IP ADDRESS ASSIGNMENT IN A MOBILE AD HOC NETWORK
|
|
|
- Gabriel Nicholson
- 10 years ago
- Views:
Transcription
1 MILCOM IP ADDRESS ASSIGNMENT IN A MOBILE AD HOC NETWORK Mansoor Mohsin and Ravi Prakash The University of Texas at Dallas Richardson, TX Abstract A Mobile Ad Hoc Network (MANET) consists of a set of identical mobile nodes communicating with each other via wireless links. The network s topology may change rapidly and unpredictably. Such networks may operate in a stand-alone fashion, or may be connected to the larger Internet. In traditional networks, hosts rely on centralized servers like DHCP for conguration, but this cannot be extended to MANETs because of their distributed and dynamic nature. Many schemes have been proposed to solve this problem. Some of these approaches try to extend the IPv6 stateless autoconguration mechanism to MANETs, some use flooding the entire network to come up with a unique IP address, and others distribute IP addresses among nodes (using binary split) so that each node can independently congure new nodes. None of these existing solutions consider network partitioning and merging. In this paper, we propose a proactive scheme for dynamic allocation of IP addresses in MANETs. Our solution also uses the concept of binary split and takes into consideration the previously unsolved issues like partitioning and merging and abrupt departure of nodes from the system. We show that our solution is scalable and does not have the limitations of earlier approaches. Keywords MANET, auto-conguration, IP address. I. INTRODUCTION A Mobile Ad Hoc Network (MANET) consists of a set of identical mobile nodes communicating with each other via wireless links. The network s topology may change rapidly and unpredictably. Such a network may operate in a stand-alone fashion, or may be connected to the larger Internet. Since there is no built-in infra-structure required for the network to form, all the nodes have the capability to maintain all the resources of the network in a distributed fashion. Hence the nodes rely on each other to keep the network connected. One of the most important resources is the set of IP addresses that are assigned to the network. When a new node wants to join a network, it has to be assigned an IP address as part of its initialization. Address autoconguration in MANETs is still an unresolved issue. The IETF Zeroconf working group deals with autoconguration issues. One simple solution is proposed by [1] in which each node randomly congures itself and then performs duplicate address detection to resolve conflicts. This solution is not scalable as it floods the entire network while performing duplicate address detection. Another approach is based on IPv6 stateless autoconguration [2] [3]. This solution is limited in the sense that it only works with IPv6 and is dependent on the underlying routing protocol used. In general, we can categorize the IP assignment solutions to be either reactive or proactive. Reactive protocols require a consensus among all the nodes of the network on the new IP address that is to be assigned, whereas in the proactive approach, each node can independently assign a new IP address without asking permission from any other node in the network. The former scheme is described by [4] and the latter scheme is described by [5] [6]. In this paper, we will present a This work is supported in part by the National Science Foundation CAREER grant CCR proactive approach based on the binary split idea of [5] [6]. II. SYSTEM MODEL We consider an autonomous Mobile Ad Hoc Network working on its own. It has no gateway or connection to the external world. The network is formed by a group of nodes coming together. The nodes can join and leave the network any time and are free to move around. Hence the size and topology of the network is dynamic and unpredictable in nature. There is no single DHCP server. Instead, all nodes collectively perform the functionality of a DHCP server. Each node has the capability of conguring a new node by providing it with an IP address. All the nodes of the network synchronize from time to time to keep the latest information about the network. A. Requirements A protocol for assigning IP addresses should meet the following requirements: There should be no conflict in IP address assignment, i.e., at any given instant of time there should not be two or more nodes with the same IP address. An IP address is assigned only for the duration the node stays in the network. When the node departs the network, its IP address should become available for assignment to other nodes. A node should be denied an IP address only when the whole network has run out of its available IP addresses. In other words, if any of the nodes has a free IP address, this address should be assigned to the requesting node. The protocol should handle network partitioning and merging. When two different partitions merge, there is a possibility that two or more nodes have the same IP address. Such duplicate addresses should be detected and resolved. The protocol should make sure that only authorized nodes are congured and granted access to network resources. B. Key Terms and Denitions IP Address Block: A consecutive range of IP addresses. Usually the size of an an IP address block is a power of two. IP Address Leak: A situation when the union of all the IP address blocks associated with all the nodes is less than the IP addresses for the the whole network. In other words there are IP addresses that are neither associated with any node nor available with any node as free IP addresses. IP Address Conflict: A situation when two or more nodes in a network are assigned the same IP address. Detection of IP address leaks is explained in section V. Partitioning: The division of a network into two or more disjoint sub-networks. In the simplest case, a partition may consist of only one node. Partitioning leads to IP address leak (Section VIII).
