Pro-Active Autoconfig Implementation Overview version 0.2. Andreas Tønnesen

Size: px
Start display at page:

Download "Pro-Active Autoconfig Implementation Overview version 0.2. Andreas Tønnesen"

Transcription

1 Pro-Active Autoconfig Implementation Overview version 0.2 Andreas Tønnesen 12th February 2004

2 ABSTRACT This document describes the basic functioning of the Thales Pro-Active Autoconfig implementation. It also covers how to compile, configure and run the PAA implementation using the UniK OLSR routing protocol with PAA extensions. 1

3 Pro-Active Autoconfig About Pro-Active Autoconfig is an IPv4 address allocation protocol with duplicate address detection(dad) for use in mobile ad-hoc networks(manets). PAA takes advantage of the fact that nodes that are already members of a MANET domain, running a pro-active routing protocol, already has a full understanding of the topology and therefore are well suited to allocate a IP address that is probably currently not used by any nodes in the network. PAA also does complete DAD to ensure that no other node is configured, or in the process of configuring itself, with a address. This is done by flooding the network using the underlying routing protocol. PAA should provide a node with the ability to automatic configure itself with a uniqe address and join a MANET. PAA could again be started from a MANET sensing daemon. Basic operation PAA consists of three software components. They are outlined in Fig.1. A unconfigured node runs the PAA-client to allocate a free address. In this contex free means a addres not used by any other node in the MANET. The unconfigured node comunicates with one (or more) configured nodes. A configured node runst the PAA-server that communicates with the routing daemon using interprocess communication(ipc). In the next three sections functioning of the three components are described. 2

4 Figure 1: Basick outline of the PAA design. 3

5 PAA client Files File src/paa_protocol.h src/paa_client.c src/interface.c src/net.c Description packet descriptions and constants client functions interface configuration functions network functions Terms LL - a link local address in the ( /16) address space ID - a unique identificator based on a nodes interface MAC address requester - a node requesting a IP address SEQNO - sequence number that is incremented with 1 for each sent msg. Responsibilities configure an interface with a random LL address querying neighbors for an address offer using LL broadcast perform DAD on the offered address Configure the node with the free address(or exit if no unique addresses could be found) start the routing protocol go to server operation-mode 4

6 Figure 2: Schematic view of a configuration session with respect to the PAA-client. Comunication types All control-traffic uses the user datagram protocol(udp). Interface configuration When starting PAA one must specify on what interface it should run. For now PAA can only be used on one interface. The client will first generate a random LL address. It will then configure an alias interface with this address. If PAA is set to run on eth0 the alias interface would be eth0:0. This interface will be used by both the PAA-client and later the PAAserver. 5

7 Forwarding request A requester will periodically broadcast a forwarding request(fwd_req) message LL. This is to let already configured neighbors know that they should forward all received PAA control messages LL. Address request An address request(addr_req) message is broadcasted LL next. A node signs this request with its ID. Any neighbor that is already a configured member of the MANET routing domain and out of quarantine time will answer with an offered address(if any could be allocated). If no replys are received the PAA-client can optionally configure its interface with a random /16 address and start the routing daemon - thus starting its own MANET. Address test Even though address request response(addr_res) are unicasted back to the requester - the ID field has to be set. This is to avoid problems if two nodes should configure themselves with the same LL address while both are in range of the replier. Upon receiving the first ADDR_RES(with the correct ID) the requester will generate a address test(addr_test) message and broadcast it LL to all neighbors. Any other ADDR_RES received for the same request(carrying the same SEQNO) is silently discarded. Any configured node that hears the ADDR_TEST message sends a ADDR_TEST_RES response message so that the PAA-client can be sure that the test-message is flooded. If no ADDR_TEST_RES is heard a new ADDR_TEST is sent until at least one ADDR_TEST_RES arrives. The PAA-client then waits for a given interval PAA_REQ_TIMEOUT to receive conflicting ADDR_TEST messages sent by other nodes. If this interval times out without any conflicting ADDR_TEST messages received, another ADDR_TEST 6

