Free Essay

Mobile Ip in Source Routing Systems

In:

Submitted By blackwhite2014
Words 7747
Pages 31
Technical University of Ilmenau
Faculty of Computer Science and Automation
Department of Integrated Communications Systems

Student research project
(Mobile IP in Source Routing Systems)

Supervisor: Dipl.-Inf. Florian Liers
Editor: Imad kailouh

Ilmenau, July 2010

1. Introduction ............................................................................................................. 4
1.1 Motivation .......................................................................................................... 4
1.2 Purpose of the work .......................................................................................... 4
2. Basics ..................................................................................................................... 5
2.1 Internet Protocol (IP) ......................................................................................... 5
2.1.1 IP Routing....................................................................................................... 5
2.1.1.1 What is routing ...................................................................................... 5
2.1.1.2 Source vs. Hop by Hop Routing ............................................................ 5
2.2 Mobile IP ........................................................................................................... 7
2.2.1 Terminology in Mobile IP ............................................................................. 7
2.2.2 How Mobile IP Works .................................................................................. 8
2.2.2.1 Agent Discovery .................................................................................... 9
2.2.2.2 Registration ......................................................................................... 11
2.2.2.3 Tunneling ............................................................................................ 11
2.3 Index-Based Forwarding ................................................................................. 13
2.3.1 Index-Based: Packet Forwarding Examples ............................................. 14
2.4 Naming, addressing, and routing..................................................................... 15
2.4.1 DNS - Domain Name System.................................................................... 16
2.4.2 Mobile IP Addressing ................................................................................ 17
2.4.3 Routing by Name ...................................................................................... 18
3. Architecture and processes .................................................................................. 18
3.1 Route replaces IP ............................................................................................ 18
3.2 Scenarios ........................................................................................................ 19
3.2.1 First scenario (MN and HA have a name) ................................................. 20
3.2.2 Second Scenario (reference route) ........................................................... 22
4. Implementation ..................................................................................................... 24
5. Evaluation ............................................................................................................. 26
6. Conclusion ............................................................................................................ 30
7. References ........................................................................................................... 32

1. Introduction
1.1 Motivation
„The Internet infrastructure is built on top of a collection of protocols, called the
TCP/IP protocol suite. Transmission Control Protocol (TCP) and Internet Protocol (IP) are the core protocols in this suite [1]”.
Each computer (host) is connected to the Internet should be uniquely identified by an
IP address. This raises one of the most important issues in mobility, because when a host moves to another location. This host should get a new IP address to be reachable from other partners on the network and this maybe leads to limitation problem in IP addresses.
So the motivation of our work is to use routes instead of IP addresses to reach the
Mobile Node. The computation of these routes will be depending on the name .i.e. of
(Mobile Node, Home Agent...).This new internet architecture will give us the Solution to face the limitation problem of IP addresses in currently internet architecture.

1.2 Purpose of the work
The new approach of next internet generation that we will talk about in this student research is based on the concept of source routing (index-based routing) and name based routing. All the nodes in the internet network will have the ability to get the routes that they need to reach their destination with help from the Route Service, this is responsible to compute these routes.
The basic idea behind this is to replace the IP addresses, which used by the Mobile
IP entities like Mobile Node, Home Agent, Foreign Agent to achieve an IP
Datagram’s routing operation, in other words to keep Correspondent Node and
Mobile Node in contact, with domain names, which will be resolved into Routes.
In this student research our work is to build Mobility scenarios, which will be represented by using Message Sequence Diagram. These scenarios will be only depends on the names like (Mobile Node, Home Agent...) which will be resolved into routes instead of IP addresses to allow the Correspondent Node(CN) to communicate with Mobile Node(MN).
The next step in this work is to simulate one of these scenarios by using Frogger
Simulator, which developed by the group of Integrated Communication in Technical
University of Ilmenau.

4

2. Basics
In this section we will take an overview about what is the Internet Protocol and what are the types of IP routing, what are terminologies that used in Mobile IP, and how does it work. In addition to this we will explain by example what Index-Based
Forwarding concept is and clear the difference between the names, addresses and paths. 2.1 Internet Protocol (IP)
The Internet Protocol (IP) is a protocol or method, by using this protocol data will be sent from one computer to another on the Internet network. Each computer (known as a host) on the Internet network has at least one IP address that uniquely identifies it from all other computers on the Internet.
The most widely used version of IP today is Internet Protocol Version 4 (IPv4).
However, IP Version 6 (IPv6) is also beginning to be supported [2].

2.1.1 IP Routing
2.1.1.1What is routing
In general routing is a process that forward traffic from its source to its destination across multiple networks by using a set of protocols (e.g. BGP, OSPF...), that determine the best path that data should follows. In IP network, routing based on the
IP addresses of source and destination.
Routing involves two basic activities: first finding out how to get from here to there, that’s mean determining the optimal routing path to destination and second actually getting from here to there (packet transporting); this can be done in many (very different) basic ways [3], [4].

2.1.1.2 Source vs. Hop by Hop Routing
In Source Routing concept the Source has full information about the route should the
IP datagram pass through until it reach its destination. IP traffic get through specified routers (gateways), it can’t change its route.
The reason for using Source Routing might be to avoid certain networks for performance, or administrative reasons (such as privacy, access policy).

Figure (1) Source Routing
5

Figure (1) represent a simplified explanation of Source Routing concept, we assumed that each gateway have only one address. When the datagram is moved from the source host (A) into the Internet, the Source Address (SA), Destination address (DA),
Source Route List (SRL) and Source Route Pointer (SRP) fields take these values at this moment: (SA: A), (DA: B), (SRL: C, D, E), (SRP: 0).
As the datagram leave gateway B, the fields became: (SA: A), (DA: C), (SRL: B, D,
E), (SRP: 1).
At gateway C, the processing is similar. The datagram leaves gateway C with its fields appearing: (SA: A), (DA: D), (SRL: B, C, E), (SRP: 2).
Finally, at the gateway D, The datagram leaves gateway D with its fields appearing:
(SA: A), (DA: E), (SRL: B, C, D), (SRP: 3).
There are three IP options that support source routing. In each, the option includes a list of IP addresses specifying the routers that must be used, to reach the destination
[3], [4].
Strict Source routing: this means that the route specified in the option must be used exactly from datagram, in sequence, with no other routers allowed to handle the traffic at all [3], [4].
Loose source routing: the route is specified by a list of IP addresses that must be followed in sequence, but having hops that are out of the list in between the devices on the list is permitted [3], [4].
Record Route: this option allows the datagram’s get through the network to record their path within the header for the datagram itself. When a source device sends a datagram use this option in it, router’s which “process” the datagram adds their IP addresses to this datagram. The recipient can then extract the list of IP addresses to see the route taken by the datagram [3], [4].
By hop-by-hop routing, the source don’t have all the information about how to get to the Destination; it is only know how to get to the "next hop“. That’s means routing decisions are made at each router independently and locally.
Each router belongs to the network send to the other routers its information, so each router can extract from this information its Routing table which includes the addresses of all other nodes, therefore Hop by Hop routing is also referred to as destination based table driven routing [3], [4].
In other words we can say that each node has all information about the topology of the network and it can now determine which the better route to reach the destination is. 6

Figure (2) shows that routing table on each node contains the next hop node and
Data Packet only has the destination address.

