Seamless Integration of MANETs into IP-based Access Networks

Size: px
Start display at page:

Download "Seamless Integration of MANETs into IP-based Access Networks"

Transcription

1 11ª Conferência sobre Redes de Computadores 1 Seamless Integration of MANETs into IP-based Access Networks A. Triviño-Cabrera Abstract Access Routers inform about some configuration parameters (such as those related to the construction of temporary IP addresses) to the devices that are inside their coverage area so that the devices can access to external networks. However, the Neighbor Discovery Protocol, whose specifications describe this functionality, prevents messages from being propagated so this technology cannot be straightforwardly applied into multihop wireless networks. In order to overcome this shortcoming, an Internet Gateway is used. Opportunistic gateways, which are mobile nodes configured to act as gateways, offer a flexible and reliable solution to guarantee access to IPbased access network in MANET. Although some mechanisms to integrate MANET into the Internet suggest the use of opportunistic gateway, none have specified how the Access Router becomes aware of which node is acting as the Internet Gateway. This paper focuses on this concern by developing a simple and successful scheme to use opportunistic gateways in Internet-connected MANETs. By using conventional Neighbor Discovery messages, a seamless and transparent integration that does not alter conventional Access Router s behavior is achieved. Index Terms Integration, MANET, Multihop wireless network, Neighbor Discovery Protocol, Opportunistic Gateway. T I. INTRODUCTION HE use of a wireless access to connect to the Internet is a key issue for ubiquitous computing paradigm. Under some specific geographical constraints, the development of a wireless infrastructure that guarantees the mobile nodes access within a particular area is economically unfeasible. In these cases, wireless connection can benefit from Mobile Ad Hoc Network (MANET) technology to reduce the costs of the deployments. Specifically, the use of multihop communication can easily eliminate dead zones and it also virtually extends the coverage area of the Access Routers or GGSN (Gateway GPRS Support Node) in UMTS (Universal Mobile Telecommunication Systems) [1]. However, the use of MANETs in this context prompts several technological challenges that need to be previously solved. Concerning the architecture, the infrastructured network provides an Access Router (or a GGSN in UMTS), to which mobile devices connect to access Internet hosts. In IPv6, Access Routers are responsible for informing about some configuration parameters to those nodes that are inside their coverage area [2]. With this information, mobile devices become aware of the technique to configure their global IP addresses which will be valid in the context where they are temporarily. When a stateless configuration mechanism is applied, the nodes also received the prefix information from which they can construct their own IP addresses [3]. Therefore, the information that Access Routers emit is vital to guarantee the mobility of wireless devices that dynamically connect to the available points of attachment and which must acquire valid IP addresses in each temporary scenario. However, conventional Access Routers does not provide this information to all nodes in the MANET as their messages are restricted to one hop. This significant drawback is due to the fact that this functionality is described in the Neighbor Discovery Protocol (NDP) [2]. This protocol prevents all the messages from being propagated as they are emitted with link local addresses [4]. Consequently, the nodes outside the coverage of the Access Routers will not know how to acquire a valid and temporary IP address nor even how to route the packets to the Access Router so they can be received by external hosts. Another significant limitation of Access Routers is related to routing. Since conventional Access Routers do not implement any ad hoc routing protocol [5], when they receive packets whose destination corresponds to a MANET node which is located outside their coverage area, they cannot forward the packets because they do not know any route to the destination and they cannot even discover the corresponding routes. These two shortcomings are overcome by installing an Internet Gateway which complements the Access Router (AR). Firstly, it generates new messages which contain the information emitted by the AR. However, these messages can be propagated in the MANET so all the nodes in the network become aware of the configuration parameters. On the other hand, the Internet Gateway also provides the routing procedures that are commonly absent in conventional Access Routers. With this new element, when the Access Router receives a packet whose destination is a node in the MANET, the packet is forwarded to the Internet Gateway which conveniently routes the packet in the MANET. This forwarding could be explicitly performed, i.e., the Access Router is configured so that all packets destined to the MANET nodes are sent to the Internet Gateway which is in charge of routing them. By this technique, the conventional behavior of the Access Router is modified in order to include information related to the Internet

2 11ª Conferência sobre Redes de Computadores 2 Gateway in its routing tables. This necessary adaptation could be easily accomplished in scenarios where dedicated and fixed Gateways are permanently attached to the Access Routers. However, the formation of mobile ad hoc network could spontaneously occur in unplanned scenarios where fixed Gateways are not present. In these cases, the use of an opportunistic or occasional Gateway provides a feasible solution for Internet connectivity in MANET. Opportunistic gateways are mobile nodes which configure themselves to operate as the Internet Gateway on behalf of the rest of the nodes in the MANET. As opportunistic gateways must work with Access Router to route the packets in the MANET, they must be directly connected. As any node holding these conditions could operate as the Internet Gateway, the use of opportunistic gateways provides more flexibility and robustness for the Internet connection of MANET. The use of opportunistic gateways is appropriate for coverage area extensions in cellular networks where mobile nodes belonging to the same ad hoc network communicate among them without any previously deployed network while the communication with external host demands a MANET node acting as the Gateway that is neither provided nor controlled by the telecommunication operator. Moreover, these gateways could be also suitable for automotive scenarios where a vehicle temporally connects to a petrol station or to an UMTS access while performing the Gateway functionalities on behalf of some other vehicles [6]. To make this strategy succeed, the configured opportunistic gateway should not be private from its freedom to move anywhere, even to some areas where it is not reachable by the AR. With this freedom, the gateway functionalities are expected to be transferred among the nodes in the MANET. So, in these cases, temporary opportunistic gateways are dynamically configured. Despite of the benefits that the use of opportunist gateway produces, so far there is not any specification about how the opportunistic gateway should be employed by the Access Router. Specifically, an important issue should be defined: how does the Access Router know which node is playing the role of the Internet Gateway (especially, when these functionalities are dynamically transferred in the MANET)? An automatic mechanism is necessary for this setting. Aiming at not altering the usual Access Router functionalities, the use of opportunistic gateways should not be based on forcing the Access Router to analyze the messages generated by the Gateway in order to extract the Internet gateway information, such as its IP address. Therefore, a transparent, seamless and automatic cooperation between the Access Router and the Internet Gateway is preferred. In this paper, a new simple and successful scheme which holds these requirements is proposed. The structure of this paper is as follows. Section II presents the related work about how opportunistic gateways are proposed to be used. Section III describes the proposed scheme for opportunistic gateway. The proposal is evaluated by analyzing its behavior in the possible situations where opportunistic gateways could be employed. This evaluation is shown in Section IV. Section V shows the cost of the proposal in terms of number of messages injected into the network. Finally, Section VI draws the main conclusions derived from this work. II. RELATED WORK IP-based access networks may offer an AR to which mobile devices connect. For the integration of mobile devices in a MANET into IP-based access networks, there is a great variety of proposed supports. All of them are supported by a Gateway that complements the Access Router so that it can cope with multihop wireless communication. Figure 1 shows this interconnection. INTERNET MANET Fig. 1. Scheme of an Internet-Connected MANET. AR Gateway The Gateway characteristics as mobility, implementation details or their availability to work with some other Gateways differentiate these proposals. About the Gateway s implementation, two opposite approaches can be basically observed. Firstly, the Internet Gateway could be considered as a dedicated device which is specifically pre-installed in those environments where a MANET is expected to be connected to the Internet [7] [8] [9]. In this sense, the dedicated Internet Gateway has two interfaces: one to connect to the ad hoc network and another to communicate with the Access Router. Furthermore, the Internet Gateway could be also integrated into the Access Router. As mobile ad hoc networks could be spontaneously formed in scenarios where no specific ad hoc equipment has been previously set up, some works [10] [11] [12] propose the use of MANET nodes that configure themselves to operate as

