Professional Documents
Culture Documents
Wireless Means Transmitting Signals Using Radio Waves As The Medium Instead of Wires
Wireless Means Transmitting Signals Using Radio Waves As The Medium Instead of Wires
Wireless means transmitting signals using radio waves as the medium instead of wires.
Wireless technologies are used for tasks as simple as switching off the television or as
complex as supplying the sales force with information from an automated enterprise
application while in the field. Now cordless keyboards and mice, PDAs, pagers and digital
and cellular phones have become part of our daily life.
Point-to-point bridge
As you know, a bridge is used to connect two networks. A point-to-point
bridge interconnects two buildings having different networks. For example, a wireless LAN
bridge can interface with an Ethernet network directly to a particular access point (as shown
in the following image).
Point-to-multipoint bridge
This topology is used to connect three or more LANs that may be located on different floors
in a building or across buildings(as shown in the following image).
This network is an independent local area network that is not connected to a wired
infrastructure and in which all stations are connected directly to one another(as shown in the
following image).
Wireless Technologies
Wireless technologies can be classified in different ways depending on their range. Each
wireless technology is designed to serve a specific usage segment. The requirements for
each usage segment are based on a variety of variables, including Bandwidth needs,
Distance needs and Power.
This network enables you to access the Internet via a wireless wide area network (WWAN)
access card and a PDA or laptop.
These networks provide a very fast data speed compared with the data rates of mobile
telecommunications technology, and their range is also extensive. Cellular and mobile
networks based on CDMA and GSM are good examples of WWAN.
These networks are very similar to WWAN except their range is very limited.
This network enables you to access the Internet in localized hotspots via a wireless local
area network (WLAN) access card and a PDA or laptop.
It is a type of local area network that uses high-frequency radio waves rather than wires to
communicate between nodes.
These networks provide a very fast data speed compared with the data rates of mobile
telecommunications technology, and their range is very limited. Wi-Fi is the most
widespread and popular example of WLAN technology.
This network enables you to access the Internet and multimedia streaming services via a
wireless region area network (WRAN).
These networks provide a very fast data speed compared with the data rates of mobile
telecommunication technology as well as other wireless network, and their range is also
extensive.
Broadband wireless is a technology that promises high-speed connection over the air. It uses
radio waves to transmit and receive data directly to and from the potential users whenever
they want it. Technologies such as 3G, Wi-Fi, WiMAX and UWB work together to meet
unique customer needs.
WBA is a point-to-multipoint system which is made up of base station and subscriber
equipment
Mobile Internet Protocol (or Mobile IP)
Mobile IP is a communication protocol (created by extending Internet Protocol, IP) that
allows the users to move from one network to another with the same IP address. It ensures
that the communication will continue without user’s sessions or connections being dropped.
o First of all, the internet host sends a datagram to the mobile node using the mobile
node's home address (normal IP routing process).
o If the mobile node (MN) is on its home network, the datagram is delivered through
the normal IP (Internet Protocol) process to the mobile node. Otherwise the home
agent picks up the datagram.
o If the mobile node (MN) is on foreign network, the home agent (HA) forwards the
datagram to the foreign agent.
o The foreign agent (FA) delivers the datagram to the mobile node.
o Datagrams from the MN to the Internet host are sent using normal IP routing
procedures. If the mobile node is on a foreign network, the packets are delivered to
the foreign agent. The FA forwards the datagram to the Internet host.
In the case of wireless communications, the above illustrations depict the use of wireless
transceivers to transmit the datagrams to the mobile node. Also, all datagrams between the
Internet host and the MN use the mobile node's home address regardless of whether the
mobile node is on a home or foreign network. The care-of address (COA) is used only for
communication with mobility agents and is never seen by the Internet host.
Network integration
Agent Advertisement
• HA and FA periodically send advertisement messages into their physical
subnets
• MN listens to these messages and detects, if it is in the home or a foreign
network (standard case for home network)
• MN reads a COA from the FA advertisement messages
Registration (always limited lifetime!)
• MN signals COA to the HA via the FA, HA acknowledges via FA to MN
• these actions have to be secured by authentication Advertisement
• HA advertises the IP address of the MN (as for fixed systems), i.e. standard
routing information
• routers adjust their entries, these are stable for a longer time (HA responsible
for a MN over a longer period of time)
• packets to the MN are sent to the HA,
• independent of changes in COA/FA
2. Registration
Mobile Node requests registration from Foreign Agent (or directly for co-located COA)
Request is forwarded to Home Agent
Includes CAO + home addresses
Home Agent replies to Foreign Agent
Security
Authentication between all three parties
Mobile-Home auth. is based on shared secret
HA intercepts all packets for the MN and passes them along to MN using a tunnel.
The presence of dynamic and adaptive routing protocols enables ad hoc networks to be
formed quickly. Wireless ad-hoc networks can be further classified by their applications:
Routing protocols
Dynamic routes are routes learned via routing protocols. Routing protocols are configured on
routers with the purpose of exchanging routing information. There are many benefits of using
routing protocols in your network, such as:
unlike static routing, you don’t need to manually configure every route on each router
in the network. You just need to configure the networks to be advertised on a router
directly connected to them.
if a link fails and the network topology changes, routers can advertise that some
routes have failed and pick a new route to that network.
Cisco has created its own routing protocol – EIGRP. EIGRP is considered to be an advanced
distance vector protocol, although some materials erroneously state that EIGRP is a hybrid
routing protocol, a combination of distance vector and link state.
