN MN GW MN access gateway to Global Internet directory and security servers MN MN 30 October 2007 KU EECS 882 Mobile Wireless Nets Ad Hoc Nets MWN-AH-27

28 Mobile Wireless Networking AH.3 Self-Organisation AH.1 Motivation and application AH.2 Architecture, challenges and issues AH.3 Self-organisation AH.3.1 Auto-configuration AH.3.2 Self-organisation AH.4 Routing overview AH.5 Autonomic control and self-management 30 October 2007 KU EECS 882 Mobile Wireless Nets Ad Hoc Nets MWN-AH-28

29 Mobile Ad Hoc Networks Implications of No Infrastructure MANETs need to operate without infrastructure implication? 30 October 2007 KU EECS 882 Mobile Wireless Nets Ad Hoc Nets MWN-AH-29

30 Mobile Ad Hoc Networks Implications of No Infrastructure MANETs need to operate without infrastructure nodes must configure themselves nodes must organise themselves into networks Challenges? 30 October 2007 KU EECS 882 Mobile Wireless Nets Ad Hoc Nets MWN-AH-30

31 Mobile Ad Hoc Networks Challenges MANETs need to operate without infrastructure nodes must configure themselves nodes must organise themselves into networks Challenges fully distributed system with inconsistent information weak and episodic connectivity: stale information mobility: dynamically changing information 30 October 2007 KU EECS 882 Mobile Wireless Nets Ad Hoc Nets MWN-AH-31

32 Mobile Ad Hoc Networks AH.3 Self-Organisation AH.1 Motivation and application AH.2 Architecture, challenges and issues AH.3 Self-organisation AH.3.1 Auto-configuration AH.3.2 Self-organisation AH.4 Routing overview AH.5 Autonomic control and self-management 30 October 2007 KU EECS 882 Mobile Wireless Nets Ad Hoc Nets MWN-AH-32

33 Mobile Ad Hoc Networks Auto-Configuration Nodes must be configured for a particular network physical layer: frequency, coding, bandwidth, MAC layer: type and parameters link layer: protocol, error control, 30 October 2007 KU EECS 882 Mobile Wireless Nets Ad Hoc Nets MWN-AH-33

34 Mobile Ad Hoc Networks Auto-Configuration Nodes must be configured for a particular network physical layer: frequency, coding, bandwidth, MAC layer: type and parameters link layer: protocol, error control, network layer: (preliminary) addresses Auto-configuration : nodes configure themselves without human interaction without depending on infrastructure how? 30 October 2007 KU EECS 882 Mobile Wireless Nets Ad Hoc Nets MWN-AH-34

35 Mobile Ad Hoc Networks Auto-Configuration Techniques Auto-configuration: nodes configure themselves reasonable defaults context-based sensing environment may use infrastructure if available policy driven may be guided by human 30 October 2007 KU EECS 882 Mobile Wireless Nets Ad Hoc Nets MWN-AH-35

36 Mobile Ad Hoc Networks Auto-Configuration Techniques Auto-configuration: nodes configure themselves reasonable defaults context-based sensing environment may use infrastructure if available policy driven may be guided by human Configured nodes do not a network make what s next? 30 October 2007 KU EECS 882 Mobile Wireless Nets Ad Hoc Nets MWN-AH-36

37 Mobile Wireless Networking AH.3 Self-Organisation AH.1 Motivation and application AH.2 Architecture, challenges and issues AH.3 Self-organisation AH.3.1 Auto-configuration AH.3.2 Self-organisation AH.4 Routing overview AH.5 Autonomic control and self-management 30 October 2007 KU EECS 882 Mobile Wireless Nets Ad Hoc Nets MWN-AH-37

38 Mobile Ad Hoc Networks Self-Organisation Configured nodes must be organised into a network pairwise link agreement to form L2 structures may modify auto-configuration of L1 L2 parameters network topology and federation to form L3 structures will likely modify any preliminary node addresses 30 October 2007 KU EECS 882 Mobile Wireless Nets Ad Hoc Nets MWN-AH-38

39 Mobile Ad Hoc Networks Self-Organisation Configured nodes must be organised into a network pairwise link agreement to form L2 structures may modify auto-configuration of L1 L2 parameters network topology and federation to form L3 structures will likely modify any preliminary node addresses Self-organisation : nodes organise themselves without human interaction without depending on infrastructure such as DHCP and DNS how? 30 October 2007 KU EECS 882 Mobile Wireless Nets Ad Hoc Nets MWN-AH-39

40 Ad Hoc Self-Organisation Steps Neighbour discovery Link formation Self-organisation Topology optimisation and maintenance 30 October 2007 KU EECS 882 Mobile Wireless Nets Ad Hoc Nets MWN-AH-40

41 Ad Hoc Self-Organisation Set of Nodes Set of nodes to self-organise 30 October 2007 KU EECS 882 Mobile Wireless Nets Ad Hoc Nets MWN-AH-41

42 Ad Hoc Self-Organisation Neighbour Discovery Nodes emit beacons to announce their presence known frequencies and codes used for announcements part of auto-configuration Establishes set of directly reachable nodes should all pairs form links? 30 October 2007 KU EECS 882 Mobile Wireless Nets Ad Hoc Nets MWN-AH-42

43 Ad Hoc Self-Organisation Link Formation Pairwise negotiation of link formation constrained by maximum degree interested nodes answer beacons 30 October 2007 KU EECS 882 Mobile Wireless Nets Ad Hoc Nets MWN-AH-43

44 Ad Hoc Self-Organisation Link Formation Pairwise negotiation of link formation constrained by maximum degree interested nodes answer beacons exchange identification, node and link characteristics agree on variable physical, MAC, and link parameters Forms layer 2 connectivity structure 30 October 2007 KU EECS 882 Mobile Wireless Nets Ad Hoc Nets MWN-AH-44

45 Ad Hoc Self-Organisation Link Formation Maintain link adjacencies e.g. keepalive messages discard links to unreachable nodes add links to new nodes in range Maintains layer 2 connectivity structure 30 October 2007 KU EECS 882 Mobile Wireless Nets Ad Hoc Nets MWN-AH-45

46 Ad Hoc Self-Organisation Link Formation Layer 2 connectivity structure built and maintained what s next? 30 October 2007 KU EECS 882 Mobile Wireless Nets Ad Hoc Nets MWN-AH-46

47 Ad Hoc Self-Organisation Link Formation Layer 2 connectivity structure built and maintained but we need a network with the ability to route and forward we may need hierarchy to manage scalability 30 October 2007 KU EECS 882 Mobile Wireless Nets Ad Hoc Nets MWN-AH-47

48 Ad Hoc Self-Organisation Self-Organisation and Federation Communicating nodes self-organise into federations network-layer address acquisition and agreement bootstrap routing topology Lecture MR unlimited size of federations? 30 October 2007 KU EECS 882 Mobile Wireless Nets Ad Hoc Nets MWN-AH-48

