Unit-Iii MC
Unit-Iii MC
Unit-Iii MC
This page compares LAN vs PAN and mentions difference between LAN and PAN. LAN stands for Local
Area Network. PAN stands for Personal Area Network.
As mentioned LAN is the short form of Local Area Network. It is basically a communication network
which interconnects devices such as PCs, Laptops, Smartphones, tablets et. to exchange information.
LAN are of two types viz. wired and wireless. In wired LAN, devices are connected using ethernet cables
and all are wired onto ethernet Hub or Switch. In wireless LAN, devices are connected using radio
frequency waves which are electromagnetic waves. There are different bands of WLAN viz. 2.4 GHz, 5
GHz etc. WLAN have been as IEEE 802.11 family of protocols viz. 11a, 11b, 11g, 11n, 11ac, 11ad etc.
Refer WLAN tutorial➤.
As mentioned PAN is the short form of Personal Area Network. It is a network which connects devices
within small range typically on the order of 10 to 100 meters. Device in one PAN network can establish
connection with another device in other PAN network when in the range.
All the short range wireless technologies fall under PAN viz. Bluetooth, Zigbee, Zwave, Infrared etc. It is
mainly designed and developed for low data rate monitoring and control applications. PAN wireless
technologies have become very popular in IoT (Internet of things) networks.
Following are the characeteristics of PAN:
• Short range
• have both star and mesh architecture
• mainly used for low data rate applications in home automation, bluetooth is used for data transfer
between devices .
• Widely adopted in IoT (Internet of Things)
Following table compares LAN and PAN with respect to many useful system parameters. It also provides
links to various wireless LAN and wireless PAN technologies.
IEEE 802.11 is part of the IEEE 802 set of local area network (LAN) technical standards, and specifies the
set of media access control (MAC) and physical layer (PHY) protocols for implementing wireless local
area network (WLAN) computer communication.
IEEE 802 is a collection of networking standards that cover the physical and data link layer specifications
for technologies such as Ethernet and wireless. These specifications apply to local area networks (LANs)
and metropolitan area networks (MANs). IEEE 802 also aids in ensuring multivendor interoperability by
promoting standards for vendors to follow.
Essentially, the IEEE 802 standards help make sure internet services and technologies follow a set of
recommended practices so that network devices can all work together smoothly.
IEEE 802 is divided into different parts that cover the physical and data link aspects of networking. The
family of standards is developed and maintained by the Institute of Electrical and Electronics Engineers
(IEEE) 802 LAN/MAN Standards Committee, also called the LMSC.
The set of standards started in 1979 with a proposed standard called Local Network for Computer
Interconnection, which was approved a year later. The LMSC has made more than 70 standards for IEEE
802.
Some commonly used standards include those for Ethernet, bridging and virtual bridged LANs, wireless
LANs, wireless MANs, wireless personal area networks (PANs) and radio access networks, as well as
media independent handover services.
Individual working groups are decided on and assigned to each area so that each segment receives an
acceptable amount of focus. IEEE 802 specifications also split the data link layer into two different layers
-- a logical link control layer and a media access control (MAC) layer.
LMSC provides a PDF of standards for up to six months after they have been published. All standards
stay in place until they are replaced with another document or withdrawn.
LMSC was formed in 1980 to standardize network protocols and provide a path to make compatible
devices across numerous industries.
Without these standards, equipment suppliers could manufacture network hardware that would only
connect to certain computers. It would be much more difficult to connect to systems not using the same
set of networking equipment. Standardizing protocols helps ensure multiple types of devices can
connect to multiple network types. It also helps make sure network management isn't the challenge it
could be if standards weren't in place.
IEEE 802 also coordinates with other international standards, such as the International Organization for
Standardization or ISO, to help maintain international standards.
The 802 in IEEE 802 does not stand for anything of significance; 802 was the next numbered project.
Commercial organizations can use the IEEE 802 specifications to ensure their products maintain any
newly specified standards. So, for example, the 802.11 specification that applies to Wi-Fi could be used
to make sure Wi-Fi devices work together under one standard. In the same way, IEEE 802 can help
maintain LAN standards.
These specifications also define what connectivity infrastructure will be used for -- individual networks
or those at a larger organizational scale.