Figure (2) Hop-by-Hop routing

2.2 Mobile IP
The idea behind the invention of Mobile IP is to give devices, which are attached to the network (e.g. mobile telephone, computer...) the ability to maintain Internet
Connectivity while moving from one Internet attachment point to another with their
Permanent IP addresses.

Figure (3) Traditional Routing for a Mobile Host
Figure (3) shows that’s, When the Host moving to another network, it became unreachable. 2.2.1 Terminology in Mobile IP
Mobile node: As examples for mobile nodes are (mobile telephone and laptop computers), these devices have the ability when they move from internet attachment point to another to be reachable via their home addresses.
To keep the Connection while the mobile node moves from one network to another, it needs a special support, because the traditional internet routing assumes that the

7

mobile node has the same IP address. Therefore, each node should have new IP
Address each time it connected to new network [5].
Home Agent (HA): is a router which plays as a connection point between the mobile node and its home network (when it moves to another network) [5]. Home agent always received information from mobile node about its new location (its new IP address). Foreign Agent (FA): is a router act as a point of attachment when the mobile node has been moved to a foreign network.
Foreign agent works in conjunction with home agent to support internet traffic routing for and from mobile node [5].
Correspondent Node (CN): it’s a device or node that communicates with mobile node (it’s out of the mobile node network) [5].
Care-of Address (COA): when a mobile node moves to new network, it’s obtaining a new IP address this IP address called CoA. It’s a temporary IP address that enables mobile Node to communicate with other nodes in other networks.
There are two types of Care-of Address:
Foreign Agent Care-of Address: This is the static IP address of a foreign Agent on a visited network.
Collocated Care-of Address: which is a temporary IP address assigned to the mobile node. 2.2.2 How Mobile IP Works

Figure (4) Mobile IP Scenario
8

When IP packet exchanged over the connection between correspondent node and mobile node the following operation occur:
Correspondent node send an IP packet intended for mobile node A, with A’s home address in IP header. The IP packet is forwarded to A's home network.
When the IP packet arrive the home network, the home agent intercept this packet encapsulate it within a new IP packet that has A’s care of address in the header and then resend it to mobile node A. IP packet encapsulation within other IP packet called
Tunneling.
When the IP packet arrive at the foreign network the foreign agent strip it from its outer IP header and then send it to mobile node A. Mobile node A sends directly the
IP traffic to correspondent node by using (CN) IP address.
To support the operations illustrated in Figure (1), Mobile IP includes three basic
Functions: Agent Discovery, Registration, and Tunneling [6], [7], [8].

2.2.2.1 Agent Discovery
The first thing must the mobile node to do when it became active is to determine if it still at home or it has been moved. This can be done through a process called Agent discovery, which have three Basic Functions:
First Determine if the Mobile Node connected to foreign or home network.
Second Determine if Mobile Node moved from one network to another.
Finally obtain a care of address if it’s connected to foreign network.
There are two types of Messages are used by Agent Discovery: Agent
Advertisement, and Agent Solicitation [6], [7], [8].

Agent Solicitation

Figure (5) Agent Discovery Messages

9

Agent Advertisement message: it is similar to ICMP(Internet Control Message
Protocol) message, that is used for the regular IP router discovery process this message has one or more extensions added to ICMP message, and this extension contain Mobile-IP-specific information for mobile nodes.
As we see in Figure (5) Mobile Agent (Home agents and foreign agents) always send
Agent Advertisements messages, which are received by all Nodes on the network.
Mobile nodes listen to these Agent Advertisements and from the information that included in this message it determines whether they are stay connected to their home network or a foreign network.
If it discovers that it is stay connected to the home network, and then it behaves as any static node in this network, therefore, it does not use any mobile IP capabilities.
If it discovers that it is connected to the foreign network, then it gets a care of address from the Agent Advertisements Message [6], [7], [8].
Agent Solicitation message: When Mobile Node has been moved to the new network and has not received agent advertisements, it send Solicitation Message that forced the Foreign Agent to broadcast an agent advertisement Message as we see in Figure(5).
How Does a Mobile Node Determine That It Has Moved (Movement detection)
There are two ways to detect that the Mobile Node has been moved from its Home
Network to Foreign network.
First by using Lifetime field: in this method mobile node use the lifetime filed in agent advertisement message as a timer, when it does not receive an advertisement during this time from mobile agent, it assumes that it has moved and must try to find another network to register with.
Second by using Network Prefix: in this approach mobile node compare between its home address and Agent Advertisements’ source address, if the network prefix are the same for both of them, then the mobile node it still at home if not , that’s mean it has moved to a foreign network [6], [7], [8].

10

2.2.2.2 Registration

Figure (6) Registrations process
The purpose behind of registration process is to let mobile node to inform its Home agent about its current care of address, this address will be used by Home Agent to forward encapsulated traffic to the mobile node.
When registration about to expire mobile node renew this registration (another lifetime field), and when mobile node moves back to its home network deregistration from its care of address will be done [6], [7], [8].
The registration process includes four steps:
 The mobile node requests the forwarding service by sending a registration request to the foreign agent that the mobile node wants to use.
 The foreign agent rebroadcasts this request to the home agent of that mobile node.  The home agent either accepts or refuses the request and sends a registration reply to the foreign agent.
 The foreign agent rebroadcast this reply to the mobile node.
If the mobile node is using a collocated care-of address, then it registers directly with its home agent, rather than going through a foreign agent.

2.2.2.3 Tunneling

Figure (7) tunneling from home agent to foreign agent

11

When a mobile node has moved to foreign network and registered itself with its home agent, at this moment IP traffic sent to the mobile node will be intercepted by home agent. Home agent tells nodes on the home network that IP datagram’s to the mobile node should be delivered to home agent instead. Practically, the home agent steals the identity of the mobile node in order to capture datagram’s intended for that node that are transmitted across the home network. The home agent uses the Address
Resolution Protocol (ARP) as a possible mechanism to do this [6], [7], [8].
Address Resolution Protocol (ARP): IP addresses are virtual addresses, to send
IP traffic across the network we should translate this addresses to physical addresses this process called address resolution, therefore we use
ARP protocol which is transforming an IP address to a physical address that is acceptable in the local network.
To allow Home Agent to intercept mobile node’s traffic it should send a number of
ARP’s messages to update the ARP caches for the other nodes, which still have the original physical address for the Mobile Node in their caches. This physical address will be replaced with the physical address of the Home Agent, and then IP packets are routed to the mobile node’s care-of address via tunneling, each IP packet is encapsulated in an outer IP packet with a new header added [6], [7], [8].
Foreign Agent removes original packets from the tunnel and delivers the original packet to the mobile node over the foreign network.
If the mobile node wants to send packets, they will be sent directly to their destination without the need for tunneling. The foreign Agent acts as a router for all packets produced by mobile node.
Different types of Tunneling:
IP-within-IP: The whole original IP packet becomes the payload in a new IP packet.
Minimal encapsulation: A new header is inserted between the original IP header and the original IP payload. The original IP header is then modified to form a new outer IP header. This encapsulation technique need not be supported by all FAs and
HAs; it is optional [6], [7], [8].
Generic Routing Encapsulation (GRE): was designed to encapsulate a packet from one protocol into a network layer of a second protocol. This encapsulation technique need not be supported by all FAs and HAs; it is optional [6], [7], [8].

