Академический Документы
Профессиональный Документы
Культура Документы
Routing
Transparency
Compatibility
Security
Terminology
Mobile Node (MN)
Example network
HA
MN
router
home network
mobile end-system
Internet
FA
foreign
network
router
(current physical network
for the MN)
CN
end-system
router
MN
home network
Internet
receiver
3
FA
CN
sender
foreign
network
home network
sender
Internet
FA
foreign
network
CN
receiver
MN
Overview
COA
home
network
router
FA
router
HA
MN
foreign
network
Internet
CN
router
home
network
router
HA
router
FA
2.
Internet
1.
CN
router
3.
MN
4.
foreign
network
Network integration
Agent Advertisement
Advertisement
Agent advertisement
0
7 8
type
#addresses
15 16
23 24
checksum
lifetime
31
code
addr. size
router address 1
preference level 1
router address 2
preference level 2
...
type = 16
type = 16
length
sequence number
length = 6 + 4 * #COAs
R B H F M G r T reserved
registration lifetime
R: registration required
COA 1
B: busy, no more registrations
COA 2
H: home agent
F: foreign agent
...
M: minimal encapsulation
G: GRE encapsulation
r: =0, ignored (former Van Jacobson compression)
T: FA supports reverse tunneling
reserved: =0, ignored
Registration
MN r
FA
egis
requ tration
es
HA
MN re
HA
gist
requ ration
e
st
regi
s
requ tration
es t
n
ratio
t
s
i
reg
y
repl
n
ratio
t
s
i
reg
y
repl
stra
regi
y
repl
tion
7 8
type = 1
15 16
S B DMG r T x
home address
home agent
COA
identification
extensions . . .
S: simultaneous bindings
B: broadcast datagrams
D: decapsulation by MN
M mininal encapsulation
G: GRE encapsulation
r: =0, ignored
T: reverse tunneling requested
x: =0, ignored
23 24
lifetime
31
7 8
type = 3
15 16
code
home address
home agent
31
lifetime
identification
Example codes:
extensions . . .
registration successful
0 registration accepted
1 registration accepted, but simultaneous mobility bindings unsupported
registration denied by FA
65 administratively prohibited
66 insufficient resources
67 mobile node failed authentication
68 home agent failed authentication
69 requested Lifetime too long
registration denied by HA
129 administratively prohibited
131 mobile node failed authentication
133 registration Identification mismatch
135 too many simultaneous mobility bindings
Encapsulation
original IP header
new IP header
outer header
original data
new data
inner header
original data
Encapsulation I
Encapsulation of one packet into another as payload
e.g. IPv6 in IPv4 (6Bone), Multicast in Unicast (Mbone)
here: e.g. IP-in-IP-encapsulation, minimal encapsulation or GRE (Generic
Record Encapsulation)
ver.
IHL
DS (TOS)
length
IP identification
flags
fragment offset
TTL
IP-in-IP
IP checksum
IP address of HA
Care-of address COA
ver. IHL
DS (TOS)
length
IP identification
flags
fragment offset
TTL
lay. 4 prot.
IP checksum
IP address of CN
IP address of MN
TCP/UDP/ ... payload
Encapsulation II
IHL
DS (TOS)
length
IP identification
flags
fragment offset
TTL
min. encap.
IP checksum
IP address of HA
care-of address COA
lay. 4 protoc. S reserved
IP checksum
IP address of MN
original sender IP address (if S=1)
TCP/UDP/ ... payload
outer header
new header
RFC 1701
IHL
DS (TOS)
length
IP identification
flags
fragment offset
TTL
GRE
IP checksum
IP address of HA
Care-of address COA
C R K S s rec.
rsv.
ver.
protocol
checksum (optional)
offset (optional)
key (optional)
sequence number (optional)
routing (optional)
ver.
IHL
DS (TOS)
length
IP identification
flags
fragment offset
TTL
lay. 4 prot.
