MC Unit 4
MC Unit 4
MC Unit 4
4
Mobile Network Layer
This chapter introduces protocols and mechanisms developed for the network layer to
support mobility. Mobile IP adds mobility support to the internet network layer protocol IP. IP is
the common base for thousands of applications and runs over dozens of different networks. This
is the reason for supporting mobility at the IP layer. To merge the world of mobile phones with
the internet and to support mobility in the small more efficiently, so-called micro mobility
protocols have been developed. Another kind of mobility, portability of equipment, is supported
by the dynamic host configuration protocol (DHCP)
.
In former times, computers did not often change their location. Today, due to laptops
or notebooks, students show up at a university with their computers, and want to plug them in or
use wireless access. A network administrator does not want to configure dozens of computers
every day or hand out lists of valid IP addresses, DNS servers, subnet prefixes, default routers
etc. DHCP sets in at this point to support automatic configuration of computers. The chapter
concludes with a look at ad-hoc networks in combination with the network layer. This is a fast-
growing field of research with standards that are unclear as yet.
4.1Mobile IP
The following topic gives an overall view of Mobile IP, and the extensions needed for the
internet to support the mobility of hosts. A good reference for the original standard is Perkins
and Solomon which describe the development of mobile IP, all packet formats, mechanisms,
discussions of the protocol and alternatives etc. in detail. The new version of Mobile IP does not
involve major changes in the basic architecture but corrects some minor problems.
1) The receiver.
1. One solution to address the mobility problem is to assign a new topologically (analysis
sites) correct IP address to the moved system (i.e.,) when the system moves to a new location
implies assigning a new IP address.
Disadvantages:
Domain Name System is a table which has logical name and its equivalent IP address.
The main advantage is its quick reach ability. It has its own disadvantages. Such as The DNS
needs some time to update the table. If the nodes move often the table cannot be updated quickly
and it uses caching to improve scalability (quality).
2. When the IP address is changed while the TCP connection in open. It implies that the
connection is broken. The TCP connection is identified by (Source IP address, source post,
Destination IP address, Destination post). This is called socket pair. TCP cannot accept the
address changes. The mobile node informs all its partners about the changes in the IP address.
3. While it is theoretically possible to change routing tables all over the world to create
specific routes to a mobile node, this does not scale at all with the number of nodes in the
internet. Routers are built for extremely fast forwarding, but not for fast updates of routing
tables. Routers are the „brains‟ of the internet, holding the whole net together. No service
provider or system administrator would allow changes to the routing tables, probably sacrificing
stability, just to provide mobility for individual users.
4.1.2 Requirements
When the solutions did not work, a more general architecture had to be designed. Many
field trials and proprietary systems finally led to mobile IP as a standard to enable mobility in the
internet. Several requirements accompanied the development of the standard.
DEPARTMENT OF CSE 172 PREC
IT1403-MOBILE COMPUTING IV YEAR / VIII SEM
3. Scalability (quality) and Efficiency (ratio of the output): Of course the new mechanism
should not have its effect on efficiency. The mobile IP should be scalable over a large
number of participants in the internet, worldwide.
4. Security: All the messages should be authenticated in the minimum requirement. The IP
layer must make sure that the destined receiver alone receives the packet.
1. Mobile Node: Mobile node is an end system (or) router that can change its point of
attachment to the internet using mobile IP. The mobile node keeps its IP address and can
continuously communicate with any other system in the internet.
2. Correspondent Node: This is another end for communication. This node can be a fixed
node or mobile node.
3. Home Network: Home network is the subnet the mobile node belongs to with respect to
the IP address.
4. Foreign Network: Foreign Network is the current subnet the mobile node visits which is
not the home network.
5. Foreign Agent: The Foreign Agent provides services to the mobile node during its visit
to the foreign network. The foreign agent can have a COA Care Of Address acting as a
tunnel end point forwarding packets to the mobile node.
The Foreign Agent is the default router for the mobile network. The Foreign Agent also
gives security service. Foreign Agent is implemented on a router for the subnet the mobile
network attaches to care of address.
The COA defines the current location of the mobile node from the IP point of view. All
the packets sent to the mobile network are delivered to the COA, not to the IP address of the
mobile network.
The COA is the tunnel end point. The COA can be present in either of one location.
1. Foreign Agent COA: When the COA is present in FA, the COA is the IP address of FA.
FA is the tunnel end point and forwards the packet to Mobile Network. Many mobile
nodes using the FA can share this COA as common COA.