12

2.3 Index-Based Forwarding
It’s important to understand the difference between how index based and IP forwarded datagram’s through the network. Hop by Hop and source routing is giving an obvious example of how IP routing deals with traffic and routed it across the network, this has been mentioned before as we see in section (1).
Index based is a new forwarding concept, in this concept the link interface IDs of each node will be ordered and then in this ordering each link will be represented by an index.

IP Address

Index

124.13.23.2

1

124.13.23.3

2

124.13.23.4

3

124.13.23.5

4

Figure (8) Example of How Interfaces are Indexed
As we see figure (8) give us an example how interfaces are indexed. It shows that the node have four links ID each one is represented by an index number.
After the node interfaces have been indexed the new link ID can now be efficiently encoded as binary code. In general a global hash function is used to encode the links
IDs [9].

Figure (9) Explanation of the Index-Based Encoding
13

Figure (9) shows how the links IDs will be encoded, the number of bits that used in binary form is depending on how many links the node had [9].
As result for this new concept paths between nodes can be specified as a concatenation of encoded index. Each node in the subnet knows the network topology and recognizes all links interface ID of other nodes.
So when all links ID are represented in binary form; this node can associate this code from source to destination as binary chains. This chain is guaranteed to be unique
(there is no collision probability) [9].
The concatenation operation used is an example of a reversible or perfect hash, so the next hop information can be extracted without needing to forward table.

2.3.1 Index-Based: Packet Forwarding Examples

Figure (10) Forwarding with the Index-based PathID
In this section will explain how the packets will be forwarded from its source to its destination by using index based concept. As shown above in figure (10) there are three upgraded node (S, 2, 3) these nodes have the ability to compute the path ID.
Each node build its index table, which associate between IP address and interface link ID.
Node 2 has two interface links, so the index table has only two entries and need only two bits to represent it in binary form (10=2) (2 is the interface link).
Node 3 has five interface links, so index table have five entries and we need here 3 bit to encode the link into binary code (110=3) (3 is the interface link). Node S
14

concatenates the previous interface links together to form the path ID; that the datagram will be used it to reach its destination [9].
Node S will send the packet to node 2; this node will shift the path ID two bit right and extract the appropriate interface link from that two bit then obtain the appropriate IP address from index table.
Node 6 let the packet pass because it is not upgraded, the packet will reach node 3, which made the same steps that node 2 achieve.
At the end the path ID will be zero and continue until it reach the final destination.
We will take another example that shows all the nodes are upgraded nodes, each node build its index table. Source node computes the complete route to destination

Figure (11) Forwarding with the Index-based PathID (All nodes are upgraded)
The index that the data packet should pass through its way to destination is (1, 2, and 1) these indexes are coded in binary form. When the datagram’s pass a node the route must be changed, part of the it will fall down, which represent the index that the packet already pass through, so at the destination it will be null.
In this student research project all nodes which are used in the scenarios are not upgraded nodes. There is a Routing Service entity which is responsible to compute the routes. So the nodes only send the name of its destination and the Routing
Service will compute the route.

2.4 Naming, addressing, and routing
There is always confusion when we discuss internet terms, name, address, and route because these terms are interpenetrating between each other.
In general they are taking these definitions, which are given by John F. Shoch’s [10]:
Name: a name identifies what we seek.
15

Address: an address indicates where it is.
Route: a route identifies a way to get there.
For more details we will describe those terms in different words: a name is string of characters, which is human readable and not need to be meaningful to all user, it indicate to resource, object .etc [10].
An address: In essence, addresses are just names but they are represented in binary form, which is understandable from machine. In practice addresses used to identify an object (it should unique throughout the domain) and as locater for this object [10].
A route: A route is the specific information that used to forward data to its destination address [10].

Figure (12) Name to address to path mapping
As it’s appearing in figure (12), there is interconnection between name, address and route. Each name (e.g. www.ilnenau.de), its bind to IP address (e.g.124.190.0.4)
(name→ address) and this address will be used to find the route to reach the destination (address→ route).

2.4.1 DNS - Domain Name System
It is very hard to remember the IP addresses of all of the Web sites we access every day. We just are not that good at remembering chains of binary numbers. We are good at remembering words, and that is where domain names come in.DNS give us the allowance to use friendly names, such as www.yahoo.com, to easily locate computers and other resources on network [11].
Usually a domain name consists of two parts or more, which are separated with dot.
The first step after we type the domain name into the browser is to transform this name into IP address, and when we get this address it’s easy to request this page.
The browser ask its name server, whether has he the IP address of this domain, if not then it send this request to one of root name servers. The root server knows the
16

IP addresses for all top level domains, so the root server give us the IP address destined for COM server as example [11].
Name server asking the COM server, if he know sites IP address, COM server knows the IP address of the name servers handling the site name and when return it our name server can now contact the site name server and get the IP address intended for it [10].

Figure (13) Domain Name Hierarchy

2.4.2 Mobile IP Addressing
IP Structure: “An IP address consists of 4-bytes of data. A byte consists of 8 bits therefore we have a total of 32 bits for each IP address” [12]. The IP address can be represented using one of these three methods: Hexadecimal: C0.A8.0A.02
Binary: 11000000. 10101000. 00001010.00000010
Decimal: 192.168.10.2 to simplify things, the decimal representation is usually use.

Figure (14) Mobile IP data flow

17

As we mention before IP address is used as a locator (routing to) and identifier
(naming) for the communication end point.
In Mobile IP the addresses that used are: Home address, which is hosts home agent
IP address. Care-of address, IP address on the foreign link used to locate the host.

2.4.3 Routing by Name
In routing by name, Addresses are no more used, these addresses which are used in
IP routing as an artificial intermediaries between names and routes to perform packets forwarding and routing until they reach their destination. In figure (15) names, which means what we are seeking are mapping to routes, which means how we will reach there, packets forwarding and routing are based only on names.