3 11ª Conferência sobre Redes de Computadores 3 Internet Gateways on behalf of the rest of ad hoc devices. These nodes are referenced as opportunistic or occasional gateways. In [10], gateways are restricted to stay in the coverage area of the AR while in [11] gateways are completely free to move. The proposal in [11] is one of the documents which specify the behavior of opportunistic gateways. Specifically, it detects two techniques that are necessary when working with opportunistic gateways. These techniques are: A. Selection of the Opportunistic Gateway Among all nodes with direct access to AR, one of them will assume the role of the Internet Gateway. The method to select the node should be based on a distributed algorithm which does not need any centralized equipment. Therefore, the nodes in the MANET will coordinate to select one Internet Gateway. For instance, the proposal in [11] suggests the use of internal timers set with random values. When the timer expires, the node check if there is a Gateway configured. If not, the node will configure itself as the new Gateway and it will immediately announce its new acquired state to the MANET. Additionally, the mechanism specified in [11] also proposes that the nodes placed in the coverage area of the AR that does not work as Gateway could route packets to the AR in order to balance traffic. B. Transfer of the Gateway Functionalities When the node acting as Gateways escapes from the coverage area of the AR, it cannot operate as gateway any longer. Under these circumstances, a mechanism by which the nodes detect the absence of the gateway is necessary so the nodes could trigger the procedures to configure a new gateway [13]. III. PROPOSAL FOR THE USE OF OPPORTUNISTIC GATEWAYS The AR must know which node is acting as the Gateway in order to forward the packets to be routed in the MANET. So far there is not any specification about how the AR configures itself to use opportunistic gateways. In this sense, the identification of the opportunistic gateways by analyzing the specific messages that the gateways generate could be considered a valid strategy. However, this functionality is not included in conventional AR so specific ARs would be demanded. In order to overcome this significant limitation, our proposal forces opportunistic gateways to configure themselves as address resolution proxy on behalf of the other MANET nodes [2]. This is a reasonable requisite as NDP is already incorporated in MANET nodes. As a benefit, the AR behavior is unaltered with this proposal. The configuration of opportunistic gateways as address resolution proxy reveals itself when the AR proceeds to discover the link-layer address associated to an IPv6 address to which the AR must send a packet. The discovery could be triggered because the AR does not know the destination link layer address or because it has detected that the one it knew has become invalid. This functionality, which replaces IPv4 ARP (Address Resolution Protocol) in IPv6 context, works as follows [2]. When the AR receives a packet whose destination is a node in the MANET, it studies if the destination is in its coverage area. With this purpose, the AR first checks if it knows the link layer address of the destination. For this operation, it queries its Neighbor Cache which binds IP addresses to link layer addresses. In case there is not any information about the intended destination in this structure, the AR proceeds to determine destination link layer address. Consequently, it generates a Neighbor Solicitation message. This is a one-hop message so it cannot be forwarded. Then, only the nodes in the coverage area of the AR will receive this solicitation. On receipt, the opportunistic gateway, configured as address resolution proxy, will reply with a Proxy Advertisement message. With this message, the opportunistic gateway is expressing its willingness to receive packets intended to other nodes and then, it will forward the packets to the corresponding destination. Occasionally, when the final destination receives the solicitation generated by the AR, it will reply with a Neighbor Advertisement message. In these cases, the AR receives two messages for a solicitation: the Proxy Advertisement and the Neighbor Advertisement. NDP specifications gives priority to Neighbor Advertisement messages so their information prevails against the data contained in the Proxy Advertisement independently on which messages was received first. When NDP was specified, this coincidence was taken into account so the authors include the override bit by which the messages generated by the final destination priories. Figure 1 depicts the procedure by which link-layer address are determined in the proposed scheme. In this diagram, the inclusion of multicast messages is represented by incorporating the destination or the origin of the messages [14]. IV. ANALYSIS OF THE PROPOSAL: STUDYING THE CASES As a first step, the correctness of the proposal is evaluated by analyzing the possible conditions on which the AR is when it needs to retransmit a packet whose destination is a MANET node. The identified states on which the AR could be are: A. The Neighbor Cache binds the destination IP address to its corresponding link layer address. The destination is inside the coverage area of the AR. The entry in the Neighbor Cache is considered valid and, consequently, it can be correctly used. Thus, the AR sends the packet to the final destination. B. The Neighbor Cache binds the destination IP address to the gateway s link layer address. The gateway is inside the coverage area of the AR. The AR will use the information contained in the Neighbor Cache to retransmit the packet to the gateway. Then, the gateway will route the packet to the final destination if it keeps valid routing data. Otherwise, the gateway will trigger the ad

4 11ª Conferência sobre Redes de Computadores 4 hoc routing procedures to learn a new path to the final destination. C. The Neighbor Cache binds the destination IP address to its corresponding link layer address. This information is stale because the destination is outside the coverage area of the AR. When the AR notices that this information is invalid (this could be perceived by any OSI layer), the procedures associated to the address resolution are executed. Therefore, the AR emits a Neighbor Solicitation message demanding for the link layer address of the IP address that is set in the destination field of the packet. D. The Neighbor Cache binds the destination IP address to the gateway s link layer address. This information is stale because the node that was acting as the gateway is not providing this service any longer, that is, a new gateway has already been chosen. In this case, the AR will proceed to emit the packet using the previous gateway s link layer (which is stored in the Neighbor Cache). If the previous gateway is still inside the coverage area of the AR, it will receive the packet and it can retransmit it to the destination as it is a MANET node. On the other hand, if the previous gateway is unable to receive the packet, any OSI layer will notify the NDP module that the packet has not been received. The AR will be demanded to initiate the address resolution procedures. E. The Neighbor Cache does not contain any data about the link layer address of the destination node. The AR will execute the address resolution procedures, as indicated in the NDP specifications. In the states C, D and E, the AR initiates the address resolution procedures. Thus, it emits a Neighbor Solicitation message demanding the link layer address of the IP address set in the destination field. The message will be responded by a Proxy Advertisement (generated by the gateway) and it can also prompt the response of the final destination if it is in the coverage of the AR. Therefore, the AR can receive three types of response depending on the timing of the potential receivers (the gateway and the final destination). These responses are: 1. The destination is not in the coverage area of the Access Router. In this case, the AR receives just one message: the message generated by the gateway. The proxy advertisement is analyzed by the AR and it binds the destination IP address to gateway link layer address. 2. The destination is inside the coverage area of the Access Router and its Neighbor Advertisement message reaches the AR after the Proxy Advertisement Under these circumstances, the AR firstly associates the destination IP address to the gateway link layer address as the Proxy Advertisement message indicates. Thus, the Neighbor Cache is conveniently updated but setting that the information has low priority. When the Neighbor Advertisement (generated by the final destination) is received, the AR updates its Neighbor Cache. The Neighbor Cache has already information for that destination but as it is marked with low priority. Therefore, the data contained in the Neighbor Advertisement is preferred. The packets will be transmitted directly to the final destination. 3. The destination is inside the coverage area of the Access Router and its Neighbor Advertisement message reaches the AR before the Proxy Advertisemen.t With the Neighbor Advertisement, the AR updates its Neighbor Cache. Later, the Proxy Advertisement generated by the gateway is received by the AR. As all Proxy Advertisements, the data contained in them are marked with low priority. Therefore, the Neighbor Advertisement information prevails and the Proxy Advertisement is silently discarded [2]. It is important to note that the situations explained above follows conventional NDP procedures. By configuring the opportunistic gateway as Address Resolution proxy, the AR communicates with the destination directly when it is in its coverage area. In another case, the AR sends the packets to the opportunistic gateway. With this procedure, the bottleneck in the link AR-Gateway is also lightened. V. SOLUTION COSTS As a second approach, the proposal is evaluated by means of a set of simulations supported by a simplified model of a MANET in MATLAB [15]. 50 mobiles nodes are uniformly placed in a scenario of 1500x300 m 2. The AR is set at the center of the simulation area. In this model, a geometric transmission is used so that two nodes are assumed to be connected when the distance separating them does not exceed the transmission range. In the simulations, this parameter is set to 250 m. On the other hand, the effect of interferences and collisions are captured by the parameter named probability of loss. The probability of loss indicates the probability that a message generated by the NDP does not reach its intended destination. In our experiments, the probability of loss ranges from 0, 0.1 and 0.2. The nodes move according to the Random WayPoint model. The speed of the nodes varies from a not-null minimum speed (1 m/s), as recommended in [16], to a maximum speed. The maximum speed of the nodes is varied (from 1 m/s to 10 m/s) in order to analyze the proposal under different mobility conditions. For every possible maximum speed, 10 runs are executed and the mean value of the results is used for the representations. The pause time is fixed to 0 s. Concerning the data traffic, the Access Router receives a data packet to a MANET node every second. The destination of the packets is fixed for every simulation. One simulation lasts 1000 seconds. The gateways are selected following the mobile multi-