8 message is broadcasted. If another time interval of PAA_REQ_TIMEOUT passes without the node receiving any conflicting ADDR_TEST messages the address is considered valid and DAD is considered complete. If conflicting messages are received another ADDR_REQ message will be generated as described in 3.3. Configuring interface When a unique IP is allocated the PAA-client will configure the interface specified with the address. FORW_REQ messages will now no longer be sent. Starting the routing protocol When the interface is configured the chosen routing protocol is started. In this implementation the UniK OLSR implementation is used( The PAAclient must take care to ensure that the routing daemon will run on the chosen interface. PAA is also responsible for terminating the routing-protocol process when it is terminated itself. Leaving client mode When the routing-daemon is started the PAA-client will put itself in server mode. 7

9 PAA server Files File src/paa_protocol.h src/paa_server.c src/ipc.c src/net.c Description packet descriptions and constants server functions for communicating with PAA-clients IPC functions for communication with the routing protocol network functions Terms FWD_TIMER - a timer indicating if a PAA-server should forward messages on the LL interface LL - a link local address in the ( /16) address space ID - a unique identificator based on a nodes interface MAC address requester - a node requesting a IP address offerer - a node offering a IP address SEQNO - a sequence number that is incremented with 1 for each sent message. Responsibilities connect to the local routing-daemon listening for FWD_REQ messages and maintain a forward timer listening for ADDR_REQ messages query the routing protocol for free addresses 8

10 Figure 3: Schematic view of a configuration session with respect to the PAA-server. send ADDR_RES messages to PAA-clients that has issued ADDR_REQ messages forward ADDR_TEST messages received from PAA-clients to the routing protocol forward ADDR_TEST messages received from the routing protocol to PAAclients Communication types All control-traffic between PAA-clients and servers uses the user datagram protocol(udp). IPC between PAA-servers and the OLSR daemon uses TCP over the loopback device. Connecting to the local routing-daemon The first thing PAA does when going from client- to server-mode is to connect to the routing-daemon via a TCP socket to the loopbackdevice( ). All IPC between the PAA-server and the routing-daemon will go via this socket. 9

11 Forward request messages A PAA-server should only forward messages LL if there exists any unconfigured 1 hop neighbors. To detect this the PAA-server listens for FWD_REQ messages sent periodically by unconfigured nodes. Upon receiving a FWD_REQ the FWD_TIMER of this node is set to current time + FWD_HOLD_TIME. Address response messages Upon receiving a ADDRESS_TEST from a PAA-client the PAA-server queries the routing protocol(over IPC) for a free address. If the ADDR_TEST contained a preferred address this is passed to the OLSR daemon in the query message. If no free IP addresses can be allocated, the PAA-server will silently discard the ADDR_TEST and take no further action. If a IP offer is received from the routing protocol a ADDR_RES message is generated containing the offered IP and the ID and SEQNO from the received ADDR_TEST. Address test messages from PAA-clients Upon receiving an ADDR_TEST message on the LL interface, the PAA-server forwards this message to the routing protocol if and only if the FORWARDED flag is not set in the message. This is to prevent forwarding of messages forwarded from other PAA-servers. The PAA-server then sends a ADDR_TEST_RES LL back to the PAA-client. Address test messages from the routing protocol Upon receiving an ADDR_TEST message from the routing protocol the PAAserver broadcasts this message LL if and only if the FORWARD_TIMER > current time. If the message is to be forwarded the FORWARDED flag is set. This is to en- 10

12 sure that other PAA-servers within radio-range does not process this message as a ADDR_TEST from a PAA-client. 11

13 Routing daemon with PAA extentions Files File olsrd/src/paa_protocol.h olsrd/src/paa_olsr.h olsrd/src/olsr_protocol.h olsrd/src/paa.c olsrd/src/process_package.c olsrd/src/input.c olsrd/src/olsr.c olsrd/src/build_msg.c Description packet descriptions and constants OLSR encapsulated PAA packets the OLSR protocol definitions IP address caching package processing package reception PAA message forwarding Message generation Responsibilities(with respect to PAA) Make sure it does not serve any IP address before it has ran for a certain amount of time(quarantine) Caching all heard-of IP addresses for a given period Listen for ADDR_REQ messages and try to locate a free IP address Flood the network with ADDR_TEST messages Deliver ADDR_TEST messages to the PAA-server Communication types IPC between PAA-servers and the OLSR daemon uses TCP over the loopback device. 12