49 Ad Hoc Self-Organisation Self-Organisation and Federation Communicating nodes self-organise into federations network structure small networks can be flat (10s to perhaps 1000s of nodes) large networks need hierarchical structure of clusters how formed? 30 October 2007 KU EECS 882 Mobile Wireless Nets Ad Hoc Nets MWN-AH-49

50 Ad Hoc Self-Organisation Self-Organisation and Federation Clustering algorithm requirements efficiency measured in message complexity efficiency measured in time to form cluster 30 October 2007 KU EECS 882 Mobile Wireless Nets Ad Hoc Nets MWN-AH-50

51 Ad Hoc Self-Organisation Self-Organisation and Federation Clustering algorithm objectives cluster size (number of nodes), e.g. expanding ring search cluster diameter (maximum length of shortest path) policy-driven constraints e.g. don t cluster with a bad guy 30 October 2007 KU EECS 882 Mobile Wireless Nets Ad Hoc Nets MWN-AH-51

52 Ad Hoc Self-Organisation Self-Organisation and Federation Hierarchical network structure lowest level: clusters of physical nodes higher levels: clusters of clusters how? 30 October 2007 KU EECS 882 Mobile Wireless Nets Ad Hoc Nets MWN-AH-52

53 Ad Hoc Self-Organisation Self-Organisation and Federation physical cluster head Hierarchical network structure each cluster may have a leader or cluster head leader is abstraction for entire cluster to higher level 30 October 2007 KU EECS 882 Mobile Wireless Nets Ad Hoc Nets MWN-AH-53

54 Ad Hoc Self-Organisation Self-Organisation and Federation logical cluster head Hierarchical network structure each cluster may have a leader or cluster head leader is abstraction for entire cluster to higher level level n clusters are virtual nodes in level n+1 cluster 30 October 2007 KU EECS 882 Mobile Wireless Nets Ad Hoc Nets MWN-AH-54

55 Ad Hoc Self-Organisation Self-Organisation and Federation Hierarchical network structure: cluster selection determined by role (e.g. personal node in a PAN) leader election by distributed algorithm (most common) leaderless clustering: fully distributed operation 30 October 2007 KU EECS 882 Mobile Wireless Nets Ad Hoc Nets MWN-AH-55

56 Ad Hoc Self-Organisation Self-Organisation and Federation Layer 3 connectivity structure self-organised what about mobility and dynamic behaviour? 30 October 2007 KU EECS 882 Mobile Wireless Nets Ad Hoc Nets MWN-AH-56

57 Ad Hoc Self-Organisation Topology Optimisation and Maintenance Topology maintenance of federations merge/split group mobility, dynamic coalitions heal partition 30 October 2007 KU EECS 882 Mobile Wireless Nets Ad Hoc Nets MWN-AH-57

58 Ad Hoc Self-Organisation Topology Optimisation and Maintenance leave then join Topology maintenance of nodes leave/join from/to federation node mobility resolution to identifier vs. topological address reassignment 30 October 2007 KU EECS 882 Mobile Wireless Nets Ad Hoc Nets MWN-AH-58

59 Mobile Ad Hoc Networks AH.4 Routing Overview AH.1 Motivation and application AH.2 Architecture, challenges and issues AH.3 Self-organisation AH.4 Routing overview AH.5 Autonomic control and self-management 30 October 2007 KU EECS 882 Mobile Wireless Nets Ad Hoc Nets MWN-AH-59

60 Mobile Ad Hoc Networking Routing Challenges Routing algorithm discovers path between source(s) and destination(s) 30 October 2007 KU EECS 882 Mobile Wireless Nets Ad Hoc Nets MWN-AH-60

61 Mobile Ad Hoc Networking Routing Challenges Routing algorithm discovers path between source(s) and destination(s) Routing algorithm classes distance vector (e.g. RIP) link state (e.g. OSPF, ISIS) source routing Challenges in MANETs? 30 October 2007 KU EECS 882 Mobile Wireless Nets Ad Hoc Nets MWN-AH-61

62 Mobile Ad Hoc Networking Routing Challenges Routing algorithm discovers path between source(s) and destination(s) Routing algorithm classes distance vector (e.g. RIP) link state (e.g. OSPF, ISIS) source routing Challenges in MANETs episodic connectivity and mobility routes and link state keeps changing difficult or impossible to maintain consistent information Conventional DV and LS algorithms do not work well 30 October 2007 KU EECS 882 Mobile Wireless Nets Ad Hoc Nets MWN-AH-62

63 Mobile Ad Hoc Networking Routing Algorithm Examples Many proposals Lecture MR many within the IETF MANET working group specilaised domains: e.g. supersonic military aircraft Examples: AODV: ad hoc on-demand distance vector DSR: dynamic source routing 30 October 2007 KU EECS 882 Mobile Wireless Nets Ad Hoc Nets MWN-AH-63

64 Mobile Ad Hoc Networking Routing Algorithm Examples Many proposals Lecture MR many within the IETF MANET working group specilaised domains: e.g. supersonic military aircraft Examples: AODV: ad hoc on-demand distance vector DSR: dynamic source routing Problem: no one protocol can possibly be right for all scenarios adaptive framework needed to negotiate protocols part of self-organisation and federation 30 October 2007 KU EECS 882 Mobile Wireless Nets Ad Hoc Nets MWN-AH-64

65 Mobile Ad Hoc Networks AH.5 Autonomic Control and Self-Management AH.1 Motivation and application AH.2 Architecture, challenges and issues AH.3 Self-organisation AH.4 Routing overview AH.5 Autonomic control and self-management 30 October 2007 KU EECS 882 Mobile Wireless Nets Ad Hoc Nets MWN-AH-65

66 Ad Hoc Control & Management Introduction In the current Internet: network control is poorly understood network management is a dark art already exceeding the ability for humans to understand 30 October 2007 KU EECS 882 Mobile Wireless Nets Ad Hoc Nets MWN-AH-66

67 Ad Hoc Control & Management Introduction In the current Internet: network control is poorly understood network management is a dark art already exceeding the ability for humans to understand In large-scale MANETs: problem is significantly worse dynamic behaviour distributed ownership and management of resources 30 October 2007 KU EECS 882 Mobile Wireless Nets Ad Hoc Nets MWN-AH-67

68 Autonomic Control & Management Motivation Large-scale MANET control and management seems to require autonomic mechanisms Autonomic network management and control: self-* auto-configuration self-organisation self-management self-diagonsis and repair Significant extension to self-organisation very hard research problem 30 October 2007 KU EECS 882 Mobile Wireless Nets Ad Hoc Nets MWN-AH-68