The IEEE 802 specifications apply to hardware and software products. So that manufacturers don't have
any input on the standards, there is a voting protocol in place. This ensures one organization does not
influence the standards too much.
Working groups
The working groups are the different areas of focus within the 802 specifications. They are numbered
from 802.1 onward.
Group.
802.11 Wi-Fi Wireless LAN MAC and physical layer specification. 802.11a, b,
g, ax, etc., are amendments to the original 802.11 standard.
Products that implement 802.11 standards must pass tests
and are referred to as Wi-Fi certified.
802.15 Wireless PANs Communications specification for wireless PANs that IEEE
approved in early 2002
802.15.1 Bluetooth Short-range (10 meters) wireless technology used for cordless
mouse, keyboard and wireless headphones at 2.4 GHz
802 Overview Basics of physical and logical networking concepts
802.18 Radio Supports IEEE 802 LMSC and IEEE 802 wireless working
Regulatory groups. Actively participates in and monitors radio regulatory
Technical matters.
Advisory Group
802.24 Vertical Focused on application categories that use IEEE 802 standards
Applications or multiple working groups. For these, 802.24 acts as a point
Technical of contact with other organizations focused on other IEEE 802
Advisory Group standards. 802.24 can also serve as a resource for
understanding the IEEE 802 standards by providing white
papers and other documents.
WiFi:
WiFi stands for Wireless Fidelity. WiFi uses Radio waves to provide wireless high-speed internet and
network connections. A WiFi connection is established using a wireless adapter to create hotspots. WiFi
antennas size is small enough to be placed on a very small router. WiFi can be used to connect with a
printer, computers, gaming consoles, and many more.
WiMAX:
WiMAX stands for Wireless Inter-operability for Microwave Access. WiMAX uses licensed or unlicensed
spectrum to deliver the connection to the network. WiMAX handles a larger inter-operable network.
WiMAX can be used to provide internet services such as mobile data and WiFi spots.
The WiFi network range is around WiMAX network can reach about 50-
4. Distance 100 meters. 90 km.
10. Usage WiFi is utilized for domestic use and WiMAX supports a broader
S.
No. Parameters WiFi WiMax
Bluetooth is universal for short-range wireless voice and data communication. It is a Wireless Personal
Area Network (WPAN) technology and is used for exchanging data over smaller distances. This
technology was invented by Ericson in 1994. It operates in the unlicensed, industrial, scientific, and
medical (ISM) band from 2.4 GHz to 2.485 GHz. Maximum devices that can be connected at the same
time are 7. Bluetooth ranges up to 10 meters. It provides data rates up to 1 Mbps or 3 Mbps depending
upon the version. The spreading technique that it uses is FHSS (Frequency-hopping spread spectrum). A
Bluetooth network is called a piconet and a collection of interconnected piconets is called scatternet.
What is Bluetooth?
Bluetooth simply follows the principle of transmitting and receiving data using radio waves. It can be
paired with the other device which has also Bluetooth but it should be within the estimated
communication range to connect. When two devices start to share data, they form a network called
piconet which can further accommodate more than five devices.
Bluetooth is Wireless.
Bluetooth is cable replacement technology that can be used to connect almost any device to any
other device.
Bluetooth Architecture:
1. Piconet
2. Scatternet
Piconet:
Piconet is a type of Bluetooth network that contains one primary node called the master node
and seven active secondary nodes called slave nodes. Thus, we can say that there is a total of 8 active
nodes which are present at a distance of 10 meters. The communication between the primary and
secondary nodes can be one-to-one or one-to-many. Possible communication is only between the
master and slave; Slave-slave communication is not possible. It also has 255 parked nodes, these are
secondary nodes and cannot take participation in communication unless it gets converted to the active
state.
Scatternet:
It is formed by using various piconets. A slave that is present in one piconet can act as master or we can
say primary in another piconet. This kind of node can receive a message from a master in one piconet
and deliver the message to its slave in the other piconet where it is acting as a master. This type of node
is referred to as a bridge node. A station cannot be mastered in two piconets.
2. Baseband Link layer: The baseband is the digital engine of a Bluetooth system and is equivalent
to the MAC sublayer in LANs. It performs the connection establishment within a piconet,
addressing, packet format, timing and power control.