Figure (15) Name to path mapping

3. Architecture and processes
The new approach of next internet generation that we will talk about in this section is based on the concept of source routing (index-based routing) and name based routing. In this internet architecture all the nodes in the internet network will have the ability to get the routes from the source to the destination with help from the Route Service, which is responsible to compute these routes.
New architecture should support mobility operations too, when a Mobile node move from its Home Agent to a foreign agent. Two different scenarios will be introduced in this section to explain how mobility problem will be solved.

3.1 Route replaces IP
In currently internet architecture the basic element that the whole network depends on is the IP address. As we said before each name (Domain Name) has a unique IP, this address will be included in the datagram’s (IP packets) and help it to reach its destination. 18

DNS (Domain Name System) play a great role and represent the first step should be taken in the routing operation, it help us to resolve each Domain Name to IP address, which is Machine-Understandable.

Figure (16) DNS resolve the name to IP address
In our future view to the internet architecture we will try to replace the IP address with
Route’s, that mean every node will get the route to reach its destination from the
Route Service depending on topology information that the Route Service hold such as(name ,index…). Route Service (RS) will replace Domain Name System, so when we write in our internet browser a name for web site the RS will give the route to the
Destination.

Figure (17) Route Service resolves the name to Route
No more IP addresses will be used in routing. Each node will be identifying bye its name, that will help to calculate the route should the data traffic go through to reach the final destination. No more limitation problem of IP addresses, that we faced in currently internet architecture. Removing of IP addresses will give us free space.
One of the challenges that we will face in the next internet generation that is based on route instead of IP addresses is how we can implement this new approach when a mobile node leaves its home Agent and moved to another network.
How the correspondent node will know the route to mobile node if it has moved. What is the information’s that we need to achieve this operation i.e. (home agent name, foreign agent name, etc...). These entire questions should be answered in the next section. 3.2 Scenarios
Figure (18) shows all the messages that transmitted between all entities, which are shared in mobile IP scenario in MSC (Message Sequence Chart) diagram. First the
Mobile Node and the Foreign Agent exchange Advertisement message and
Solicitation message then the Mobile Agent Register itself with the Home Agent.
Finally the Correspondent Node send the Datagram’s to Mobile Node.
19

Figure (18) MSC representation of normal Mobile IP Scenario
So how the Mobility operation will take under the using of name based routing. After the Mobile Node has been moved to a new network, our basic goals in this situation to keep the connection between the Correspondent Node and the Mobil Node, to do this job we should know the route that allow the Correspondent Node (CN) to reach the Mobile Node (MN) in its new position.
To bind Correspondent Node with Mobile Node we have suggested three scenarios.
In the first one, each of the Mobile Node (MN) and Home Agent (HA) have a name, the second one, only the MN has a name, but we used additionally a reference route, which is the route between the HA and MN. In the third scenario we have used the
HAMultiplexer (this entity will be explained in the third scenario) this HAMultiplexer will have no name.

3.2.1 First scenario (MN and HA have a name)
In this scenario both of Mobile Node and Home Agent are identify by their names.
Figure (19) shows how the (MN), (HA), and (CN) will exchange the messages between of them to achieve Mobility Scenario.
First of all the nodes in the network should be registered with its names in the Route
Service, so it can easily compute the Routes between these entities. As example for that in our MSC scenario the Mobile Node register its name in the Route Service
(RS).
20

Figure (19) a MSC representation for Mobility Scenario, when both of MN and HA have a name
The second step should the Mobile Node take is to send a route request to the Route
Service to obtain the route between the Mobile Nodes Old Position and the Home
Agent. So when the MN get the route to the (HA), it send a message to the (HA), which can get and store from this message the return Route. This route will be called the OldRouteToMN.
When the mobile node has moved to another network it sends immediately a route request to the Route Service. This request includes the Home Agent Name, so the
Route Service computes the route between (MN) New Position and (HA) and sends it again to (MN).
When the Mobile Node gets this route it will be able to send a registration request to the Home Agent. The return route, which will be calculated through the journey of registration packet to the Home Agent will be stored in the (HA) and it will be used to reach the Mobile Node. This route will be called NewRouteToMN.
In other hand when randomly any correspondent node wants to communicate with mobile node. It sends the Mobile’s Node Name to the Route Service to get the route to the (MN), and then with this route can it reach to the MN in the Old Position. So
21

because of that the Home Agent should intercept CN Datagram’s and make a route mapping with stored return route (NewRouteToMN) to allow this Datagram to reach the (MN) in the new position.
This mapping operation will take place after a Comparison between the
RemainRoute, which is the route that allow CN Datagram’s to reach (MN) in Old
Position, and the OldRouteToMN, That we mentioned earlier.
If the two routes are equal the Home Agent will know that the (CN) Datagram’s want to reach (MN) in the New Position, so it will swap the RemainRoute with
NewRouteToMN and the (CN) Datagram’s will reach its destination.
In this scenario each Mobile Node should store the name of the Home Agent that’s means we need a more memory to do this. In other hand this scenario will be used with all network topology.

3.2.2 Second Scenario (reference route)
In this scenario only Mobile Node is identify by a name. Figure (20) shows how the
(MN), (HA), and (CN) will exchange the messages between them to achieve a
Mobility Scenario.
The question is how the Home Agent will get the name of the Mobile Node. This issue can be handled in several ways but these solutions will have the same problem, which is the need for large memory to allow the Home Agent to store the
MN names.
One of These solutions is that the Home Agent will be part of the registration process in the Routing Service for each MN belongs to it. When the MN wants to register itself in the Routing Service it sends first its name to the Home Agent which will hold this name for a short time.
The HA will use it to complete the MN registration process in RS (Route Service) and to get the reference route. RS will response to the registration message by sending a reference route to HA. HA will send this route to OldMN and at the end of this the HA can remove the MN name to reduce the size of used memory.
When the Mobile Node has moved to another network, it sends a route request
(include its name) to the Route Service to get this route between its new position and old position.
With some calculation based on the Reference Route the Mobile Node has the ability to compute the route to the Home Agent. After that the MN will be able to send a registration request to the Home Agent and the return route, which will be calculated through the journey of registration packet to the Home Agent. This route will be stored there as a (NewRouteToMN) and then used to reach the Mobile Node.
22

Figure (20) An MSC representation for Mobility Scenario with reference route
In other hand when any correspondent node wants to communicate with mobile node. It sends the Mobile’s Node Name to the Route Service to get the route to the
MN, and then with this route can it reach to the MN in the old position. So because of that the Home Agent should intercept (CN) Datagram’s and make a route mapping with stored return route (NewRouteToMN) to allow this Datagram to reach the (MN) in the new position.
This mapping operation will take place after a Comparison between the
RemainRoute, which is the remain route that allow (CN) Datagram’s to reach MN in
Old Position and the Reference Route, That we mentioned earlier. If the two routes are equal the Home Agent will know that the (CN) Datagram’s want to reach MN in the New Position. So it will swap the RemainRoute with NewRouteToMN and the
(CN) Datagram’s will reach to its destination.
In this scenario Mobile Node does not need to store the name of the Home Agent and this will be a good advantage. But the disadvantages will be that the Home
Agent will need more memory to store the names of mobile nodes and in addition to this, this scenario will be used only with specific network topology where the Home
Agent should be between the MN and RS.
23

