MMIP: A New Dynamic IP Configuration Scheme with MAC Address Mapping for Mobile Ad hoc networks

Size: px
Start display at page:

Download "MMIP: A New Dynamic IP Configuration Scheme with MAC Address Mapping for Mobile Ad hoc networks"

Transcription

1 NCC 2009, January 16-18, IIT Guwahati 425 MMIP: A New Dynamic IP Configuration Scheme with MAC Address Mapping for Mobile Ad hoc networks Uttam Ghosh and Raja Datta, Member, IEEE Department of Electronics and Electrical Communication Engineering Indian Institute of Technology, Kharagpur, India, Kharagpur uttamg@iitkgp.ac.in, rajadatta@ece.iitkgp.ernet.in Abstract In this paper we present a novel dynamic IP configuration scheme that maps the MAC address for Mobile Ad-hoc Networks (MANET). Though not explicitly, the proposed scheme will also help in securing and keeping MANET organized as it grows from one node to many. It has been seen that within a lifetime of a MANET an individual node may exit and again re-enter the network as per its requirement. In most existing addressing schemes a node resurfaces with a new IP address to continue its work. As the IP address gets changed every time a node switches off and on within the network lifetime, the process of unique IP address assignment, partitioning and merging of the network becomes complex. In this work we propose a technique to map the MAC addresses of the nodes along with the IP addresses which are assigned at the time when a node enters the network. Performance analysis shows our proposed addressing scheme has less addressing latency and control overhead compared to the similar existing schemes. I. INTRODUCTION IP configuration in mobile ad hoc networks (MANET) is a prime concern as it requires that the allocated addresses are unique and robust in nature. Further, the scheme should have low addressing latency and communication overhead. Unlike in infrastructure based wireless networks, the unique characteristics of MANETs such as open network architecture, shared wireless medium, stringent resource constraints and highly dynamic network topology pose new challenges. Security is also a concern as till very recently research done on MANETs assumed a friendly and cooperative environment, which may not apply in real-life scenarios. Typical real-life scenario may be a MANET set up in a battlefield or in case of natural calamity or simply to facilitate outdoor conferences. Several schemes have been proposed in the literature for dynamic IP configuration. This work focuses on the problem of unique address allocation in an independent MANET where network security is also a consideration. Recently, a number of addressing schemes for ad hoc networks have been proposed [3] [7], all of which aim to provide efficient address assignment in a dynamic network environment so as to enable correct communication in the network. These approaches bear many similarities to each other, such as self-organizing, self-healing behavior in order to better adapt to the dynamic and resource-constrained environment of the ad hoc network. However, these approaches also differ in a wide range of aspects, such as address format, usage of centralized servers or full decentralization, hierarchical structure or flat network organization and explicit or implicit duplicate address detection. As a consequence, these approaches are likely to have different performance properties under varying network conditions. For example, due to the limited resources of the mobile devices as well as of the wireless network, the address assignment process should not incur significant traffic load on the network. Limiting the control traffic generated by the assignment process enables the protocol to more easily scale to larger networks. On the other hand, a node should obtain a valid address in a timely fashion, regardless of the network size, so that its communication is not delayed. To deploy largescale mobile ad hoc networks, it is important to understand and analyze these different approaches under a wide range of network conditions so that their performance and suitability can be predicted. Traditionally, a user can either configure the address of a host manually or have the host acquire its IP address dynamically through certain dynamic methods, such as Dynamic Host Configuration Protocol (DHCP) [1]. Manual address configuration is very troublesome and in most cases inapplicable to MANETs. However, DHCP requires the presence of a centralized DHCP server which maintains the configuration information of all hosts in the network. Since a MANET is devoid of any fixed infrastructure or centralized administration, this approach cannot be used. The existing IP address allocation schemes can be classified into three categories [2]. The best effort allocation schemes do not guarantee address uniqueness. Under this the Prophet scheme [5] propose a function f(n) to generate a series of random numbers for address allocation. But prophet scheme needs some mechanisms, such as passive duplicate address detection (DAD) [8] to resolve address conflicts. In Passive DAD, nodes use periodic link state routing information notify other nodes about their neighbors. But this causes broadcast storm problem in passive DAD. The second category is the Leader-based allocation scheme. In this scheme nodes obtain valid IP addresses from an elected leader or server of the network e.g., DHCP [1]. In DHCP, a new node needs to broadcast to discover the server discovery and then use DAD to verify the uniqueness of the IP address. In ODACP [2], instead of discovering the server, server periodically broadcasts the address request to reduce the overhead of broadcasting. But it requires longer latencies for hosts to obtain addresses. Decentralized allocation is the third category in which a host can acquire an IP address either itself or from a neighbor and then performs the DAD to ensure the uniqueness of the address. In MANETconf [4] scheme, every node maintains a

2 NCC 2009, January 16-18, IIT Guwahati 426 list of IP addresses which are in use by the network. Network partitions and mergers are detected throughout the DAD. In Prime DHCP [6], address can be allocated to the new host without broadcasting over the whole MANET. Prime DHCP makes each host a DHCP proxy of the MANET and run a prime numbering address allocation algorithm individually to compute unique addresses for address allocation. In this paper we propose a distributed dynamic IP configuration scheme that maps the offered IP address with corresponding MAC address of each host. Our distributed protocol ensures that no two hosts in the MANET acquire the same IP address. The scheme ensures that during a MANETs life time a node within that MANET will not be able to resurface (after switching off) with a different IP address to continue with its work. This also helps in securing the network though not explicitly. We describe enhancements to the solution that can handle problems that may arise due to host failures, message losses, mobility of the hosts and network partitioning and merger. The rest of the paper is organized as follows: We describe the system model in section II. In section III we present our dynamic address allocation algorithm (MMIP). Section IV gives the performance comparison and conclusions are given in section V. II. SYSTEM MODEL We consider an autonomous ad hoc network working on its own. It has no gateway or connection to the external world. The network is formed starting from one node and then the other nodes add up one by one. The nodes are free to move around and can join or leave the network at any point of time. Hence the size and the topology of the network is dynamic and unpredictable in nature. We define the lifetime of a MANET as the time from which the first node configures itself with an IP address till the time when all the nodes are switched off, i.e., the time when the MANET ceases to exist. A. Protocol Requirements: For assigning an IP address, the protocol should meet the following requirements: i. Each node should have an unique IP in the MANET, i.e., at any given instant of time there should not be two or more nodes with the same IP address. ii. The protocol should ensure that in the event of a node switching off and trying to join the network sometime later (within the lifetime of the network), the IP assigned to the node remains unchanged and cannot be changed under any circumstances. iii. A node should be denied an IP address if and only if there are no available IP addresses in the network. iv. The protocol should handle the network partitioning and merging. When two different partitions merge, there is a possibility that two or more nodes have the same IP address. Such duplicate address should be detected and resolved. III. THE MMIP ALGORITHM In this section we present our proposed algorithm for dynamic IP configuration where the MAC address is mapped with the allotted IP address. We call this algorithm as MAC Mapped IP (MMIP) algorithm. Mentioned in section I, most of the address allocation schemes for MANET rely on broadcasting a message to discover the server or uses DAD. Also, none of the existing schemes have considered the security of the MANET. Here we propose a technique where every node acts as a proxy to a new node (N n ). Therefore all the nodes are eligible to assign addresses and a new node N n can acquire an address simply from its neighbors. Each proxy computes a unique IP address for a new host N n from its own IP address and as a result DAD is not necessary here. The MMIP address allocation algorithm has two parts: one for the new node (N n ) and the other for the proxy that assigns its IP address. The MMIP algorithm for a new node and for the node acting as proxy using pseudo code is given in Algorithm 1 and Algorithm 2 respectively. Algorithm 1: Address Allocation for host N n Set threshold 2 Set begin true Set configured false Set counter 1 if begin = true and counter threshold then 1-hop broadcast DISCOVER message start offertimer begin false else exit if multiple OFFER(NEWIP) messages is received from proxies then stop offertimer select minimum IP from OFFER messages send SELECT message to selected proxy start miptimer else if OFFER(OLDIP) messages is received from proxies then send STATREQ message to parent if STATUS message is received then update allocation status if MIP is received from selected proxy then stop miptimer configured true MAPPING( ) refer to function. SWITCHOFF() refer to function. if timeout(offertimer) if timeout(miptimer) a) MMIP address allocation: When a new node N n wants to join a MANET, proposed MMIP algorithm periodically issues a DISCOVER broadcast message to its neighbors till it either receives an OFFER message or a DENY message. If no OFFER or DENY message is received, the new node N n configures itself to the IP address 169.X.1.1 and generates an unique network ID (NID, which is random number) as a network identifier. This NID is sent to the new node whenever the node joins that MANET. The DISCOVER message contains its MAC address as an identifier of the host N n and as the IP address (refer Algorithm 1). The new node N n then waits for multiple responses from its neighbors and chooses the smallest IP address (last byte of IP address i.e., the value of i) that has been offered to it. This smallest IP address is then unicast in a SELECT message back to the proxy offering that IP address. The other OFFERs are ignored. On receiving the SELECT message from the new node N n,the MAC address of N n is now mapped with the said IP address