3. Link Manager protocol layer: It performs the management of the already established links
which includes authentication and encryption processes. It is responsible for creating the links,
monitoring their health, and terminating them gracefully upon command or failure.
4. Logical Link Control and Adaption (L2CAP) Protocol layer: It is also known as the heart of the
Bluetooth protocol stack. It allows the communication between upper and lower layers of the
Bluetooth protocol stack. It packages the data packets received from upper layers into the form
expected by lower layers. It also performs segmentation and multiplexing.
5. Service Discovery Protocol (SDP) layer: It is short for Service Discovery Protocol. It allows
discovering the services available on another Bluetooth-enabled device.
6. RF comm layer: It is a cabal replacement protocol. It is short for Radio Frontend Component. It
provides a serial interface with WAP and OBEX. It also provides emulation of serial ports over
the logical link control and adaption protocol(L2CAP). The protocol is based on the ETSI standard
TS 07.10.
8. WAP: It is short for Wireless Access Protocol. It is used for internet access.
9. TCS: It is short for Telephony Control Protocol. It provides telephony service. The basic function
of this layer is call control (setup & release) and group management for the gateway serving
multiple devices.
10. Application layer: It enables the user to interact with the application.
Types of Bluetooth
Various types of Bluetooth are available in the market nowadays. Let us look at them.
In-Car Headset: One can make calls from the car speaker system without the use of mobile
phones.
Webcam: One can link the camera with the help of Bluetooth with their laptop or phone.
Bluetooth-equipped Printer: The printer can be used when connected via Bluetooth with mobile
phone or laptop.
Bluetooth Global Positioning System (GPS): To use GPS in cars, one can connect their phone with
car system via Bluetooth to fetch the directions of the address.
Advantage:
Disadvantages:
Applications:
It can be used in laptops, and in wireless PCs, printers.
It can transfer data in terms of videos, songs, photographs, or files from one cell phone to
another cell phone or computer.
It is used in the sectors of Medical health care, sports and fitness, Military.
IEEE 802.11:
IEEE 802.11 is a set of media access control (MAC) and physical layer (PHY) specifications for
implementing wireless local area network(WLAN) computer communication in the 900 MHz
and 2.4, 3.6, 5, and 60 GHz frequency bands
The IEEE developed an international standard for WLANs. The 802.11 standard focuses on the
bottom two layers of the OSI model, the physical layer (PHY) and data link layer (DLL).
The objective of the IEEE 802.11 standard was to define a medium access control (MAC)
sublayer, MAC management protocols and services, and three PHYs for wireless connectivity
of fixed, portable, and moving devices within a local area.
The three physical layers are an IR base band PHY, an FHSS radio in the 2.4 GHz band, and a
DSSS radio in the 2.4 GHz.
IEEE 802.11 Architecture:
The architecture of the IEEE 802.11 WLAN is designed to support a network where most
decision making is distributed to mobile stations. This type of architecture has several
advantages. It is tolerant of faults in all of the WLAN equipment and eliminates possible
bottlenecks a centralized architecture would introduce. The architecture is flexible and can
easily support both small, transient networks and large, semipermanent or permanent
networks. In addition, the architecture and protocols offer significant power saving and
prolong the battery life of mobile equipment without losing network connectivity
Two network architectures are defined in the IEEE 802.11 standard:
Infrastructure network: An infrastructure network is the network architecture for
providing communication between wireless clients and wired network resources. The
transition of data from the wireless to wired medium occurs via an AP. An AP and its
associated wireless clients define the coverage area. Together all the devices form a
basic service set (refer figure 1).
Point-to-point (ad-hoc) network: An ad-hoc network is the architecture that is used
to support mutual communication between wireless clients. Typically, an ad-hoc
network is created spontaneously and does not support access to wired networks. An
ad-hoc network does not require an AP.
IEEE 802.11 supports three basic topologies for WLANs, the independent basic service set
(IBSS), the basic service set, and the extended service set (ESS). The MAC layer supports
implementations of IBSS, basic service set, and ESS configurations.
Independent basic service set: The IBSS configuration is referred to as an independent
configuration or an ad-hoc network. An IBSS configuration is analogous to a peer-to-peer
office network in which no single node is required to act as a server. IBSS WLANs include a
number of nodes or wireless stations that communicate directly with one another on an ad-
hoc, peer-to-peer basis. Generally, IBSS implementations cover a limited area and are not
connected to any large network. An IBSS is typically a short-lived network, with a small
number of stations, that is created for a particular purpose.