2 2 MILCOM 2002 Merging: The combination of two or more networks into one bigger network. Merging results when two or more partitions come in the range of each other. Merging has the potential of causing IP address conflict (Section VIII). III. THE BUDDY SYSTEM FOR IP ADDRESS ASSIGNMENT Buddy systems [7] are a type of segregated lists that support an efcient kind of splitting and coalescing. Binary buddies are the simplest and best-known kind of buddy system [8]. In this scheme, all buddy sizes are a power of two, and each size is divided into two equal parts. All the buddies are aligned on a power-of-two boundary offset from the beginning of the heap area. Each bit in the offset of a block represents one level in the buddy system s hierarchical splitting of the heap area if the bit is 0, it is the rst in a pair of buddies, and if the bit is 1, it is the second in the pair. These operations can be implemented efciently with bitwise logical operations. In a Buddy System for IP Assignment every node has a disjoint set of IP addresses that it can assign to a new node without consulting any other node in the network. The basic idea is as follows: 1. In the beginning, there is only one node in the network that has the entire pool of IP addresses. 2. When an un-congured node, A, wishes to join a network, it requests the nearest congured neighbor node, B, for an IP address. Node B assigns the requesting node A an IP address from its pool of IP addresses. It also divides the set of IP addresses into two and gives one half to the requesting node A (keeping the other half with itself). 3. A node can leave the network either gracefully or abruptly. When node A leaves a network gracefully, it gives its pool of IP addresses to any node B nearby. Node B has the responsibility of handling this set of IP addresses it can either keep this block of IP addresses with itself or it can nd the buddy of node A (i.e. the node whose IP address block is a buddy of node A s IP address block) and forward this block of IP addresses to the buddy. On the other hand, when node A leaves the network abruptly it leads to IP address leak (because there is some IP address that is neither assigned to any node nor available for assignment to an un-congured node). This situation is handled later on when the nodes synchronize and exchange information about the latest status of the network. 4. Nodes synchronize from time to time to keep track of the IP addresses assigned and detect any leaks in the available pool of IP addresses. Every node keeps a record of all the IP address blocks in the network by maintaining a table similar to the one given below: TABLE I IP ADDRESS TABLE NodeID IPAddresses This table is sorted with respect to the IP addresses. This table can be implemented as a binary tree. A particular block of IP addresses can be searched in the table in O log n time. IV. ASSIGNING A NEW IP ADDRESS Let the node requesting an IP address be a client node and the node that actually assigns the IP address be a server node. In this way we can view the scheme of assigning an IP address as a handshaking protocol between the server and the client. 1. The client periodically sends broadcast messages using its hardware address. 2. When a server receives this broadcast message, it responds by sending a reply message using its IP address and the client s hardware address. It is possible that two or more servers reply to the same broadcast message. 3. The client sends an acknowledgment message back to the server. If the client has received more than one reply messages from different servers, it sends the acknowledgment message only to the rst server and ignores the rest. 4. When the server receives this message, it realizes that it is ready to assign a new IP address to the requesting client node. If the server has multiple blocks of IP addresses (as a result of departures of neighbors), it assigns one of these blocks to the client node. Otherwise, it divides its set of available IP addresses into two disjoint subsets. It then sends one subset to the client node and keeps the other subset with itself. The server also sends its latest version of IP address table to the client. 5. When the client receives this set of available IP addresses, it assigns itself the rst IP address from this set and keeps the rest as its available set of IP addresses. It then sends a conrm message to the server indicating a successful conguration. 6. When the server receives this conrm message, it terminates the IP assignment process. It is possible that a node has allocated all the IP addresses from its IP address block but some other nodes in the network still have some available IP addresses. If this is the case and a new request for IP address assignment arrives, then we can employ the following three solutions: 1. The server node searches its IP address table for a neighbor node that still has some available IP addresses. The server then requests that neighbor node for some available IP addresses. The neighbor node divides its block of IP addresses into two and gives one half to the server (keeping the second with itself). The server then continues with the conguration of the client using this acquired block. If none of the neighbors has free IP addresses available, then the server checks for nodes which are at a distance of two hops, and so on. 2. The server sends a multicast message to all its neighbors for a block of available IP addresses. The server accepts the reply of the neighbor that replies rst. The rest is the same as case 1. If none of the neighbors has free IP addresses available, then the server sends a multicast message to the nodes that are at a distance of two hops from the server, and so on. 3. The server node searches its IP address table for the node that has the biggest block of IP addresses. If two or more nodes have the same number of free IP addresses available, then it simply selects the nearest one. The rest is the same as case 1.
3 MOHSIN AND PRAKASH 3 The rst two solutions are very similar. The only difference is that in the rst solution the server searches the IP addresses table whereas in the second solution the server sends multicast messages. The rst one is efcient in terms of the number of messages it sends whereas the second one is efcient in terms of time required to discover a node that has free IP addresses available. In both the solutions, the server node increases the radius by one hop and searches for a node that has free IP addresses available until it nds one. The third solution is different. The server node targets the node that has the most number of free IP addresses available. If all the IP addresses in the network have been assigned, the server does not need to exchange any messages to determine that. The advantage of this scheme is that it leads to less fragmentation as available IP address blocks get evenly distributed over the network whenever a node runs out of its free IP addresses. This is extremely useful when the network is getting concentrated at a given location and the nodes in that location run out of free IP addresses. In terms of the amount of state information maintained, the second solution requires the least amount of state information because it does not need to know about the IP address block of any node in the network, whereas the third solution requires the most amount of state information as it needs to know about the IP address block of all the nodes in the network. The rst solution, however, requires an intermediate amount of state information because the server only needs to know about the IP address blocks of it s neighbors. In this paper, we will focus our attention on the third solution. A. Format of Messages The following messages are used in the assignment of a new IP address: request This is the broadcast message that the client sends periodically to start its conguration process. The source eld of this message is the client s hardware address and destination eld contains the broadcast address. reply This is the message that a potential server sends to the client when it receives a request message. This message lets the client identify the server it will be dealing with. ack This is the acknowledgment message that the client sends to the server in response to the reply message to permit the server to start the conguration process. addressblock The server sends this message to the client. It contains the block of IP addresses that the client can use for the conguration of other requesting nodes. The rst address of this block is used by the client as its own IP address. conrm This is the conrmation message by the client to the server indicating that it has been congured properly. When the server receives this message, it terminates the IP assignment process. borrow This is the message sent by the server to any other node asking for a free block of IP addresses. The server uses this message when it runs out of available IP addresses to assign to a new requesting node. deny The message is used by a server to a requesting client indicating that it has no free IP address available. When the client receives this message it realizes that there is no IP address available in the entire network and it cannot get congured. B. Timers The following timers are used in the assignment of a new IP address. Note