3 NCC 2009, January 16-18, IIT Guwahati 427 Algorithm 2: Address Allocation for the proxy Set threshold 2 Set begin true Set counter 1 if DISCOVER message is received from N n then if MAC address in RESERVE( ) then send previously allocated OLDIP in OFFER message if STATREQ message is received from children then send allocation status in STATUS message else if MAC address in MAPPINGTABLE( ) then send previously allocated OLDIP in OFFER msg. else if free IP address is available then NEWIP = GENERATEUNIQUEIP( ) send OFFER message with NEWIP to N n else send REQUEST message to parent for NEWIP if NEWIP is received from parent then send NEWIP in OFFER message to N n else send DENY message to N n if SELECT message is received from N n then broadcast MIP message if begin = true and counter threshold then send UPDATE message to N n start updatedtimer begin false UPDATEMAPPINGTABLE( ) refer to function. if DEPOSIT message is received from children then RESERVE( ) refer to function. if timeout(updatedtimer) and is encapsulated in a MIP (Mapped IP) message. This MIP message is then broadcasted to all nodes within its radio range (including N n ). After receiving the MIP message from the selected proxy, N n performs a final check on the configuration parameters (e.g., ARP for allocated network address) specified in the MIP message and configures itself. The neighbors after receiving the MIP message broadcasts it to its neighbors and so on such that the whole of the MANET receives it within a short time. The nodes then updates their mapping table by inserting the MAC address and the IP address of the new host N n. In case N n does not receive any OFFER message from the proxy within a given time it retransmits the DISCOVER message. When the neighbor host receives DISCOVER message (Algorithm 2), they start serving as proxies of the host N n if the MAC address and a corresponding IP address of the host is not found in the mapping table (i.e., when the said node has not been allocated an IP address earlier anytime during the lifetime of the MANET). Here, if the proxy finds the MAC address and a corresponding IP address of the host N n in the ReserveList (refer Function RESERVE), then the said allocated IP address will be again assigned to N n. b) Unique IP address generation: Here we describe the algorithm given in Function GENERATEUNIQUEIP that generates unique IP address for a new node. As mentioned earlier each network node acts as a proxy and can assign IP address for a new node. We assume the class B IP address format 169.X.j.i for describing the algorithm and for the purpose of illustration. We also assume that the first node s IP address is 169.X.1.1 that initiates the address allocation process. Here 169.X be the net ID which is fixed for a network and the values i and j are Function GENERATEUNIQUEIP getmyip 169.X.j.i Set static count 1 Set I ((i 1) K + count) Set m Imod254 Set J (j + m) if I 1and I 254 and count K then count (count +1) return NEWIP 169.X.j.I else if I 255 and I 508 and J 254 and j =1and count K then I 1 count (count +1) return NEWIP 169.X.J.I else IP is not available variables. Thus, the address can be allocated from 169.X.1.1 to 169.X for the new node. Here each proxy can assign from ((i 1) K + count) to (i K), wherei is the last byte of its own IP address. K( 1) is the number of total nodes that a proxy can assign and count is initialized to 1 for each host in the MANET and is incremented by 1 after each IP assignment for the new node by that proxy j=2 j= Fig. 1. An example of address allocation tree, wherein K = 10 Fig 1 gives an example of how unique address can be allocated by a node acting as proxy. In the figure the last byte of an IP address (i) is shown within the circle and the corresponding third byte (j) is shown just outside the circle. In this illustration we have assumed K =10. The first node of the network which is shown as the root node in the figure has an address of i =1, j =1and can allocate from i =2, j = 1 to i = 10, j = 1 and the node having i = 2, j =1can assign from i =11, j =1to i =20, j =1. Similarly, a proxy having i =26, j =1can allocate addresses from ((26 1) ) mod 254 i.e. i = 251, j =1to (26 10) mod 254 i.e. i =1, j =7. Also a node having i =1and j =2can assign addresses having i =2, j =2 to i =10, j =2. Due to the limited IP address range, some proxies may not be able to allocate addresses to new nodes. In that case the proxies will have to request their parent proxy for an IP address that can be allocated to the new node. In this way the network grows up to the largest address bounded by the address space. Thus, the address can be allocated from 169.X.1.1 to 169.X in the network uniquely. In this algorithm each node has to maintain its allocation status that is the value of count to record the last assigned address. Here, no two nodes acting as proxies can generate the same IP address, and thus DAD is not required during the process of address resolution. Besides, each proxy can easily derive, from its own address and the value of K, the address

4 NCC 2009, January 16-18, IIT Guwahati 428 of its parent proxy. c) Graceful Switch-off of node: In case of our proposed MMIP algorithm every node has to Gracefully Switch-off whenever it wants to permanently or temporarily switch off itself from the network. This is required firstly to inform about its intention and also to transfer its allocation status to its parent node prior to switching off. This allocation status is reverted back to the same node when it wants to re-enter the network some time later. This is required because the allocation status contains the value of count which is used to generate unique IP address. After a node re-enters the network, if it still has available IP addresses, it may have to assign them to the new nodes entering the network for the first time. The value of count in the allocation status before a node has gracefully switched off will then be used so that unique IP is generated as per the Function GENERATEUNIQUEIP. The algorithm for a node that wants to do graceful switch-off is given in the Function SWITCHOFF and the corresponding parent proxy updates the reserve list is given in Function RESERVE. Function SWITCHOFF if configured = true and counter threshold then send DEPOSIT message to parent start oktimer if OK message is received from parent then stop oktimer configured false counter 1 if timeout(oktimer) then Function RESERVE if DEPOSIT message is received from children then send OK message to the host N n updatereservelist( ) The Function SWITCHOFF and the Function RESERVE works as follows: When a node (other than the root node) decides to switch off either permanently or temporarily within the lifetime of a MANET, it informs its parent by sending DEPOSIT message and waits for an OK message. If the root node decides to switch-off the network, it has to inform its child node (from among all children nodes) who has been allocated the minimum IP address. This child node becomes the new root node of the network. When a parent node receives the DEPOSIT message, it updates the reserve list and records the allocation status for that node. When a node that has switched off earlier wants to rejoin the MANET, it has to broadcast the DISCOVER message to the neighbors as is done in case of a new node. When the neighbors receive the DISCOVER message, it searches the reserve list to check whether the said node has been previously allocated with an IP address or not. In case the neighbors find that it is already allocated with an IP address it sends back the same IP address. The concerned node configures itself with the said IP address and sends information to the original parent node to obtain the allocation status which it has sent to it before switching off. Subsequently the original parent node sends the allocation status which enables the concerned node to act as proxy to new nodes. This is possible if there are IP addresses still available with him. The scheme ensures that once a host is assigned an IP address, it will never be able to change it within the lifetime of the MANET and also ensures the uniqueness of the IP addresses in the network even if the network is partitioned or merged. If the host leaves the network without sending the DEPOSIT message, it will be treated as an address leak. Thus a host can leave only after getting the OK message from its parent. d) Network Partitioning and Merger: In the initial state of address allocation, more than one node may configure themselves with the same IP address. This duplication of IP addresses can be detected when the nodes with different NIDs come in the radio range of each other. The difference in NID can be detected through the HELLO messages used by the routing protocols. The node with larger NID resets its configuration and reconfigures again using the MMIP algorithm. The network can partition and then again can merge at any instant of time due to the dynamic and unpredictable nature of the MANET. In our proposed MMIP protocol there will be no address conflicts in the network even if the network partitions. The split MANET needs a new root only. Though, the split MANET can continue with the same NID. Even if a node within the lifetime MANET switches off from the network, the IP address of the said node will not be allocated to any other host as described earlier. Therefore, there will be no address conflicts even if two split networks merge again as every node has the capability of generating unique IP addresses for a new host. In addition to this the proposed protocol also handles the following scenarios efficiently: i. A node which has not undergone a graceful switch-off (usually a malicious node) will be automatically caught if it tries to re-enter the network within its lifetime. ii. The MANET can partition and then the split networks can merge later without any address conflict. iii. Two separately configured MANETs i.e., if two different MANETs having different net IDs may merge without any conflicts of the IP addresses. e) Constructing and updating Mapping Table: In our proposed MMIP scheme, the mapping table is very important and has to be updated whenever a new node enters the network. Each node in the MANET, maintains a mapping table where the MAC addresses are mapped with the IP addresses of each node. Mapping table is created for a new host N n, after getting the IP from its parent proxy. Each node acting as Proxy in the MANET updates their mapping table by inserting MAC address and IP address for the new host N n. The algorithm for the mapping table for the new host N n and the proxy is given in Function MAPPING and Function UPDATEMAPPINGTABLE respectively. Function MAPPING create mapping table if UPDATE message is received from parent then send UPDATED message to parent updatemappingtable() Function UPDATEMAPPINGTABLE if UPDATED message is received from N n or MIP from other proxy then stop updatedtimer updatemappingtable()