14 Figure 4: Schematic view of a configuration session with respect to the routing-daemon. IP cache The pro-active routing protocol will eventually have heard of all IP addresses currently used in the MANET if the PAA protocol is used by all nodes. But rather than checking for free IP addresses by looking up all internal tables of the routing table, a IP cache pool is maintained. This way IPs can also be cached for a longer periods than they would stay in the routing daemons internal tables. Upon receiving any kind of known routing control traffic, the routing daemon adds all the IP addresses listed in the message to the IP cache with a timeout of CACHE_HOLD_TIME. This period is set to 30 seconds in the implementation. To locate a free address the routing daemon selects a random address in the netrange that the MANET uses or uses a possible preferred address provided by the PAA-server, and checks this against the IP cache. If the address exists a random address is created within the MANETs net-range and checked against the IP cache again - this is done for a maximum of GEN_TRIES times. If an generated address is not found in the cache it is considered free and will be sent to the PAA-server that will offer it to the PAA-client that again will perform DAD on the address. 13

15 Figure 5: Schematic view of a configuration with no conflicts. Address request message Upon receiving a ADDR_REQ message from the PAA-server the routing daemon tries to generate a free IP address as described in section If a free address is located a ADDR_RES is sent to the PAA-server and the address is added to the IP cache. If no address was found no action is taken. Address test messages from PAA-server Upon receiving an ADDR_TEST from the PAA-server the routing daemon encapsulates the ADDR_TEST message in a routing protocol message. This message is then flooded troughout the MANET by the flooding mechanism provided by the routing protocol. Address test messages carried by routing protocol Upon receiving a encapsulated ADDR_TEST message carried by the routing protocol the routing daemon will, in addition to forwarding the encapsulated message according to the forwarding algorithm used by the routing protocol, decapsulate the packet and forward it to the PAA-server. 14

16 Installing the UniK OLSR daemon You must use a version of olsrd with PAA-extensions. As of now the public avalible versions found at does not have these extensions. Compile and install the routing-protocol #tar xvfj uolsrd-0.x.x.tar.bz2 #cd unik-olsrd-0.x.x #make #make install Edit the configfile /etc/olsrd.conf in your favorite editor: remove all interface entries to let PAA set the interface olsrd should run on set other parameters. Remeber the PAA does not set any parameters other than the interface at startup. 15

17 Compiling and installing PAA Throughout all descriptions of compiling, installing and running it is assumed that you run the given commands in a shell such as bash. Requirements The PAA implementation is written i C for the GNU/Linux operating system on the i386 architecture. But it should compile for architectures such as ARM as well. To compile PAA the following is required A system running Linux kernel 2.2 or above The GNU C compiler suite(gcc). If one wishes to use another compiler one has to edit the Makefile. GNU-make GNU libc pthread dynamic libraries Compiling To compile PAA go to the root directory of the paa source tree and run: #tar xvfj paa-0.x.x.tar.bz2 #cd paa-0.x.x #make This should compile and link PAA. The executable ends up as./bin/paa 16

18 Installing NOTE: This step is not required. To install paa in /usr/local/sbin go to the root directory of the paa source tree and run: #make install Notice that this requires root privileges. 17

19 Configuring and running IMPORTANT: You must be root(have UID=0) to run paa. Configuring You should edit the path to the routing protocol daemon executable to fit your needs prior to compiling. This can be changed in the start_routing_protocol function in src/ipc.c Running The following options can be passed to the paa binary: Specifies the interface to use. Example: -i eth0 Specifies that the PAA-client should start its own net if no contact is made. To run the binary you should go to the root directory of the paa source and run: #./bin/paa <options> if you did not install paa as described in section 5.3. If you installed it, PAA can be ran from anywhere typing: #paa <options> 18