5 11ª Conferência sobre Redes de Computadores 5 Number of messages gateway support. The gateway functionalities are transferred among the MANET nodes in an optimized way as in [13]. In the first set of experiments, the correctness of the proposal was verified. In this sense, for the different mobility conditions and the different probability of loss, it was checked that the AR could always discover the link layer address of the MANET node destination (bind to the opportunistic gateway or to the node itself). In scenarios with probability of loss, the AR may be obliged to send the Neighbor Solicitation message multiple times. In the second set of experiments, the costs of the proposal are quantified. Towards this goal, we have employed the number of messages that the proposal produces. The Proxy Advertisement messages, the Neighbor Advertisements and the Neighbor Solicitations are counted for this purpose. Figure 2 shows this metric for different mobility conditions and different probability of loss loss probability = 0 loss probability = 0.1 loss probability = Maximum Speed (m/s) Fig. 2. Number of messages provoked by the proposal. As can be observed, increasing the speed of the nodes leads to an increment in the number of changes in the Neighbor Cache. The updates of this structure is achieved by means of NDP messages so the number of messages that the proposal injects in the network also increments. On the other hand, the probability of loss also impact on this metric. Including a not-null probability of loss implies that the information contained in the Neighbor Cache is valid for a shorter period than in idealistic propagation conditions. However, by retransmitting some messages, the proposal is able to make the AR work with dynamic gateways. Considering the number of messages per change in the NeighborCache, it was checked that the mean value of is figure was lower than 3 for idealistic conditions. When a probability of loss is applied, the number of messages necessary to operate increases. The repetition of messages is responsible for this increment. VI. CONCLUSIONS Connection of MANET to IP-based access networks gains reliability and flexibility when opportunistic gateways are used. Opportunistic gateways are nodes in the MANET that configure themselves as gateway on behalf of other nodes. Despite of the benefits associated to the use of opportunistic gateways, there is not any specification about how the AR becomes aware of which node is playing the role of gateway. The automatic use of opportunistic gateways is especially vital in scenarios where the gateway functionalities are frequently transferred among the MANET nodes. This paper proposes a new and simple scheme by which opportunistic gateways are used in a seamless and transparent way in Internet-connected MANETs. The analysis of the possible situations where the proposal is executed demonstrates its correctness. By means of simulations, the costs associated to the use of the proposal are quantified. ACKNOWLEDGMENT This work has been partially supported by Project No. TEC C REFERENCES [1] Kaaranen, H., Ahtiainen, A., Laitinen, L., Naghian and S., Niemi, V UMTS Networks: Architecture, Mobility and Services. Wiley Press. [2] Narten, T., Nordmark, E., Simpson, W. and Soliman, H., Neighbor Discovery for IP version 6 (IPv6). IETF RFC [3] Thomson, S., Narten and Jinmei, T IPv6 Stateless Address Autoconfiguration. IETF RFC [4] Hinden, R. and Deering, S IP Version 6 Addressing Architecture. IETF RFC [5] Royer, E. M. and Toh, C-K A Review of Current Routing Protocols for Ad Hoc Mobile Wireless Networks. IEEE Personal Communications, vol. 6, Is. 2, pp (April 1999). [6] Ruffino, S., Stuper, P., Clausen, T. and Singh, S Connectivity Scenarios for MANETs. IETF Internet Draft (work in progress). [7] Wakikawa, R., Malinen, J. T., Nilsson, A. and Tuominen,A. J Global connectivity for IPv6 Mobile Ad Hoc Networks. IETF Internet- Draft (work in progress) [8] Jelger, C. and Noël,T Proactive Address Autoconfiguration and Prefix Continuity in IPv6 hybrid ad hoc networks. Proceedings of the Sensor and Ad Hoc Communications and Networks (SECON), pp , (September 2005) [9] Cha, H. W., Park, J. S. and Kim, H. K Extended Support for Global Connectivity for IPv6 Mobile Ad Hoc Networks IETF Internet Draft (work in progress) [10] Ammari,H. and El-Rewini,H Integration of Mobile Ad Hoc Networks and the Internet using Mobile Gateways. Proceedings of the 18th International Parallel and [11] Singh, S., Kim,J. H., Choi,Y. G, Kang, K. L. and Roh, Y. S Mobile multi-gateway support for IPv6 mobile ad hoc networks. IETF Internet Draft (work in progress). [12] Ruffino, S. and Stupar, P Automatic configuration of IPv6 addresses for MANET with multiple gateways (AMG). IETF Internet- Draft (work in progress) [13] Triviño-Cabrera, A, Casilari, E. and González-Cañete, F. J Active gateway switching in hybrid ad hoc networks. Electronic Letters, vol. 42, No. 21, pp (October 2006) [14] Bauer, B. and Odell, J. UML 2.0 and agents: how to build agent-based systems with the new UML standard. Engineering Applications of Artificial Intelligence, Agent-oriented Software Development, vol.18, pp (March 2005)

6 11ª Conferência sobre Redes de Computadores 6 [15] [16] Yoon, J., Liu, M., Noble, B.: Random WayPoint considered harmful. In: 22nd Annual Joint Conference of the IEEE Computer and Communications Societies (INFOCOM), pp , San Francisco (2003)

A DHCPv6 Based IPv6 Autoconfiguration Mechanism for Subordinate MANET

A DHCPv6 Based IPv6 Autoconfiguration Mechanism for Subordinate MANET 2008 IEEE Asia-Pacific Services Computing Conference A DHCPv6 Based IPv6 Autoconfiguration Mechanism for Subordinate MANET Shubhranshu Singh Advanced Technology Division Samsung India Software Operations

More information

IP CONSORTIUM TEST SUITE Internet Protocol, Version 6

IP CONSORTIUM TEST SUITE Internet Protocol, Version 6 IP CONSORTIUM TEST SUITE Internet Protocol, Version 6 Technical Document Last Update: January 25, 2002 Internet Protocol Consortium 7 Leavitt Lane, Room 106 Durham, NH 03824-3525 Research Computing Center

More information

Route Optimization based on ND-Proxy for Mobile Nodes in IPv6 Mobile Networks

Route Optimization based on ND-Proxy for Mobile Nodes in IPv6 Mobile Networks Route Optimization based on ND-Proxy for Mobile Nodes in IPv6 Mobile Networks Jaehoon Jeong, Kyeongjin Lee, Jungsoo Park, Hyoungjun Kim Protocol Engineering Center, ETRI, 161 Gajeong-dong Yuseong-gu, Daejeon,

More information

Name Service in IPv6 Mobile Ad-hoc Network connected to the Internet

Name Service in IPv6 Mobile Ad-hoc Network connected to the Internet Name Service in IPv6 Mobile Ad-hoc Network connected to the Internet Jaehoon Jeong, Jungsoo Park, Hyoungjun Kim Protocol Engineering Center, ETRI, 161 Gajong-Dong, Yusong-Gu, Daejon 305 350, Korea Email:

More information

A NOVEL APPROACH OF AODV FOR STABILITY AND ENERGY EFFICIENT ROUTING FOR MANET USING IPV6

A NOVEL APPROACH OF AODV FOR STABILITY AND ENERGY EFFICIENT ROUTING FOR MANET USING IPV6 A NOVEL APPROACH OF AODV FOR STABILITY AND ENERGY EFFICIENT ROUTING FOR MANET USING IPV6 Shival Chadda Department of Computer Science Lovely Professional University Phagwara, Punjab, India Email: Shival.chadda@gmail.com

More information

MANET Architecture and address auto-configuration issue

MANET Architecture and address auto-configuration issue MANET Architecture and address auto-configuration issue Namhi Kang Catholic University E-mail: kang@catholic.ac.kr Contents Background Information Overview Common MANET misperception Multilink subnet issue

More information

Guide to TCP/IP Fourth Edition. Chapter 6: Neighbor Discovery in IPv6

Guide to TCP/IP Fourth Edition. Chapter 6: Neighbor Discovery in IPv6 Guide to TCP/IP Fourth Edition Chapter 6: Neighbor Discovery in IPv6 Objectives Describe Neighbor Discovery in IPv6 and how it compares to ARP in IPv4 Explain Neighbor Discovery message interaction between

More information

A COMPARISON OF REACTIVE ROUTING PROTOCOLS DSR, AODV AND TORA IN MANET

A COMPARISON OF REACTIVE ROUTING PROTOCOLS DSR, AODV AND TORA IN MANET ISSN: 2278 1323 All Rights Reserved 2016 IJARCET 296 A COMPARISON OF REACTIVE ROUTING PROTOCOLS DSR, AODV AND TORA IN MANET Dr. R. Shanmugavadivu 1, B. Chitra 2 1 Assistant Professor, Department of Computer

More information

IPv6 Operation for WAVE - Wireless Access in Vehicular Environments

IPv6 Operation for WAVE - Wireless Access in Vehicular Environments IPv6 Operation for WAVE - Wireless Access in Vehicular Environments Emmanuel Baccelli INRIA, France Email: Emmanuel.Baccelli@inria.fr Thomas Clausen Hipercom@LIX Ecole Polytechnique, France Email: thomas@thomasclausen.org

More information

Handover Management for Mobile Nodes in IPv6 Networks

Handover Management for Mobile Nodes in IPv6 Networks TECHNOLOGY ADVANCES FOR 3G AND BEYOND Handover Management for Mobile Nodes in IPv6 Networks Nicolas Montavont and Thomas Noël LSIIT Louis Pasteur University CNRS, Strasbourg ABSTRACT In this article we

More information

A Study on Mobile Internet Protocol and Mobile Adhoc Network Routing Protocols

A Study on Mobile Internet Protocol and Mobile Adhoc Network Routing Protocols International Journal of Computer Science & Communication Vol. 1, No. 2, July-December 2010, pp. 185-189 A Study on Mobile Internet Protocol and Mobile Adhoc Network Routing Protocols B.V. Manikyala Rao

More information

Charles Perkins Nokia Research Center 2 July Mobility Support in IPv6 <draft-ietf-mobileip-ipv6-14.txt> Status of This Memo

Charles Perkins Nokia Research Center 2 July Mobility Support in IPv6 <draft-ietf-mobileip-ipv6-14.txt> Status of This Memo IETF Mobile IP Working Group INTERNET-DRAFT David B. Johnson Rice University Charles Perkins Nokia Research Center 2 July 2000 Mobility Support in IPv6 Status of This

More information

Study of Route Reconstruction Mechanism in DSDV Based Routing Protocols

Study of Route Reconstruction Mechanism in DSDV Based Routing Protocols Study of Route Reconstruction Mechanism in DSDV Based Routing Protocols Sharma Shelja, Kumar Suresh and Rathy R. K. Department of CSE, FET, MRIU, Faridabad, India Email: sharma.shelja@gmail.com, enthusk@yahoo.com,

More information

Fixed Internetworking Protocols and Networks. IP mobility. Rune Hylsberg Jacobsen Aarhus School of Engineering

Fixed Internetworking Protocols and Networks. IP mobility. Rune Hylsberg Jacobsen Aarhus School of Engineering Fixed Internetworking Protocols and Networks IP mobility Rune Hylsberg Jacobsen Aarhus School of Engineering rhj@iha.dk 1 2011 ITIFN Mobile computing Vision Seamless, ubiquitous network access for mobile

More information

Performance Analysis of Three Routing Protocols for Varying MANET Size

Performance Analysis of Three Routing Protocols for Varying MANET Size Proceedings of the International MultiConference of Engineers and Computer Scientists 8 Vol II IMECS 8, 9- March, 8, Hong Kong Performance Analysis of Three Routing Protocols for Varying MANET Size N Vetrivelan,

More information

A Review of Reactive, Proactive & Hybrid Routing Protocols for Mobile Ad Hoc Network

A Review of Reactive, Proactive & Hybrid Routing Protocols for Mobile Ad Hoc Network ShriRam College of Engineering & Management 1 A Review of Reactive, Proactive & Hybrid Routing Protocols for Mobile Ad Hoc Network M.Ramaiya Rohit Gupta Rachit Jain Head,Dept. Computer Science Dept. Computer

More information

An Approach to Efficient and Reliable design in Hierarchical Mobile IPv6

An Approach to Efficient and Reliable design in Hierarchical Mobile IPv6 An Approach to Efficient and Reliable design in Hierarchical Mobile IPv6 Taewan You 1, Seungyun Lee 1, Sangheon Pack 2, and Yanghee Choi 2 1 Protocol Engineering Center, ETRI, 161 Gajoung-dong, Yusong-gu,

More information

Gateway Discovery Approaches Implementation and Performance Analysis in the Integrated Mobile Ad Hoc Network (MANET)-Internet Scenario

Gateway Discovery Approaches Implementation and Performance Analysis in the Integrated Mobile Ad Hoc Network (MANET)-Internet Scenario Gateway Discovery Approaches Implementation and Performance Analysis in the Integrated Mobile Ad Hoc Network (MANET)-Internet Scenario K.Gautham 1, Nagajothi A 2 Student, Computer Science and Engineering,

More information

Hybrid gateway advertisement scheme for connecting mobile ad hoc networks to the Internet

Hybrid gateway advertisement scheme for connecting mobile ad hoc networks to the Internet * gateway advertisement scheme for connecting mobile ad hoc networks to the Internet Jeongkeun Lee (), Dongkyun Kim (2), J.J.Garcia-Luna-Aceves (3), Yanghee Choi (), Jihyuk Choi (4), Sangwoo Nam (4) ()

More information

Network Working Group Request for Comments: W. Simpson Daydreamer H. Soliman Elevate Technologies September 2007

Network Working Group Request for Comments: W. Simpson Daydreamer H. Soliman Elevate Technologies September 2007 Network Working Group Request for Comments: 4861 Obsoletes: 2461 Category: Standards Track T. Narten IBM E. Nordmark Sun Microsystems W. Simpson Daydreamer H. Soliman Elevate Technologies September 2007

More information

An Analysis of The Fast Handovers for Mobile IPv6 Protocol

An Analysis of The Fast Handovers for Mobile IPv6 Protocol An Analysis of The Fast Handovers for Mobile IPv6 Protocol Janne Lundberg Helsinki University of Technology Laboratory for Theoretical Computer Science May 28, 2003 Abstract Fast Handovers for Mobile IPv6

More information

MBC. Auto. Address. Networks. Mesh. uto- configuration for Wireless. Keecheon Kim. Konkuk University Seoul, Korea

MBC. Auto. Address. Networks. Mesh. uto- configuration for Wireless. Keecheon Kim. Konkuk University Seoul, Korea Address Auto uto- configuration for Wireless Mesh Networks Keecheon Kim Konkuk University Seoul, Korea kckim@konkuk.ac.kr Contents Wireless Mesh Networks Auto- configuration Topics In Autoconf WG Proposed