2. Co-located COA: The COA is co-located if the COA is present in the mobile node itself.
Here the Mobile Network temporarily acquires an additional IP address which acts as
COA. The tunnel end point is the Mobile Network itself. This method does not work well
in IPV4 due to the scarcity of addresses.
6. Home Agent : Home Agent is present in the home network itself. The Home Agent
provides services to the Mobile Network. Home Agent is the tunnel entry point. Home
Agent has a location registry. This registry informs the current location of the Mobile
Network with the help of current COA. The Home Agent can be present in
1. Router of the home network: This is the best position because all the packets for the
MN have to go through the router.
2. Arbitrary node in the subnet: The disadvantage is the double crossing of the router by
the packet, if the Mobile Network is in foreign networks. The packet comes via the
router, the HA sends the packet through the tunnel which crosses the router.
3. Router: Acts as a manager for Mobile Network belonging to the virtual home network.
Disadvantage is that all Mobile Network‟s are always in a foreign network.
The above figure shows a correspond node is connected via a router to the internet. There
are home net work and foreign network. Foreign Agent is implemented on the router of the
Foreign Network. The tunnel for the packet starts at the HA and ends at the Foreign Agent.
Foreign Agent has the COA for the Mobile Network.
Consider the following network. The following paragraph explains the packet
delivery to and from the Mobile Network.
When the correspondent node wants to send an IP packet to the MN. It transfers the
packet to its Router (device) and it does not need to know about the current location of the
Mobile Node.
Step 1: Correspondent Node sends the packet to the IP address of the Mobile Network, (i.e.,)
Correspond Node sends a packet with MN as destination address, to the router(the HA). The
Mobile IP is to support transparency to the packet in transferred to the home network of the
Mobile Node.
Step2: Home Agent receives and intercepts the packet .It knows that the MN is not in the Home
Network currently with the help of the registry .Hence the packet is not forwarded as usual. But
the packet is encapsulated (reduce in volume) and travelled to the COA.A new header is attached
which contains the Home Agent as the resource add and COA as the destination address
Step 3: The FA receives the packets, de -capsulate the packet and forwards the original packet to
the destination Mobile Node.
Step 4: The Mobile Node sends the packet as usual with its own fixed IP address as source and
Correspondent Node's address as destination.
The router with Foreign Agent acts as a default router and forwards the packet in the
same way as is would do for any other node. If Correspondence Node is a fixed node the
procedure is as usual. But if Correspondent Node is also a mobile node then the same procedure
as that of Mobile Node to CN should be followed
When the MN moves to a Foreign Network it needs the support of Foreign Agent. To
identify the FA mobile IP suggests two methods.
1. Agent Advertisement.
2. Agent Solicitation.
4.1.5.1 Agent Advertisement
In this method the HA and Foreign Agent advertise periodically the "Agent advertisement
messages". These messages are sent as beacon broadcast to the subnet. To advertise ICMP
(Internet Control Message Protocol) are used.
The agent advertisement packet follows RFC 1256 standard plus mobility extension. The
packets have the following structure in Figure 4.3.
The upper part represents the ICMP packet, the lower part is the extension needed for
mobility. The TTL field of IP packet is =1 for all advertisements to avoid forwarding. IP
destination address for advertisement is 224.0.0.1 the multicast address (or) 255.255.255.255 the
broadcast address.
If no agent advertisements are present (or) Inter Arrival time is too high, and mobile
Node has not received a COA by any other means, the Mobile Node must send "agent
Solicitation".
A mobile Node can send out 3 solicitations, One-per second, as soon as it enters new
networks. In highly dynamic networks, the Mobile Node's are moving, and the application
receives continuous packets in one second interval between solicitation will be too long. Before
the Mobile Node gets ends new address many packets will be lost. If the node does not receive
an answer it must decrease the rate of solicitation exponentially to avoid flooding.
After either advertisements (or) Solicitation the Mobile Node receives a COA. The
next step is the registration with HA if Mobile Node is in foreign networks.
4.1.6 Registration
After receiving a COA the mobile node has to register with HA. The function of
registration is to inform the HA the current location for forward of packets. Two ways of
registration depending upon the location of the COA.
4.1.6.1 COA at FA
The mobile node sends the registration request to the Foreign Agent. The registration
request message contains the CAO. The Foreign Agent will forward the request to the
HA.