69 Mobile Ad Hoc Networks Further Reading S. Ramanathan and Martha Steenstrup, A Survey of Routing Techniques for Mobile Communication Networks, Mobile Networks and Applications, vol.1 iss.2, February 1996, pp October 2007 KU EECS 882 Mobile Wireless Nets Ad Hoc Nets MWN-AH-69

70 Mobile Ad Hoc Networks Acknowledgements Some material in these foils is based on the textbook Murthy and Manoj, Ad Hoc Wireless Networks: Architectures and Protocols Some material in these foils enhanced from EECS 780 foils 30 October 2007 KU EECS 882 Mobile Wireless Nets Ad Hoc Nets MWN-AH-70

www.mindteck.com 6LoWPAN Technical Overview

www.mindteck.com 6LoWPAN Technical Overview www.mindteck.com 6LoWPAN Technical Overview 6LoWPAN : Slide Index Introduction Acronyms Stack Architecture Stack Layers Applications IETF documents References Confidential Mindteck 2009 2 6LoWPAN - Introduction

More information

Enterprise VoIP Services over Mobile Ad-Hoc Technologies

Enterprise VoIP Services over Mobile Ad-Hoc Technologies Enterprise VoIP Services over Mobile Ad-Hoc Technologies 1 System Architecture Figure 1 illustrates the system architecture. We can divide it into 2 parts. One is the Mobile VoIP Box (MVB) node and the

More information

Security for Ad Hoc Networks. Hang Zhao

Security for Ad Hoc Networks. Hang Zhao Security for Ad Hoc Networks Hang Zhao 1 Ad Hoc Networks Ad hoc -- a Latin phrase which means "for this [purpose]". An autonomous system of mobile hosts connected by wireless links, often called Mobile

More information

Security in Ad Hoc Network

Security in Ad Hoc Network Security in Ad Hoc Network Bingwen He Joakim Hägglund Qing Gu Abstract Security in wireless network is becoming more and more important while the using of mobile equipments such as cellular phones or laptops

More information

Top-Down Network Design

Top-Down Network Design Top-Down Network Design Chapter Five Designing a Network Topology Copyright 2010 Cisco Press & Priscilla Oppenheimer Topology A map of an internetwork that indicates network segments, interconnection points,

More information

8/27/2014. What is a computer network? Introduction. Business Applications (1) Uses of Computer Networks. Business Applications (2)

8/27/2014. What is a computer network? Introduction. Business Applications (1) Uses of Computer Networks. Business Applications (2) What is a computer network? Introduction Chapter 1 A number of separate but interconnected computers A collection of autonomous computers interconnected by a single technology COURSE FOCUS: design and

More information

Lecture 2.1 : The Distributed Bellman-Ford Algorithm. Lecture 2.2 : The Destination Sequenced Distance Vector (DSDV) protocol

Lecture 2.1 : The Distributed Bellman-Ford Algorithm. Lecture 2.2 : The Destination Sequenced Distance Vector (DSDV) protocol Lecture 2 : The DSDV Protocol Lecture 2.1 : The Distributed Bellman-Ford Algorithm Lecture 2.2 : The Destination Sequenced Distance Vector (DSDV) protocol The Routing Problem S S D D The routing problem

More information

Disaster Recovery Design Ehab Ashary University of Colorado at Colorado Springs

Disaster Recovery Design Ehab Ashary University of Colorado at Colorado Springs Disaster Recovery Design Ehab Ashary University of Colorado at Colorado Springs As a head of the campus network department in the Deanship of Information Technology at King Abdulaziz University for more

More information

Behavior Analysis of TCP Traffic in Mobile Ad Hoc Network using Reactive Routing Protocols

Behavior Analysis of TCP Traffic in Mobile Ad Hoc Network using Reactive Routing Protocols Behavior Analysis of TCP Traffic in Mobile Ad Hoc Network using Reactive Routing Protocols Purvi N. Ramanuj Department of Computer Engineering L.D. College of Engineering Ahmedabad Hiteishi M. Diwanji

More information

Mobile Communications Chapter 8: Network Protocols/Mobile IP

Mobile Communications Chapter 8: Network Protocols/Mobile IP Mobile Communications Chapter 8: Network Protocols/Mobile IP Motivation Data transfer Encapsulation Security IPv6 Problems Micro mobility support DHCP Ad-hoc networks Routing protocols Prof. Dr.-Ing. Jochen

More information

Performance Evaluation of AODV, OLSR Routing Protocol in VOIP Over Ad Hoc

Performance Evaluation of AODV, OLSR Routing Protocol in VOIP Over Ad Hoc (International Journal of Computer Science & Management Studies) Vol. 17, Issue 01 Performance Evaluation of AODV, OLSR Routing Protocol in VOIP Over Ad Hoc Dr. Khalid Hamid Bilal Khartoum, Sudan dr.khalidbilal@hotmail.com

More information

LIST OF FIGURES. Figure No. Caption Page No.

LIST OF FIGURES. Figure No. Caption Page No. LIST OF FIGURES Figure No. Caption Page No. Figure 1.1 A Cellular Network.. 2 Figure 1.2 A Mobile Ad hoc Network... 2 Figure 1.3 Classifications of Threats. 10 Figure 1.4 Classification of Different QoS

More information

Keywords- manet, routing protocols, aodv, olsr, grp,data drop parameter.

Keywords- manet, routing protocols, aodv, olsr, grp,data drop parameter. Volume 5, Issue 3, March 2015 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Evaluation of

More information

Datagram-based network layer: forwarding; routing. Additional function of VCbased network layer: call setup.

Datagram-based network layer: forwarding; routing. Additional function of VCbased network layer: call setup. CEN 007C Computer Networks Fundamentals Instructor: Prof. A. Helmy Homework : Network Layer Assigned: Nov. 28 th, 2011. Due Date: Dec 8 th, 2011 (to the TA) 1. ( points) What are the 2 most important network-layer

More information

A Comparison Study of Qos Using Different Routing Algorithms In Mobile Ad Hoc Networks

A Comparison Study of Qos Using Different Routing Algorithms In Mobile Ad Hoc Networks A Comparison Study of Qos Using Different Routing Algorithms In Mobile Ad Hoc Networks T.Chandrasekhar 1, J.S.Chakravarthi 2, K.Sravya 3 Professor, Dept. of Electronics and Communication Engg., GIET Engg.