More information

Link-Layer Based Anycast Routing for a Dynamic and Distributed Portal Selection in Wireless Mesh Networks

Link-Layer Based Anycast Routing for a Dynamic and Distributed Portal Selection in Wireless Mesh Networks Link-Layer Based Anycast Routing for a Dynamic and Distributed Portal Selection in Wireless Mesh Networks A. Ariza-Quintana, A. Triviño-Cabrera, E. Casilari Dpto. Tecnología Electrónica, E.T.S.I. Telecomunicación,

More information

Request for Comments: 1972 Category: Standards Track August A Method for the Transmission of IPv6 Packets over Ethernet Networks

Request for Comments: 1972 Category: Standards Track August A Method for the Transmission of IPv6 Packets over Ethernet Networks Network Working Group M. Crawford Request for Comments: 1972 Fermilab Category: Standards Track August 1996 A Method for the Transmission of IPv6 Packets over Ethernet Networks Status of this Memo This

More information

Utilizing Multiple Home Links in Mobile IPv6

Utilizing Multiple Home Links in Mobile IPv6 Utilizing Multiple Home Links in Mobile IPv6 Hongbo Shi and Shigeki Goto Department of Computer Science, Waseda University 3-4-1 Ohkubo Shijuku-ku, Tokyo, 169-8555 JAPAN Email: {shi, goto}@goto.info.waseda.ac.jp

More information

Ch.6 Mapping Internet Addresses to Physical Addresses (ARP)

Ch.6 Mapping Internet Addresses to Physical Addresses (ARP) CSC521 Communication Protocols 網路通訊協定 Ch.6 Mapping Internet Addresses to Physical Addresses (ARP) 吳俊興國立高雄大學資訊工程學系 Internetworking With TCP/IP, Vol I: Sixth Edition, Douglas E. Comer Outline 1 Introduction

More information

Internet Engineering Task Force (IETF) Category: Informational. Juniper Networks May 2017

Internet Engineering Task Force (IETF) Category: Informational. Juniper Networks May 2017 Internet Engineering Task Force (IETF) Request for Comments: 8161 Category: Informational ISSN: 2070-1721 W. Cerveny Arbor Networks R. Bonica R. Thomas Juniper Networks May 2017 Benchmarking the Neighbor

More information

Active source routing for ad-hoc network: seamless integration of wireless environment

Active source routing for ad-hoc network: seamless integration of wireless environment Active source routing for ad-hoc network: seamless integration of wireless environment 1. Introduction Active networking is the emerging technology that will provide new network environment where lots

More information

Performance Evaluation of Various Routing Protocols in MANET

Performance Evaluation of Various Routing Protocols in MANET 208 Performance Evaluation of Various Routing Protocols in MANET Jaya Jacob 1,V.Seethalakshmi 2 1 II MECS,Sri Shakthi Institute of Science and Technology, Coimbatore, India 2 Associate Professor-ECE, Sri

More information

SIPCache: A Distributed SIP Location Service for Mobile Ad-Hoc Networks

SIPCache: A Distributed SIP Location Service for Mobile Ad-Hoc Networks SIPCache: A Distributed SIP Location Service for Mobile Ad-Hoc Networks Simone Leggio Hugo Miranda Kimmo Raatikainen Luís Rodrigues University of Helsinki University of Lisbon August 16, 2006 Abstract

More information

Performance Evaluation of Mesh - Based Multicast Routing Protocols in MANET s

Performance Evaluation of Mesh - Based Multicast Routing Protocols in MANET s Performance Evaluation of Mesh - Based Multicast Routing Protocols in MANET s M. Nagaratna Assistant Professor Dept. of CSE JNTUH, Hyderabad, India V. Kamakshi Prasad Prof & Additional Cont. of. Examinations

More information

2013, IJARCSSE All Rights Reserved Page 85

2013, IJARCSSE All Rights Reserved Page 85 Volume 3, Issue 12, December 2013 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Overview of

More information

A FORWARDING CACHE VLAN PROTOCOL (FCVP) IN WIRELESS NETWORKS

A FORWARDING CACHE VLAN PROTOCOL (FCVP) IN WIRELESS NETWORKS A FORWARDING CACHE VLAN PROTOCOL (FCVP) IN WIRELESS NETWORKS Tzu-Chiang Chiang,, Ching-Hung Yeh, Yueh-Min Huang and Fenglien Lee Department of Engineering Science, National Cheng-Kung University, Taiwan,

More information

IPv6 CONSORTIUM TEST SUITE Address Architecture Conformance Test Specification

IPv6 CONSORTIUM TEST SUITE Address Architecture Conformance Test Specification IPv6 CONSORTIUM TEST SUITE Address Architecture Technical Document Version 2.4 University of New Hampshire 121 Technology Drive, Suite 2 Durham, NH 03824 IPv6 Consortium Phone: +1-603-862-2804 http://www.iol.unh.edu

More information

AN ADAPTIVE GATEWAY DISCOVERY IN HYBRID MANETS

AN ADAPTIVE GATEWAY DISCOVERY IN HYBRID MANETS AN ADAPTIVE GATEWAY DISCOVERY IN HYBRID MANETS F. D. Trujillo, A. Triviño, E. Casilari and A. Díaz-Estrella Department of Electronic Technology University of Malaga A. J. Yuste Department of Telecommunication

More information

Updates: 2710 September 2003 Category: Standards Track. Source Address Selection for the Multicast Listener Discovery (MLD) Protocol

Updates: 2710 September 2003 Category: Standards Track. Source Address Selection for the Multicast Listener Discovery (MLD) Protocol Network Working Group B. Haberman Request for Comments: 3590 Caspian Networks Updates: 2710 September 2003 Category: Standards Track Status of this Memo Source Address Selection for the Multicast Listener

More information

INTEGRATION OF MOBILE-IPV6 AND OLSR FOR INTER-MONET COMMUNICATIONS

INTEGRATION OF MOBILE-IPV6 AND OLSR FOR INTER-MONET COMMUNICATIONS INTEGRATION OF MOBILE-IPV6 AND OLSR FOR INTER-MONET COMMUNICATIONS Ines b. ~amida', Hakim ~adis'?~, Lila ~oukhatem' and Khaldoun ~ la~ha'>~ LRI Laboratory, University of Paris XI Orsay, France INRIA Laboratory

More information

Virtual Hierarchical Architecture Integrating Mobile IPv6 and MANETs for Internet Connectivity

Virtual Hierarchical Architecture Integrating Mobile IPv6 and MANETs for Internet Connectivity Virtual Hierarchical Architecture Integrating Mobile IPv6 and MANETs for Internet Connectivity Hyemee Park, Tae-Jin Lee, and Hyunseung Choo School of Information and Communication Engineering Sungkyunkwan

More information

Simulation & Performance Analysis of Mobile Ad-Hoc Network Routing Protocol

Simulation & Performance Analysis of Mobile Ad-Hoc Network Routing Protocol Simulation & Performance Analysis of Mobile Ad-Hoc Network Routing Protocol V.S.Chaudhari 1, Prof.P.N.Matte 2, Prof. V.P.Bhope 3 Department of E&TC, Raisoni College of Engineering, Ahmednagar Abstract:-

More information

IPv6 Client IP Address Learning

IPv6 Client IP Address Learning Prerequisites for IPv6 Client Address Learning, on page 1 Information About IPv6 Client Address Learning, on page 1 Configuring IPv6 Unicast, on page 6 Configuring RA Guard Policy, on page 7 Applying RA

More information

Introduction to Mobile Ad hoc Networks (MANETs)

Introduction to Mobile Ad hoc Networks (MANETs) Introduction to Mobile Ad hoc Networks (MANETs) 1 Overview of Ad hoc Network Communication between various devices makes it possible to provide unique and innovative services. Although this inter-device

More information

Mobile Ad Hoc Networking Working Group

Mobile Ad Hoc Networking Working Group Mobile Ad Hoc Networking Working Group Ryuji Wakikawa INTERNET DRAFT Keio University 23 Oct 2003 Jari T. Malinen Charles E. Perkins Nokia Research Center Anders Nilsson University of Lund Antti J. Tuominen

More information

IPv6 Neighbor Discovery

IPv6 Neighbor Discovery About, page 1 Prerequisites for, page 2 Guidelines for, page 2 Defaults for, page 4 Configure, page 5 View and Clear Dynamically Discovered Neighbors, page 10 History for, page 11 About The IPv6 neighbor

More information

Figure 1: Ad-Hoc routing protocols.