The Home Agent sets up mobility binding. This contains the mobile node‟s home IP
address and the current COA.
The mobility binding also contains the life time of the registration.
Registration expires after the life time and deleted.
Registration should be renewed before expiration.
After mobility binding, the Home Agent acknowledges by the Sending Registration
Reply Message, to FA which in turn is forwarded to Mobile Node.
UDP packets are used for registration request. The fields are defined as follows,
Life Time: It denotes the validity of the registration in seconds. When Life time = 0, It is
called as deregistration. All bits set indicate Infinity.
Home Address: Fixed IP address of the MN.
Home Agent: IP address of the HA.
COA: Tunnel end point.
Identification: 64 Bits generated by the MN to identify a request and match in with
registration replies.
Extension: Contains the parameter to authentication.
Registration Reply
For registration reply also UDP packet is used. It contains a type field set to 3 and a code
indicating the result of the registration request. Fig 4.8 gives some example codes.
4.1.7 Encapsulation
Tunneling describes the mechanism used to forward the packets between HA and COA.
Tunnel is a virtual pipe to transfer data packets between the tunnel entry and end point.
Packets entering the tunnel are forwarded and leave the tunnel unchanged. To send a
packet through a tunnel it is encapsulated.
1. IP-in-IP Encapsulation
2. Minimal Encapsulation
This encapsulation is mandatory for mobile IP. The fig 4.9 shows the packet inside a
tunnel.
Inner Header:
The header remains almost unchanged during encapsulation. The only change is TTL is
decremented by 1.Tunnel is considered as a single hop. At the end the pay load is present. Several
fields are redundant.
The GRE header is pretended to the packet which contains the original header and data.
(The packet is different protocol suite).To the above the new header is pretended. This
header is the second protocol suite.
Fields:
GRE Header:
S Bit: Sequence number field in set when sequence number is present .S in important for
in order transmission of packets.
Rec: Recursion control field. This field represents a counter that shows the number of
allowed recursive encapsulation.
When the packet arrives at an encapsulation it checks whether the field=0.
If not Zero, additional encapsulation is allowed packet is encapsulated, field in by 1,
decremented else packet is discarded.
Default value is 0; allows only one level of encapsulation.
Reserved Fields:
Field=0 and are ignored at reception.
Version: =0 For GRE version.
4.1.8 Optimization
Consider the example.Japanese and a German meet at a conference on Hawaii .Both use
their laptops for exchanging data both run mobile IP for mobility support.
If the Japanese sends a packet to the German, his computer sends the data the Home
Agent of the German. (i.e.) from Hawaii to German. The Home Agent in Germany encapsulates
the packets and tunnels them to the COA of the German laptop on Hawaii.
Disadvantages
Unnecessary Overheads.
To optimize the route is to inform the correspondent node of the current location the
mobile node
Correspondent Node can learn the location by caching it in a binding cache.
Binding Cache is a part of Routing Table.
1. Binding Request:
Any Correspondent Node that wants to know the current location of a mobile Node can
send a binding request to the Home Agent. The Home Agent can check if the Mobile Node has
allowed dissemination of the current location.If the Home Agent is allowed to reveal the location
it sends back a binding update.
2. Binding Update:
This message sent by Home Agent to Correspondent Node.This message tells the current
location of network.This message can request an acknowledgement.
3. Binding Acknowledgement:
4. Binding Warning:
A node decapsulates a packet for a Mobile Node, but the MN has moved to a new FA, the
old FA sends binding warning. The warning contains Mobile Node‟s HA and the target node
address. Target node address in the address of the node that has tried sending packet to Mobile
Node. The Home Agent receives this message, and the Home Agent sends a binding update to
the node that has a wrong COA.
The following figure explains the four additional message .When the Mobile Node
changes foreign Agent.
The Mobile Node changes its location and register with FA.
In case when the Correspondent does not know about the new changes of location, the
Correspondent Node transmits packet to FA old.
The FA old will notice that the Mobile Node is not attached to it. Hence it will forward
the packets to FA new.
This forwarding of packets is called smooth handover.
In the absence of smooth handover the packets will be lost in the transit.
To tell the CN that has a sate binding FA old sends warning message to CA.
CN requests for binding update.
The Home Agent sends an update to inform them to inform the CN about the new
location.
Disadvantage:
Security Problems.