4. Implementation
In this section we will discuss how we can take advantage of the scenarios mentioned above and turn them into an Applicable scenario. This implementation scenario will be a detailed design for the first and second scenario. In this scenario we are going to suggest using of HomeAgentMultiplexer.
So what HomeAgentMultiplexer means. This entity is derived from type (gates), which is defined in Frogger simulator classes.
The major task of this entity is to handle the packets, which are sending from the
Mobile Node and the Correspondent Node. The Home Agent Multiplexer makes a comparison and through this comparison it can decide to any Mobile Node should the data packets reach.
So if this Mobile Node is not at home the HomeAgentMultiplexer adds a route to the
Correspondent Node packets that helps it to reach MN in its new position. This process will be explained more clearly in figure (21).

Figure (21) a MSC representation for implementation Scenario with (Using
HAMultiplexer)
24

Figure (21) show us how the entities in the implementation scenario with (Using
HAMultiplexer) will exchange the messages between them to allow the
Correspondent Node packets to reach the Mobile Node in its new position.
First all the nodes should register their names in the Routing Service. Second when the Mobile Node reach to its new position it send a request to the Routing Service asking for the route to its old position (it’s simply send its name to RS).
The Routing Service will send back the route to (MN), then the Mobile Node sends
Registration Packet to Old Mobile Node and this packet will be intercept by the
HAMultiplexer which will get the return route to (MN) and use it as new route to reach
(MN).
When a Correspondent Node wants to communicate with the Mobile Node, simply it sends the name of this Mobile Node to the Routing Service and gets the route to it.
The HomeAgentMultiplexer will intercept all the packets are coming from the CN and add to them the new route that’s he got it from the Registration Packet. All CN packets will use the new route that they got it from the HAMultiplexer to reach MN in its new position.
The software structure of this implementation scenario will consist of these entities
Mobile Node, Old Mobile Node, Correspondent Node, Home Agent, and Home Agent
Multiplexer.
The first four entities the Mobile Node, Old Mobile Node and Correspondent Node and the Home Agent are derived from the Application class in the frogger simulator.
The Mobile Node Application will be responsible for sending registration packet, which will be intercepted by the Home Agent Multiplexer.
The Correspondent Node will be responsible of sending datagram packet to the
Mobile Node and this packet will be intercepted by Home Agent Multiplexer.
Home Agent Multiplexer is the important part of our software, which is represented by frogger simulator as gate; it’s derived from the Multiplexer Gate. It’s responsible of handle the registration packet and correspondent Datagram and then forwards the correspondent packet to the Mobile Node in its new position.
In addition to Mobile Node, Old Mobile Node, Correspondent Node, etc…, there is a registration packet, which is derived from the Packet class in frogger simulator.
To achieve our scenario we have made some changes to the frogger simulator especially to connect the Home Agent Multiplexer with the Home Agent, because of this we add some methods. Some changes are made too in the multiplexer gate to allow the packets to be forwarded to the Home Agent Multiplexer, which there will be handled. 25

5. Evaluation

Figure (22) Frogger GUI
In this section we will talk about the Simulator that we used in this paper. Frogger simulator is software that developed by the group of integrated communication in
Technical University of Ilmenau. Route Service is one of the important parts of frogger, which is responsible of routes computation.
Figure (22) show us how our mobility scenario looks like all the entities are connected to each other through bus objects, which are the yellow dots.
The white dots represent the Mobile Node, Correspondent Node and Home Agent, and the Old Mobile Node. The blue dot represents the Global Routing Service, which is explained in figure (23) clearly.
Each node in the routing service picture is identifying by a number generated randomly. This number will be registered in the Routing Service to help it to compute the routes. The arrows which are connecting between these nodes have an index number. Theses index are interconnected to form the routes between the nodes such
Mobile Node, Home Agent, etc….
26

Figure (23) Frogger GUI GlobalRS

Figure (24) Frogger GUI HA
27

Figure(24) shows how the Home agent look like .it consist of central multiplexer connected to interfaces ,buses which allow him to communicate with other entities in our scenario.

Figure (25) Home Agent Multiplexer attached with two MN

Figure (26) Home Agent Multiplexer after the MN1 move
The Home Agent Multiplexer is the most important part of our scenario. This gate will be responsible to handle the packets which are coming through the Home Agent to reach the Mobile Node in its old position.
Figures (25) and (26) represent the Home Agent Multiplexer connected with two mobile nodes one of them will moves to another network. So when MN1 in its new position sends a registration message this message will intercept by the Home Agent
Multiplexer.
The HAM will verify that this message is come from MN1 through a comparison operation between the routes ID that it holds (which is in our example is 17 for MN1) and the routes IDs which the packet hold. When the comparison is true the HAM get the return route from the registration packet and store it to use it later to reach MN1 in its new position.
HAM will intercept the packets sends from any correspondent node by using the same comparison method and it will add the stored route to this packet to allow it reach the MN1.
28

Figure (27) Messages Exchange
Figure (27) shows the messages exchange in our implemented scenario. The Mobile node sends from its new position a message to Routing Service this message is called Route Request to get the route to its old position.
This Route Request message includes the name of the MN and as a result of it the
MN will obtain the route to its old position from the RS. The second thing that the MN do is sending a registration message by using the route he got from RS.
This message will reach through the Home Agent to the Home Agent Multiplexer, which will handle this message and get from it the return route to reach MN in its new position. When any Correspondent Node wants to communicate with MN it send the name of
MN to the Routing Service to get the route but this route will be the route to the old position of MN. The packet which is sent from the Correspondent Node will reach the
MN Home Agent and it will be intercepted by the Home Agent Multiplexer.

29

The Home Agent Multiplexer will make a mapping by adding the route it got from the registration packet to the Correspondent Node packet to allow him to reach the MN in its new position.

6. Conclusion
There are many methods to implement Mobility scenarios; in the new internet architecture which based on the route instead of IP addresses, table (1) and (2) shows us the differences between these two methods and the Mobile IP.

Mobile IP

Mobility based on route
(Home Agent)

CN send the data traffic to MN, which is identifying by the IP address of its
Foreign Agent

CN sends its data traffic to MN, which is identifying by its Name.

In the registration process the MN send its CoA to the HA, which will intercept the
Datagram’s and redirect it to MN

In the registration process the MN send the route to reach its new position to the
HA ,which will redirect the Datagram’s to
MN

The HA is identify by its IP address

The HA should be identify by its global name, that’s mean all nodes which attached to this HA should know the HA names Table (1) difference between Mobile IP and Mobility based on route (Home Agent)

30

Mobile IP

Mobility based on route
(Home Agent Multiplexer)

CN send the data traffic to MN, which is identifying by the IP address of its
Foreign Agent

CN sends its data traffic to MN, which is identifying by its Name.