More information

Comparison of WCA with AODV and WCA with ACO using clustering algorithm

Comparison of WCA with AODV and WCA with ACO using clustering algorithm Comparison of WCA with AODV and WCA with ACO using clustering algorithm Deepthi Hudedagaddi, Pallavi Ravishankar, Rakesh T M, Shashikanth Dengi ABSTRACT The rapidly changing topology of Mobile Ad hoc networks

More information

LAN Switching. 15-441 Computer Networking. Switched Network Advantages. Hubs (more) Hubs. Bridges/Switches, 802.11, PPP. Interconnecting LANs

LAN Switching. 15-441 Computer Networking. Switched Network Advantages. Hubs (more) Hubs. Bridges/Switches, 802.11, PPP. Interconnecting LANs LAN Switching 15-441 Computer Networking Bridges/Switches, 802.11, PPP Extend reach of a single shared medium Connect two or more segments by copying data frames between them Switches only copy data when

More information

COMPARATIVE ANALYSIS OF ON -DEMAND MOBILE AD-HOC NETWORK

COMPARATIVE ANALYSIS OF ON -DEMAND MOBILE AD-HOC NETWORK www.ijecs.in International Journal Of Engineering And Computer Science ISSN:2319-7242 Volume 2 Issue 5 May, 2013 Page No. 1680-1684 COMPARATIVE ANALYSIS OF ON -DEMAND MOBILE AD-HOC NETWORK ABSTRACT: Mr.Upendra

More information

CHAPTER 6. VOICE COMMUNICATION OVER HYBRID MANETs

CHAPTER 6. VOICE COMMUNICATION OVER HYBRID MANETs CHAPTER 6 VOICE COMMUNICATION OVER HYBRID MANETs Multimedia real-time session services such as voice and videoconferencing with Quality of Service support is challenging task on Mobile Ad hoc Network (MANETs).

More information

INTRUSION DETECTION SYSTEM ON MOBILE AD HOC NETWORK

INTRUSION DETECTION SYSTEM ON MOBILE AD HOC NETWORK INTRUSION DETECTION SYSTEM ON MOBILE AD HOC NETWORK Kruahnadeo Belerao M.E. student JSPM Imperial College Of Engg. Wagholi,Pune Vinod Wadane M.E. student JSPM Imperial College Of Engg. Wagholi,Pune ABSTRACT

More information

Christian Bettstetter. Mobility Modeling, Connectivity, and Adaptive Clustering in Ad Hoc Networks

Christian Bettstetter. Mobility Modeling, Connectivity, and Adaptive Clustering in Ad Hoc Networks Christian Bettstetter Mobility Modeling, Connectivity, and Adaptive Clustering in Ad Hoc Networks Contents 1 Introduction 1 2 Ad Hoc Networking: Principles, Applications, and Research Issues 5 2.1 Fundamental

More information

TRILL for Service Provider Data Center and IXP. Francois Tallet, Cisco Systems

TRILL for Service Provider Data Center and IXP. Francois Tallet, Cisco Systems for Service Provider Data Center and IXP Francois Tallet, Cisco Systems 1 : Transparent Interconnection of Lots of Links overview How works designs Conclusion 2 IETF standard for Layer 2 multipathing Driven

More information

Suganya D. Computer Science and Engineering, Anna University SMK FOMRA Institute of Technology, Chennai, India Suganya2086@yahoo.

Suganya D. Computer Science and Engineering, Anna University SMK FOMRA Institute of Technology, Chennai, India Suganya2086@yahoo. gopalax -International Journal of Technology And Engineering System(IJTES): Jan March 2011- Vol.2.No.2. ) Most Efficient Multicast structure for Wireless Mesh Networks Suganya D Computer Science and Engineering,

More information

ROUTE MECHANISMS FOR WIRELESS ADHOC NETWORKS: -CLASSIFICATIONS AND COMPARISON ANALYSIS

ROUTE MECHANISMS FOR WIRELESS ADHOC NETWORKS: -CLASSIFICATIONS AND COMPARISON ANALYSIS International Journal of Science, Environment and Technology, Vol. 1, No 2, 2012, 72-79 ROUTE MECHANISMS FOR WIRELESS ADHOC NETWORKS: -CLASSIFICATIONS AND COMPARISON ANALYSIS Ramesh Kait 1, R. K. Chauhan

More information

Municipal Mesh Network Design

Municipal Mesh Network Design White Paper Municipal Mesh Network Design Author: Maen Artimy 1 Summary This document provides a wireless mesh network design for the downtown area of the Town of Wolfville, Nova Scotia. This design serves

More information

PERFORMANCE ANALYSIS OF AODV, DSDV AND AOMDV USING WIMAX IN NS-2

PERFORMANCE ANALYSIS OF AODV, DSDV AND AOMDV USING WIMAX IN NS-2 International Journal of Computer Engineering & Technology (IJCET) Volume 7, Issue 1, Jan-Feb 2016, pp. 01-08, Article ID: IJCET_07_01_001 Available online at http://www.iaeme.com/ijcet/issues.asp?jtype=ijcet&vtype=7&itype=1

More information

A Catechistic Method for Traffic Pattern Discovery in MANET

A Catechistic Method for Traffic Pattern Discovery in MANET A Catechistic Method for Traffic Pattern Discovery in MANET R. Saranya 1, R. Santhosh 2 1 PG Scholar, Computer Science and Engineering, Karpagam University, Coimbatore. 2 Assistant Professor, Computer

More information

Implementing Intercluster Lookup Service

Implementing Intercluster Lookup Service Appendix 11 Implementing Intercluster Lookup Service Overview When using the Session Initiation Protocol (SIP), it is possible to use the Uniform Resource Identifier (URI) format for addressing an end

More information

Proposition of a new approach to adapt SIP protocol to Ad hoc Networks

Proposition of a new approach to adapt SIP protocol to Ad hoc Networks , pp.133-148 http://dx.doi.org/10.14257/ijseia.2014.8.7,11 Proposition of a new approach to adapt SIP protocol to Ad hoc Networks I. Mourtaji, M. Bouhorma, M. Benahmed and A. Bouhdir Computer and Communication

More information

Router and Routing Basics

Router and Routing Basics Router and Routing Basics Malin Bornhager Halmstad University Session Number 2002, Svenska-CNAP Halmstad University 1 Routing Protocols and Concepts CCNA2 Routing and packet forwarding Static routing Dynamic

More information

Mitigation of Breaking Connections. (a.k.a. OLSRd v1 Multi-Gateway & BRDP)

Mitigation of Breaking Connections. (a.k.a. OLSRd v1 Multi-Gateway & BRDP) Mitigation of Breaking Connections (a.k.a. OLSRd v1 Multi-Gateway & BRDP) About Me Ferry Huberts Self-Employed Open Source Entrepreneur Lead Committer for OLSRd v1 Committer in several other projects Mainly

More information

TOPOLOGIES NETWORK SECURITY SERVICES

TOPOLOGIES NETWORK SECURITY SERVICES TOPOLOGIES NETWORK SECURITY SERVICES 1 R.DEEPA 1 Assitant Professor, Dept.of.Computer science, Raja s college of Tamil Studies & Sanskrit,Thiruvaiyaru ABSTRACT--In the paper propose about topology security

More information

Comparative Study of Performance Evaluation for Mobile Ad hoc networks using a proxy node

Comparative Study of Performance Evaluation for Mobile Ad hoc networks using a proxy node Comparative Study of Performance Evaluation for Mobile Ad hoc networks using a proxy node G. E. RIZOS georizos@teiep.gr D. C. VASILIADIS dvas@teiep.gr E. STERGIOU ster@teiep.gr Abstract: In this paper,

More information

CHAPTER 6 DESIGNING A NETWORK TOPOLOGY

CHAPTER 6 DESIGNING A NETWORK TOPOLOGY CHAPTER 6 DESIGNING A NETWORK TOPOLOGY Expected Outcomes Able to identify terminology that will help student discuss technical goals with customer. Able to introduce a checklist that can be used to determine

More information

Mobile Computing. Logical entities are instances of a running user application or a mobile agent. Mobile agents can migrate any where over internet.