The return path from the Mobile Node to CN is not simple. The MN can directly send
packets to CN but the problems faced are:
1. Fire Walls:
The entire internal network is connected to Internet via firewall. The fire wall will
filter the packets from malicious address. Here when the Mobile Node sends a packet
with its fixed IP address fire walls will filter these packets because Mobile Node cannot
send packets .To overcome this Network Address Translation is used by many
companies. Reverse tunnel is used to resolve.
2. Multi Cast:
Reverse Tunnels are needed for the Mobile Node to participate in a multicast
group. For a Mobile Node in a foreign network to transmit multicast packets they need a
reverse tunnel.
3. TTL:
A Mobile Node sends a packet with a certain.TTL and still is in its home network.
When the Mobile Node has removed to a foreign network this TTL is very low .Hence
the packet will not reach the destination. This scenario reverse tunnel is needed whereby
it considers the distance as 1 hop so that the packet reaches the destination within the
specified TTL. RFC 2344 defines Reverse Tunneling as an extension to mobile IP.
Disadvantage:
Reverse Tunneling creates a triangular routing in the reverse direction.
Security issues need to be solved.
4.1.10 IPV6
Features of IPV6:
Several features that had to be separately specified for V4 come free in IPV6.
1) Security for authentication is a feature for IPV6.No special mechanisms needed for
security.
2) Every node masters auto configuration (i.e.) the mechanisms to acquire COA is built
in.
3) Neighbor discovery is mandatory for every node .For this no FA is needed to
advertise.
4) Every IPV6 nodes can send binding update to another node. So the mobile node can
send its current COA directly to COA and Home Agent.
5)A soft handover is possible .For this the Mobile Node sends in new COA to the old
router and the old router encapsulates all incoming packets for the MN and forwards
them to the new COA.
6) FA is not needed any more. The CN only has to be able to process binding updates .As
no FA, the Mobile Node should be able to decapsulate packets to detect when needs a
new COA and to determine when to send binding update to HA and CN.
7) IPV6 does not solve any firewall (or) privacy problem.
4.1.11Micro mobility
The mobile IP faces many problems in the duration of the handover and scalability of
registration. Consider a larger number of nodes change the network frequently, a heavy load is
present on the home agents and network for registration and binding update messages exists. To
have fast seamless handover the “IP micro mobility protocols” comes as handy.
Concept:
To understand the concept of Micro mobility protocol considers the following example.
A client arrives to the customer‟s place with a laptop. The Home Agent needs to know only an
entry point to the customer network .The entry point acts as the current location. When the
client the location within the customer‟s network it should be handle locally to avoid the traffic
and to speed up the local handover.
Principle: The Home Agent needs to be informed only when the node changes a region. Three
IP micro mobility approaches are
(1)Cellular IP
(2)Hawaii
(3)Hierarchical mobile IPV6
4.1.11.1 Cellular IP
Cellular IP provides local handovers by installing a single cellular IP gateway for each
Domain.
This domain acts as a foreign agent to the outside world.
Inside the domain, all nodes collect the routing information for accessing Mobile Node
based on the origin of the packets.
Soft handover is achieved by simultaneous forwarding of packets destined for a node
along multiple paths.
A mobile moving between adjacent cells will temporarily receive the packets via old and new
Base Stations.
Architecture:
Advantages:
Manageability
Cellular IP is self configuring.
Integration of CIPGW into a fire wall facilitates administration of mobility related
functionality.
Disadvantages:
Efficiency: Additional load is induced by forwarding packets on multiple paths.
Transparency: Changes to Mobile Node‟s are required.
Security: Routing tables are changed based on messages sent by mobile nodes.
Tries to keep micro mobility support transparent to Home Agent and Mobile Node.
Increase Performance and Reliability.
Support QOS.
Concept:
Step1: When a mobile node enters a HAWAII domain, the mobile Node obtains a
co-located COA.
Step 2: Registers with Home Agent.
Step 3: When moving to another cell inside the foreign domain, the MN sends a
registration requests to the new base station as to foreign agent.
Step 4: The base station intercepts the registration request and sends out a handoff update
message, which reconfigures all routers on paths from the old and new base station
to the cross over routes.
Routing changes are a initiated by the foreign domain‟s infrastructure and the message as
are authenticated.
Architecture:
Advantages:
Disadvantages:
Micro mobility is supported by installing a mobility anchor pointer (MAP). This MAP is
responsible for certain domains and act as a local HA with in this domain for visiting
Mobile Node.