5 NCC 2009, January 16-18, IIT Guwahati 429 IV. PERFORMANCE COMPARISON Table I presents the comparison of our proposed MMIP scheme with the existing dynamic addressing approaches. We focus on qualitative evaluation of all the approaches. Suppose the number of mobile hosts is n, the number of links is l, the average 1-hop latency is t and the network diameter is d. The existing DHCP [1] gives the guarantee of the uniqueness but can not be deployed in mobile ad hoc network. Further, DHCP needs to find out the server. Thus the latency is 4 t d and communication overhead is O(n 2 ). Another dynamic allocation scheme MANETconf [4] requires a positive acknowledgment from all known nodes indicating that the address is available for use. DAD is also necessary for MANETconf. Thus, the latency of MANETconf is 2 t d and the communication overhead is O(n 2 ). In ODACP [2], every host need to register with an address authority to reduce the communication overhead from O(n 2 ) to O(2l) and the latency from 4 t d to 2 t d. Prophet [5] is the only mechanism that can not guarantee about the uniqueness of addresses. Both Prophet and Prime DHCP [6] send their request to neighbors for an IP address and therefor the latency is 2t. The communication overhead of Prophet and Prime is the average degree (n/2) of each node in the network. MANETconf and Prophet are complex address allocation scheme. Most of the approaches use explicit mechanisms to detect network events such as partitions and merges except Prophet and our proposed MMIP acheme. The detection is normally accomplished by utilizing a unique network identifier which is either broadcast throughout the network by a leader node, or is contained in periodic hello messages (refer to P.Msg in table I) exchanged between neighbors. Finally, none of them have considered MANET security. TABLE I COMPARISON OF DYNAMIC ADDRESSING APPROACHES Metrics DHCP MANETconf ODACP Prophet Prime DHCP MMIP Uniqueness Yes Yes Yes No Yes Yes Latency O(4td) O(2td) O(2td) O(2t) O(2t) O(2t) Overhead O(n 2 ) O(n 2 ) O(2l) O(n/2) O(n/2) O(n/2) Complexity Low High Low High Low Low P.Msg Yes Yes Yes No Yes No Security No No No No No Yes In the proposed MMIP, every proxy in the network offers an unique IP address to a new host and that the IP cannot be changed during the lifetime of the MANET. So, unique IP is guaranteed in the network at any instant of time even after any partitions or mergers. After the partition, network can grow independently and if the partitions are merged at any later stage, there is no need to change the IP addresses of the nodes. This shows that the scheme is perfectly stable and robust. If a node initiates the address allocation procedure in the network then the proposed scheme eliminates the periodic message exchange between neighbors to detect network events such as partitions and mergers. The MMIP host N n sends request to neighbors only for an IP address, thus the latency is 2t and the communication overhead is the average degree (n/2) of each node of the network, assuming that the address space is sufficient. Thus, the latency and the overhead is less for the address allocation. To update the mapping table for a new host, we need to flood the MIP message in the network. Thus, the communication overhead is O(n 2 ). As there is no need to maintain any block of addresses nor there is a requirement to generate any complex function for an IP address the complexity is low for the address allocation in our scheme. Also the IP addresses for new nodes are generated from a node acting as proxy which reduces the complexity even further. The memory requirement for mapping table depends on the size of the network. If there are n nodes in the network, then the number of entries in the table are equal to the (n 1). Finally, it will be difficult, if not impossible, for a node to shed its IP address by switching itself off from the network, as its MAC address is mapped with the allocated IP address. Even though it is possible to change the MAC address of a node, our proposed MMIP scheme makes a network somewhat secure as it ensures that a node within the MANET will not be able to resurface (after switching itself off) with the original MAC address and a different IP to continue its work. V. CONCLUSION In this paper we proposed a dynamic IP address allocation algorithm for mobile ad hoc networks. The algorithm assumes the importance of an organized MANET along with low latency and communication overhead. The scheme maps the MAC address of a node with the allocated IP address. It ensures that a node will not be able to change its allocated IP address within the lifetime of a network if of course the MAC address of the node is not changed altogether. This eliminates the periodic message exchange between neighbors to detect network events such as partitions and mergers. In the algorithm, every node in the network also acts as a proxy and has the capability to assign IP addresses to new hosts. The signaling messages except MIP message need not be flooded all over the MANET saving considerable bandwidth. In addition, as each host can assign a unique IP address for a new host, DAD broadcasting is not required and is capable of handling host arrivals and departures. Performance analysis shows that our proposed scheme has low complexity, low overhead and is robust in comparison to the existing addressing schemes. REFERENCES [1] R. Droms, Dynamic host configuration protocol, RFC 2131, Mar [2] Y. Sun and E. M. Belding-Royer, A study of dynamic addressing techniques in mobile ad hoc networks, Wireless Communications and Mobile Computing, April [3] C. E. Perkins, J. T. Malinen, R. Wakikawa, E. M. Belding-Royer, and Y. Sun, IP address autoconfiguration for ad hoc networks, draftietfmanetautoconf- 01.txt, IETF MANET Working Group, July [4] S. Nesargi and R. Prakash, in MANETconf: Configuration of Hosts in a Mobile Ad Hoc Network, in Proc. INFOCOM, 2002, pp [5] H. Zhou, L. M. Ni, and M. W. Mutka, Prophet address allocation for largescalemanets, inproc. INFOCOM, 2003, pp [6] Y. Hsu and C. Tseng, Prime DHCP: A Prime Numbering Address Allocation Mechanism for MANETs, in IEEE Communicatons, August [7] M. Mohsin and R. Prakash, IP address assignment in mobile ad hoc networks, in Proc. IEEE MILCOM, pp , Sept [8] K. Weniger., Passive Duplicate Address Detection in Mobile Ad Hoc Networks, In WCNC, Florence, Italy, February 2003.