Figure 1: Ad-Hoc routing protocols. Performance Analysis of Routing Protocols for Wireless Ad-Hoc Networks Sukhchandan Lally and Ljiljana Trajković Simon Fraser University Vancouver, British Columbia Canada E-mail: {lally, ljilja}@sfu.ca

More information

Routing Protocols in MANET: Comparative Study

Routing Protocols in MANET: Comparative Study Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 3, Issue. 7, July 2014, pg.119

More information

A Comparative Analysis of Pro-active Routing Protocols in MANET

A Comparative Analysis of Pro-active Routing Protocols in MANET Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 3, Issue. 6, June 2014, pg.144

More information

Ad-hoc and Infrastructured Networks Interconnection

Ad-hoc and Infrastructured Networks Interconnection tel. 22 209 4000 fax 22 209 4050 e-mail www@inescporto.pt internet Ad-hoc and Infrastructured Networks Interconnection Tânia Pinto Calçada and Manuel Ricardo RTCM Aveiro 18th February 2005 INESC Porto

More information

1 Multipath Node-Disjoint Routing with Backup List Based on the AODV Protocol

1 Multipath Node-Disjoint Routing with Backup List Based on the AODV Protocol 1 Multipath Node-Disjoint Routing with Backup List Based on the AODV Protocol Vahid Zangeneh i and Shahriar Mohammadi ii * ABSTRACT In recent years, routing has been the most focused area in ad hoc networks

More information

Performance Analysis of Broadcast Based Mobile Adhoc Routing Protocols AODV and DSDV

Performance Analysis of Broadcast Based Mobile Adhoc Routing Protocols AODV and DSDV INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND MOBILE APPLICATIONS IJCSMA Performance Analysis of Broadcast Based Mobile Adhoc Routing Protocols AODV and DSDV Er. Sandeep Singh Khehra 1, Er. Abhinash Singla

More information

Content. 1. Introduction. 2. The Ad-hoc On-Demand Distance Vector Algorithm. 3. Simulation and Results. 4. Future Work. 5.

Content. 1. Introduction. 2. The Ad-hoc On-Demand Distance Vector Algorithm. 3. Simulation and Results. 4. Future Work. 5. Rahem Abri Content 1. Introduction 2. The Ad-hoc On-Demand Distance Vector Algorithm Path Discovery Reverse Path Setup Forward Path Setup Route Table Management Path Management Local Connectivity Management

More information

IPv6 Neighbor Discovery

IPv6 Neighbor Discovery About, page 1 Prerequisites for, page 2 Guidelines for, page 2 Defaults for, page 4 Configure, page 5 Monitoring, page 10 History for, page 11 About The IPv6 neighbor discovery process uses ICMPv6 messages

More information

Internet Engineering Task Force INTERNET DRAFT. C. Perkins Nokia Research Center R. Droms(ed.) Cisco Systems 15 April 2001

Internet Engineering Task Force INTERNET DRAFT. C. Perkins Nokia Research Center R. Droms(ed.) Cisco Systems 15 April 2001 Internet Engineering Task Force INTERNET DRAFT DHC Working Group Obsoletes: draft-ietf-dhc-dhcpv6-18.txt J. Bound Nokia M. Carney Sun Microsystems, Inc C. Perkins Nokia Research Center R. Droms(ed.) Cisco

More information

PERFORMANCE ANALYSIS OF AODV ROUTING PROTOCOL IN MANETS

PERFORMANCE ANALYSIS OF AODV ROUTING PROTOCOL IN MANETS PERFORMANCE ANALYSIS OF AODV ROUTING PROTOCOL IN MANETS AMANDEEP University College of Engineering, Punjabi University Patiala, Punjab, India amandeep8848@gmail.com GURMEET KAUR University College of Engineering,

More information

A COMPARISON OF IMPROVED AODV ROUTING PROTOCOL BASED ON IEEE AND IEEE

A COMPARISON OF IMPROVED AODV ROUTING PROTOCOL BASED ON IEEE AND IEEE Journal of Engineering Science and Technology Vol. 4, No. 2 (2009) 132-141 School of Engineering, Taylor s University College A COMPARISON OF IMPROVED AODV ROUTING PROTOCOL BASED ON IEEE 802.11 AND IEEE

More information

STUDY ON MOBILE ADHOC NETWORK ROUTING PROTOCOLS

STUDY ON MOBILE ADHOC NETWORK ROUTING PROTOCOLS International Journal of Information Technology and Knowledge Management January-June 2012, Volume 5, No. 1, pp. 155-158 STUDY ON MOBILE ADHOC NETWORK ROUTING PROTOCOLS Monika ABSTRACT: In Many wireless

More information

Request for Comments: 1971 Category: Standards Track IBM August 1996

Request for Comments: 1971 Category: Standards Track IBM August 1996 Network Working Group Request for Comments: 1971 Category: Standards Track S. Thomson Bellcore T. Narten IBM August 1996 Status of this Memo IPv6 Stateless Address Autoconfiguration This document specifies

More information

Performance Analysis and Enhancement of Routing Protocol in Manet

Performance Analysis and Enhancement of Routing Protocol in Manet Vol.2, Issue.2, Mar-Apr 2012 pp-323-328 ISSN: 2249-6645 Performance Analysis and Enhancement of Routing Protocol in Manet Jaya Jacob*, V.Seethalakshmi** *II MECS, Sri Shakthi Institute of Engineering and

More information

QoS Routing By Ad-Hoc on Demand Vector Routing Protocol for MANET

QoS Routing By Ad-Hoc on Demand Vector Routing Protocol for MANET 2011 International Conference on Information and Network Technology IPCSIT vol.4 (2011) (2011) IACSIT Press, Singapore QoS Routing By Ad-Hoc on Demand Vector Routing Protocol for MANET Ashwini V. Biradar

More information

Auto-Networking Technologies for IPv6 Mobile Ad Hoc Networks

Auto-Networking Technologies for IPv6 Mobile Ad Hoc Networks Auto-Networking Technologies for IPv6 Mobile Ad Hoc Networks Jaehoon Jeong, Jungsoo Park, and Hyoungjun Kim Protocol Engineering Center, ETRI, 161 Gajeong-dong, Yuseong-gu, Daejeon 305 350, Korea {paul,pjs,khj}@etri.re.kr

More information

Internet Engineering Task Force INTERNET DRAFT. C. Perkins Nokia Research Center R. Droms(ed.) Cisco Systems 1 March 2001

Internet Engineering Task Force INTERNET DRAFT. C. Perkins Nokia Research Center R. Droms(ed.) Cisco Systems 1 March 2001 Internet Engineering Task Force INTERNET DRAFT DHC Working Group Obsoletes: draft-ietf-dhc-dhcpv6-16.txt J. Bound Nokia M. Carney Sun Microsystems, Inc C. Perkins Nokia Research Center R. Droms(ed.) Cisco

More information

Performance Analysis of MANET Routing Protocols OLSR and AODV

Performance Analysis of MANET Routing Protocols OLSR and AODV VOL. 2, NO. 3, SEPTEMBER 211 Performance Analysis of MANET Routing Protocols OLSR and AODV Jiri Hosek Faculty of Electrical Engineering and Communication, Brno University of Technology Email: hosek@feec.vutbr.cz

More information

[Kamboj* et al., 5(9): September, 2016] ISSN: IC Value: 3.00 Impact Factor: 4.116

[Kamboj* et al., 5(9): September, 2016] ISSN: IC Value: 3.00 Impact Factor: 4.116 IJESRT INTERNATIONAL JOURNAL OF ENGINEERING SCIENCES & RESEARCH TECHNOLOGY NOVEL REVIEW OF MANET ROUTING PROTOCOLS Nippun Kamboj*, Dr. Munishwar Rai Department of Computer Applications Maharishi Markandeshwar

More information

Multicast over Vehicle Ad Hoc Networks

Multicast over Vehicle Ad Hoc Networks 1 Multicast over Vehicle Ad Hoc Networks Alberto Gordillo Muñoz Abstract Vehicular networks may improve the safety and efficiency of road travel but there are many challenges that still need to be overcome.