MAP receives all packets on behalf of Mobile Node encapsulates and forwards to the
Mobile Node‟s current address.
As long as Mobile Node stays within the domain of MAP, the global COA does not
change. This Global COA is called as Regional COA (RCOA).
The MAP‟s boundaries are defined by access routers (AR). The MAP helps in local hand
from RCOA to LCOA.
The Mobile Node registers with the RCOA.
When the Mobile Node moves locally, it should register with the new LCOA (Local
COA) with its MAP.
RCOA is unchanged.
Architecture:
Advantages:
Disadvantages:
1) The aim of DHCP is to simplify the installation and maintenance of network computer.
2) When a new computer is added to the network, DHCP can provide with all necessary
information for integration.
Configuration/model
Initialization phase:
The client broadcasts a DHCP discover to the subnet. There may be a relay to forward
this broad.
In the above figure two servers receive this broadcast and determine the configuration
they can offer to the client.
DEPARTMENT OF CSE 192 PREC
IT1403-MOBILE COMPUTING IV YEAR / VIII SEM
Server‟s reply to the client‟s request with DHCP OFFER and offers a list of configuration
parameters.
The client can choose one of the configurations offered.
The client replies to the servers either accepting or rejecting using DHCP REQUEST for
rejection the client sends DHCP REQUEST with a reject.
The rejected server releases the reserved configuration.
The accepted server sends back DHCP acknowledgement.
Release:
When the client leaves the subnet it should release the configuration received from the
server.
It does using the DHCP RELEASE.
The period of service is fixed.
If the client dose not reconfirm within that duration the server will free the configuration.
Thus the DHCP supports the acquisition of COA for the mobile modes.
Adhoc Networks:
The networks devices which are mobile and use wireless communication are called as
Adhoc Networks.
Examples:
2. Disaster Relief: During the time of hurricanes, flood the infrastructure break down. In
military activities the Adhoc networks can be used.
3. Remote Areas: Setting up of infrastructure is costly in remote areas where the Adhoc
Networks can be used.
4. Effectiveness: Services will be too expensive for certain applications where adhoc
network can be used.
At a certain time t1 the topology looks as at the left side. Nodes N1 to N5 are connected.
N1 can receive info over a weak link from N4, but N4 can receive over a strong link from N1.
The links can be strong or weak depending upon the antenna characteristics or transmit
power. N1 cannot receive from N2.
After some time at time t2 the topology looks as at the right side.
N1 cannot receive from N4, etc.
Hence in adhoc wireless the topology changes.
1. Asymmetric Links: Routing information for one direction is not the same in the other
direction in wireless (i.e.) Node A can receive signal from B. This does not tell about the reverse
connection between B to A (i.e.,) B to A link can be either strong/weak or No link routing also
for the wired depends upon symmetric scenario.
2. Redundant Links: There is no control for the redundant link in the wireless. But the network
admin controls the redundancy in wired. High redundancy leads to heavy computational
overhead for routing tables.
3. Interference: In adhoc the links come and go depending upon the transmission char. (i.e.) one
transmission can interfere with other or overhear.
Interference has a disadvantage. If two close by nodes and forward, transmissions they
might interfere and destroy each other.
Advantage:
Dynamic Topology:
4.2.2.1 Routing:
Routing is to find a path between source and destination and to forward the packets
appropriately.
Due to the above discussed difficulties in adhoc networks, the following observations are
made.
1. In adhoc environment the traditional routing algorithms cannot work because these
algorithms cater to symmetric and static network topology.
2. Routing cannot rely on layer three knowledge alone.
3. Centralized approach will not work, because the network in dynamic.
4. Algorithms need to consider the limited battery power of the nodes.
5. Nodes need to make local decision to forward the packets.
6. Flooding is to done forward the packets. This mechanisms works when the load is low.
Distance Vector Concept: Each node exchanges with its neighbor , the adjacency information
(i.e.) hop count changes at one node in the network
1. Sequence Number: Each routing advertisements comes with a sequence number. The
advertisement travel in many paths. The sequence number is used to see the order of
advertisements.
2. Damping Advantage: Avoid loops; when the topology remains the same.
Damping (breaking):
Changes in the topology which is of short duration should not destabilize the routing.
Advertisements containing such transient changes are not disseminated further.
A node waits with destination if these changes are unstable.
Waiting time depends on the time between the first and best announcements of a path to a
destination.