that the name of the timer depend upon the message it is waiting for: replytimer The client starts this timer after sending the request message and stops it when it receives the reply message from the server. When the timer expires, it sends the request message again and resets the timer. addressblocktimer The client starts this timer after sending the ack message to the server and stops it with it receives the addressblock message from the server. When the timer expires, the client assumes that the server has left the network before completing its conguration process, so it starts the IP assignment process from scratch again. conrmtimer The server starts this timer after sending the addressblock message to the client and stops it when it receives the conrm message from the server. When the timer expires, the server assumes that the client has left the network before completing it conguration process and does nothing, otherwise it updates its IP address table (described in the next section) and make a new entry for the client. V. NODE SYNCHRONIZATION Nodes of a MANET synchronize from time to time to keep record of IP address assignment in the entire network and detect any IP address leaks. The synchronization process involves every node broadcasting its pool of IP addresses. This broadcast is used by every other node to update its IP address table. A. Detecting IP Address Leaks If a node leaves the network abruptly, or if the network is partitioned into two or more networks, there are IP addresses that are assigned to nodes which are no longer part of the network. We need to devise a mechanism to detect such IP address leaks, and then take corrective actions to reclaim those IP addresses. The detection of IP address leaks is simple. Let there be nodes i and j such that i and j are buddy nodes of each other. In order to detect IP address leak every node scans the IP address table (section III) for its buddy s IP address block, i.e., node i will scan the IP address table for node j and vice versa. If node i discovers that the IP address block corresponding to node j is missing from the table, it concludes that node j is missing and the network has been unable to reclaim j s IP address block. Node i then merges node j s IP address block with its own. The advantage of this scheme is that every node is responsible for nding out if its buddy node is missing and acquiring that buddy s IP address, as compared to flooding the entire network to nd out IP address leaks. VI. RETURNING A POOL OF IP ADDRESSES We will adopt the same convention of client node and server node for this section. The node that has to return the pool of IP addresses is the client node and the node that accepts the pool of IP addresses is the server node. The protocol is designed in such a way to minimize work done by the departing node as far as possible. This is because the departing node might not have
4 4 MILCOM 2002 enough time to complete the whole process of giving its block of IP addresses to the node with its buddy block. The departing node just initiates the process before leaving the network and it is up to the network to make this a graceful departure. 1. When a client node decides to leave the network, it informs of its departure to any of the neighboring nodes (server node). 2. When the server node receives this message, it marks the IP addresses of the client as being available and sends a message back to the client signaling that it may now leave the network. 3. Upon receiving this message, the client node sends a bye() message to the server and leaves the network. This message reconrms the client s intention to leave the network. If the client does not send this message it means that it has changed its mind and no longer wishes to leave the network. 4. When the server receives this bye() message, it is sure that the node has left the network. It then nds the buddy of the client (by looking up its IP address table) and requests it to acquire the client s block of IP addresses, or it can keep this IP address block with itself for conguring other nodes. 5. The buddy node acquires the block of IP addresses and sends a conrmation message back to the server. 6. On receiving this message, the server is sure that the block has been acquired successfully, so it terminates the process. Note that if anything goes wrong in the above process, for example, if the client leaves the network without sending the bye() message, it will be treated an address leak and will be reclaimed when the nodes synchronize. A. Format of Messages The following messages are used in a graceful departure of a node: depart The client sends this message to the server when it wants to leave the network. The server can be any of the neighboring nodes. ok The server sends this message to the client after marking its entry in the IP address table. When the client receives this message, it is sure that the server will take care of its IP address block, so it can leave the network. bye The client send this message to the server indicating that it has left the network and the server can now send its IP address block to its buddy node. acquire The server sends this message to the buddy of the departing node asking it to acquire the IP address block of the client. done The buddy of the departing node sends this message to the server indicating that it has acquired the IP addresses of the client. When the server receives this message it deletes the departing client s entry from the IP address table and relaxes as it no longer needs to worry about taking care of the client s IP address block. B. Timers The following timers are used in the graceful departure of a node: oktimer The client starts this timer after sending depart message to the server and stops it when it receives the ok message from the the server. When the timer expires, the client can either start the departure process again or it does nothing and just leaves the network assuming that it is no longer a part of the network. Note that the latter case leads to IP address leaks and it is up to the network to resolve this situation. byetimer The server starts this timer after sending the ok message to the client and stops it when it receives the bye message from the client. When the timer expires, the server pings the client node. If it hears nothing from the client, it assumes that the client has left, so it starts the process of assigning the client node s IP address block it its buddy. VII. THE ALGORITHM The algorithm for the client using the Abstract Protocol Notation (APN) is given below: const threshold; bool begin := true; bool congured := false; int count := 0; bool rstreply := true; begin = true count < threshold broadcast request; start replytimer; begin := false; count = threshold self-congure(); congured := true; receive reply from server rstreply stop replytimer; send ack to server; start addressblocktimer; rstreply := false; receive addressblock from server stop addressblocktimer; congured := true; congured = true send depart to server; start oktimer; receive ok from server stop oktimer; send bye to server; releaseipaddress(); congured := false; count := 0; timeout(replytimer) begin := true; count := count + 1; timeout(addressblocktimer) begin := true; count := count + 1; timeout(oktimer) congured := false; The corresponding server algorithm for the IP address assignment is given below: bool availableblock := true; receive request from client send reply to client; start acktimer;
5 MOHSIN AND PRAKASH 5 receive ack from client stop acktimer; if availableblock = true then divideblock(); send addressblock to client; if free IP address is available then availableblock := true; availableblock := false; checkipaddresstable(); if no node has a new IP address then send deny to client; send borrow to newserver; start addressblocktimer; receive conrm from client updateipaddresstable(); receive addressblock from newserver stop addressblocktimer; newaddressblock = divideblock(addressblock); send newaddressblock to client; if free IP address is available then availableblock := true; availableblock := false; receive depart from client send ok to client; start oktimer; receive bye from client stop byetimer; ndclientbuddy(); send acquire to clientbuddy; start donetimer; receive done from clientbuddy stop donetimer; updateipaddresstable(); timeout(conrmtimer) pollclient(); if client is present then updateipaddresstable(); skip; timeout(byetimer) pollclient(); if client is not present then ndclientbuddy(); send acquire to clientbuddy; start donetimer; skip; Most of the functions given in the above algorithm can be implemented in a number of ways. Given below is a brief description of the different possibilities: The function self-congure() is called when a node discovers that it is the only node in the network and needs to congure itself. This node has the entire block of IP addresses and assigns itself the rst IP address of that block. This makes the division of IP address blocks very easy, as a node can keep the rst half and give the second half to a requesting node. congure() too works on the same principle. It also has a block of IP addresses (obtained from a server node) and assigns the rst IP address from that block to itself. Both these functions also update their copy of IP address table. Whenever a node gets