In the registration process the MN send its CoA to the HA, which will intercept the
Datagram’s and redirect it to MN

In the registration process the Home
Agent Multiplexer will intercept the registration packet which is sent from MN in its new position to MN in its old position and get from this packet the return route to MN in its new position

The Home Agent Multiplexer is identify by the return route to MN in its new position, each packet to old MN will be intercepted and return route will be added to it to reach MN in its new position The HA is identify by its IP address

Table (2) difference between Mobile IP and Mobility based on route (Home Agent
Multiplexer)

31

7. References
1. Debalina Ghosh “Mobile IP” http://www.acm.org/crossroads/xrds72/mobileip.html. 2. http://searchunifiedcommunications.techtarget.com/sDefinition/0,,sid186_gci21
4031,00.html
3. David M. Piscitello, Bellcore and A. Lyman Chapin, BBN “Introduction to
Routing” Reprinted with permission from Connexions Magazine (Volue 7, No.
9, September 1993), with permission. Connexions are a Softbank Forums publication. 4. http://www.inetdaemon.com/tutorials/internet/ip/routing/
5. Chakchai So-In, s_chakchai@yahoo.com “Mobile IP Survey Mobile IP
Terminology”.
6. http://ciscosystems.com/en/US/docs/ios/solutions_docs/mobile_ip/mobil_ip.pdf
7. http://tlclab.unipv.it/downloads/Sistemi%20di%20Trasmissione%20Radio/2008
0528/20_MobileIP_WAP.pdf “Mobile IP and Wireless Application Protocol”.
8. Charles E. Perkins Sun Microsystems “Mobile Networking through Mobile IP”. http://www.cs.colorado.edu/~rhan/CSCI_7143_002_Fall_2001/Papers/Perkins _Tutorial_Mobile_IP.htm.
9. Hema Tahilramani Kaur, Shivkumar Kalyanaraman, Andreas Weiss, Shifalika
Kanwar, Ayesha Gandhi, “BANANAS: An Evolutionary Framework for Explicit and Multipath Routing in the Internet”.
10. John F. Shoch, Inter-Network Naming, Addressing, and Routing, pp. 7279, Seventeenth
IEEE
Conference on Computer
Communication
Networks, Washington, D.C., 1978.
11. http://www.howstuffworks.com/dns.htm “How Domain Name Servers Work”
12. http://www.trainsignaltraining.com.” IP Addressing and Routing Part 1:
Invasion of IP Addresses”, Posted on November 5th, 2007 by Stelios
Antoniou.

32

Similar Documents

Premium Essay

Samplefile

...Glossary 1xEV-DO. See EV-DO. 1xEV-DV. The third phase of CDMA2000 following 1xEV-DO deployment. 1xEV-DV stands for 1x Evolution - Data Voice, and is characterized by a maximum data rate of 5.2 Mbps and the ability to support wireless Voice over IP (VoIP) services. 1xRTT. The first phase of CDMA2000, characterized by the ability to support a maximum data rate of 1.44 Kbps. 1xRTT stands for 1x, denoting the one radio channel of 1.25 MHz in Radio Transmission Technology. 2G. The second generation of wireless technology that was characterized by its use of digital transmissions rather than analog methods. Radio bandwidth is used for data transmissions. Data transmissions are limited to a maximum rate of 1.44 Kbps for CDMA 2G services (9.6 Kbps for GSM 2G). Radio bandwidth is consumed whenever the Mobile Node (MN) is connected to the Internet, regardless of whether it is receiving or transmitting data. This is based on the IS-95A standard for CDMA. 2.5G. An evolutionary step between 2G and 3G wireless services wherein two enhancements were introduced over 2G. The first is that the MN only consumes radio bandwidth when data is being transmitted or received. The second is that the maximum data rate increased to approximately 64 Kbps. Most 2.5G services only support data rates between 1.15 Kbps and 384 Kbps. This is based on the IS-95B standard for CDMA. 3G. The third generation of wireless technology, wherein data services are packetized, with...

Words: 7125 - Pages: 29

Premium Essay

Manet

...Department of Computer science & Engineering,SIRT Bhopal Abstract-- Mobile ad-hoc network is wireless network composed of different nodes communicate with each other without having to establish infrastructure. The security of such network is a major concern. To improve the security of such network, technique proposed here is securing routing protocol AODV through the use of Symmetric Encryption algorithm AES. This secures the data as well as preserves the confidentiality. Further future work to be carried as of node authentication using IP address and using the AODV routing protocol and digital signature scheme. Keywords-- Mobile ad-hoc, symmetric encryption algorithm, confidentiality, AODV, Digital signature, IP address The nodes involved in a MANET should collaborate amongst themselves and each node acts as a relay as needed, to implement functions e.g. security and routing. C] Multihop Routing: Basic types of ad hoc routing algorithms can be singlehop and multihop, based on different link layer attributes and routing protocols. Single-hop MANET is simpler than multihop in terms of structure and implementation, with the cost of lesser functionality and applicability. When delivering data packets from a source to its destination out of the direct wireless transmission range, the packets should be forwarded via one or more intermediate nodes D] Light –weight Terminal: In most cases, the MANET nodes are mobile devices with less CPU processing capability, small memory size, and...

Words: 2868 - Pages: 12

Free Essay

Use of Ipsec in Mobile Ip

...IPSec in Mobile IP DONE BY: SALEM ITANI SUBMITTED TO: Dr. AYMAN KAYSSI DATE: MAY 21, 2001 ID #: 20011003 INTRODUCTION As mobile computing has become a reality, new technologies and protocols have been developed to provide to mobile users the services that already exist for non-mobile users. Mobile IP, one of these technologies, enables a node to change its point of attachment to an internet in a manner transparent to applications running on top of the protocol stack, since its IP address does not change. To provide this transparency, new elements are required: the “home agent”(HA), located in the home network, will forward all incoming packets addressed to the mobile node’s (MN) new location. The foreign agent (FA) is responsible for providing a temporary address to the MN. The flexibility of communication through the Internet allows the existence of such protocols as Mobile IP. As much as this is true, it is as well the fact that every time new protocols or services are made available on the Internet, new security challenges arise. IPSec has been developed as a protocol to provide security at the IP layer. That is to say, using IPSec all communications on the Internet can be accomplished in a secure fashion. Providing security is not an easy task, since many situations have to be taken into account. The approach IPSec uses to address security is by managing two key concepts: privacy and authentication. In this paper, the MOBILE IPv4 & MOBILE...