Mobile Computing. Logical entities are instances of a running user application or a mobile agent. Mobile agents can migrate any where over internet. Migration is important for survival. Mobility originated from the desire to move either toward resources or away from scarcity. Mobile computing about both physical and logical computing entities that

More information

Administrivia. CSMA/CA: Recap. Mobility Management. Mobility Management. Channel Partitioning, Random Access and Scheduling

Administrivia. CSMA/CA: Recap. Mobility Management. Mobility Management. Channel Partitioning, Random Access and Scheduling Administrivia No lecture on Thurs. Last work will be out this week (not due, covers wireless) Extra office hours for next week and the week after. Channel Partitioning, Random Access and Scheduling Channel

More information

Mobile and Sensor Systems

Mobile and Sensor Systems Mobile and Sensor Systems Lecture 1: Introduction to Mobile Systems Dr Cecilia Mascolo About Me In this course The course will include aspects related to general understanding of Mobile and ubiquitous

More information

An Efficient AODV-Based Algorithm for Small Area MANETS

An Efficient AODV-Based Algorithm for Small Area MANETS An Efficient AODV-Based Algorithm for Small Area MANETS Jai Prakash Kumawat 1, Prakriti Trivedi 2 PG Student, Department of Computer Engineering & IT, Government Engineering College, Ajmer, India 1 Assistant

More information

Basic Wireless Infrastructure and Topologies

Basic Wireless Infrastructure and Topologies Basic Wireless Infrastructure and Topologies Developed by Sebastian Buettrich and Alberto Escudero Pascual 1 Goals To be aware of the most common wireless topologies To be able to identify and plan suitable

More information

A Survey on Reduction in Energy Consumption by Improved AODV on Mobile Ad Hoc Network

A Survey on Reduction in Energy Consumption by Improved AODV on Mobile Ad Hoc Network International Journal of Computer Sciences and Engineering Open Access Review Paper Volume-4, Issue-2 E-ISSN: 2347-2693 A Survey on Reduction in Energy Consumption by Improved AODV on Mobile Ad Hoc Network

More information

Release: 1. ICTTEN5217A Plan a wireless mesh network

Release: 1. ICTTEN5217A Plan a wireless mesh network Release: 1 ICTTEN5217A Plan a wireless mesh ICTTEN5217A Plan a wireless mesh Modification History Not Applicable Approved Page 2 of 10 Unit Descriptor Unit descriptor This unit describes the performance

More information

A Study of Internet Connectivity for Mobile Ad Hoc Networks in NS 2

A Study of Internet Connectivity for Mobile Ad Hoc Networks in NS 2 A Study of Internet Connectivity for Mobile Ad Hoc Networks in NS 2 Alex Ali Hamidian January 2003 Department of Communication Systems Lund Institute of Technology, Lund University Box 118 S-221 00 Lund

More information

Design and Implementation of Ad-hoc Communication and Application on Mobile Phone Terminals

Design and Implementation of Ad-hoc Communication and Application on Mobile Phone Terminals Design and Implementation of Ad-hoc Communication and Application on Mobile Phone Terminals Yujin Noishiki Hidetoshi Yokota Akira Idoue KDDI R&D Laboratories, Inc. 2-1-15 Ohara, Fujimino-Shi, Saitama,

More information

A Mobile Ad-hoc Satellite and Wireless Mesh Networking Approach for Public Safety Communications

A Mobile Ad-hoc Satellite and Wireless Mesh Networking Approach for Public Safety Communications A Mobile Ad-hoc Satellite and Wireless Mesh Networking Approach for Public Safety Communications G. Iapichino, C. Bonnet Mobile Communications Department Eurecom Sophia Antipolis, France {Iapichin, Bonnet}@eurecom.fr

More information

CROSS LAYER BASED MULTIPATH ROUTING FOR LOAD BALANCING

CROSS LAYER BASED MULTIPATH ROUTING FOR LOAD BALANCING CHAPTER 6 CROSS LAYER BASED MULTIPATH ROUTING FOR LOAD BALANCING 6.1 INTRODUCTION The technical challenges in WMNs are load balancing, optimal routing, fairness, network auto-configuration and mobility

More information

Formal Measure of the Effect of MANET size over the Performance of Various Routing Protocols

Formal Measure of the Effect of MANET size over the Performance of Various Routing Protocols Formal Measure of the Effect of MANET size over the Performance of Various Routing Protocols Er. Pooja Kamboj Research Scholar, CSE Department Guru Nanak Dev Engineering College, Ludhiana (Punjab) Er.

More information

ISSUES AND CHALLENGES OF QUALITY OF SERVICE IN MOBILE ADHOC NETWORK

ISSUES AND CHALLENGES OF QUALITY OF SERVICE IN MOBILE ADHOC NETWORK ISSUES AND CHALLENGES OF QUALITY OF SERVICE IN MOBILE ADHOC NETWORK Mukesh Kumar Student (Ph.D) Department of Computer Engineering The Technological Institute of Textile and Science, Bhiwani-127021, Haryana

More information

This chapter covers four comprehensive scenarios that draw on several design topics covered in this book:

This chapter covers four comprehensive scenarios that draw on several design topics covered in this book: This chapter covers four comprehensive scenarios that draw on several design topics covered in this book: Scenario One: Pearland Hospital Scenario Two: Big Oil and Gas Scenario Three: Beauty Things Store

More information

Adapting Distributed Hash Tables for Mobile Ad Hoc Networks

Adapting Distributed Hash Tables for Mobile Ad Hoc Networks University of Tübingen Chair for Computer Networks and Internet Adapting Distributed Hash Tables for Mobile Ad Hoc Networks Tobias Heer, Stefan Götz, Simon Rieche, Klaus Wehrle Protocol Engineering and

More information

NETE-4635 Computer Network Analysis and Design. Designing a Network Topology. NETE4635 - Computer Network Analysis and Design Slide 1

NETE-4635 Computer Network Analysis and Design. Designing a Network Topology. NETE4635 - Computer Network Analysis and Design Slide 1 NETE-4635 Computer Network Analysis and Design Designing a Network Topology NETE4635 - Computer Network Analysis and Design Slide 1 Network Topology Design Themes Hierarchy Redundancy Modularity Well-defined