congured, it sends a broadcast message to the network informing of its arrival. This helps in updating the routing and IP address tables. The function releaseipaddress() is very simple. All it does is assign null values to the IP address block, it own IP address and the IP address table. It is worth mentioning here that if we are dealing with gateways and subnets then the above three functions should also deal with this situation. updateipaddresstable() adds or deletes an entry in the IP address table to reflect the latest state of the network. Adding a new entry means arrival of a new node and splitting of an IP address block into two smaller blocks. Similarly, deleting and entry means departure of node and merging of two IP address blocks into one bigger block. When a node updates its IP address table it does not immediately informs this to all other nodes in the network. This is because as long as a node has a pool of IP addresses, it is autonomous in conguring client nodes. Other nodes get to know of this only when needed, e.g. when a node has exhausted its IP address block and it asks for a block from some other node. Even if this does not happen then the time to time node synchronization will keep the information updated throughout the network. The function checkipaddress() scans the IP address table for the node that has the largest IP address block. This function is used by a server node that has run out of its IP address block wants to borrow a block from some other node. ndclientbuddy() is also a similar function. It also scans the IP address table but it takes the IP address of the client as a parameter and returns the IP address of the node that is the buddy of the given client node. divideblock() divides an IP address block into two blocks. It returns the second half of the original block encapsulated as the addressblock message that can be sent to the client. The function pollclient() simply pings the client just to nd out whether it is alive or not. VIII. NETWORK PARTITIONING AND MERGING One main advantage of the Buddy System for IP address assignment is that it works very well with network partitioning and merging. In order to differentiate two or more partitions, each partition is associated with a PartitionID which is a universally unique identier, UUID. Hence, it is guaranteed that every partition will have a unique PartitionID. There can be two cases when a new PartitionID is generated. First, when a new network is formed, i.e. when a node discovers that it is the only node in the network, it generates a new PartitionID and assigns to itself. Later, whenever a new node wishes to join the network, this PartitionID is passed to the new node as a part of the conguration process. The second case is when an existing network is partitioned into two or more partitions. When a node discovers that it has been partitioned from the main network, then each node in that new partition is assigned a new PartitionID. The protocol to detect network partitioning is described in [4]. Now let us consider what happens when a network gets partitioned and the different partitions merge after some time. Let A and B be two partitions after a network is partitioned into two. As long as A and B have some IP address available, they do not assign themselves a new PartitionID. The Buddy System for IP
6 6 MILCOM 2002 address assignment will continue to work under such conditions. If the two partitions A and B merger before they run out of IP addresses, then we do not need to do anything. In other words, there is no problem if disjoint partitions merge. On the other hand, consider the situation when A has used all its IP address and a new request comes in. In this case, partition A generates a new PartitionID and acquires the entire IP address block of partition B. Now if A and B merge then their intersection is not null and there are IP address conflicts. In order to resolve such conflicts, one of the conflicting nodes in either A or B has to give up its IP address block. Our algorithm requires the node with the larger IP address block to give up its IP address and acquire a new IP address. In this way the number of changes required to resolve the conflicts is minimum. The details of the algorithm are given below: nd the node in other partition with same IP address if there is no such node then adjust PartitionID, if necessary let A = node in other partition with same IP address if blocksize = A s blocksize then give up IP address request for an IP address from A if blocksize < A s blocksize then divide block into two give the second half to A (A will be requesting for an IP address) adjust PartitionIDs request for an IP address from A end if end if Figure 1 illustrates how IP address conflicts are resolved using the above algorithm. Nodes A and B have the same IP address. Node A gives up its IP address since its block size is greater than node B s block size. Node B then divides its IP address block into two and gives the second half to A. A B C D Fig. 1. Block sizes before and partition merging Referring to the gure, several improvements can be made to the above algorithm. Instead of dividing block B into two and giving one half to A, we can divide the largest block, in this case D, into two and give one half to A. In this way, IP addresses will be much more uniformly distributed among the nodes. Also if we have some information about the amount of network a node is using, then we can decide which node to give up its IP address. For example, suppose that A has a lot of telnet and ftp sessions going while B is idle, then it s a good idea to give B the second block while A keep the rst block. IX. PERFORMANCE MEASURES Assigning a new IP address is very efcient, as only the client and server nodes are involved in this process and there are no overheads. There are a nite number of messages needed for this protocol. B A C D Synchronization of nodes involves broadcast messages as every node periodically broadcasts its information about its block of IP addresses. So, in a network with n nodes, we will have n broadcast messages during a nite interval of time. We can adopt a lazy synchronization mechanism here in which the nodes synchronize only when needed. This signicantly reduces the number of messages in a given amount of time. When a node departs a network, again we have a nite number of message exchanges. This is possible because the server node can search for the node with the buddy block from the table and it does not need to send any broadcast messages. As far as memory requirement is concerned, it depends on the size of the table every node has to maintain. In the worst case, all IP addresses has been assigned and each block of IP addresses consists of just one IP address. In this case, the number of entries in the table are equal to the size of the network. Note that the buddy scheme not only helps minimize the size of the table but also helps minimize fragmentation of IP address blocks. X. CONCLUSION AND FUTURE WORK We presented a simple solution for automatic IP address assignment of nodes in a MANET. The solution employs the buddy system, a well known method for memory management. The solution has low overheads, and is capable of handling node arrivals, departures, and network partitioning. A major issue that has been ignored in this paper is security. We assumes that each node trusts every other node, but if this is not the case then the following situations can arise: A node requests IP addresses for nodes that do not exist. In this way a node can acquire all the IP addresses denying others to participate in the network. A node assigns IP addresses to other nodes without following the given protocol. This can lead to IP address conflicts which might be difcult to resolve. A node selectively gives wrong information to other nodes. The synchronization process in our protocol depends on reliable broadcast. Since no such broadcast exists in a mobile distributed environment, one can question the robustness of the protocol. There is need for further research on security and reliable multicast/broadcast communication in MANETs. REFERENCES [1] C. E. Perkins, E. M. Royer, and S. R. Das: IP Address Autoconguration for Ad Hoc Networks. Technical Report draft-ietf-manet-autoconf-00.txt, Internet Engineering Task Force, MANET Working Group, July [2] S. Thomson, and T. Narten: IPv6 Stateless Autoconguration, RFC 2462, December [3] Kilian Weniger, and Martina Zitterbart: IPv6 Autoconguration in Large Scale Mobile Ad Hoc Networks, University of Karlsruhe, Germany. [4] Sanket Nesargi and Ravi Prakash: MANETconf: Congurationof Hosts in a Mobile Ad Hoc Network, Proceedings of INFOCOM [5] A. J. McAulley, and K. Manousakis: Self-Conguring Networks, MIL- COM 2000, 21st Century Military Communications Conference Proceedings, Volume 1, Pages [6] A. Misra, S. Das, A. McAulley, and S. K. Das: Autoconguration, Registration, and Mobility Management for Pervasive Computing, IEEE Personal Communications, Volume 8, Issue 4, August 2001, Pages [7] Paul R. Wilson, Mark S. Johnstone, Michael Neely, and David Boles: Dynamic Storage Allocation: A Survey and Critical Review, International Workshop on Memeory Management, September [8] Kenneth C. Knowlton: A Fast Storage Allocator, Communications of the ACM, Volume 8, Number 10, October 1965.