Next hop: From starting node to which node, it will move in the next hop to reach the
destination path to reach the destination is the next hop.
Sequence No: Sequence number of the last advertisement for this node.
Advantages:
In the DSDV, all nodes maintain path to all the other nodes.
Due to this there is heavy traffic.
To save the battery power DSR is considered.
This DSV divides the routing into 2 sub problems.
1.Route Discovery:
Here a node tries to discover a route to a node (i) Only if there is information to send (ii)
and no routes are known.
2.Route Maintenance:
If a node is continuously using this route to transmit a packet, then the route should be
without problems. But if the node detects that the route is with problem, then it has to determine
alternate route.
Working Principle:
The node which receives the (Route Request Message) does the following:
1. If the node has already received the request, it drops the request packet.
2. If the node recognizes own address as the destination, the request has reached the target.
3. Otherwise the node appends its own address in the route, and broadcasts this updated
route request.
Principle:
The route request collects the list of address representing a possible path on its way
towards the destination.When the request reaches the destination, it can return the request
packet to the source.
When the link is bi-directional the route list is sent in the reverse order to the destination.
When the link is unidirectional the destination does not maintain the route. It needs to
discover the route.
1. N1 broadcasts the Request (N1 id=42, target=N3). N2 and N4 receive the packet.
2. N2 broadcasts (N1, N2, id=42, target=N3).N4 broadcasts (N1, N4,id=42,target=N3).N3 and
N5 receive N2's broadcasts. N1, N2,N5 receives N4's broadcasts.
3. N3 itself is the target.
4. N5 broadcasts (N1, N2, N 5, id=45, target=N3). N3, N4 receive this broadcast.
5. N1, N2, N5 drop this because it has already received.
6. N4 drops N5's broadcast.
7. N4 finds (N1, N2, and N5) as an alternate route but a longer route.
8. N3 has to return the path (N1, N2, and N3) to N1. N3 can do the reverse forwarding
because symmetric link is assumed.
9. When the links are uni-directional the algorithm needs to be applied again with N 3 as
source and N1 as destination.
Optimization:
1. To avoid too many broad cast route requests should contain a counter. For every rebroad
cast the counter is incremented. When the counter exceeds the number of nodes in the
network, the nodes can drop the request.
2. Node can Cache the path fragments from recent requests. This fragments can be used to
find other route.
3. A node can update the Cache while forwarding the packets.
4. The node can update the Cache when it overhears the transmission from other nodes.
When the routes are discovered they need to be maintained. Approaches to maintain the route
are as follows
1. If the link layer uses acknowledgement this ack can be considered as an intact route.
2. The node can overhear the next hop which is passive acknowledgement.
3. A node can ask for explicit acknowledge.
When the links are bi-directional , no problem for maintenance. If not the situation is
complicated. If there is connectivity problem, detected by a node, it has to inform the sender, to
find a new route from the sender.
1.Proactive Protocols
Sets up tables for routing (e.g.,) DSDV. The Algorithm is based on link state algorithm.
Such algorithm floods the information to the neighbors periodically. This algorithm
cannot be used in mobile ad hoc environment due to too much of updates/too few updates the
reduces the traffic.
The concept is to transmit for away destination at a lower frequency.Some algorithms attacks,
QOS guarantees
Routing table reflect the current topology with certain precision.
Disadvantage
Overhead in lightly loaded networks.
2.Reactive Protocols
A path between source and destination is set only if there is a necessity (e.g.) DSR,
AODV (Ad hoc on Demand Distance Vector) on demand.
Advantages:
Scalability
Devices can use longer low power periods because they wakeup only when needed.
Disadvantages:
For larger networks, clustering of rodes needs to be done. This algorithm is scalable.
Concept : Locality property. (i.e.)if a cluster can be established nodes remain in the cluster
(grouping ) with minor changes. When the topology changes only the cluster is to be informed.
Nodes of other cluster needs to know how to reach the cluster.
Advantage:
This method uses the location of neighbors that are exchanged via a periodic beacon
messages or in a piggy banking. This follows the greedy method where by the packets are
forwarded to the geographically closest neighbor via which the destination can be reached. Once
when it reaches a dead end hash tracking should be done.
Metrics
1. Traditionally hop count is considered as Metrics. This hop count is best choice for
fixed network.
2. Other metric can be Bandwidth.
3. Least Interference Routing can be considered as other metric.