More information

Wireless Mesh Networks under FreeBSD

Wireless Mesh Networks under FreeBSD Wireless Networks under FreeBSD Rui Paulo rpaulo@freebsd.org The FreeBSD Project AsiaBSDCon 2010 - Tokyo, Japan Abstract With the advent of low cost wireless chipsets, wireless mesh networks became much

More information

Link-State Routing Protocols

Link-State Routing Protocols Link-State Routing Protocols Malin Bornhager Halmstad University Session Number 2002, Svenska-CNAP Halmstad University 1 Objectives Link-state routing protocol Single-area OSPF concepts Single-area OSPF

More information

Comparison of RIP, EIGRP, OSPF, IGRP Routing Protocols in Wireless Local Area Network (WLAN) By Using OPNET Simulator Tool - A Practical Approach

Comparison of RIP, EIGRP, OSPF, IGRP Routing Protocols in Wireless Local Area Network (WLAN) By Using OPNET Simulator Tool - A Practical Approach Comparison of RIP, EIGRP, OSPF, IGRP Routing Protocols in Wireless Local Area Network (WLAN) By Using OPNET Simulator Tool - A Practical Approach U. Dillibabau 1, Akshay 2, M. Lorate Shiny 3 UG Scholars,

More information

CSC458 Lecture 6. Homework #1 Grades. Inter-domain Routing IP Addressing. Administrivia. Midterm will Cover Following Topics

CSC458 Lecture 6. Homework #1 Grades. Inter-domain Routing IP Addressing. Administrivia. Midterm will Cover Following Topics CSC458 Lecture 6 Inter-domain Routing IP Addressing Stefan Saroiu http://www.cs.toronto.edu/syslab/courses/csc458 University of Toronto at Mississauga Homework #1 Grades Fraction of Students 100 80 60

More information

DESIGN AND DEVELOPMENT OF LOAD SHARING MULTIPATH ROUTING PROTCOL FOR MOBILE AD HOC NETWORKS

DESIGN AND DEVELOPMENT OF LOAD SHARING MULTIPATH ROUTING PROTCOL FOR MOBILE AD HOC NETWORKS DESIGN AND DEVELOPMENT OF LOAD SHARING MULTIPATH ROUTING PROTCOL FOR MOBILE AD HOC NETWORKS K.V. Narayanaswamy 1, C.H. Subbarao 2 1 Professor, Head Division of TLL, MSRUAS, Bangalore, INDIA, 2 Associate

More information

IPv6 mobility and ad hoc network mobility overview report

IPv6 mobility and ad hoc network mobility overview report Institut Eurecom 1 Department of Mobile Communications 2229, route des Crêtes B.P. 193 06904 Sophia Antipolis FRANCE Research Report RR-08-217 IPv6 mobility and ad hoc network mobility overview report

More information

Data Networking and Architecture. Delegates should have some basic knowledge of Internet Protocol and Data Networking principles.

Data Networking and Architecture. Delegates should have some basic knowledge of Internet Protocol and Data Networking principles. Data Networking and Architecture The course focuses on theoretical principles and practical implementation of selected Data Networking protocols and standards. Physical network architecture is described

More information

Mesh Networks. Abdus Salam ICTP, February 2004 Schoolon DigitalRadio Communications for Research and Training in Developing Countries

Mesh Networks. Abdus Salam ICTP, February 2004 Schoolon DigitalRadio Communications for Research and Training in Developing Countries Mesh Networks Abdus Salam ICTP, February 2004 Schoolon DigitalRadio Communications for Research and Training in Developing Countries Ermanno Pietrosemoli Escuela Latinoamericana de Redes (Latin American

More information

CSET 4750 Computer Networks and Data Communications (4 semester credit hours) CSET Required IT Required

CSET 4750 Computer Networks and Data Communications (4 semester credit hours) CSET Required IT Required CSET 4750 Computer Networks and Data Communications (4 semester credit hours) CSET Required IT Required Current Catalog Description: Computer network architectures and their application to industry needs.

More information

PERFORMANCE OF MOBILE AD HOC NETWORKING ROUTING PROTOCOLS IN REALISTIC SCENARIOS

PERFORMANCE OF MOBILE AD HOC NETWORKING ROUTING PROTOCOLS IN REALISTIC SCENARIOS PERFORMANCE OF MOBILE AD HOC NETWORKING ROUTING PROTOCOLS IN REALISTIC SCENARIOS Julian Hsu, Sameer Bhatia, Mineo Takai, Rajive Bagrodia, Scalable Network Technologies, Inc., Culver City, CA, and Michael

More information

An Efficient QoS Routing Protocol for Mobile Ad-Hoc Networks *

An Efficient QoS Routing Protocol for Mobile Ad-Hoc Networks * An Efficient QoS Routing Protocol for Mobile Ad-Hoc Networks * Inwhee Joe College of Information and Communications Hanyang University Seoul, Korea iwj oeshanyang.ac.kr Abstract. To satisfy the user requirements

More information

Virtual PortChannels: Building Networks without Spanning Tree Protocol

Virtual PortChannels: Building Networks without Spanning Tree Protocol . White Paper Virtual PortChannels: Building Networks without Spanning Tree Protocol What You Will Learn This document provides an in-depth look at Cisco's virtual PortChannel (vpc) technology, as developed

More information

Re-Engineering Campus-Wide Internet Telephony Using Voice over Internet Protocol

Re-Engineering Campus-Wide Internet Telephony Using Voice over Internet Protocol International Journal of Networks and Communications 2015, 5(2): 23-30 DOI: 10.5923/j.ijnc.20150502.01 Re-Engineering Campus-Wide Internet Telephony Using Voice over Internet Protocol Francisca O. Oladipo

More information

Step by Step Procedural Comparison of DSR, AODV and DSDV Routing protocol

Step by Step Procedural Comparison of DSR, AODV and DSDV Routing protocol th International Conference on Computer Engineering and Technology (ICCET ) IPCSIT vol. () () IACSIT Press, Singapore Step by Step Procedural Comparison of DSR, AODV and DSDV Routing protocol Amith Khandakar

More information

Portable Wireless Mesh Networks: Competitive Differentiation

Portable Wireless Mesh Networks: Competitive Differentiation Portable Wireless Mesh Networks: Competitive Differentiation Rajant Corporation s kinetic mesh networking solutions combine specialized command and control software with ruggedized, high-performance hardware.