Words: 9748 - Pages: 39

Premium Essay

Nt1330 Unit 3 Network Analysis

...91377 Student Report Demonstrate understanding of local area network technologies involves: Describing networking concepts Explaining why the components have been used in a local area network (LAN) to achieve the desired characteristics Explaining how the connection technologies allow the components to function in a LAN Describing the access control method used in the Ethernet architecture. LAN Uses 2 Characteristics 2 Purpose 2 Peer to Peer LANs 3 Characteristics 3 Purpose 3 Client/Server LANs 3 Characteristics 3 Purpose 3 Bandwidth 4 QoS 4 Data Transmission Modes 4 Network Address Translation (NAT) 5 TCP/IP (Transmission Control Protocol/Internet Protocol) 6 Open System Interconnection (OSI) Model 7 IP Addressing 8 Components 9 To...

Words: 1600 - Pages: 7

Free Essay

E-Business - Voice over Ip

...E-Business : Voice over IP Faculty of Computer Science and Automatic Control Politehnica University of Bucharest 313 Splaiul Independenţei ROMANIA Abstract: - Electronic business, commonly referred to as "eBusiness" or "e-business", or an internet business, may be defined as the application of information and communication technologies (ICT) in support of all the activities of business. Commerce constitutes the exchange of products and services between businesses, groups and individuals and can be seen as one of the essential activities of any business. Electronic commerce focuses on the use of ICT to enable the external activities and relationships of the business with individuals, groups and other businesses. Electronic business methods enable companies to link their internal and external data processing systems more efficiently and flexibly, to work more closely with suppliers and partners, and to better satisfy the needs and expectations of their customers. Key-Words: - VoIP, gatekeeper, endpoint, gateway, softphone, asterisk 1 Introduction E-business involves business processes spanning the entire value chain: electronic purchasing and supply chain management, processing orders electronically, handling customer service, and cooperating with business partners. Special technical standards for e-business facilitate the exchange of data between companies. E-business software solutions allow the integration of intra and inter firm business processes. E-business...

Words: 5944 - Pages: 24

Premium Essay

Ddos Attack

...A Secure Intrusion detection system against DDOS attack in Wireless Mobile Ad-hoc Network Abstract: Wireless Mobile ad-hoc network (MANET) is an emerging technology and have great strength to be applied in critical situations like battlefields and commercial applications such as building, traffic surveillance, MANET is infrastructure less, with no any centralized controller exist and also each node contain routing capability, Each device in a MANET is independently free to move in any direction, and will therefore change its connections to other devices frequently. So one of the major challenges wireless mobile ad-hoc networks face today is security, because no central controller exists. MANETs are a kind of wireless ad hoc networks that usually has a routable networking environment on top of a link layer ad hoc network. Ad hoc also contains wireless sensor network so the problems is facing b y sensor network is also faced by MANET. While developing the sensor nodes in unattended environment increases the chances of various attacks. There are many security attacks in MANET and DDoS (Distributed denial of service) is one of them. Our main aim is seeing the effect of DDoS in routing load, packet drop rate, end to end delay, i.e. Maximizing due to attack on network. And with these parameters and many more also we build secure IDS to...

Words: 5918 - Pages: 24

Premium Essay

Nt1330 Unit 1 Assignment 1

...functionalities of the devices. Router: Move router gadgets packets of information between systems. The router, in at least two systems, typically two LAN or WAN LAN or is connected to the system provider. Router is located in the assembly point of the two or more of the system in the passage. Switch: electrical switch is a segment that can be transferred from the next transmitter in the electrical circuit breaking prevention or down. The device of switches, specifically, for example, whether the input switch is operated, body weight, and can be developed using the detected temperature and current, the circuit can be designed by moving the problem It can be processed into human administrator to control. NIC: As network interface card (NIC) is able to associate with the system, is a computer circuit board or card has been inserted into the computer. Media: There are different types of cables, systems engineer / chief...

Words: 2126 - Pages: 9

Free Essay

Route Redistriution

...Redistributing Routing Protocols Document ID: 8606 Contents Introduction Prerequisites Requirements Components Used Conventions Metrics Administrative Distance Redistribution Configuration Syntax and Examples IGRP and EIGRP OSPF RIP Redistributing Static Routes Except Gateway of Last resort in RIP using Route Map IS−IS Connected Routes Avoiding Problems Due to Redistribution Example 1 Example 2 Example 3 Example 4 Example 5 How to Redistribute Single Static Route Related Information Introduction The use of a routing protocol to advertise routes that are learned by some other means, such as by another routing protocol, static routes, or directly connected routes, is called redistribution. While running a single routing protocol throughout your entire IP internetwork is desirable, multi−protocol routing is common for a number of reasons, such as company mergers, multiple departments managed by multiple network administrators, and multi−vendor environments. Running different routing protocols is often part of a network design. In any case, having a multiple protocol environment makes redistribution a necessity. Differences in routing protocol characteristics, such as metrics, administrative distance, classful and classless capabilities can effect redistribution. Consideration must be given to these differences for redistribution to succeed. Prerequisites Requirements There are no specific requirements for this document. Components Used ...

Words: 5394 - Pages: 22

Free Essay

Anonymous Users Srs

...Guidance of Table of Contents Revision History 1. Introduction 1.1 Purpose 1.2 Project Scope 1.3 References 2. Overall Description 2.1 Product Perspective 2.2 Product Features 2.3 User Classes and Characteristics 2.4 Operating Environment 2.5 Design and Implementation Constraints 3. System Features 3.1 System Feature 1 3.2 System Feature 2 (and so on) 4. External Interface Requirements 4.1 User Interfaces 4.2 Hardware Interfaces 4.3 Software Interfaces 4.4 Communications Interfaces 5. Other Nonfunctional Requirements 5.1 Performance Requirements 5.2 Safety Requirements 5.3 Security Requirements 5.4 Software Quality Attributes 6. Other Requirements Appendix A: Glossary Appendix B: Analysis Models 1. Introduction 1. Purpose The project is to make available security and privacy protection to the user credentials in wireless mesh networks (WMN) using group signature and pair wise secrets terms. 2. Project Scope In wireless mesh network, there is no restriction for public to access the internet or mobile services. So that the large numbers of attacks are might be happened like eavesdrop, inject or impersonate in WMN.All these attacks are great threat to the user credential, because the adversaries’ once disclosed the user’s credential means devastating the user consequences. We proposed two scheme for protect the user’s privacy in wireless...

Words: 1918 - Pages: 8

Free Essay

Telephony Platform

...single packet based infrastructure. SoftSwitch, the kernel of next generation networks (NGN), a software that is used to bridge a traditional PSTN and VoIP by linking PSTN to IP networks and managing IP multimedia traffic. This paper gives an overview of SoftSwitch and summarize the currently deployed free and open source SoftSwitch i.e. FreeSWITCH in telecommunication industry. FreeSWITCH uses SIP protocol for communication between end terminals. This paper also gives an overview of SIP protocol and SIP proxy servers used by FreeSWITCH in end to end communication. Keywords- Next Generation Networks(NGN) ,SoftSwitch, FreeSwitch,Session Initiation Protocol, SIP proxy server Introduction Next Generation Networks (NGN) is convergence of various networks such as the Public Switched Telephone network (PSTN), the packet data networks (Internet) and wireless communication networks, which can provide multimedia services including voice, data and video. NGN can be divided in three functional layers: Transport, Call Control & Signaling and Service & Application layer as shown in figure1. [1] [pic] Fig.1 Today’s Network and Next generation network SoftSwitch, the core element of NGN in Call Control & Signaling Layer, is built over a system composed of many devices distributed over IP network. IP SoftSwitch is a platform that allows implementing various types of Voice Over Internet Protocol (VOIP) services, with retaining shared, uniform management interface. The International...