A Comparison Study of Address Autoconfiguration Schemes for Mobile Ad hoc Network

A Comparison Study of Address Autoconfiguration Schemes for Mobile Ad hoc Network A Comparison Study of Address Autoconfiguration Schemes for Mobile Ad hoc Network Soyeon Ahn, Namhoon Kim, Woohyun Kim and Younghee Lee Information and Communications University, Computer Networks Lab.,

More information

A UBIQUITOUS PROTOCOL FOR ADDRESS DYNAMICALLY AUTO CONFIGURATION FOR MOBILE AD HOC NETWORKS

A UBIQUITOUS PROTOCOL FOR ADDRESS DYNAMICALLY AUTO CONFIGURATION FOR MOBILE AD HOC NETWORKS A UBIQUITOUS PROTOCOL FOR ADDRESS DYNAMICALLY AUTO CONFIGURATION FOR MOBILE AD HOC NETWORKS Chandanpreet Kaur Global Institute of Management and Emerging Technologies, Amritsar, Punjab, India, lpu_chandan@yahoo.co.in

More information

Hosts Address Auto Configuration for Mobile Ad Hoc Networks

Hosts Address Auto Configuration for Mobile Ad Hoc Networks Hosts Address Auto Configuration for Mobile Ad Hoc Networks Sudath Indrasinghe, Rubem Pereira, Hala Mokhtar School of Computing and Mathematical Sciences Liverpool John Moores University M.P.Indrasinghe@2004.ljmu.ac.uk,

More information

New Approach for Address Auto-Configuration in MANET Based on Virtual Address Space Mapping (VASM)

New Approach for Address Auto-Configuration in MANET Based on Virtual Address Space Mapping (VASM) New Approach for Address Auto-Configuration in MANET Based on Virtual Address Space Mapping (VASM) Majid Taghiloo 1, Mehdi Dehghan 2, Jamshid Taghiloo 3, Maria Fazio 4, 1 Computer Engineering Department,

More information

Abstract. In a wired network, layer three address assignment is a task that is mostly performed by

Abstract. In a wired network, layer three address assignment is a task that is mostly performed by IP Address Assignment schemes for mobile ad hoc networks Fernando Rodríguez Haro Universitat Politècnica de Catalunya Report for Mobility in TCP/IP networks, spring semester, 2006. Abstract In a wired

More information

A Study of Dynamic Addressing Techniques in Mobile Ad hoc Networks

A Study of Dynamic Addressing Techniques in Mobile Ad hoc Networks A Study of Dynamic Addressing Techniques in Mobile Ad hoc Networks Yuan Sun Elizabeth M. Belding-Royer Department of Computer Science University of California, Santa Barbara suny, ebelding @cs.ucsb.edu

More information

IP ADDRESS ASSIGNMENT IN A MOBILE AD HOC NETWORK

IP ADDRESS ASSIGNMENT IN A MOBILE AD HOC NETWORK MILCOM 2002 1 IP ADDRESS ASSIGNMENT IN A MOBILE AD HOC NETWORK Mansoor Mohsin and Ravi Prakash The University of Texas at Dallas Richardson, TX Abstract A Mobile Ad Hoc Network (MANET) consists of a set

More information

Autoconfiguration and maintenance of the IP address in ad-hoc mobile networks

Autoconfiguration and maintenance of the IP address in ad-hoc mobile networks 1 Autoconfiguration and maintenance of the IP address in ad-hoc mobile networks M. Fazio, M. Villari, A. Puliafito Università di Messina, Dipartimento di Matematica Contrada Papardo, Salita Sperone, 98166

More information

Behavior Analysis of TCP Traffic in Mobile Ad Hoc Network using Reactive Routing Protocols

Behavior Analysis of TCP Traffic in Mobile Ad Hoc Network using Reactive Routing Protocols Behavior Analysis of TCP Traffic in Mobile Ad Hoc Network using Reactive Routing Protocols Purvi N. Ramanuj Department of Computer Engineering L.D. College of Engineering Ahmedabad Hiteishi M. Diwanji

More information

Result Analysis of Virtual IP Address Configuration Protocol

Result Analysis of Virtual IP Address Configuration Protocol Volume 64 No2, February 2013 Result Analysis of Virtual IP Address Configuration Protocol Satinder Kaur MTech Student Amritsar College of Engineering & Technology, Amritsar, Punjab-India- 143001 Tanu Preet

More information

RAA: A Ring-Based Address Autoconfiguration Protocol in Mobile Ad Hoc Networks

RAA: A Ring-Based Address Autoconfiguration Protocol in Mobile Ad Hoc Networks RAA: A Ring-Based Address Autoconfiguration Protocol in Mobile Ad Hoc Networks Yuh-Shyan Chen and Shih-Min Lin Department of Computer Science and Information Engineering, National Chung Cheng University,

More information

Security issues in Address Autoconfiguration Protocols: An improved version of the Optimized Dynamic Address Configuration Protocol

Security issues in Address Autoconfiguration Protocols: An improved version of the Optimized Dynamic Address Configuration Protocol Security issues in Address Autoconfiguration Protocols: An improved version of the Optimized Dynamic Address Configuration Protocol André Langer Department of Computer Science University of California,

More information

A Comparison Study of Qos Using Different Routing Algorithms In Mobile Ad Hoc Networks

A Comparison Study of Qos Using Different Routing Algorithms In Mobile Ad Hoc Networks A Comparison Study of Qos Using Different Routing Algorithms In Mobile Ad Hoc Networks T.Chandrasekhar 1, J.S.Chakravarthi 2, K.Sravya 3 Professor, Dept. of Electronics and Communication Engg., GIET Engg.

More information

Swarm Intelligence and Network Administration: Applications in Ad Hoc Wireless Auto-Configuration

Swarm Intelligence and Network Administration: Applications in Ad Hoc Wireless Auto-Configuration Swarm Intelligence and Network Administration: Applications in Ad Hoc Wireless Auto-Configuration Dr. Eric Cole Abstract: The Dynamic Host Configuration Protocol (DHCP) has been a commonly employed technique

More information

A Mobility Tolerant Cluster Management Protocol with Dynamic Surrogate Cluster-heads for A Large Ad Hoc Network

A Mobility Tolerant Cluster Management Protocol with Dynamic Surrogate Cluster-heads for A Large Ad Hoc Network A Mobility Tolerant Cluster Management Protocol with Dynamic Surrogate Cluster-heads for A Large Ad Hoc Network Parama Bhaumik 1, Somprokash Bandyopadhyay 2 1 Dept. of Information Technology, Jadavpur

More information

Adapting Distributed Hash Tables for Mobile Ad Hoc Networks

Adapting Distributed Hash Tables for Mobile Ad Hoc Networks University of Tübingen Chair for Computer Networks and Internet Adapting Distributed Hash Tables for Mobile Ad Hoc Networks Tobias Heer, Stefan Götz, Simon Rieche, Klaus Wehrle Protocol Engineering and

More information

Accelerating Service Discovery in Ad-hoc Zero Configuration Networking

Accelerating Service Discovery in Ad-hoc Zero Configuration Networking Accelerating Service Discovery in Ad-hoc Zero Configuration Networking Se Gi Hong, Suman Srinivasan and Henning Schulzrinne Columbia University, New York, NY {segihong, sumans, hgs}@cs.columbia.edu Abstract

More information

Fast and Secure Data Transmission by Using Hybrid Protocols in Mobile Ad Hoc Network

Fast and Secure Data Transmission by Using Hybrid Protocols in Mobile Ad Hoc Network Middle-East Journal of Scientific Research 15 (9): 1290-1294, 2013 ISSN 1990-9233 IDOSI Publications, 2013 DOI: 10.5829/idosi.mejsr.2013.15.9.11514 Fast and Secure Data Transmission by Using Hybrid Protocols

More information

INTERNATIONAL JOURNAL OF PURE AND APPLIED RESEARCH IN ENGINEERING AND TECHNOLOGY

INTERNATIONAL JOURNAL OF PURE AND APPLIED RESEARCH IN ENGINEERING AND TECHNOLOGY INTERNATIONAL JOURNAL OF PURE AND APPLIED RESEARCH IN ENGINEERING AND TECHNOLOGY A PATH FOR HORIZING YOUR INNOVATIVE WORK AN OVERVIEW OF MOBILE ADHOC NETWORK: INTRUSION DETECTION, TYPES OF ATTACKS AND

More information

Research on the Implementation of VoIP Service. in Mobile Ad-hoc Network

Research on the Implementation of VoIP Service. in Mobile Ad-hoc Network Research on the Implementation of VoIP Service in Mobile Ad-hoc Network 1,2 Yi Sun, 1,2 Gengfa Fang, 1 Jinglin Shi ( 1 Institute of Computing Technology, Chinese Academy of Sciences, Beijing 100080, P.R.