IP checksum
IP address of CN
IP address of MN
GRE
header
original
header
original data
original
header
original data
new data
ver.
reserved0
ver.
checksum (optional)
protocol
reserved1 (=0)
Solutions
Change of FA
packets on-the-fly during the change can be lost
new FA informs old FA to avoid packet loss, old FA now
forwards remaining packets to new FA
this information also enables the old FA to release resources
for the MN
HA
Data
Update
FAold
MN
FAnew
Data
Data
ACK
Data
Data
Update
ACK
Data
Data
Warning
MN changes
location
Registration
Data
Request
Update
ACK
Data
Data
MN
home network
Internet
sender
1
FA
CN
receiver
foreign
network
1. MN sends to FA
2. FA tunnels packets to HA
by encapsulation
3. HA forwards the packet to the
receiver (standard case)
Application
simplification of installation and maintenance of networked
computers
supplies systems with all necessary information, such as IP
address, DNS server address, domain name, subnet mask,
default router etc.
enables automatic integration of systems into an Intranet or
the Internet, can be used to acquire a COA for Mobile IP
Client/Server-Model
the client sends via a MAC broadcast a request to the DHCP
DHCPDISCOVER
server (might be via a DHCP relay)
DHCPDISCOVER
server
client
relay
client
client
initialization
DHCPDISCOVER
DHCPDISCOVER
server
(selected)
determine the
configuration
DHCPOFFER
DHCPOFFER
collection of replies
time
selection of configuration
DHCPREQUEST
(reject)
DHCPREQUEST
(options)
confirmation of
configuration
DHCPACK
initialization completed
release
DHCPRELEASE
delete context
DHCP characteristics
Server
several servers can be configured for DHCP, coordination not
yet standardized (i.e., manual configuration)
Renewal of configurations
IP addresses have to be requested periodically, simplified
protocol
Options
available for routers, subnet mask, NTP (network time
protocol) timeserver, SLP (service location protocol)
directory, DNS (domain name system)
Examples
Single-hop: All partners max. one hop apart
Bluetooth piconet, PDAs in a room,
gaming devices
Mobile
Router
Manet
Mobile
Devices
Mobile IP,
DHCP
Fixed
Network
Router
End system
N6
N7
N1
N1
N2
N3
N4
N3
N2
N4
N5
time = t1
N5
time = t2
good link
weak link
N6
Distance Vector
periodic exchange of messages with all physical neighbors
that contain information about who can be reached at what
distance
selection of the shortest path if several paths available
Link State
periodic notification of all routers about the current state of
all physical links
router get a complete picture of the network
Example
Reasons
Maximal
Stability of the logical network, battery run-time, time of
connectivity
Early work
on demand version: AODV
Route maintenance
makes S able to detect, while using a source route to D, if it can
no longer use its route (because a link along that route no
longer works)
F
Q
I
L
C
N
F
Q
(S)
I
L
C
N
(S,A)
Q
(S,E)
I
L
C
N
F
Q
(S,E,G)
I
L
C
(S,B,C)
(S,A,F,H)
F
Q
(S,E,G,J)D
I
L
C
N
F
Q
(S,A,F,H,K)
I
L
C
N
F
Q
I
L
C
N
P
(S,A,F,H,K,P)
F
Q
D
RREP(S,E,G,J,D)
I
L
C
N
F
Q
A
DATA(S,E,G,J,D)
E
S
I
L
C
N
F
Q
A
DATA(S,E,G,J,D)
E
S
I
L
C
N
F
Q
A
RERR(G-J)
E
G
I
L
C
N
When
Whenreceiving
receivingthe
theRoute
RouteError
Errormessage
message(RERR),
(RERR),
SSremoves
the
broken
link
from
its
cache.
removes the broken link from its cache.
ItItthen
thentries
triesanother
anotherroute
routestored
storedininits
itscache;
cache;ififnone,
none,
ititinitializes
initializesaanew
newroute
routediscovery
discovery
neighbourhood
However, route caching has its downside: stale caches can
severely hamper the performance of the network
DSR: Strengths
DSR: Weaknesses
F
Q
I
L
C
N
F
Q
I
L
C
N
: Route Request (RREQ)
Note:
Note:ififone
oneofofthe
theintermediate
intermediatenodes
nodes(e.g.,
(e.g.,A)
A)
knows
knowsaaroute
routetotoD,
D,ititresponds
respondsimmediately
immediatelytotoSS
F
Q
I
L
C
N
: represents a link on the reverse path
F
Q
I
L
C
N
F
Q
I
L
C
N
F
Q
I
L
C
N
F
Q
I
L
C
N
F
Q
I
L
C
N
: Link over which the RREP is transmitted
: Forward path
F
Q
Data
I
L
C
N
The
Theroute
routeisisnot
notincluded
includedininthe
thepacket
packetheader
header
F
Q
Data
I
L
C
N
F
Q
RERR(G-J)
G
I
L
C
N
When
Whenreceiving
receivingthe
theRoute
RouteError
Errormessage
message(RERR),
(RERR),
SSremoves
removesthe
thebroken
brokenlink
linkfrom
fromits
itscache.
cache.