Words: 1701 - Pages: 7

Premium Essay

Nt2580

...able to come up with the following information design in a form of questions and answers. What is required to implement a SAN and /or NAS?  Storage-area networks (SANs) are composed of computers and remote storage devices. The computers are typically connected to the remote storage devices using SCSI over Fibre Channel (see Figure 1). Other implementations of SAN exist, but this is the most common. In a SAN, all the storage appears local, just as if the remote disk were directly connected to the computer and physically located inside the computer chassis. Network-attached storage (NAS) devices appear to the user as a remote drive letter or are named remote storage device. Typically, the operating system employs a protocol such as Network File System (NFS) or Common Internet File System (CIFS) to discover, log in, and transfer content to and from a storage device. NFS and CIFS both communicate over Ethernet. The user typically enters a username and password, and then is granted access to a particular device. Figure 1. SAN and NAS use different protocols and transports. Click here to see an enlarged diagram. Read more:  http://broadcastengineering.com/mag/broadcasting_san_nas_practical/#ixzz1vw2GVkV9 The SAN and NAS storage schemes evolved to meet different needs. Some possible benefits of SAN include access to large amounts of data; sharing data among different applications on...

Words: 7132 - Pages: 29

Premium Essay

Nt1330 Unit 1 Lab Report

...MODULE DESCRIPTION A. Trust Systems Intermediate nodes are computing or networking is a distributed application that partitions watchdog’s task between source and target nodes. These nodes are connected and communicate by using IP address and host name. Often Inheritor nodes operate over a network on separate functionalities. A server machine is a high performance host that is running one or more tasks which share its resources with nodes. B. Target Nodes Choose the target node from the intermediate nodes. Then the number of connections to establish between each pair of target node and established between each and every nodes for network communication. From the source node to the destination node and intermediates node must have connection between source nodes after communicate between combinations of multi node each and every node must be link to each other. After to choose the neighbour nodes and communicate with each other and also set the priority queue in the network communications. In multipath data transmission, send the data from source node that means which type of file size and file extension. C. Watchdog Optimization Techniques...

Words: 554 - Pages: 3

Free Essay

Nt1210 Midterm Review

...NT1210 Introduction to Networking Unit 1: Mid-Term Mid Term Review 1 Nibble, Byte, Word, Double Word Nibble, Byte, Word, Double Word Figure 1-2 2 Kilobyte, Megabyte, Gigabyte, Terabyte Size (2N Bytes) Term Size (Bytes) Kilobyte Megabyte Gigabyte Terabyte 1024 1,048,576 1,073,741,824 1,099,511,627,776 Kilobyte, Megabyte, Gigabyte, Terabyte 210 220 230 240 Rounded by Size (Bytes) 1,000 1,000,000 1,000,000,000 1,000,000,000,000 Table 1-1 3 Random Access Memory (RAM) Physically exists as set of microchips installed on plastic card (memory module) Central Processing Unit (CPU) uses RAM like people g ( ) p p use notepad Stores binary value so can use it later Can read data from RAM to recall value stored earlier CPU sends electrical signal over bus (electrical pathway) to communicate with RAM 4 Random Access Memory (RAM) (cont.) RAM uses address for each unique memory location where byte can be stored To write to RAM: CPU sends signal to RAM over the bus g to write (store) value into byte of RAM Address in RAM Value to be written To read from RAM: CPU uses similar process (see example in Figure 1-3 on next slide) 5 CPU Reads Byte 4 from RAM The CPU uses the same bus to read the current value of a byte in RAM as it does to send a message to RAM. The read request lists the address of the particular byte, asking for its value. RAM returns the binary value stored at that address. CPU Reads Byte 4 from RAM 6 Figure 1-3 Writing Individual Bits in Byte 4 of RAM...

Words: 11596 - Pages: 47

Free Essay

Toc Research Paper Analysis

...AERONAUTICAL MOBILE AD HOC NETWORKS CONTENTS 1: Introduction 2: Literature Survey 3: References PROBLEM STATEMENT 1.1 Ad-hoc network "Ad Hoc" is actually a Latin phrase that means "for this purpose." It is often used to describe solutions that are developed on-the-fly for a specific purpose. In computer networking, an ad hoc network refers to a network connection established for a single session and does not require a router or a wireless base station. An ad hoc network is a temporary network connection created for a specific purpose (such as transferring data from one computer to another) 1.2 Mobile ad hoc network(MANET) A MANET is an autonomous collection of mobile users that communicate over relatively bandwidth constrained wireless links. Since the nodes are mobile, the network topology may change rapidly and unpredictably over time. The network is decentralized, where all network activity including discovering the topology and delivering messages must be executed by the node themselves, i.e., routing functionality will be incorporated into mobile nodes. In other words, MANET is a type of ad hoc network that can change locations and configure itself on the fly. Because MANETS are mobile, they use wireless connections to connect to various networks. This can be a standard Wi-Fi connection, or another medium, such as a cellular or satellite transmission. Literature Survey 2.2 Analysis of research Paper TITLE OF PAPER | AUTHORS | YEAR...

Words: 982 - Pages: 4

Premium Essay

Unit 1 Assignment 1: Effects of Routing on Current Communication Methods Used by Organizations

...December 2011 | | | | | | | | | | | | | | | | | | | | | | | | | | ------------------------------------------------- Graded Discussion/Assignment Requirements Discussion or Assignment Requirements documents provided below must be printed and distributed to students for guidance on completing the discussions and assignments and submitting them for grading. Instructors must remind students to retain all handouts and assignment documents issued in every unit, as well as student-prepared documentation and graded deliverables. Some or all these documents will be used repeatedly across different units. Unit 1 Assignment 1: Effects of Routing on Current Communication Methods Used by Organizations Learning Objectives and Outcomes * Explore the effects of routing on current communication methods used by organizations. Assignment Requirements The Johnson Company provides networking components and services. It sounds simple, but management knows it takes a lot of planning to get it right. Retail product and service businesses operate in a crowded market. There is intense competition for customers. Today's businesses have found that the pursuit and retention of customers is the primary goal and Johnson is concerned that their methods are too antiquated to keep them competitive. Currently, Johnson used analog phone lines and takes all customer orders by...

Words: 3601 - Pages: 15