Basic service set: The basic service set configuration relies on an AP that acts as the logical
server for a single WLAN cell or channel. Communications between station 1 and station 4
actually flow from station 1 to AP1 and then from AP1 to AP2 and then from AP2 to AP4 and
finally AP4 to station 4 (refer to Figure 2). An AP performs a bridging function and connects
multiple WLAN cells or channels, and connects WLAN cells to a wired enterprise LAN.
Extended service set: The ESS configuration consists of multiple basic service set cells that
can be linked by either wired or wireless backbones called a distributed system. IEEE 802.11
supports ESS configurations in which multiple cells use the same channel to boost aggregate
through put to network. The equipment outside of the ESS, the ESS and all of its mobile
stations appear to be a single MAC layer network where all stations are physically stationary.
Thus, the ESS hides the mobility of the mobile stations from everything outside the ESS (refer
figure 1).
The following sections define the station and distribution system services.
Station Services
The 802.11 standard defines services for providing functions among stations. A station may be within any
wireless element on the network, such as a handheld PC or handheld scanner. In addition, all access points
implement station services. To provide necessary functionality, these stations need to send and receive
MSDUs and implement adequate levels of security.
Authentication
Because wireless LANs have limited physical security to prevent unauthorized access, 802.11 defines
authentication services to control LAN access to a level equal to a wired link. Every 802.11 station, whether
part of an independent BSS or an ESS network, must use the authentication service prior to establishing a
connection (referred to as an association in 802.11 terms) with another station with which it will communicate.
Stations performing authentication send a unicast management authentication frame to the corresponding
station.
The IEEE 802.11 standard defines the following two authentication services:
Shared key authentication This type of authentication assumes that each station has received
a secret shared key through a secure channel independent from the 802.11 network. Stations
authenticate through shared knowledge of the secret key. Use of shared key authentication
requires implementation of the Wired Equivalent Privacy algorithm (WEP).
Deauthentication
When a station wants to disassociate from another station, it invokes the deauthentication service.
Deauthentication is a notification and cannot be refused. A station performs deauthentication by sending an
authentication management frame (or group of frames to multiple stations) to advise of the termination of
authentication.
Privacy
With a wireless network, all stations and other devices can hear data traffic taking place within range on the
network, seriously affecting the security level of a wireless link. IEEE 802.11 counters this problem by offering a
privacy service option that raises the security level of the 802.11 network to that of a wired network.
The privacy service, applying to all data frames and some authentication management frames, is based on the
802.11 Wired Equivalent Privacy (WEP) algorithm that significantly reduces risks if someone eavesdrops on
the network. This algorithm performs encryption of messages, as shown in Figure 3.9. With WEP, all stations
initially start unencrypted. Refer to the section "Private Frame Transmissions," in Chapter 4, "IEEE 802.11
Medium Access Control (MAC) Layer," for a description of how WEP works.
Figure 3.9 The Wired Equivalent Privacy (WEP) algorithm produces ciphertext, keeping eavesdroppers
from listening in on data transmissions.
NOTE
The WEP protects RF data transmissions using a 64-bit seed key and the RC4 encryption algorithm. When
enabled, WEC protects only the data packet information. Physical layer headers are left unencrypted so that all
stations can properly receive control information for managing the network. Some companies today are offering
128-bit encryption.
Association
Each station must initially invoke the association service with an access point before it can send information
through a distribution system. The association maps a station to the distribution system via an access point.
Each station can associate with only a single access point, but each access point can associate with multiple
stations. Association is also a first step to providing the capability for a station to be mobile between BSSs.
Disassociation
A station or access point may invoke the disassociation service to terminate an existing association. This
service is a notification; therefore, neither party may refuse termination. Stations should disassociate when
leaving the network. An access point, for example, may disassociate all its stations if being removed for
maintenance.
Distribution
A station uses the distribution service every time it sends MAC frames across a distribution system. The 802.11
standard does not specify how the distribution system delivers the data. The distribution service provides the
distribution system with only enough information to determine the proper destination BSS.