More information

Unit 3 - Advanced Internet Architectures

Unit 3 - Advanced Internet Architectures Unit 3 - Advanced Internet Architectures Carlos Borrego Iglesias, Sergi Robles Carlos.Borrego@uab.cat,Sergi.Robles@uab.cat Departament d Enginyeria de la Informació i de les Comunicacions Universitat Autònoma

More information

OSPF Routing Protocol

OSPF Routing Protocol OSPF Routing Protocol Contents Introduction Network Architecture Campus Design Architecture Building Block Design Server Farm Design Core Block Design WAN Design Architecture Protocol Design Campus Design

More information

Interconnecting Cisco Network Devices 1 Course, Class Outline

Interconnecting Cisco Network Devices 1 Course, Class Outline www.etidaho.com (208) 327-0768 Interconnecting Cisco Network Devices 1 Course, Class Outline 5 Days Interconnecting Cisco Networking Devices, Part 1 (ICND1) v2.0 is a five-day, instructorled training course

More information

Mobility Management 嚴 力 行 高 雄 大 學 資 工 系

Mobility Management 嚴 力 行 高 雄 大 學 資 工 系 Mobility Management 嚴 力 行 高 雄 大 學 資 工 系 Mobility Management in Cellular Systems Cellular System HLR PSTN MSC MSC VLR BSC BSC BSC cell BTS BTS BTS BTS MT BTS BTS BTS BTS HLR and VLR HLR (Home Location Register)

More information

Computer Networking: A Survey

Computer Networking: A Survey Computer Networking: A Survey M. Benaiah Deva Kumar and B. Deepa, 1 Scholar, 2 Assistant Professor, IT Department, Sri Krishna College of Arts and Science College, Coimbatore, India. Abstract- Computer

More information

SIMULATION STUDY OF BLACKHOLE ATTACK IN THE MOBILE AD HOC NETWORKS

SIMULATION STUDY OF BLACKHOLE ATTACK IN THE MOBILE AD HOC NETWORKS Journal of Engineering Science and Technology Vol. 4, No. 2 (2009) 243-250 School of Engineering, Taylor s University College SIMULATION STUDY OF BLACKHOLE ATTACK IN THE MOBILE AD HOC NETWORKS SHEENU SHARMA

More information

DL TC72 Communication Protocols: HDLC, SDLC, X.25, Frame Relay, ATM

DL TC72 Communication Protocols: HDLC, SDLC, X.25, Frame Relay, ATM DL TC72 Communication Protocols: HDLC, SDLC, X.25, Frame Relay, ATM Objectives: Base training of an engineer for the installation and maintenance of Digital Telecommunications and Internetworking systems.

More information

100-101: Interconnecting Cisco Networking Devices Part 1 v2.0 (ICND1)

100-101: Interconnecting Cisco Networking Devices Part 1 v2.0 (ICND1) 100-101: Interconnecting Cisco Networking Devices Part 1 v2.0 (ICND1) Course Overview This course provides students with the knowledge and skills to implement and support a small switched and routed network.

More information

Scalable Source Routing

Scalable Source Routing Scalable Source Routing January 2010 Thomas Fuhrmann Department of Informatics, Self-Organizing Systems Group, Technical University Munich, Germany Routing in Networks You re there. I m here. Scalable

More information

JOB READY ASSESSMENT BLUEPRINT COMPUTER NETWORKING FUNDAMENTALS - PILOT. Test Code: 4514 Version: 01

JOB READY ASSESSMENT BLUEPRINT COMPUTER NETWORKING FUNDAMENTALS - PILOT. Test Code: 4514 Version: 01 JOB READY ASSESSMENT BLUEPRINT COMPUTER NETWORKING FUNDAMENTALS - PILOT Test Code: 4514 Version: 01 Specific Competencies and Skills Tested in this Assessment: PC Principles Identify physical and equipment

More information

Saleh Ali K.Al-Omari 1, Putra Sumari 2

Saleh Ali K.Al-Omari 1, Putra Sumari 2 Saleh Ali K.Al-Omari 1, Putra Sumari 2 School of Computer Science, Universiti Sains Malaysia, 11800 Penang, Malaysia Salehalomari2005@yahoo.com, putras@cs.usm.my ABSTRACT Mobile Ad Hoc Network (MANET)

More information

Wireless Networks. Reading: Sec5on 2.8. COS 461: Computer Networks Spring 2011. Mike Freedman

Wireless Networks. Reading: Sec5on 2.8. COS 461: Computer Networks Spring 2011. Mike Freedman 1 Wireless Networks Reading: Sec5on 2.8 COS 461: Computer Networks Spring 2011 Mike Freedman hep://www.cs.princeton.edu/courses/archive/spring11/cos461/ 2 Widespread Deployment Worldwide cellular subscribers

More information

Cisco Discovery 3: Introducing Routing and Switching in the Enterprise 157.8 hours teaching time

Cisco Discovery 3: Introducing Routing and Switching in the Enterprise 157.8 hours teaching time Essential Curriculum Computer Networking II Cisco Discovery 3: Introducing Routing and Switching in the Enterprise 157.8 hours teaching time Chapter 1 Networking in the Enterprise-------------------------------------------------

More information

Security and Scalability of MANET Routing Protocols in Homogeneous & Heterogeneous Networks

Security and Scalability of MANET Routing Protocols in Homogeneous & Heterogeneous Networks Security and Scalability of MANET Routing Protocols in Homogeneous & Heterogeneous Networks T.V.P. Sundararajan 1, Karthik 2, A. Shanmugam 3 1. Assistant Professor, Bannari Amman Institute Of Technology,

More information

IPv6 SECURITY. May 2011. The Government of the Hong Kong Special Administrative Region

IPv6 SECURITY. May 2011. The Government of the Hong Kong Special Administrative Region IPv6 SECURITY May 2011 The Government of the Hong Kong Special Administrative Region The contents of this document remain the property of, and may not be reproduced in whole or in part without the express

More information

SECURITY ASPECTS IN MOBILE AD HOC NETWORK (MANETS)

SECURITY ASPECTS IN MOBILE AD HOC NETWORK (MANETS) SECURITY ASPECTS IN MOBILE AD HOC NETWORK (MANETS) Neha Maurya, ASM S IBMR ABSTRACT: Mobile Ad hoc networks (MANETs) are a new paradigm of wireless network, offering unrestricted mobility without any underlying

More information

Figure 2 Control and data planes WMR NODE ARCHITECTURE

Figure 2 Control and data planes WMR NODE ARCHITECTURE Controller selection in a Wireless Mesh SDN under network partitioning and merging scenarios Stefano Salsano, Giuseppe Siracusano, Andrea Detti, Claudio Pisa, Pier Luigi Ventre, Nicola Blefari-Melazzi

More information

Literature Synthesis on Wireless Networks Management. Veenesh Jeena (JNXVEE001) CSC4000W 2010

Literature Synthesis on Wireless Networks Management. Veenesh Jeena (JNXVEE001) CSC4000W 2010 Literature Synthesis on Wireless Networks Management Veenesh Jeena (JNXVEE001) CSC4000W 2010 Abstract In this paper, we look a Wireless Mesh Networks (WMN). We discuss the importance of WMN s and some

More information

Multihop Wireless Networks

Multihop Wireless Networks Multihop Wireless Networks Ray-Guang Cheng Associate Professor Department of Electronic Engineering, National Taiwan Univ. of Science and Technology, Taipei, Taiwan Email: crg@mail.ntust.edu.tw Outline

More information

PSTN IXC PSTN LEC PSTN LEC STP STP. Class 4. Class 4 SCP SCP STP. Switch. Switch STP. Signaling Media. Class 5. Class 5. Switch.