More information

Routing protocols in WSN

Routing protocols in WSN Routing protocols in WSN 1.1 WSN Routing Scheme Data collected by sensor nodes in a WSN is typically propagated toward a base station (gateway) that links the WSN with other networks where the data can

More information

A Highly Effective and Efficient Route Discovery & Maintenance in DSR

A Highly Effective and Efficient Route Discovery & Maintenance in DSR A Highly Effective and Efficient Route Discovery & Maintenance in DSR Shiva Prakash 1, Rajeev Kumar 2, Brijesh Nayak 3, Manindar Kumar Yadav 4 Department of Computer Science and Engineering, Madan Mohan

More information

Performance Comparison of Ad Hoc Routing Protocols over IEEE DCF and TDMA MAC Layer Protocols

Performance Comparison of Ad Hoc Routing Protocols over IEEE DCF and TDMA MAC Layer Protocols Performance Comparison of Ad Hoc Routing Protocols over IEEE 82.11 DCF and TDMA MAC Layer Protocols Govind. P. Gupta Computer Science Department R.K.G.I.T, Ghaziabad (India) er_gpgupta@yahoo.com A. K.

More information

Mobile Ad hoc Networking (MANET) LIX, Ecole Polytechnique, France. Intended status: Standards Track

Mobile Ad hoc Networking (MANET) LIX, Ecole Polytechnique, France. Intended status: Standards Track Page 1 of 64 Mobile Ad hoc Networking (MANET) Internet-Draft Intended status: Standards Track Expires: June 8, 2008 T. Clausen LIX, Ecole Polytechnique, France C. Dearlove BAE Systems Advanced Technology

More information

Internet Engineering Task Force (IETF) Category: Standards Track. H. Li Huawei Technologies June 2013

Internet Engineering Task Force (IETF) Category: Standards Track. H. Li Huawei Technologies June 2013 Internet Engineering Task Force (IETF) Request for Comments: 6957 Category: Standards Track ISSN: 2070-1721 F. Costa J-M. Combes, Ed. X. Pougnard France Telecom Orange H. Li Huawei Technologies June 2013

More information

EXPERIMENTS WITH IPV6 NETWORK MOBILITY USING NEMO PROTOCOL

EXPERIMENTS WITH IPV6 NETWORK MOBILITY USING NEMO PROTOCOL EXPERIMENTS WITH IPV6 NETWORK MOBILITY USING NEMO PROTOCOL Nuno Veiga, Mário Antunes and Vítor Santos School of Technology and Management, Polytechnic Institute of Leiria Morro do Lena, Leiria, Portugal

More information

Maharishi Markandeshwar University

Maharishi Markandeshwar University RESEARCH ARTICLE OPEN ACCESS Simulation Based Performance Comparison of Adhoc Routing Protocols Kushagra Agrawal*, Shaveta Jain** *Department of Computer Science,, Mullana, Ambala agrawal_kushagra@rediffmail.com

More information

Internet Engineering Task Force (IETF) Category: Standards Track. J. Halpern Ericsson E. Levy-Abegnoli, Ed. Cisco February 2017

Internet Engineering Task Force (IETF) Category: Standards Track. J. Halpern Ericsson E. Levy-Abegnoli, Ed. Cisco February 2017 Internet Engineering Task Force (IETF) Request for Comments: 8074 Category: Standards Track ISSN: 2070-1721 J. Bi Tsinghua University G. Yao Tsinghua University/Baidu J. Halpern Ericsson E. Levy-Abegnoli,

More information

REVIEW ON ROUTING PROTOCOLS FOR MOBILE AD HOC NETWORKS

REVIEW ON ROUTING PROTOCOLS FOR MOBILE AD HOC NETWORKS REVIEW ON ROUTING PROTOCOLS FOR MOBILE AD HOC NETWORKS G. Poornima 1, Mr. M. Rajasenathipathi 2, 1 Research Scholar, Department of Computer Science, NGM College, Pollachi 2 Assistant Professor, Department

More information

B. Carpenter. January Connection of IPv6 Domains via IPv4 Clouds without Explicit Tunnels. Copyright Notice

B. Carpenter. January Connection of IPv6 Domains via IPv4 Clouds without Explicit Tunnels. Copyright Notice IETF Internet Draft January 1999 B. Carpenter K. Moore Connection of IPv6 Domains via IPv4 Clouds without Explicit Tunnels Copyright Notice Placeholder for ISOC copyright if needed Abstract draft-ietf-ngtrans-6to4-00.txt

More information

Performance Comparison of MANETs Routing Protocols for Dense and Sparse Topology

Performance Comparison of MANETs Routing Protocols for Dense and Sparse Topology 2012 International Conference on Information and Computer Networks (ICICN 2012) IPCSIT vol. 27 (2012) (2012) IACSIT Press, Singapore Performance Comparison of MANETs Routing Protocols for Dense and Sparse

More information

Network Working Group. Societe Francaise du Radiotelephone(SFR) Intended status: Informational Expires: March 28, 2019

Network Working Group. Societe Francaise du Radiotelephone(SFR) Intended status: Informational Expires: March 28, 2019 Network Working Group Internet-Draft Intended status: Informational Expires: March 28, 2019 D. Shytyi Societe Francaise du Radiotelephone(SFR) G. Campo A. Petrescu CEA, LIST September 24, 2018 Abstract

More information

Experiment and Evaluation of a Mobile Ad Hoc Network with AODV Routing Protocol

Experiment and Evaluation of a Mobile Ad Hoc Network with AODV Routing Protocol Experiment and Evaluation of a Mobile Ad Hoc Network with AODV Routing Protocol Kalyan Kalepu, Shiv Mehra and Chansu Yu, Department of Electrical and Computer Engineering Cleveland State University 2121

More information

3. Evaluation of Selected Tree and Mesh based Routing Protocols

3. Evaluation of Selected Tree and Mesh based Routing Protocols 33 3. Evaluation of Selected Tree and Mesh based Routing Protocols 3.1 Introduction Construction of best possible multicast trees and maintaining the group connections in sequence is challenging even in

More information

IPv6 Neighbor Discovery

IPv6 Neighbor Discovery The IPv6 neighbor discovery process uses Internet Control Message Protocol (ICMP) messages and solicited-node multicast addresses to determine the link-layer address of a neighbor on the same network (local

More information

Mobile IP Overview. Based on IP so any media that can support IP can also support Mobile IP

Mobile IP Overview. Based on IP so any media that can support IP can also support Mobile IP Introduction: Mobile IP Overview An Internet Protocol address (IP address) is a numerical label assigned to each device (e.g., computer, printer) participating in a computer network that uses the Internet

More information

IPv6 support for VANET with geographical routing

IPv6 support for VANET with geographical routing IPv6 support for VANET with geographical routing Choi Jinhyeock, Yacine Khaled, Manabu Tsukada, Thierry Ernst To cite this version: Choi Jinhyeock, Yacine Khaled, Manabu Tsukada, Thierry Ernst. IPv6 support

More information

Expiration Date: August 2003 February Access Control Prefix Router Advertisement Option for IPv6 draft-bellovin-ipv6-accessprefix-01.