ItItthen
theninitializes
initializesaanew
newroute
routediscovery.
discovery.
2.
: Forward path
A
RREQ
DSN(D) = 8
D
4.
DSN(D) = 5
RREP
DSN(D) = 8
DSN(D) = 8
DSN(D) = 5
DSN(D) = 5
3.
DSN(D) = 5
C
: Forward path
Assume there is a route between A and D; link S-D breaks; assume A is not aware of this, e.g. because
RERR sent by S is lost
Assume now S wants to send to D. It performs a RREQ, which can be received by A via path S-C-A
Node A will reply since it knows a route to D via node B
This would result in a loop (S-C-A-B-S)
The presence of sequence numbers will let S discover that the routing information from A is outdated
Principle: when S discovers that link S-D is broken, it increments its local value of DSN(D). In this way,
the new local value will be greater than the one stored by A.
Discover a path
only if a path for sending packets to a certain destination is
needed and no path is currently available
Maintaining a path
only while the path is in use one has to make sure that it
can be used continuously
Optimizations
limit broadcasting if maximum diameter of the network is known
caching of address lists (i.e. paths) with help of passing packets
stations can use the cached information for path discovery (own paths
or paths for other hosts)
Interference-based routing
N1
N2
R1
S1
N3
N4
S2
neighbors
(i.e. within radio range)
N5
N7
N6
N8
R2
N9
proactive
FSLS Fuzzy Sighted Link State
FSR Fisheye State Routing
OLSR Optimized Link State Routing Protocol (RFC 3626)
TBRPF Topology Broadcast Based on Reverse Path Forwarding
reactive
Hierarchical
Two promising
candidates:
OLSRv2 and
DYMO
Service discovery
Discovery of services and service providers
Multicast
Transmission to a selected group of receivers
Quality-of-Service
Maintenance of a certain transmission quality
Power control
Minimizing interference, energy conservation mechanisms
Security
Data integrity, protection from attacks (e.g. Denial of Service)
Scalability
10 nodes? 100 nodes? 1000 nodes? 10000 nodes?
Internet
Cluster head
Base station
Cluster
Super cluster
Differences to MANETs
Example:
Properties of
wireless sensor networks
Sensor nodes (SN) monitor and control the environment
Nodes process data and forward data via radio
Integration into the environment, typically attached to other networks
SN
SN
Bluetooth, TETRA,
SN
SN
SN
GW
SN
SN
M!
R
A
AL
SN A
L
RM!
A
L
A
SN
GW
GPRS
GW
WLAN
Eth
ern
AL
et
AR
M!
SN
AR
M!
SN
SN
Gaming, Tourism
Emergency, Rescue
Monitoring, Surveillance
Self-configuring networks
Robust routing
Low-power data aggregation
Simple indoor localization
cst.mi.fu-berlin.de
2008-03-12
automatically by accelerometers.
Earthquake speed: around 5-10km/s
If the epicenter of an earthquake is in an unpopulated
area 200km from a city center, an instantaneous
detection system can give a warning up to 30 seconds
before the shockwave hits the city.
If a proper municipal actuation network is in place:
Sirens go off
Traffic lights go to red
Elevators open at the nearest floor
Pipeline valves are shut
C.S. Raghavendra, K.M. Sivalinguam and T. Znati Editors. Wireless Sensor Networks. Springer, 2006
www.ip01.com
Lighting management:
Solar radiation
Temperature
Humidity
Soil moisture
Data Messages
Send back data using gradients
Hop count guarantees shortest path
Sink
Energy-aware routing
Solar-aware routing
Solar-powered node
Send status updates to neighbors
Either proactive or when sniffing ongoing traffic
Walking
Running
Sprinting
Similar to running
Highest step frequency
Only short distances
Still a lot to do