A UBIQUITOUS PROTOCOL FOR ADDRESS DYNAMICALLY AUTO CONFIGURATION FOR MOBILE AD HOC NETWORKS
A UBIQUITOUS PROTOCOL FOR ADDRESS DYNAMICALLY AUTO CONFIGURATION FOR MOBILE AD HOC NETWORKS Chandanpreet Kaur Global Institute of Management and Emerging Technologies, Amritsar, Punjab, India, [email protected]
Hosts Address Auto Configuration for Mobile Ad Hoc Networks
Hosts Address Auto Configuration for Mobile Ad Hoc Networks Sudath Indrasinghe, Rubem Pereira, Hala Mokhtar School of Computing and Mathematical Sciences Liverpool John Moores University [email protected],
New Approach for Address Auto-Configuration in MANET Based on Virtual Address Space Mapping (VASM)
New Approach for Address Auto-Configuration in MANET Based on Virtual Address Space Mapping (VASM) Majid Taghiloo 1, Mehdi Dehghan 2, Jamshid Taghiloo 3, Maria Fazio 4, 1 Computer Engineering Department,
Autoconfiguration and maintenance of the IP address in ad-hoc mobile networks
1 Autoconfiguration and maintenance of the IP address in ad-hoc mobile networks M. Fazio, M. Villari, A. Puliafito Università di Messina, Dipartimento di Matematica Contrada Papardo, Salita Sperone, 98166
Behavior Analysis of TCP Traffic in Mobile Ad Hoc Network using Reactive Routing Protocols
Behavior Analysis of TCP Traffic in Mobile Ad Hoc Network using Reactive Routing Protocols Purvi N. Ramanuj Department of Computer Engineering L.D. College of Engineering Ahmedabad Hiteishi M. Diwanji
Accelerating Service Discovery in Ad-hoc Zero Configuration Networking
Accelerating Service Discovery in Ad-hoc Zero Configuration Networking Se Gi Hong, Suman Srinivasan and Henning Schulzrinne Columbia University, New York, NY {segihong, sumans, hgs}@cs.columbia.edu Abstract
Result Analysis of Virtual IP Address Configuration Protocol
Volume 64 No2, February 2013 Result Analysis of Virtual IP Address Configuration Protocol Satinder Kaur MTech Student Amritsar College of Engineering & Technology, Amritsar, Punjab-India- 143001 Tanu Preet
Name Service in IPv6 Mobile Ad-hoc Network
Name Service in IPv6 Mobile Ad-hoc Network Jaehoon Jeong, Jungsoo Park, Hyoungjun Kim, and Kishik Park Protocol Engineering Center, ETRI, 161 Gajong-Dong, Yusong-Gu, Daejon 305-350, Korea {paul,pjs,khj,kipark}@etri.re.kr,
PERFORMANCE ANALYSIS OF AD-HOC ON DEMAND DISTANCE VECTOR FOR MOBILE AD- HOC NETWORK
http:// PERFORMANCE ANALYSIS OF AD-HOC ON DEMAND DISTANCE VECTOR FOR MOBILE AD- HOC NETWORK Anjali Sahni 1, Ajay Kumar Yadav 2 1, 2 Department of Electronics and Communication Engineering, Mewar Institute,
COMPARATIVE ANALYSIS OF ON -DEMAND MOBILE AD-HOC NETWORK
www.ijecs.in International Journal Of Engineering And Computer Science ISSN:2319-7242 Volume 2 Issue 5 May, 2013 Page No. 1680-1684 COMPARATIVE ANALYSIS OF ON -DEMAND MOBILE AD-HOC NETWORK ABSTRACT: Mr.Upendra
Performance Evaluation of AODV, OLSR Routing Protocol in VOIP Over Ad Hoc
(International Journal of Computer Science & Management Studies) Vol. 17, Issue 01 Performance Evaluation of AODV, OLSR Routing Protocol in VOIP Over Ad Hoc Dr. Khalid Hamid Bilal Khartoum, Sudan [email protected]
A Comparison Study of Qos Using Different Routing Algorithms In Mobile Ad Hoc Networks
A Comparison Study of Qos Using Different Routing Algorithms In Mobile Ad Hoc Networks T.Chandrasekhar 1, J.S.Chakravarthi 2, K.Sravya 3 Professor, Dept. of Electronics and Communication Engg., GIET Engg.
LOAD BALANCING AND EFFICIENT CLUSTERING FOR IMPROVING NETWORK PERFORMANCE IN AD-HOC NETWORKS
LOAD BALANCING AND EFFICIENT CLUSTERING FOR IMPROVING NETWORK PERFORMANCE IN AD-HOC NETWORKS Saranya.S 1, Menakambal.S 2 1 M.E., Embedded System Technologies, Nandha Engineering College (Autonomous), (India)
- Cognitive Radio (CR) technology is a promising emerging technology that enables a more efficient usage of
An Asynchronous Neighbor Discovery Algorithm for Cognitive Radio Networks Short Paper Chanaka J. Liyana Arachchige, S. Venkatesan and Neeraj Mittal Erik Jonsson School of Engineering and Computer Science
Adapting Distributed Hash Tables for Mobile Ad Hoc Networks
University of Tübingen Chair for Computer Networks and Internet Adapting Distributed Hash Tables for Mobile Ad Hoc Networks Tobias Heer, Stefan Götz, Simon Rieche, Klaus Wehrle Protocol Engineering and
Implementation of a Lightweight Service Advertisement and Discovery Protocol for Mobile Ad hoc Networks
Implementation of a Lightweight Advertisement and Discovery Protocol for Mobile Ad hoc Networks Wenbin Ma * Department of Electrical and Computer Engineering 19 Memorial Drive West, Lehigh University Bethlehem,
DESIGN AND DEVELOPMENT OF LOAD SHARING MULTIPATH ROUTING PROTCOL FOR MOBILE AD HOC NETWORKS
DESIGN AND DEVELOPMENT OF LOAD SHARING MULTIPATH ROUTING PROTCOL FOR MOBILE AD HOC NETWORKS K.V. Narayanaswamy 1, C.H. Subbarao 2 1 Professor, Head Division of TLL, MSRUAS, Bangalore, INDIA, 2 Associate
Communications and Networking
Communications and Networking History and Background telephone system local area networks Internet architecture: what the pieces are and how they fit together names and addresses: what's your name and
Fast and Secure Data Transmission by Using Hybrid Protocols in Mobile Ad Hoc Network
Middle-East Journal of Scientific Research 15 (9): 1290-1294, 2013 ISSN 1990-9233 IDOSI Publications, 2013 DOI: 10.5829/idosi.mejsr.2013.15.9.11514 Fast and Secure Data Transmission by Using Hybrid Protocols
Session Initiation Protocol Deployment in Ad-Hoc Networks: a Decentralized Approach
Session Initiation Protocol Deployment in Ad-Hoc Networks: a Decentralized Approach Simone Leggio, Jukka Manner, Antti Hulkkonen, Kimmo Raatikainen Department of Computer Science University of Helsinki,
Introduction to IP v6
IP v 1-3: defined and replaced Introduction to IP v6 IP v4 - current version; 20 years old IP v5 - streams protocol IP v6 - replacement for IP v4 During developments it was called IPng - Next Generation
Location Information Services in Mobile Ad Hoc Networks
Location Information Services in Mobile Ad Hoc Networks Tracy Camp, Jeff Boleng, Lucas Wilcox Department of Math. and Computer Sciences Colorado School of Mines Golden, Colorado 841 Abstract In recent
APPENDIX B. Routers route based on the network number. The router that delivers the data packet to the correct destination host uses the host ID.