20 The paa_protocol headerfile The headerfile defines all PAA spesific datatypes and values in the implementation. It is listed here as a reference:! "! # %$'& ()$ # *' +$'& (, -. /- # $ # , # # # # : # <;3 = <; > : - # A! 1 6! BC(D& ( ( ( ( ( ( ( # 7 E*!F 1 (D& ( ( ( ( ( ( ( # (D 5( ( ( ( ( ( ( - HG I - 19

21 # 790 *6 1! 5 # 12 E*H;1F 8 # 12 E*13 5 # <9E*' $( # 13 *'13, # 790! 0 E*H; *6 1! *6, - - #!! A 0 3 (D -!. - #!! 1 7E*> (D( ( ( ( -!. D - #!! 37)*> <; >C: C # 0 17 F! 1 7E*>C(D( ( ( (& ( - 6)*< )? $, $: & $, - 4, "7 ; /G? - 4,? - I D / A! 1 6! B - 4, - G? - 20

22 4,? - I D "7 )*!F 1-4, - #G? - 4,? - I D "7 )*!F 1-4, - #G? - 4,? 4, G? - 4,? - I D "7 )*!F ,? 4, 21

23 - = G? - G? & & ) $: 4, ) ) < ) < ) < ) < ) < ) < 22

Implementing and extending the Optimized Link State Routing Protocol. Master presentation by Andreas Tønnesen

Implementing and extending the Optimized Link State Routing Protocol. Master presentation by Andreas Tønnesen Implementing and extending the Optimized Link State Routing Protocol Master presentation by Andreas Tønnesen andreto@olsr.org http://www.olsr.org Agenda MANET routing Optimized LinkState Routing The UniK

More information

3. Evaluation of Selected Tree and Mesh based Routing Protocols

3. Evaluation of Selected Tree and Mesh based Routing Protocols 33 3. Evaluation of Selected Tree and Mesh based Routing Protocols 3.1 Introduction Construction of best possible multicast trees and maintaining the group connections in sequence is challenging even in

More information

Better Approach To Mobile Adhoc Networking

Better Approach To Mobile Adhoc Networking Better Approach To Mobile Adhoc Networking batman-adv - Kernel Space L2 Mesh Routing Martin Hundebøll Aalborg University, Denmark March 28 th, 2014 History of batman-adv The B.A.T.M.A.N. protocol initiated

More information

Chapter 7: Naming & Addressing

Chapter 7: Naming & Addressing Chapter 7: Naming & Addressing Goals of this chapter This short chapter looks at non-standard options for denoting the senders/receivers of messages Traditional (fixed, wireless, ad hoc): Denote individual

More information

Putting it all together

Putting it all together Putting it all together What happens when a user shows up to a new network and wants to access a web site? (These are new slides. Please stop and ask questions if anything is unclear!) Scenario Scenario

More information

Multicast Communications. Slide Set were original prepared by Dr. Tatsuya Susa

Multicast Communications. Slide Set were original prepared by Dr. Tatsuya Susa Multicast Communications Slide Set were original prepared by Dr. Tatsuya Susa Outline 1. Advantages of multicast 2. Multicast addressing 3. Multicast Routing Protocols 4. Multicast in the Internet 5. IGMP

More information

Objectives. Chapter 10. Upon completion you will be able to:

Objectives. Chapter 10. Upon completion you will be able to: Chapter 10 Figure 10.1 Position of IGMP in the network layer Objectives Upon completion you will be able to: Know the purpose of IGMP Know the types of IGMP messages Understand how a member joins a group

More information

IPv6 Neighbor Discovery

IPv6 Neighbor Discovery The IPv6 neighbor discovery process uses Internet Control Message Protocol (ICMP) messages and solicited-node multicast addresses to determine the link-layer address of a neighbor on the same network (local