More information

Implementation of a Lightweight Service Advertisement and Discovery Protocol for Mobile Ad hoc Networks

Implementation of a Lightweight Service Advertisement and Discovery Protocol for Mobile Ad hoc Networks Implementation of a Lightweight Advertisement and Discovery Protocol for Mobile Ad hoc Networks Wenbin Ma * Department of Electrical and Computer Engineering 19 Memorial Drive West, Lehigh University Bethlehem,

More information

A Distributed Protocol for Dynamic Address. Assignment in Mobile Ad Hoc Networks

A Distributed Protocol for Dynamic Address. Assignment in Mobile Ad Hoc Networks Distributed Protocol for Dynamic ddress 1 ssignment in Mobile d Hoc Networks Mansi Thoppian and Ravi Prakash bstract Mobile d hoc NETwork (MNET) is a group of mobile nodes that form a multi-hop wireless

More information

TOPOLOGIES NETWORK SECURITY SERVICES

TOPOLOGIES NETWORK SECURITY SERVICES TOPOLOGIES NETWORK SECURITY SERVICES 1 R.DEEPA 1 Assitant Professor, Dept.of.Computer science, Raja s college of Tamil Studies & Sanskrit,Thiruvaiyaru ABSTRACT--In the paper propose about topology security

More information

An Improved Buddy System Auto-Configuration Protocol for Mobile Ad Hoc Networks

An Improved Buddy System Auto-Configuration Protocol for Mobile Ad Hoc Networks An Improved Buddy System Auto-Configuration Protocol for Mobile Ad Hoc Networks Julián García Matesanz #1, Luis Javier García Villalba *2, Ana Lucila Sandoval Orozco *3 and José René Fuentes Cortez *4

More information

COMPARATIVE ANALYSIS OF ON -DEMAND MOBILE AD-HOC NETWORK

COMPARATIVE ANALYSIS OF ON -DEMAND MOBILE AD-HOC NETWORK www.ijecs.in International Journal Of Engineering And Computer Science ISSN:2319-7242 Volume 2 Issue 5 May, 2013 Page No. 1680-1684 COMPARATIVE ANALYSIS OF ON -DEMAND MOBILE AD-HOC NETWORK ABSTRACT: Mr.Upendra

More information

Control overhead reduction: A Hierarchical Routing Protocol In Mobile Ad hoc Networks

Control overhead reduction: A Hierarchical Routing Protocol In Mobile Ad hoc Networks Control overhead reduction: A Hierarchical Routing Protocol In Mobile Ad hoc Networks Dr.G.Mary Jansi Rani Professor / Department of Electronics and Communication Engineering, Sri Ramakrishna Engineering

More information

MANETconf: Configuration of Hosts in a Mobile Ad Hoc Network

MANETconf: Configuration of Hosts in a Mobile Ad Hoc Network 1 MANETconf: Configuration of Hosts in a Mobile Ad Hoc Network Sanket Nesargi, Ravi Prakash Abstract A mobile ad hoc network (MANET) is a multi-hop wireless network capable of autonomous operation. The

More information

DESIGN AND DEVELOPMENT OF LOAD SHARING MULTIPATH ROUTING PROTCOL FOR MOBILE AD HOC NETWORKS

DESIGN AND DEVELOPMENT OF LOAD SHARING MULTIPATH ROUTING PROTCOL FOR MOBILE AD HOC NETWORKS DESIGN AND DEVELOPMENT OF LOAD SHARING MULTIPATH ROUTING PROTCOL FOR MOBILE AD HOC NETWORKS K.V. Narayanaswamy 1, C.H. Subbarao 2 1 Professor, Head Division of TLL, MSRUAS, Bangalore, INDIA, 2 Associate

More information

Performance Evaluation of AODV, OLSR Routing Protocol in VOIP Over Ad Hoc

Performance Evaluation of AODV, OLSR Routing Protocol in VOIP Over Ad Hoc (International Journal of Computer Science & Management Studies) Vol. 17, Issue 01 Performance Evaluation of AODV, OLSR Routing Protocol in VOIP Over Ad Hoc Dr. Khalid Hamid Bilal Khartoum, Sudan dr.khalidbilal@hotmail.com

More information

PERFORMANCE ANALYSIS OF AD-HOC ON DEMAND DISTANCE VECTOR FOR MOBILE AD- HOC NETWORK

PERFORMANCE ANALYSIS OF AD-HOC ON DEMAND DISTANCE VECTOR FOR MOBILE AD- HOC NETWORK http:// PERFORMANCE ANALYSIS OF AD-HOC ON DEMAND DISTANCE VECTOR FOR MOBILE AD- HOC NETWORK Anjali Sahni 1, Ajay Kumar Yadav 2 1, 2 Department of Electronics and Communication Engineering, Mewar Institute,

More information

Lecture 2.1 : The Distributed Bellman-Ford Algorithm. Lecture 2.2 : The Destination Sequenced Distance Vector (DSDV) protocol

Lecture 2.1 : The Distributed Bellman-Ford Algorithm. Lecture 2.2 : The Destination Sequenced Distance Vector (DSDV) protocol Lecture 2 : The DSDV Protocol Lecture 2.1 : The Distributed Bellman-Ford Algorithm Lecture 2.2 : The Destination Sequenced Distance Vector (DSDV) protocol The Routing Problem S S D D The routing problem

More information

PERFORMANCE OF MOBILE AD HOC NETWORKING ROUTING PROTOCOLS IN REALISTIC SCENARIOS

PERFORMANCE OF MOBILE AD HOC NETWORKING ROUTING PROTOCOLS IN REALISTIC SCENARIOS PERFORMANCE OF MOBILE AD HOC NETWORKING ROUTING PROTOCOLS IN REALISTIC SCENARIOS Julian Hsu, Sameer Bhatia, Mineo Takai, Rajive Bagrodia, Scalable Network Technologies, Inc., Culver City, CA, and Michael

More information

Analysis on Leveraging social networks for p2p content-based file sharing in disconnected manets

Analysis on Leveraging social networks for p2p content-based file sharing in disconnected manets Analysis on Leveraging social networks for p2p content-based file sharing in disconnected manets # K.Deepika 1, M.Tech Computer Science Engineering, Mail: medeepusony@gmail.com # K.Meena 2, Assistant Professor

More information

SIMULATION STUDY OF BLACKHOLE ATTACK IN THE MOBILE AD HOC NETWORKS

SIMULATION STUDY OF BLACKHOLE ATTACK IN THE MOBILE AD HOC NETWORKS Journal of Engineering Science and Technology Vol. 4, No. 2 (2009) 243-250 School of Engineering, Taylor s University College SIMULATION STUDY OF BLACKHOLE ATTACK IN THE MOBILE AD HOC NETWORKS SHEENU SHARMA

More information

CROSS LAYER BASED MULTIPATH ROUTING FOR LOAD BALANCING

CROSS LAYER BASED MULTIPATH ROUTING FOR LOAD BALANCING CHAPTER 6 CROSS LAYER BASED MULTIPATH ROUTING FOR LOAD BALANCING 6.1 INTRODUCTION The technical challenges in WMNs are load balancing, optimal routing, fairness, network auto-configuration and mobility

More information

G.Vijaya kumar et al, Int. J. Comp. Tech. Appl., Vol 2 (5), 1413-1418

G.Vijaya kumar et al, Int. J. Comp. Tech. Appl., Vol 2 (5), 1413-1418 An Analytical Model to evaluate the Approaches of Mobility Management 1 G.Vijaya Kumar, *2 A.Lakshman Rao *1 M.Tech (CSE Student), Pragati Engineering College, Kakinada, India. Vijay9908914010@gmail.com

More information

Simulating Fixed Virtual Nodes for Adapting Wireline Protocols to MANET

Simulating Fixed Virtual Nodes for Adapting Wireline Protocols to MANET Simulating Fixed Virtual Nodes for Adapting Wireline Protocols to MANET Jiang Wu #1, Nancy Griffeth #2, Nancy Lynch 3, Calvin Newport 4, Ralph Droms 5 # City University of New York Massachusetts Institute

More information

An Efficient QoS Routing Protocol for Mobile Ad-Hoc Networks *

An Efficient QoS Routing Protocol for Mobile Ad-Hoc Networks * An Efficient QoS Routing Protocol for Mobile Ad-Hoc Networks * Inwhee Joe College of Information and Communications Hanyang University Seoul, Korea iwj oeshanyang.ac.kr Abstract. To satisfy the user requirements

More information

Proposition of a new approach to adapt SIP protocol to Ad hoc Networks

Proposition of a new approach to adapt SIP protocol to Ad hoc Networks , pp.133-148 http://dx.doi.org/10.14257/ijseia.2014.8.7,11 Proposition of a new approach to adapt SIP protocol to Ad hoc Networks I. Mourtaji, M. Bouhorma, M. Benahmed and A. Bouhdir Computer and Communication

More information

What is VLAN Routing?