APPENDIX B IP Subnetting IP Addressing Routers route based on the network number. The router that delivers the data packet to the correct destination host uses the host ID. IP Classes An IP address is
Name Resolution in On-Demand MANETs and over External IP Networks
Name Resolution in On-Demand MANETs and over External IP Networks Paal Engelstad, Do Van Thanh, Geir Egeland University of Oslo (UniK) / Telenor R&D, 1331 Fornebu, Norway {Paal.Engelstad, Thanh-van.Do,
Routing with OSPF. Introduction
Routing with OSPF Introduction The capabilities of an internet are largely determined by its routing protocol. An internet's scalability, its ability to quickly route around failures, and the consumption
Lecture 2.1 : The Distributed Bellman-Ford Algorithm. Lecture 2.2 : The Destination Sequenced Distance Vector (DSDV) protocol
Lecture 2 : The DSDV Protocol Lecture 2.1 : The Distributed Bellman-Ford Algorithm Lecture 2.2 : The Destination Sequenced Distance Vector (DSDV) protocol The Routing Problem S S D D The routing problem
Local Address Management in IoT environments
Local Address Management in IoT environments Pat Thaler, Senior Technical Director, Broadcom 29 September 2014 3 rd IEEE 802 and IETF Leadership Meeting 1 PROBLEM STATEMENT 2 MAC address consumption ramps
Guide to Network Defense and Countermeasures Third Edition. Chapter 2 TCP/IP
Guide to Network Defense and Countermeasures Third Edition Chapter 2 TCP/IP Objectives Explain the fundamentals of TCP/IP networking Describe IPv4 packet structure and explain packet fragmentation Describe
Datagram-based network layer: forwarding; routing. Additional function of VCbased network layer: call setup.
CEN 007C Computer Networks Fundamentals Instructor: Prof. A. Helmy Homework : Network Layer Assigned: Nov. 28 th, 2011. Due Date: Dec 8 th, 2011 (to the TA) 1. ( points) What are the 2 most important network-layer
IPv6 mobility and ad hoc network mobility overview report
Institut Eurecom 1 Department of Mobile Communications 2229, route des Crêtes B.P. 193 06904 Sophia Antipolis FRANCE Research Report RR-08-217 IPv6 mobility and ad hoc network mobility overview report
Performance Analysis of Load Balancing in MANET using On-demand Multipath Routing Protocol
ISSN: 2278 1323 All Rights Reserved 2014 IJARCET 2106 Performance Analysis of Load Balancing in MANET using On-demand Multipath Routing Protocol Monika Malik, Partibha Yadav, Ajay Dureja Abstract A collection
CS335 Sample Questions for Exam #2
CS335 Sample Questions for Exam #2.) Compare connection-oriented with connectionless protocols. What type of protocol is IP? How about TCP and UDP? Connection-oriented protocols Require a setup time to
Transport and Network Layer
Transport and Network Layer 1 Introduction Responsible for moving messages from end-to-end in a network Closely tied together TCP/IP: most commonly used protocol o Used in Internet o Compatible with a
Overview. Securing TCP/IP. Introduction to TCP/IP (cont d) Introduction to TCP/IP
Overview Securing TCP/IP Chapter 6 TCP/IP Open Systems Interconnection Model Anatomy of a Packet Internet Protocol Security (IPSec) Web Security (HTTP over TLS, Secure-HTTP) Lecturer: Pei-yih Ting 1 2
Transport layer issues in ad hoc wireless networks Dmitrij Lagutin, [email protected]
Transport layer issues in ad hoc wireless networks Dmitrij Lagutin, [email protected] 1. Introduction Ad hoc wireless networks pose a big challenge for transport layer protocol and transport layer protocols
Network Security TCP/IP Refresher
Network Security TCP/IP Refresher What you (at least) need to know about networking! Dr. David Barrera Network Security HS 2014 Outline Network Reference Models Local Area Networks Internet Protocol (IP)
co Characterizing and Tracing Packet Floods Using Cisco R
co Characterizing and Tracing Packet Floods Using Cisco R Table of Contents Characterizing and Tracing Packet Floods Using Cisco Routers...1 Introduction...1 Before You Begin...1 Conventions...1 Prerequisites...1
Intelligent Agents for Routing on Mobile Ad-Hoc Networks
Intelligent Agents for Routing on Mobile Ad-Hoc Networks Y. Zhou Dalhousie University [email protected] A. N. Zincir-Heywood Dalhousie University [email protected] Abstract This paper introduces a new agent-based
VoIP over MANET (VoMAN): QoS & Performance Analysis of Routing Protocols for Different Audio Codecs
VoIP over MANET (VoMAN): QoS & Performance Analysis of Routing Protocols for Different Audio Codecs Said El brak Mohammed Bouhorma Anouar A.Boudhir ABSTRACT Voice over IP (VoIP) has become a popular Internet
NetworkPathDiscoveryMechanismforFailuresinMobileAdhocNetworks
Global Journal of Computer Science and Technology: E Network, Web & Security Volume 14 Issue 3 Version 1.0 Year 2014 Type: Double Blind Peer Reviewed International Research Journal Publisher: Global Journals
A Mobility Tolerant Cluster Management Protocol with Dynamic Surrogate Cluster-heads for A Large Ad Hoc Network
A Mobility Tolerant Cluster Management Protocol with Dynamic Surrogate Cluster-heads for A Large Ad Hoc Network Parama Bhaumik 1, Somprokash Bandyopadhyay 2 1 Dept. of Information Technology, Jadavpur
Chapter 5. Simple Ad hoc Key Management. 5.1 Introduction
Chapter 5 Simple Ad hoc Key Management 5.1 Introduction One of the most important consequences of the nature of the MANET networks is that one cannot assume that a node that is part of a network will be
architecture: what the pieces are and how they fit together names and addresses: what's your name and number?