Expiration Date: August 2003 February Access Control Prefix Router Advertisement Option for IPv6 draft-bellovin-ipv6-accessprefix-01. Network Working Group Steven M. Bellovin Internet Draft AT&T Labs Research Expiration Date: August 2003 February 2003 Access Control Prefix Router Advertisement Option for IPv6 draft-bellovin-ipv6-accessprefix-01.txt

More information

IPv6 maintenance Working Group (6man) Updates: 3971, 4861 (if approved) January 12, 2012 Intended status: Standards Track Expires: July 15, 2012

IPv6 maintenance Working Group (6man) Updates: 3971, 4861 (if approved) January 12, 2012 Intended status: Standards Track Expires: July 15, 2012 IPv6 maintenance Working Group (6man) F. Gont Internet-Draft UK CPNI Updates: 3971, 4861 (if approved) January 12, 2012 Intended status: Standards Track Expires: July 15, 2012 Security Implications of

More information

Operation Manual IPv6 H3C S3610&S5510 Series Ethernet Switches Table of Contents. Table of Contents

Operation Manual IPv6 H3C S3610&S5510 Series Ethernet Switches Table of Contents. Table of Contents Operation Manual IPv6 Table of Contents Table of Contents Chapter 1 IPv6 Basics Configuration... 1-1 1.1 IPv6 Overview... 1-1 1.1.1 IPv6 Features... 1-2 1.1.2 Introduction to IPv6 Address... 1-3 1.1.3

More information

NetWare Link-Services Protocol

NetWare Link-Services Protocol 44 CHAPTER Chapter Goals Describe the Network Link-Service Protocol. Describe routing with NLSP. Describe the data packet used by NLSP. Background The (NLSP) is a link-state routing protocol from Novell

More information

MeshDV: A Distance Vector mobility-tolerant routing protocol for Wireless Mesh Networks

MeshDV: A Distance Vector mobility-tolerant routing protocol for Wireless Mesh Networks MeshDV: A Distance Vector mobility-tolerant routing protocol for Wireless Mesh Networks Luigi Iannone Serge Fdida LIP6/CNRS Université Paris VI Paris France {luigi.iannone,serge.fdida}@lip6.fr Abstract

More information

See Also: 1201 January 1999 Category: Standards Track

See Also: 1201 January 1999 Category: Standards Track Network Working Group I. Souvatzis Request for Comments: 2497 The NetBSD Project See Also: 1201 January 1999 Category: Standards Track Status of this Memo Transmission of IPv6 Packets over ARCnet Networks

More information

IPv6 Protocols and Networks Hadassah College Spring 2018 Wireless Dr. Martin Land

IPv6 Protocols and Networks Hadassah College Spring 2018 Wireless Dr. Martin Land IPv6 1 IPv4 & IPv6 Header Comparison IPv4 Header IPv6 Header Ver IHL Type of Service Total Length Ver Traffic Class Flow Label Identification Flags Fragment Offset Payload Length Next Header Hop Limit

More information

IPv6 Neighbor Discovery

IPv6 Neighbor Discovery The IPv6 neighbor discovery process uses Internet Control Message Protocol (ICMP) messages and solicited-node multicast addresses to determine the link-layer address of a neighbor on the same network (local

More information

IPv6 Traffic Hijack Test System and Defense Tools Using DNSSEC

IPv6 Traffic Hijack Test System and Defense Tools Using DNSSEC IPv6 Traffic Hijack Test System and Defense Tools Using DNSSEC Lin Tao lintao850711@sina.com Liu Wu liuwu@cernet.edu.cn Duan Haixin dhx@cernet.edu.cn Sun Donghong sdh@cernet.edu.cn Abstract IPv6 is widely

More information

3GPP TS V6.1.0 ( )

3GPP TS V6.1.0 ( ) TS 29.161 V6.1.0 (2005-06) Technical Specification 3rd Generation Partnership Project; Technical Specification Group Core Network and Terminals; Interworking between the Public Land Mobile Network (PLMN)

More information

Modeling and Performance Evaluation of MANET Handover

Modeling and Performance Evaluation of MANET Handover Ph.D. in Electronic and Computer Engineering Dept. of Electrical and Electronic Modeling and Performance Evaluation of MANET Handover Ing. Bernardo Leal Advisor: Dott. Ing. Luigi ATZORI Curriculum: ING-INF/03

More information

FiberstoreOS IPv6 Service Configuration Guide

FiberstoreOS IPv6 Service Configuration Guide FiberstoreOS IPv6 Service Configuration Guide Contents 1 Configuring IPv6 over IPv4 Tunnel...5 1.1 Overview...5 1.1.2 Manual Tunnel...6 1.1.3 6to4 Tunnel...6 1.1.4 ISATAP Tunnel...7 1.2 Configure Manual

More information

Mobile IP. Mobile Computing. Mobility versus Portability

Mobile IP. Mobile Computing. Mobility versus Portability Mobile IP Mobile Computing Introduction Amount of mobile/nomadic computing expected to increase dramatically in near future. By looking at the great acceptance of mobile telephony, one can foresee a similar

More information

Routing Protocols in MANETs

Routing Protocols in MANETs Chapter 4 Routing Protocols in MANETs 4.1 Introduction The main aim of any Ad Hoc network routing protocol is to meet the challenges of the dynamically changing topology and establish a correct and an

More information

WSN Routing Protocols

WSN Routing Protocols WSN Routing Protocols 1 Routing Challenges and Design Issues in WSNs 2 Overview The design of routing protocols in WSNs is influenced by many challenging factors. These factors must be overcome before

More information

Internet Engineering Task Force. C. Perkins Nokia Research Center R. Droms(ed.) Cisco Systems 22 November 2000

Internet Engineering Task Force. C. Perkins Nokia Research Center R. Droms(ed.) Cisco Systems 22 November 2000 Internet Engineering Task Force INTERNET DRAFT DHC Working Group Obsoletes: draft-ietf-dhc-dhcpv6-15.txt J. Bound Compaq Computer Corp. M. Carney Sun Microsystems, Inc C. Perkins Nokia Research Center

More information

The Research of Long-Chain Wireless Sensor Network Based on 6LoWPAN

The Research of Long-Chain Wireless Sensor Network Based on 6LoWPAN 2017 5th International Conference on Enterprise Systems The Research of Long-Chain Wireless Sensor Network Based on 6LoWPAN Weilan Lin linweilan@gz.sia.cn Shuangfei Zi zishuangfei@gz.sia.cn Zhiyi Fan Department

More information

Mobile Ad-hoc and Sensor Networks Lesson 04 Mobile Ad-hoc Network (MANET) Routing Algorithms Part 1

Mobile Ad-hoc and Sensor Networks Lesson 04 Mobile Ad-hoc Network (MANET) Routing Algorithms Part 1 Mobile Ad-hoc and Sensor Networks Lesson 04 Mobile Ad-hoc Network (MANET) Routing Algorithms Part 1 Oxford University Press 2007. All rights reserved. 1 Ad-hoc networks deployment For routing, target detection,

More information

Modification to Ipv6 Neighbor Discovery and Mobile Node Operation

Modification to Ipv6 Neighbor Discovery and Mobile Node Operation RESEARCH INVENTY: International Journal of Engineering and Science ISSN: 2278-4721, Vol. 1, Issue 6 (October 2012), PP 39-49 www.researchinventy.com Modification to Ipv6 Neighbor Discovery and Mobile Node

More information

Seamless Handover Scheme for Proxy Mobile IPv6

Seamless Handover Scheme for Proxy Mobile IPv6 IEEE International Conference on Wireless & Mobile Computing, Networking & Communication Seamless Handover Scheme for Proxy Mobile IPv6 Ju-Eun Kang 1, Dong-Won Kum 2, Yang Li 2, and You-Ze Cho 2 1 LGDACOM

More information