What is VLAN Routing? Application Note #38 February 2004 What is VLAN Routing? This Application Notes relates to the following Dell product(s): 6024 and 6024F 33xx Abstract Virtual LANs (VLANs) offer a method of dividing one

More information

Optimization of AODV routing protocol in mobile ad-hoc network by introducing features of the protocol LBAR

Optimization of AODV routing protocol in mobile ad-hoc network by introducing features of the protocol LBAR Optimization of AODV routing protocol in mobile ad-hoc network by introducing features of the protocol LBAR GUIDOUM AMINA University of SIDI BEL ABBES Department of Electronics Communication Networks,

More information

Objectives. The Role of Redundancy in a Switched Network. Layer 2 Loops. Broadcast Storms. More problems with Layer 2 loops

Objectives. The Role of Redundancy in a Switched Network. Layer 2 Loops. Broadcast Storms. More problems with Layer 2 loops ITE I Chapter 6 2006 Cisco Systems, Inc. All rights reserved. Cisco Public 1 Objectives Implement Spanning Tree Protocols LAN Switching and Wireless Chapter 5 Explain the role of redundancy in a converged

More information

A Link-state QoS Routing Protocol for Ad Hoc Networks

A Link-state QoS Routing Protocol for Ad Hoc Networks A Link-state QoS Routing Protocol for Ad Hoc Networks Anelise Munaretto 1 Hakim Badis 2 Khaldoun Al Agha 2 Guy Pujolle 1 1 LIP6 Laboratory, University of Paris VI, 8, rue du Capitaine Scott, 75015, Paris,

More information

IP Multicasting. Applications with multiple receivers

IP Multicasting. Applications with multiple receivers IP Multicasting Relates to Lab 10. It covers IP multicasting, including multicast addressing, IGMP, and multicast routing. 1 Applications with multiple receivers Many applications transmit the same data

More information

SECURE DATA TRANSMISSION USING INDISCRIMINATE DATA PATHS FOR STAGNANT DESTINATION IN MANET

SECURE DATA TRANSMISSION USING INDISCRIMINATE DATA PATHS FOR STAGNANT DESTINATION IN MANET SECURE DATA TRANSMISSION USING INDISCRIMINATE DATA PATHS FOR STAGNANT DESTINATION IN MANET MR. ARVIND P. PANDE 1, PROF. UTTAM A. PATIL 2, PROF. B.S PATIL 3 Dept. Of Electronics Textile and Engineering

More information

Study And Comparison Of Mobile Ad-Hoc Networks Using Ant Colony Optimization

Study And Comparison Of Mobile Ad-Hoc Networks Using Ant Colony Optimization Study And Comparison Of Mobile Ad-Hoc Networks Using Ant Colony Optimization 1 Neha Ujala Tirkey, 2 Navendu Nitin, 3 Neelesh Agrawal, 4 Arvind Kumar Jaiswal 1 M. Tech student, 2&3 Assistant Professor,

More information

Energy Efficiency of Load Balancing in MANET Routing Protocols

Energy Efficiency of Load Balancing in MANET Routing Protocols Energy Efficiency of Load Balancing in MANET Routing Protocols Sunsook Jung, Nisar Hundewale, Alex Zelikovsky Abstract This paper considers energy constrained routing protocols and workload balancing techniques

More information

Local Address Management in IoT environments

Local Address Management in IoT environments Local Address Management in IoT environments Pat Thaler, Senior Technical Director, Broadcom 29 September 2014 3 rd IEEE 802 and IETF Leadership Meeting 1 PROBLEM STATEMENT 2 MAC address consumption ramps

More information

Securing Internet Gateway Discovery Protocol in Ubiquitous Wireless Internet Access Networks

Securing Internet Gateway Discovery Protocol in Ubiquitous Wireless Internet Access Networks Securing Internet Gateway Discovery Protocol in Ubiquitous Wireless Internet Access Networks Bok-Nyong Park 1, Wonjun Lee 1 and Christian Shin 2 1 Dept. of Computer Science and Engineering, Korea University,

More information

LOAD BALANCING AND EFFICIENT CLUSTERING FOR IMPROVING NETWORK PERFORMANCE IN AD-HOC NETWORKS

LOAD BALANCING AND EFFICIENT CLUSTERING FOR IMPROVING NETWORK PERFORMANCE IN AD-HOC NETWORKS LOAD BALANCING AND EFFICIENT CLUSTERING FOR IMPROVING NETWORK PERFORMANCE IN AD-HOC NETWORKS Saranya.S 1, Menakambal.S 2 1 M.E., Embedded System Technologies, Nandha Engineering College (Autonomous), (India)

More information

Formal Measure of the Effect of MANET size over the Performance of Various Routing Protocols

Formal Measure of the Effect of MANET size over the Performance of Various Routing Protocols Formal Measure of the Effect of MANET size over the Performance of Various Routing Protocols Er. Pooja Kamboj Research Scholar, CSE Department Guru Nanak Dev Engineering College, Ludhiana (Punjab) Er.

More information

IPv6 mobility and ad hoc network mobility overview report

IPv6 mobility and ad hoc network mobility overview report Institut Eurecom 1 Department of Mobile Communications 2229, route des Crêtes B.P. 193 06904 Sophia Antipolis FRANCE Research Report RR-08-217 IPv6 mobility and ad hoc network mobility overview report

More information

CHAPTER 1 INTRODUCTION

CHAPTER 1 INTRODUCTION 21 CHAPTER 1 INTRODUCTION 1.1 PREAMBLE Wireless ad-hoc network is an autonomous system of wireless nodes connected by wireless links. Wireless ad-hoc network provides a communication over the shared wireless

More information

Datagram-based network layer: forwarding; routing. Additional function of VCbased network layer: call setup.

Datagram-based network layer: forwarding; routing. Additional function of VCbased network layer: call setup. CEN 007C Computer Networks Fundamentals Instructor: Prof. A. Helmy Homework : Network Layer Assigned: Nov. 28 th, 2011. Due Date: Dec 8 th, 2011 (to the TA) 1. ( points) What are the 2 most important network-layer

More information

Performance Comparison of AODV, DSDV, DSR and TORA Routing Protocols in MANETs

Performance Comparison of AODV, DSDV, DSR and TORA Routing Protocols in MANETs International Research Journal of Applied and Basic Sciences. Vol., 3 (7), 1429-1436, 2012 Available online at http:// www. irjabs.com ISSN 2251-838X 2012 Performance Comparison of AODV, DSDV, DSR and

More information

Survey on Load balancing protocols in MANET S (mobile ad-hoc networks)

Survey on Load balancing protocols in MANET S (mobile ad-hoc networks) Survey on Load balancing protocols in MANET S (mobile ad-hoc networks) Ramandeep Kaur 1, Gagandeep Singh 2, Sahil Vashist 3 1 M.tech Research Scholar, Department of Computer Science & Engineering, Chandigarh

More information

NetworkPathDiscoveryMechanismforFailuresinMobileAdhocNetworks

NetworkPathDiscoveryMechanismforFailuresinMobileAdhocNetworks Global Journal of Computer Science and Technology: E Network, Web & Security Volume 14 Issue 3 Version 1.0 Year 2014 Type: Double Blind Peer Reviewed International Research Journal Publisher: Global Journals