Communications and networking history and background telephone system local area networks Internet architecture: what the pieces are and how they fit together names and addresses: what's your name and
IP Routing Features. Contents
7 IP Routing Features Contents Overview of IP Routing.......................................... 7-3 IP Interfaces................................................ 7-3 IP Tables and Caches........................................
IP Networking. Overview. Networks Impact Daily Life. IP Networking - Part 1. How Networks Impact Daily Life. How Networks Impact Daily Life
Overview Dipl.-Ing. Peter Schrotter Institute of Communication Networks and Satellite Communications Graz University of Technology, Austria Fundamentals of Communicating over the Network Application Layer
IP Addressing Introductory material.
IP Addressing Introductory material. A module devoted to IP addresses. Addresses & Names Hardware (Layer 2) Lowest level Ethernet (MAC), Serial point-to-point,.. Network (Layer 3) IP IPX, SNA, others Transport
Security Scheme for Distributed DoS in Mobile Ad Hoc Networks
Security Scheme for Distributed DoS in Mobile Ad Hoc Networks Sugata Sanyal 1, Ajith Abraham 2, Dhaval Gada 3, Rajat Gogri 3, Punit Rathod 3, Zalak Dedhia 3 and Nirali Mody 3 1 School of Technology and
INTERNATIONAL JOURNAL OF PURE AND APPLIED RESEARCH IN ENGINEERING AND TECHNOLOGY
INTERNATIONAL JOURNAL OF PURE AND APPLIED RESEARCH IN ENGINEERING AND TECHNOLOGY A PATH FOR HORIZING YOUR INNOVATIVE WORK AN OVERVIEW OF MOBILE ADHOC NETWORK: INTRUSION DETECTION, TYPES OF ATTACKS AND
An Efficient QoS Routing Protocol for Mobile Ad-Hoc Networks *
An Efficient QoS Routing Protocol for Mobile Ad-Hoc Networks * Inwhee Joe College of Information and Communications Hanyang University Seoul, Korea iwj oeshanyang.ac.kr Abstract. To satisfy the user requirements
CROSS LAYER BASED MULTIPATH ROUTING FOR LOAD BALANCING
CHAPTER 6 CROSS LAYER BASED MULTIPATH ROUTING FOR LOAD BALANCING 6.1 INTRODUCTION The technical challenges in WMNs are load balancing, optimal routing, fairness, network auto-configuration and mobility
DHCP Failover: Requirements of a High-Performance System
DHCP Failover: Requirements of a High-Performance System A white paper by Incognito Software April, 2006 2006 Incognito Software Inc. All rights reserved. Page 1 of 6 DHCP Failover: Requirements of a High-Performance
A Survey: High Speed TCP Variants in Wireless Networks
ISSN: 2321-7782 (Online) Volume 1, Issue 7, December 2013 International Journal of Advance Research in Computer Science and Management Studies Research Paper Available online at: www.ijarcsms.com A Survey:
(Refer Slide Time: 02:17)
Internet Technology Prof. Indranil Sengupta Department of Computer Science and Engineering Indian Institute of Technology, Kharagpur Lecture No #06 IP Subnetting and Addressing (Not audible: (00:46)) Now,
CHAPTER 8 CONCLUSION AND FUTURE ENHANCEMENTS
137 CHAPTER 8 CONCLUSION AND FUTURE ENHANCEMENTS 8.1 CONCLUSION In this thesis, efficient schemes have been designed and analyzed to control congestion and distribute the load in the routing process of
Data Structures For IP Lookup With Bursty Access Patterns
Data Structures For IP Lookup With Bursty Access Patterns Sartaj Sahni & Kun Suk Kim sahni, kskim @cise.ufl.edu Department of Computer and Information Science and Engineering University of Florida, Gainesville,
Internet Protocol version 4 Part I
Internet Protocol version 4 Part I Claudio Cicconetti International Master on Information Technology International Master on Communication Networks Engineering Table of Contents
Research Article Volume 6 Issue No. 4
DOI 10.4010/2016.863 ISSN 2321 3361 2016 IJESC Research Article Volume 6 Issue No. 4 Different Modes of Discovery of Network Nodes Using SNMP and Reconciliation HemlataL.Eglambe 1, Divyani R.Vade 2, Megha
Internetworking and Internet-1. Global Addresses
Internetworking and Internet Global Addresses IP servcie model has two parts Datagram (connectionless) packet delivery model Global addressing scheme awaytoidentifyall H in the internetwork Properties
ICS 351: Today's plan
ICS 351: Today's plan Quiz, on overall Internet function, linux and IOS commands, network monitoring, protocols IPv4 addresses: network part and host part address masks IP interface configuration IPv6
Configuring Static and Dynamic NAT Translation
This chapter contains the following sections: Network Address Translation Overview, page 1 Information About Static NAT, page 2 Dynamic NAT Overview, page 3 Timeout Mechanisms, page 4 NAT Inside and Outside
Scaling the Network: Subnetting and Other Protocols. Networking CS 3470, Section 1
Scaling the Network: Subnetting and Other Protocols Networking CS 3470, Section 1 Today CIDR Subnetting Private IP addresses ICMP, IMAP, and DHCP Protocols 2 Packet Encapsulation ** Creative Commons: http://en.wikipedia.org/wiki/file:udp_encapsulation.svg
Secured Data Transmissions In Manet Using Neighbor Position Verfication Protocol
www.ijecs.in International Journal Of Engineering And Computer Science ISSN:2319-7242 Volume 3 Issue3 March, 2014 Page No. 5067-5071 Secured Data Transmissions In Manet Using Neighbor Position Verfication
Computer Network. Interconnected collection of autonomous computers that are able to exchange information
Introduction Computer Network. Interconnected collection of autonomous computers that are able to exchange information No master/slave relationship between the computers in the network Data Communications.