Integration
The integration service enables the delivery of MAC frames through a portal between a distribution system and
a non-802.11 LAN. The integration function performs all required media or address space translations. The
details of an integration function depend on the distribution system implementation and are beyond the scope
of the 802.11 standard.
Reassociation
The reassociation service enables a station to change its current state of association. Reassociation provides
additional functionality to support BSS-transition mobility for associated stations. The reassociation service
enables a station to change its association from one access point to another. This keeps the distribution system
informed of the current mapping between access point and station as the station moves from one BSS to
another within an ESS. Reassociation also enables changing association attributes of an established
association while the station remains associated with the same access point. The mobile station always
initiates the reassociation service.
NOTE
IEEE 802.11 allows a client to roam among multiple access points that may be operating on the same or
separate channels. To support the roaming function, each access point typically transmits a beacon signal
every 100ms. Roaming stations use the beacon to gauge the strength of their existing access point connection.
If the station senses a weak signal, the roaming station can implement the reassociation service to connect to
an access point emitting a stronger signal.
A grocery store in Gulf Port, Mississippi, has a bar code–based shelf inventory system that helps the owners of
the store keep track of what to stock, order, and so on. Several of the store clerks use handheld scanners
during the store's closed hours to perform inventory functions. The store has a multiple-cell 802.11-compliant
wireless LAN (ESS) consisting of access points A and B interconnected by an ethernet network. These two
access points are sufficient to cover the store's entire floor space and backroom.
In the frozen meat section at one end of the store, a clerk using a handheld device may associate with access
point A. As he walks with the device to the beer and wine section on the other end of the store, the mobile
scanner (that is, the 802.11 station within the scanner) will begin sensing a signal from access point B. As the
signal from B becomes stronger, the station will then reassociate with access point B, offering a much better
signal for transmitting MSDUs.
NOTE
Point Coordination Function (PCF) Implemented in the access point and (in addition to the
mandatory DCF) provides delivery of time-bounded data via synchronous communications
using station-polling mechanisms.
Contention-Free Pollable Implemented in an independent station to enable time-bounded data
transfers defined in the PCF.
Wired Equivalent Privacy (WEP) Provides frame transmission privacy similar to a wired
network by generating secret shared encryption keys for source and destination stations.
Multiple Outstanding MSDUs An option that restricts the number of outstanding MSDUs to
one in order to avoid reordering or unnecessarily discarding MSDUs between two LLCs.
NOTE
When two peer LLCs communicate over a network through the MAC and PHY layers, the capability to transmit
multiple MSDUs (packets) and the presence of finite propagation delay make it possible for stations to reorder
or unnecessarily discard the MSDUs. This problem becomes more significant as propagation delay or data rate
increases because of the capability to have a greater number of outstanding MSDUs. Because of the higher
potential data rates of 802.11a and the high potential for outdoor implementations, companies are likely to need
the multiple outstanding MSDU option in 802.11 MAC software.
NOTE
Most end users of 802.11 and 802.11b radio cards and access points choose not to implement WEP. However,
the transmission of unprotected data outdoors offers a greater risk than within a closed facility such as an office
building. It is very likely that the high demand today for implementing wireless metropolitan networks will drive a
significant need for information security mechanisms.
The following types of functions can occur within each class of frame:
Class 1 Frames
Control frames
Acknowledgment (ACK)
Contention-free (CF)
Management frames
Probe request/response
Beacon
Authentication
Deauthentication
Data frames
Class 2 Frames
Management Frames
Association request/response
Reassociation request/response
Disassociation
Class 3 Frames
Data frames
Management frames
Deauthentication
Control frames
To keep track of station state, each station maintains the following two state variables:
The GSM network is divided into three major systems: the switching system (SS), the base station
system (BSS), and the operation and support system (OSS).
GSM automates and encodes the information before transmitting it via a channel including three distinct
streams of user information inside each time slot. For the vast majority of the world, it is also the leading
2G digital cell phone standard. It governs how cell phones interact with the land-based tower system
To enable seamless internet access, Wireless Application Protocol (WAP) was needed. It emerged in
1999. The key characteristics of GPRS are speed, instant data connections -- depending on the signal
strength and coverage -- and the facilitation of mobile application development.