As the name implies, distance vector routing protocols use distance to determine the best path
to a remote network. The distance is something like the number of hops (routers) to the
destination network.
Distance vector protocols usually send the complete routing table to each neighbor (a
neighbor is directly connected router that runs the same routing protocol). They employ some
version of Bellman-Ford algorithm to calculate the best routes. Compared with link state
routing protocols, distance vector protocols are easier to configure and require little
management, but are susceptible to routing loops and converge slower than the link state
routing protocols. Distance vector protocols also use more bandwidth because they send
complete routing table, while the link state procotols send specific updates only when
topology changes occur.
Link state routing protocols are the second type of routing protocols. They have the same
basic purpose as distance vector protocols, to find a best path to a destination, but use
different methods to do so. Unlike distance vector protocols, link state protocols don’t
advertise the entire routing table. Instead, they advertise information about a network toplogy
(directly connected links, neighboring routers…), so that in the end all routers running a link
state protocol have the same topology database. Link state routing protocols converge much
faster than distance vector routing protocols, support classless routing, send updates using
multicast addresses and use triggered routing updates. They also require more router CPU
and memory usage than distance-vector routing protocols and can be harder to configure.
Each router running a link state routing protocol creates three different tables:
neighbour table – the table of neighboring routers running the same link state routing
protocol.
topology table – the table that stores the topology of the entire network.
routing table – the table that stores the best routes.
Shortest Path First algorithm is used to calculate the best route. OSPF and IS-IS are examples
of link state routing protocols.
(QP12) State the difference between DSR and DSDV routing protocols. Suggest a
routing protocol which is suitable for larger networks
1. If the new address has a higher sequence number, the node chooses the route with the
higher sequence number and discards the old sequence number.
2. If the incoming sequence number is identical to the one belonging to the existing route,
a route with the least cost is chosen.
3. All the metrics chosen from the new routing information are incremented.
4. This process continues until all the nodes are updated. If there are duplicate updated
packets, the node considers keeping the one with the least-cost metric and discards the
rest.
In case of a broken link, a cost of metric with a new sequence number (incremented) is
assigned to it to ensure that the sequence number of that metric is always greater than or
equal to the sequence number of that node. Figure 8.2 shows a routing table for node 2,
whose neighbours are nodes 1, 3, 4, and 8. The dashed lines indicate no communications
between any corresponding pair of nodes. Therefore, node 2 has no information about
node 8.A DSDV routing table The packet overhead of the DSDV protocol increases the
total number of nodes in the ad-hoc network. This fact makes DSDV suitable for small
networks. In large adhoc networks, the mobility rate and therefore the overhead increase,
making the network unstable to the point that updated packets might not reach nodes on
time.
(QP31)
Consider a Mobile node A is connected with Node 1 and another Mobile node B is connected with
Node 15. Now the Node 1 will act as source point and Node 15 will act as destination point as shown
in the below diagram. Construct a table-driven routing information table using Destination
Sequenced Distance-Vector routing protocol (DSDV) based on Bellman-Ford algorithm for Node 1
and suggest a shortest path to reach the destination Node 15.
NOTE: Draw the diagram again and highlight(darken)the shortest path between source and
destination
• a node marks each node in RT that has to acknowledge update message it transmitted;
Dynamic Source Routing : Network
Step 1: Start from source node N1 and broadcast the information about it to
its neighbors i.e. in this case the route information is “<1>”, because of its one-to-one
link between node N1 and N2.
Step 2: Broadcast previous route information to neighbors of node N2 i.e. to node N3,
N4, N5. The new route will remain same “<1,2>” in all the cases.
Step 3: Take node N3 and broadcast previous route(<1,2>) to next neighboring nodes
i.e. node N6. New route till node N6 will be “<1,2,3>” and same process can be done
for other nodes i.e. Node N4 and N5.
Step 4 : Further, broadcast the new routes i.e. <1,2,3,6> , <1,2,4> , <1,2,5> to nodes
N8, N7 & N9 respectively.
Step 5: Repeat the above steps until destination node is reached via all the routes.
The updated routes will be as:
Consider a network containing 5 nodes that are “X”, “Y”, “Z”,”T”,”D” present at unit
distance from each other, where “X” being the source node and “D” being the
destination node.
As the name implies, distance vector routing protocols use distance to determine the best path
to a remote network. The distance is something like the number of hops (routers) to the
destination network.
Distance vector protocols usually send the complete routing table to each neighbor (a
neighbor is directly connected router that runs the same routing protocol). They employ some
version of Bellman-Ford algorithm to calculate the best routes. Compared with link state
routing protocols, distance vector protocols are easier to configure and require little
management, but are susceptible to routing loops and converge slower than the link state
routing protocols. Distance vector protocols also use more bandwidth because they send
complete routing table, while the link state procotols send specific updates only when
topology changes occur.
It is a pro-active/table driven routing protocol. It actually extends the distance vector routing
protocol of the wired networks as the name suggests. It is based on the Bellman-ford routing
algorithm. Distance vector routing protocol was not suited for mobile ad-hoc networks due to
count-to-infinity problem. Hence, as a solution Destination Sequenced Distance Vector
Routing Protocol (DSDV) came into picture.
Destination sequence number is added with every routing entry in the routing table
maintained by each node. A node will include the new update in the table only if the entry
consists of the new updated route to the destination with higher sequence number.