More information

A Workload-Based Adaptive Load-Balancing Technique for Mobile Ad Hoc Networks

A Workload-Based Adaptive Load-Balancing Technique for Mobile Ad Hoc Networks A Workload-Based Adaptive Load-Balancing Technique for Mobile Ad Hoc Networks Young J. Lee and George F. Riley School of Electrical & Computer Engineering Georgia Institute of Technology, Atlanta, GA 30332

More information

Name Service in IPv6 Mobile Ad-hoc Network

Name Service in IPv6 Mobile Ad-hoc Network Name Service in IPv6 Mobile Ad-hoc Network Jaehoon Jeong, Jungsoo Park, Hyoungjun Kim, and Kishik Park Protocol Engineering Center, ETRI, 161 Gajong-Dong, Yusong-Gu, Daejon 305-350, Korea {paul,pjs,khj,kipark}@etri.re.kr,

More information

Internet Control Protocols Reading: Chapter 3

Internet Control Protocols Reading: Chapter 3 Internet Control Protocols Reading: Chapter 3 ARP - RFC 826, STD 37 DHCP - RFC 2131 ICMP - RFC 0792, STD 05 1 Goals of Today s Lecture Bootstrapping an end host Learning its own configuration parameters

More information

CHAPTER 8 CONCLUSION AND FUTURE ENHANCEMENTS

CHAPTER 8 CONCLUSION AND FUTURE ENHANCEMENTS 137 CHAPTER 8 CONCLUSION AND FUTURE ENHANCEMENTS 8.1 CONCLUSION In this thesis, efficient schemes have been designed and analyzed to control congestion and distribute the load in the routing process of

More information

LAN Switching. 15-441 Computer Networking. Switched Network Advantages. Hubs (more) Hubs. Bridges/Switches, 802.11, PPP. Interconnecting LANs

LAN Switching. 15-441 Computer Networking. Switched Network Advantages. Hubs (more) Hubs. Bridges/Switches, 802.11, PPP. Interconnecting LANs LAN Switching 15-441 Computer Networking Bridges/Switches, 802.11, PPP Extend reach of a single shared medium Connect two or more segments by copying data frames between them Switches only copy data when

More information

IP Routing Features. Contents

IP Routing Features. Contents 7 IP Routing Features Contents Overview of IP Routing.......................................... 7-3 IP Interfaces................................................ 7-3 IP Tables and Caches........................................

More information

Robust Security Solution to Countermeasure of Malicious Nodes for the Security of MANET

Robust Security Solution to Countermeasure of Malicious Nodes for the Security of MANET Robust Security Solution to Countermeasure of Malicious Nodes for the Security of MANET Kritika Sharma M.tech(CSE) Doon Valley Insttitute of Enggineering & Technology, Karnal Parikshit Singla Assistant

More information

Performance Analysis of Load Balancing in MANET using On-demand Multipath Routing Protocol

Performance Analysis of Load Balancing in MANET using On-demand Multipath Routing Protocol ISSN: 2278 1323 All Rights Reserved 2014 IJARCET 2106 Performance Analysis of Load Balancing in MANET using On-demand Multipath Routing Protocol Monika Malik, Partibha Yadav, Ajay Dureja Abstract A collection

More information

Master Subagent Based Architecture to Monitor and Manage Nodes in Mobile Ad-hoc Networks

Master Subagent Based Architecture to Monitor and Manage Nodes in Mobile Ad-hoc Networks Vishalakshi Prabhu H / International Journal of Engineering Research and Applications (IJERA) Master Subagent Based Architecture to Monitor and Manage Nodes in Mobile Ad-hoc Networks Vishalakshi Prabhu

More information

SJBIT, Bangalore, KARNATAKA

SJBIT, Bangalore, KARNATAKA A Comparison of the TCP Variants Performance over different Routing Protocols on Mobile Ad Hoc Networks S. R. Biradar 1, Subir Kumar Sarkar 2, Puttamadappa C 3 1 Sikkim Manipal Institute of Technology,

More information

A SURVEY OF P2P OVERLAYS IN VARIOUS NETWORKS

A SURVEY OF P2P OVERLAYS IN VARIOUS NETWORKS A SURVEY OF P2P OVERLAYS IN VARIOUS Mrs. A. Anitha Dr. J. JayaKumari Department of computer science & engineering Department of Electronics & communication Engineering anidathi@yahoo.co.in jkumaribharat@yahoo.com

More information

Survey of Service Discovery Architectures for Mobile Ad hoc Networks

Survey of Service Discovery Architectures for Mobile Ad hoc Networks Survey of Service Discovery Architectures for Mobile Ad hoc Networks Chunglae Cho 1 and Duckki Lee 1 1 Computer and Information Science and Engineering Department University of Florida, Gainesville, FL-32611,

More information

Transport layer issues in ad hoc wireless networks Dmitrij Lagutin, dlagutin@cc.hut.fi

Transport layer issues in ad hoc wireless networks Dmitrij Lagutin, dlagutin@cc.hut.fi Transport layer issues in ad hoc wireless networks Dmitrij Lagutin, dlagutin@cc.hut.fi 1. Introduction Ad hoc wireless networks pose a big challenge for transport layer protocol and transport layer protocols

More information

Name Service in IPv6 Mobile Ad-hoc Network

Name Service in IPv6 Mobile Ad-hoc Network Name Service in IPv6 Mobile Ad-hoc Network Jaehoon Jeong, Jungsoo Park, Hyoungjun Kim, and Kishik Park Protocol Engineering Center, ETRI, 161 Gajong-Dong, Yusong-Gu, Daejon 305-350, Korea {paul,pjs,khj,kipark}@etri.re.kr,

More information

Session Initiation Protocol Deployment in Ad-Hoc Networks: a Decentralized Approach

Session Initiation Protocol Deployment in Ad-Hoc Networks: a Decentralized Approach Session Initiation Protocol Deployment in Ad-Hoc Networks: a Decentralized Approach Simone Leggio, Jukka Manner, Antti Hulkkonen, Kimmo Raatikainen Department of Computer Science University of Helsinki,

More information

An Active Network Based Hierarchical Mobile Internet Protocol Version 6 Framework

An Active Network Based Hierarchical Mobile Internet Protocol Version 6 Framework An Active Network Based Hierarchical Mobile Internet Protocol Version 6 Framework Zutao Zhu Zhenjun Li YunYong Duan Department of Business Support Department of Computer Science Department of Business

More information

Recommended IP Addressing Methods for EtherNet/IP Devices

Recommended IP Addressing Methods for EtherNet/IP Devices Recommended IP Addressing Methods for EtherNet/IP Devices Version: 1.0 10-June-2003 Published by EtherNet/IP Implementors Workshop Open DeviceNet Vendor Association (ODVA) ControlNet International (CI)

More information

Security in Ad Hoc Network

Security in Ad Hoc Network Security in Ad Hoc Network Bingwen He Joakim Hägglund Qing Gu Abstract Security in wireless network is becoming more and more important while the using of mobile equipments such as cellular phones or laptops

More information

2. Related protocols. 1. Introduction

2. Related protocols. 1. Introduction Virtual Cellular Infrastructure For Mobile Ad hoc Network Muthu Chidambaranathan.P, Sundaresan S muthuc@nitt.edu Department of electronics and communication engineering National institute of technology,

More information

DSR: The Dynamic Source Routing Protocol for Multi-Hop Wireless Ad Hoc Networks

DSR: The Dynamic Source Routing Protocol for Multi-Hop Wireless Ad Hoc Networks DSR: The Dynamic Source Routing Protocol for Multi-Hop Wireless Ad Hoc Networks David B. Johnson David A. Maltz Josh Broch Computer Science Department Carnegie Mellon University Pittsburgh, PA 15213-3891

More information

Mobility Management Advanced

Mobility Management Advanced Mobility Management Advanced Summer Semester 2011 Integrated Communication Systems Group Ilmenau University of Technology Outline Motivation Mobility Management Approaches in the TCP/IP Reference Model

More information

Parallel Processing over Mobile Ad Hoc Networks of Handheld Machines

Parallel Processing over Mobile Ad Hoc Networks of Handheld Machines Parallel Processing over Mobile Ad Hoc Networks of Handheld Machines Michael J Jipping Department of Computer Science Hope College Holland, MI 49423 jipping@cs.hope.edu Gary Lewandowski Department of Mathematics

More information

Experimental Comparison of Routing and Middleware Solutions for Mobile Ad Hoc Networks: Legacy vs Cross-Layer Approach

Experimental Comparison of Routing and Middleware Solutions for Mobile Ad Hoc Networks: Legacy vs Cross-Layer Approach Experimental Comparison of Routing and Middleware Solutions for Mobile Ad Hoc Networks: Legacy vs Cross-Layer Approach E. Borgia, M. Conti, F.Delmastro, and E. Gregori Pervasive Computing & Networking

More information

CCNA R&S: Introduction to Networks. Chapter 5: Ethernet

CCNA R&S: Introduction to Networks. Chapter 5: Ethernet CCNA R&S: Introduction to Networks Chapter 5: Ethernet 5.0.1.1 Introduction The OSI physical layer provides the means to transport the bits that make up a data link layer frame across the network media.