PSTN IXC PSTN LEC PSTN LEC STP STP. Class 4. Class 4 SCP SCP STP. Switch. Switch STP. Signaling Media. Class 5. Class 5. Switch. As we enter the 21st century, we are experiencing a telecommunications revolution. From a technological perspective, the distinction between voice information and other kinds of data is blurring as circuit-switched

More information

Fast and Secure Data Transmission by Using Hybrid Protocols in Mobile Ad Hoc Network

Fast and Secure Data Transmission by Using Hybrid Protocols in Mobile Ad Hoc Network Middle-East Journal of Scientific Research 15 (9): 1290-1294, 2013 ISSN 1990-9233 IDOSI Publications, 2013 DOI: 10.5829/idosi.mejsr.2013.15.9.11514 Fast and Secure Data Transmission by Using Hybrid Protocols

More information

communication over wireless link handling mobile user who changes point of attachment to network

communication over wireless link handling mobile user who changes point of attachment to network Wireless Networks Background: # wireless (mobile) phone subscribers now exceeds # wired phone subscribers! computer nets: laptops, palmtops, PDAs, Internet-enabled phone promise anytime untethered Internet

More information

Interconnecting Cisco Networking Devices Part 2

Interconnecting Cisco Networking Devices Part 2 Interconnecting Cisco Networking Devices Part 2 Course Number: ICND2 Length: 5 Day(s) Certification Exam This course will help you prepare for the following exam: 640 816: ICND2 Course Overview This course

More information

IP Networking. Overview. Networks Impact Daily Life. IP Networking - Part 1. How Networks Impact Daily Life. How Networks Impact Daily Life

IP Networking. Overview. Networks Impact Daily Life. IP Networking - Part 1. How Networks Impact Daily Life. How Networks Impact Daily Life Overview Dipl.-Ing. Peter Schrotter Institute of Communication Networks and Satellite Communications Graz University of Technology, Austria Fundamentals of Communicating over the Network Application Layer

More information

Customer Specific Wireless Network Solutions Based on Standard IEEE 802.15.4

Customer Specific Wireless Network Solutions Based on Standard IEEE 802.15.4 Customer Specific Wireless Network Solutions Based on Standard IEEE 802.15.4 Michael Binhack, sentec Elektronik GmbH, Werner-von-Siemens-Str. 6, 98693 Ilmenau, Germany Gerald Kupris, Freescale Semiconductor

More information

2. Related protocols. 1. Introduction

2. Related protocols. 1. Introduction Virtual Cellular Infrastructure For Mobile Ad hoc Network Muthu Chidambaranathan.P, Sundaresan S muthuc@nitt.edu Department of electronics and communication engineering National institute of technology,

More information

A UBIQUITOUS PROTOCOL FOR ADDRESS DYNAMICALLY AUTO CONFIGURATION FOR MOBILE AD HOC NETWORKS

A UBIQUITOUS PROTOCOL FOR ADDRESS DYNAMICALLY AUTO CONFIGURATION FOR MOBILE AD HOC NETWORKS A UBIQUITOUS PROTOCOL FOR ADDRESS DYNAMICALLY AUTO CONFIGURATION FOR MOBILE AD HOC NETWORKS Chandanpreet Kaur Global Institute of Management and Emerging Technologies, Amritsar, Punjab, India, lpu_chandan@yahoo.co.in

More information

Study of Impact of Mobile Ad Hoc Networking and its Future Applications

Study of Impact of Mobile Ad Hoc Networking and its Future Applications Computing For Nation Development, March 10 11, 2011 Bharati Vidyapeeth s Institute of Computer Applications and Management, New Delhi Study of Impact of Mobile Ad Hoc Networking and its Future Applications

More information

A REPORT ON ANALYSIS OF OSPF ROUTING PROTOCOL NORTH CAROLINA STATE UNIVERSITY

A REPORT ON ANALYSIS OF OSPF ROUTING PROTOCOL NORTH CAROLINA STATE UNIVERSITY A REPORT ON ANALYSIS OF OSPF ROUTING PROTOCOL Using OPNET 14.5 Modeler NORTH CAROLINA STATE UNIVERSITY SUBMITTED BY: SHOBHANK SHARMA ssharma5@ncsu.edu Page 1 ANALYSIS OF OSPF ROUTING PROTOCOL A. Introduction

More information

Study And Comparison Of Mobile Ad-Hoc Networks Using Ant Colony Optimization

Study And Comparison Of Mobile Ad-Hoc Networks Using Ant Colony Optimization Study And Comparison Of Mobile Ad-Hoc Networks Using Ant Colony Optimization 1 Neha Ujala Tirkey, 2 Navendu Nitin, 3 Neelesh Agrawal, 4 Arvind Kumar Jaiswal 1 M. Tech student, 2&3 Assistant Professor,

More information

This chapter covers the following topics: Characteristics of roaming Layer 2 roaming Layer 3 roaming and an introduction to Mobile IP

This chapter covers the following topics: Characteristics of roaming Layer 2 roaming Layer 3 roaming and an introduction to Mobile IP This chapter covers the following topics: Characteristics of roaming Layer 2 roaming Layer 3 roaming and an introduction to Mobile IP C H A P T E R 5 Mobility This book covers the major components of 802.11

More information

QUALITY OF SERVICE METRICS FOR DATA TRANSMISSION IN MESH TOPOLOGIES

QUALITY OF SERVICE METRICS FOR DATA TRANSMISSION IN MESH TOPOLOGIES QUALITY OF SERVICE METRICS FOR DATA TRANSMISSION IN MESH TOPOLOGIES SWATHI NANDURI * ZAHOOR-UL-HUQ * Master of Technology, Associate Professor, G. Pulla Reddy Engineering College, G. Pulla Reddy Engineering

More information

Agenda. Distributed System Structures. Why Distributed Systems? Motivation

Agenda. Distributed System Structures. Why Distributed Systems? Motivation Agenda Distributed System Structures CSCI 444/544 Operating Systems Fall 2008 Motivation Network structure Fundamental network services Sockets and ports Client/server model Remote Procedure Call (RPC)

More information

ECE/CS 372 introduction to computer networks. Lecture 13

ECE/CS 372 introduction to computer networks. Lecture 13 ECE/CS 372 introduction to computer networks Lecture 13 Announcements: HW #4 hard copy due today Lab #5 posted is due Tuesday June 4 th HW #5 posted is due Thursday June 6 th Pickup midterms Acknowledgement:

More information