Two types of services are provided by GPRS: Point-to-point (PTP) Point-to-multipoint (PTM)
Disadvantages
The data rates are slower when compared to the latest technologies.
Networks can be affected when more GPRS users are at the same location.
All the databases involved in the network will require software upgrades to handle the new call models
and functions introduced by GPRS.
Routing Area.
Features.
Air interfaces.
Core network.
The Gateway GPRS Support Node (GGSN) was the central element within the UMTS packet switched
network. It handled inter-working between the UMTS packet switched network and external packet
switched networks, and could be considered as a very sophisticated router
Universal Mobile Telecommunications Service, known in the cellular industry as UMTS, is a 3G cellular
radio technology based on the Code Division Multiple Access (CDMA) network standard.
It consists of three protocol layers as illustrated in Figure 9: Physical layer (layer #1), Data link layer
(layer #2, lower part is called MAC and upper part is RLC), and Network layer (Layer#3, lower part is
called RRC).
Features of UMTS
It gives transmission of content, digitized voice, video and multimedia. It gives tall transmission capacity
to portable operators. It gives a tall information rate of 2Mbps. For High-Speed Downlink Parcel Get to
(HSDPA) handsets, the data-rate is as tall as 7.2 Mbps within the downlink connection
14 What are the 5 types of security?
Image result
Application security.
Network security.
Cloud security.
UNIT-IV
Terminologies:
1. Mobile Node (MN) is the hand-held communication device that the user carries e.g. Cell phone.
2. Home Network is a network to which the mobile node originally belongs as per its assigned IP
address (home address).
3. Home Agent (HA) is a router in-home network to which the mobile node was originally
connected
4. Home Address is the permanent IP address assigned to the mobile node (within its home
network).
5. Foreign Network is the current network to which the mobile node is visiting (away from its
home network).
6. Foreign Agent (FA) is a router in a foreign network to which the mobile node is currently
connected. The packets from the home agent are sent to the foreign agent which delivers them
to the mobile node.
7. Correspondent Node (CN) is a device on the internet communicating to the mobile node.
8. Care-of Address (COA) is the temporary address used by a mobile node while it is moving away
from its home network.
9. Foreign agent COA, the COA could be located at the FA, i.e., the COA is an IP address of the FA.
The FA is the tunnel end-point and forwards packets to the MN. Many MN using the FA can
share this COA as a common COA.
10. Co-located COA, the COA is co-located if the MN temporarily acquired an additional IP address
which acts as COA. This address is now topologically correct, and the tunnel endpoint is at the
MN. Co-located addresses can be acquired using services such as DHCP.
Mobile IP
Working:
The correspondent node sends the data to the mobile node. Data packets contain the correspondent
node’s address (Source) and home address (Destination). Packets reach the home agent. But now
mobile node is not in the home network, it has moved into the foreign network. The foreign agent sends
the care-of-address to the home agent to which all the packets should be sent. Now, a tunnel will be
established between the home agent and the foreign agent by the process of tunneling.
Tunneling establishes a virtual pipe for the packets available between a tunnel entry and an endpoint. It
is the process of sending a packet via a tunnel and it is achieved by a mechanism called encapsulation.
Now, the home agent encapsulates the data packets into new packets in which the source address is the
home address and destination is the care-of-address and sends it through the tunnel to the foreign
agent. Foreign agent, on another side of the tunnel, receives the data packets, decapsulates them, and
sends them to the mobile node. The mobile node in response to the data packets received sends a reply
in response to the foreign agent. The foreign agent directly sends the reply to the correspondent node.
2. Agent Registration: Mobile node after discovering the foreign agent sends a registration request
(RREQ) to the foreign agent. The foreign agent, in turn, sends the registration request to the
home agent with the care-of-address. The home agent sends a registration reply (RREP) to the
foreign agent. Then it forwards the registration reply to the mobile node and completes the
process of registration.
3. Tunneling: It establishes a virtual pipe for the packets available between a tunnel entry and an
endpoint. It is the process of sending a packet via a tunnel and it is achieved by a mechanism
called encapsulation. It takes place to forward an IP datagram from the home agent to the care-
of-address. Whenever the home agent receives a packet from the correspondent node, it
encapsulates the packet with source address as home address and destination as care-of-
address.
The route optimization adds a conceptual data structure, the binding cache, to the correspondent node.