More information

ROUTE MECHANISMS FOR WIRELESS ADHOC NETWORKS: -CLASSIFICATIONS AND COMPARISON ANALYSIS

ROUTE MECHANISMS FOR WIRELESS ADHOC NETWORKS: -CLASSIFICATIONS AND COMPARISON ANALYSIS International Journal of Science, Environment and Technology, Vol. 1, No 2, 2012, 72-79 ROUTE MECHANISMS FOR WIRELESS ADHOC NETWORKS: -CLASSIFICATIONS AND COMPARISON ANALYSIS Ramesh Kait 1, R. K. Chauhan

More information

Using Fuzzy Logic Control to Provide Intelligent Traffic Management Service for High-Speed Networks ABSTRACT:

Using Fuzzy Logic Control to Provide Intelligent Traffic Management Service for High-Speed Networks ABSTRACT: Using Fuzzy Logic Control to Provide Intelligent Traffic Management Service for High-Speed Networks ABSTRACT: In view of the fast-growing Internet traffic, this paper propose a distributed traffic management

More information

Ad hoc On Demand Distance Vector (AODV) Routing Protocol

Ad hoc On Demand Distance Vector (AODV) Routing Protocol Ad hoc On Demand Distance Vector (AODV) Routing Protocol CS: 647 Advanced Topics in Wireless Networks Dr. Baruch Awerbuch & Dr. Amitabh Mishra Department of Computer Science Johns Hopkins 4-1 Reading Chapter

More information

Quick Start for Network Agent. 5-Step Quick Start. What is Network Agent?

Quick Start for Network Agent. 5-Step Quick Start. What is Network Agent? What is Network Agent? Websense Network Agent software monitors all internet traffic on the machines that you assign to it. Network Agent filters HTTP traffic and more than 70 other popular internet protocols,

More information

Node Centric Load Balancing Routing Protocol for Mobile Ad Hoc Networks

Node Centric Load Balancing Routing Protocol for Mobile Ad Hoc Networks Node Centric Load Balancing Routing Protocol for Mobile Ad Hoc Networks Amjad Ali, Wang Huiqiang Abstract Load balancing is a crucial part of MANET routing protocols. Most of the currently implemented

More information

QoSIP: A QoS Aware IP Routing Protocol for Multimedia Data

QoSIP: A QoS Aware IP Routing Protocol for Multimedia Data QoSIP: A QoS Aware IP Routing Protocol for Multimedia Data Md. Golam Shagadul Amin Talukder and Al-Mukaddim Khan Pathan* Department of Computer Science and Engineering, Metropolitan University, Sylhet,

More information

Interconnecting Cisco Networking Devices Part 2

Interconnecting Cisco Networking Devices Part 2 Interconnecting Cisco Networking Devices Part 2 Course Number: ICND2 Length: 5 Day(s) Certification Exam This course will help you prepare for the following exam: 640 816: ICND2 Course Overview This course

More information

PEDAMACS: Power efficient and delay aware medium access protocol for sensor networks

PEDAMACS: Power efficient and delay aware medium access protocol for sensor networks PEDAMACS: Power efficient and delay aware medium access protocol for sensor networks Sinem Coleri and Pravin Varaiya Department of Electrical Engineering and Computer Science University of California,

More information

Performance Evaluation of Aodv and Dsr Routing Protocols for Vbr Traffic for 150 Nodes in Manets

Performance Evaluation of Aodv and Dsr Routing Protocols for Vbr Traffic for 150 Nodes in Manets Performance Evaluation of Aodv and Dsr Routing Protocols for Vbr Traffic for 150 Nodes in Manets Gurpreet Singh, 1 Atinderpal Singh 2, 1, 2 Department of CSE & IT, BBSBEC, Fatehgarh Sahib, Punjab, India

More information

SECURITY ASPECTS IN MOBILE AD HOC NETWORK (MANETS)

SECURITY ASPECTS IN MOBILE AD HOC NETWORK (MANETS) SECURITY ASPECTS IN MOBILE AD HOC NETWORK (MANETS) Neha Maurya, ASM S IBMR ABSTRACT: Mobile Ad hoc networks (MANETs) are a new paradigm of wireless network, offering unrestricted mobility without any underlying

More information

An Overview of ZigBee Networks

An Overview of ZigBee Networks An Overview of ZigBee Networks A guide for implementers and security testers Matt Hillman Contents 1. What is ZigBee?... 3 1.1 ZigBee Versions... 3 2. How Does ZigBee Operate?... 3 2.1 The ZigBee Stack...

More information

Level 2 Routing: LAN Bridges and Switches

Level 2 Routing: LAN Bridges and Switches Level 2 Routing: LAN Bridges and Switches Norman Matloff University of California at Davis c 2001, N. Matloff September 6, 2001 1 Overview In a large LAN with consistently heavy traffic, it may make sense

More information

Security Enhanced Cooperative Game Theory for Mobile Ad-Hoc Network

Security Enhanced Cooperative Game Theory for Mobile Ad-Hoc Network Security Enhanced Cooperative Game Theory for Mobile Ad-Hoc Network Bondu Raja PG Scholar, Vignana Bharathi Institute of Technology, Hyderabad, Telngana, India. Ch.Suneetha AssociateProfessor, Vignana

More information

Introduction to LAN/WAN. Network Layer

Introduction to LAN/WAN. Network Layer Introduction to LAN/WAN Network Layer Topics Introduction (5-5.1) Routing (5.2) (The core) Internetworking (5.5) Congestion Control (5.3) Network Layer Design Isues Store-and-Forward Packet Switching Services

More information

Routing with OSPF. Introduction

Routing with OSPF. Introduction Routing with OSPF Introduction The capabilities of an internet are largely determined by its routing protocol. An internet's scalability, its ability to quickly route around failures, and the consumption

More information

CHAPTER 6. VOICE COMMUNICATION OVER HYBRID MANETs

CHAPTER 6. VOICE COMMUNICATION OVER HYBRID MANETs CHAPTER 6 VOICE COMMUNICATION OVER HYBRID MANETs Multimedia real-time session services such as voice and videoconferencing with Quality of Service support is challenging task on Mobile Ad hoc Network (MANETs).

More information

Adaptive MAP Selection with Load Balancing Mechanism for the Hierarchical Mobile IPv6

Adaptive MAP Selection with Load Balancing Mechanism for the Hierarchical Mobile IPv6 Tamkang Journal of Science and Engineering, Vol. 12, No. 4, pp. 481 487 (2009) 481 Adaptive MAP Selection with Load Balancing Mechanism for the Hierarchical Mobile IPv6 Ying-Hong Wang, Chih-Peng Hsu* and

More information

ssumathy@vit.ac.in upendra_mcs2@yahoo.com

ssumathy@vit.ac.in upendra_mcs2@yahoo.com S. Sumathy 1 and B.Upendra Kumar 2 1 School of Computing Sciences, VIT University, Vellore-632 014, Tamilnadu, India ssumathy@vit.ac.in 2 School of Computing Sciences, VIT University, Vellore-632 014,

More information