Comparison of RIP, EIGRP, OSPF, IGRP Routing Protocols in Wireless Local Area Network (WLAN) By Using OPNET Simulator Tool - A Practical Approach
Comparison of RIP, EIGRP, OSPF, IGRP Routing Protocols in Wireless Local Area Network (WLAN) By Using OPNET Simulator Tool - A Practical Approach U. Dillibabau 1, Akshay 2, M. Lorate Shiny 3 UG Scholars,
Position and Velocity Aided Routing Protocol in Mobile Ad Hoc Networks
Position and Velocity Aided Routing Protocol in Mobile Ad Hoc Networks 1 Taifei Zhao, 2 Xizheng Ke, 3 Peilin Yang *1,Corresponding Author Department of Electronics Engineering, Xi an University of Technology,
Configuring TCP Intercept (Preventing Denial-of-Service Attacks)
Configuring TCP Intercept (Preventing Denial-of-Service Attacks) This chapter describes how to configure your router to protect TCP servers from TCP SYN-flooding attacks, a type of denial-of-service attack.
Ethernet. Ethernet. Network Devices
Ethernet Babak Kia Adjunct Professor Boston University College of Engineering ENG SC757 - Advanced Microprocessor Design Ethernet Ethernet is a term used to refer to a diverse set of frame based networking
8.2 The Internet Protocol
TCP/IP Protocol Suite HTTP SMTP DNS RTP Distributed applications Reliable stream service TCP UDP User datagram service Best-effort connectionless packet transfer Network Interface 1 IP Network Interface
DSR: The Dynamic Source Routing Protocol for Multi-Hop Wireless Ad Hoc Networks
DSR: The Dynamic Source Routing Protocol for Multi-Hop Wireless Ad Hoc Networks David B. Johnson David A. Maltz Josh Broch Computer Science Department Carnegie Mellon University Pittsburgh, PA 15213-3891
Efficient Detection of Ddos Attacks by Entropy Variation
IOSR Journal of Computer Engineering (IOSRJCE) ISSN: 2278-0661, ISBN: 2278-8727 Volume 7, Issue 1 (Nov-Dec. 2012), PP 13-18 Efficient Detection of Ddos Attacks by Entropy Variation 1 V.Sus hma R eddy,
Study of Network Characteristics Incorporating Different Routing Protocols
Study of Network Characteristics Incorporating Different Routing Protocols Sumitpal Kaur #, Hardeep S Ryait *, Manpreet Kaur # # M. Tech Student, Department of Electronics and Comm. Engineering, Punjab
IP Addressing. IP Addresses. Introductory material.
IP Addressing Introductory material. An entire module devoted to IP addresses. IP Addresses Structure of an IP address Classful IP addresses Limitations and problems with classful IP addresses Subnetting
Zarząd (7 osób) F inanse (13 osób) M arketing (7 osób) S przedaż (16 osób) K adry (15 osób)
QUESTION NO: 8 David, your TestKing trainee, asks you about basic characteristics of switches and hubs for network connectivity. What should you tell him? A. Switches take less time to process frames than
Computer Networks. Chapter 5 Transport Protocols
Computer Networks Chapter 5 Transport Protocols Transport Protocol Provides end-to-end transport Hides the network details Transport protocol or service (TS) offers: Different types of services QoS Data
Security Threats in Mobile Ad Hoc Networks
Security Threats in Mobile Ad Hoc Networks Hande Bakiler, Aysel Şafak Department of Electrical & Electronics Engineering Baskent University Ankara, Turkey [email protected], [email protected]
TCP/IP works on 3 types of services (cont.): TCP/IP protocols are divided into three categories:
Due to the number of hardware possibilities for a network, there must be a set of rules for how data should be transmitted across the connection media. A protocol defines how the network devices and computers
IPv6 Diagnostic and Troubleshooting
8 IPv6 Diagnostic and Troubleshooting Contents Introduction.................................................. 8-2 ICMP Rate-Limiting........................................... 8-2 Ping for IPv6 (Ping6)..........................................
Chapter 2 TCP/IP Networking Basics
Chapter 2 TCP/IP Networking Basics A network in your home or small business uses the same type of TCP/IP networking that is used for the Internet. This manual provides an overview of IP (Internet Protocol)
CCNA Tutorial Series SUBNETTING
CCNA Tutorial Series This document contains the Course Map For The Interactive flash tutorial at: http://www.semsim.com/ccna/tutorial/subnetting/subnetting.html HOME PAGE Course Objectives Pre-test By
Introduction to LAN/WAN. Network Layer
Introduction to LAN/WAN Network Layer Topics Introduction (5-5.1) Routing (5.2) (The core) Internetworking (5.5) Congestion Control (5.3) Network Layer Design Isues Store-and-Forward Packet Switching Services
Simulating Fixed Virtual Nodes for Adapting Wireline Protocols to MANET
Simulating Fixed Virtual Nodes for Adapting Wireline Protocols to MANET Jiang Wu #1, Nancy Griffeth #2, Nancy Lynch 3, Calvin Newport 4, Ralph Droms 5 # City University of New York Massachusetts Institute
Detecting rogue systems
Product Guide Revision A McAfee Rogue System Detection 4.7.1 For use with epolicy Orchestrator 4.6.3-5.0.0 Software Detecting rogue systems Unprotected systems, referred to as rogue systems, are often
PERFORMANCE STUDY AND SIMULATION OF AN ANYCAST PROTOCOL FOR WIRELESS MOBILE AD HOC NETWORKS
PERFORMANCE STUDY AND SIMULATION OF AN ANYCAST PROTOCOL FOR WIRELESS MOBILE AD HOC NETWORKS Reza Azizi Engineering Department, Bojnourd Branch, Islamic Azad University, Bojnourd, Iran [email protected]
Performance Comparison of AODV, DSDV, DSR and TORA Routing Protocols in MANETs
International Research Journal of Applied and Basic Sciences. Vol., 3 (7), 1429-1436, 2012 Available online at http:// www. irjabs.com ISSN 2251-838X 2012 Performance Comparison of AODV, DSDV, DSR and