The binding cache contains bindings for the mobile node’s home address and its current care-of-
address. Every time the home agent receives an IP datagram that is destined to a mobile node currently
away from the home network, it sends a binding update to the correspondent node to update the
information in the correspondent node’s binding cache. After this, the correspondent node can directly
tunnel packets to the mobile node. Mobile IP is provided by the network providers.
Dynamic Host Configuration Protocol(DHCP) is an application layer protocol which is used to provide:
4. Vendor Class Identifier (Option 43 – e.g., ‘unifi’ = 192.168.1.9 ##where unifi = controller)
DHCP is based on a client-server model and based on discovery, offer, request, and ACK.
DHCP port number for server is 67 and for the client is 68. It is a Client server protocol which uses UDP
services. IP address is assigned from a pool of addresses. In DHCP, the client and the server exchange
mainly 4 DHCP messages in order to make a connection, also called DORA process, but there are 8 DHCP
messages in the process.
1. As shown in the figure, source MAC address (client PC) is 08002B2EAF2A, destination MAC
address(server) is FFFFFFFFFFFF, source IP address is 0.0.0.0(because PC has no IP address till
now) and destination IP address is 255.255.255.255 (IP address used for broadcasting). As the
discover message is broadcast to find out the DHCP server or servers in the network therefore
broadcast IP address and MAC address is used.
1. Now, for the offer message, source IP address is 172.16.32.12 (server’s IP address in the
example), destination IP address is 255.255.255.255 (broadcast IP address) ,source MAC address
is 00AA00123456, destination MAC address is FFFFFFFFFFFF. Here, the offer message is
broadcast by the DHCP server therefore destination IP address is broadcast IP address and
destination MAC address is FFFFFFFFFFFF and the source IP address is server IP address and
MAC address is server MAC address.
Also the server has provided the offered IP address 192.16.32.51 and lease time of 72 hours(after this
time the entry of host will be erased from the server automatically) . Also the client identifier is PC MAC
address (08002B2EAF2A) for all the messages.
1. Now, the request message is broadcast by the client PC therefore source IP address is 0.0.0.0(as
the client has no IP right now) and destination IP address is 255.255.255.255 (broadcast IP
address) and source MAC address is 08002B2EAF2A (PC MAC address) and destination MAC
address is FFFFFFFFFFFF.
Note – This message is broadcast after the ARP request broadcast by the PC to find out whether any
other host is not using that offered IP. If there is no reply, then the client host broadcast the DHCP
request message for the server showing the acceptance of IP address and Other TCP/IP Configuration.
1. Now the server will make an entry of the client host with the offered IP address and lease time.
This IP address will not be provided by server to any other host. The destination MAC address is
FFFFFFFFFFFF and the destination IP address is 255.255.255.255 and the source IP address is
172.16.32.12 and the source MAC address is 00AA00123456 (server MAC address).
3. DHCP decline –
If DHCP client determines the offered configuration parameters are different or invalid, it sends
DHCP decline message to the server .When there is a reply to the gratuitous ARP by any host to
the client, the client sends DHCP decline message to the server showing the offered IP address is
already in use.
4. DHCP release –
A DHCP client sends DHCP release packet to server to release IP address and cancel any
remaining lease time.
5. DHCP inform –
If a client address has obtained IP address manually then the client uses a DHCP inform to obtain
other local configuration parameters, such as domain name. In reply to the dhcp inform
message, DHCP server generates DHCP ack message with local configuration suitable for the
client without allocating a new IP address. This DHCP ack message is unicast to the client.
Note – All the messages can be unicast also by dhcp relay agent if the server is present in different
network.
reuse of IP addresses reducing the total number of IP addresses that are required
simple reconfiguration of the IP address space on the DHCP server without needing to
reconfigure each client
The DHCP protocol gives the network administrator a method to configure the network from a
centralised area.
With the help of DHCP, easy handling of new users and reuse of IP address can be achieved.
Disadvantages – Disadvantage of using DHCP is:
References –
DHCP – help.ubnt
DHCP – docs.oracle
A MANET consists of a number of mobile devices that come together to form a network as needed,
without any support from any existing internet infrastructure or any other kind of fixed stations.
A MANET can be defined as an autonomous system of nodes or MSs(also serving as routers) connected
by wireless links, the union of which forms a communication network modeled in the form of an
arbitrary communication graph.
This is in contrast to the well-known single hop cellular network model that supports the needs of
wireless communication between two mobile nodes relies on the wired backbone and fixed base
stations.
In a MANET, no such infrastructure exists and network topology may be changed dynamically in an
unpredictable manner since nodes are free to move and each node has limiting transmitting power,
restricting access to the node only in the neighboring range.
MANETs are basically peer-to-peer, multi-hop wireless networks in which information packets are
transmitted in a store and forward manner from a source to an arbitrary destination, via intermediate
nodes as given in the figure:
For example, as MS2 in the figure changes its point of attachment from MS3 to MS4, other nodes that
are part of the network should use this new route to forward packets to MS2. In the figure, we assume
that it is not possible to have all nodes within each other's radio range. In case all nodes are closed by
within each other's radio range, there are no routing issues to be addressed.
In figures raise another issue, that of symmetric and asymmetric (bidirectional) and asymmetric
(unidirectional) links. Consider symmetric links with associative radio range; for example, if MS1 is within
radio range of MS3, then MS3 is also within radio range of MS1. The communication links are
symmetric. This assumption is not always valid because of differences in transmitting power levels and
the terrain. Routing in asymmetric networks is relatively hard task. In certain cases, it is possible to find
routes that exclude asymmetric links, since it is cumbersome to find the return path. The issue of
efficient is one of the several challenges encountered in a MANET.
The other issue is varying the mobility patterns of different nodes. Some other nodes are highly mobile,
while others are primarily stationary. It is difficult to predict a node's movement and direction of
movement and numerous studies have been performed to evaluate their performance using different
simulators.
Characteristics of MANET
Dynamic topologies: nodes are free to move arbitrarily; thus the network topology may be changed
randomly and unpredictably and primarily consists of bidirectional links. In some cases where the
transmission power of two nodes is different, a unidirectional link may exist.
Bandwidth-constrained and variable capacity links: wireless links continue to have significantly lower
capacity than infrastructure networks.
Energy-constrained operation: some or all of the MSs in a MANET may rely on batteries or other
exhaustible means for their energy. For these nodes or devices, the most important system design
optimization criteria may be energy conservation.
Limited physical security: MANETs are generally more prone to physical security threats than wire line
networks. The increased possibility of eavesdropping, spoofing, and denial of services (DoS) attacks
should be considered carefully. To reduce security threats, many existing link security techniques are
often applied within wireless networks.
Applications of MANET
Some specific applications of ad hoc networks include industrial and commercial applications involving
cooperative mobile data exchange. There are many existing and future military networking
requirements for robust, IP-compliant data services within mobile wireless communication networks,
with many of these networks consist of highly dynamic autonomous topology segments. Advanced
features of Mobile ad hoc networks, including data rates compatible with multimedia applications global
roaming capability, and coordination with other network structures are enabling new applications.
Defense applications: Many defense applications require on the fly communications set-up, and ad
hoc/sensor networks are excellent candidates for use in battlefield management.
Crisis management applications: These arise, for example, as a result of natural disasters in which the
entire communication infrastructure is in disarray. Restoring communications quickly is essential.
Telemedicine: The paramedic assisting the victim of a traffic accident in a remote location must access
medical records (e.g. X-rays) and may need video conference assistance from a surgeon for an
emergency intervention. In fact, the paramedic may need to instantaneously relay back to the hospital
the victim's X-rays and other diagnostic tests from the site of the accident.
Tele-geoprocessing application: The combination of GPS, GIS (Geographical Information Systems), and
high-capacity wireless mobile systems enables a new type of application referred to as tele- geo
processing.
Virtual Navigation: A remote database contains the graphical representation of building, streets, and
physical characteristics of a large metropolis. They may also "virtually" see the internal layout of
buildings, including an emergency rescue plan, or find possible points of interest.
Education via the internet: Educational opportunities available on the internet or remote areas because
of the economic infeasibility of providing expensive last-mile wire line internet access in these areas to
all subscribers.
Vehicular area network: This a growing and very useful application of adhoc network in providing
emergency services and other information. This is equally effective in both urban and rural setup. The
basic and exchange necessary data that is beneficial in a given situation.