More information

Configuring IGMP Snooping and MVR

Configuring IGMP Snooping and MVR CHAPTER 21 This chapter describes how to configure Internet Group Management Protocol (IGMP) snooping on the Cisco ME 3400 Ethernet Access switch, including an application of local IGMP snooping, Multicast

More information

NetWare Link-Services Protocol

NetWare Link-Services Protocol 44 CHAPTER Chapter Goals Describe the Network Link-Service Protocol. Describe routing with NLSP. Describe the data packet used by NLSP. Background The (NLSP) is a link-state routing protocol from Novell

More information

II. Principles of Computer Communications Network and Transport Layer

II. Principles of Computer Communications Network and Transport Layer II. Principles of Computer Communications Network and Transport Layer A. Internet Protocol (IP) IPv4 Header An IP datagram consists of a header part and a text part. The header has a 20-byte fixed part

More information

ETSF05/ETSF10 Internet Protocols Network Layer Protocols

ETSF05/ETSF10 Internet Protocols Network Layer Protocols ETSF05/ETSF10 Internet Protocols Network Layer Protocols 2016 Jens Andersson Agenda Internetworking IPv4/IPv6 Framentation/Reassembly ICMPv4/ICMPv6 IPv4 to IPv6 transition VPN/Ipsec NAT (Network Address

More information

The Interconnection Structure of. The Internet. EECC694 - Shaaban

The Interconnection Structure of. The Internet. EECC694 - Shaaban The Internet Evolved from the ARPANET (the Advanced Research Projects Agency Network), a project funded by The U.S. Department of Defense (DOD) in 1969. ARPANET's purpose was to provide the U.S. Defense

More information

Mobile Ad-hoc and Sensor Networks Lesson 04 Mobile Ad-hoc Network (MANET) Routing Algorithms Part 1

Mobile Ad-hoc and Sensor Networks Lesson 04 Mobile Ad-hoc Network (MANET) Routing Algorithms Part 1 Mobile Ad-hoc and Sensor Networks Lesson 04 Mobile Ad-hoc Network (MANET) Routing Algorithms Part 1 Oxford University Press 2007. All rights reserved. 1 Ad-hoc networks deployment For routing, target detection,

More information

ICS 351: Networking Protocols

ICS 351: Networking Protocols ICS 351: Networking Protocols IP packet forwarding application layer: DNS, HTTP transport layer: TCP and UDP network layer: IP, ICMP, ARP data-link layer: Ethernet, WiFi 1 Networking concepts each protocol

More information

FiberstoreOS IPv6 Security Configuration Guide

FiberstoreOS IPv6 Security Configuration Guide FiberstoreOS IPv6 Security Configuration Guide Contents 1 Configuring IPv6 over IPv4 Tunnel...4 1.1 Overview... 4 1.1.2 Manual Tunnel... 5 1.1.3 6to4 Tunnel... 6 1.1.4 ISATAP Tunnel...7 1.2 Configure Manual

More information

MLD. MLDv1 (defined in RFC 2710), which is derived from IGMPv2. MLDv2 (defined in RFC 3810), which is derived from IGMPv3.

MLD. MLDv1 (defined in RFC 2710), which is derived from IGMPv2. MLDv2 (defined in RFC 3810), which is derived from IGMPv3. Introduction to Multicast listener discovery protocol () is used by an IPv6 router to discover the presence of multicast listeners on directly-attached subnets. Multicast listeners are nodes wishing to

More information

Performance Evaluation of Mesh - Based Multicast Routing Protocols in MANET s

Performance Evaluation of Mesh - Based Multicast Routing Protocols in MANET s Performance Evaluation of Mesh - Based Multicast Routing Protocols in MANET s M. Nagaratna Assistant Professor Dept. of CSE JNTUH, Hyderabad, India V. Kamakshi Prasad Prof & Additional Cont. of. Examinations

More information

IPv6 Multicast Listener Discovery Protocol

IPv6 Multicast Listener Discovery Protocol Finding Feature Information, page 1 Information About, page 1 How to Configure, page 4 Configuration Examples for, page 10 Additional References, page 11, page 12 Finding Feature Information Your software

More information

Network Element Configuration

Network Element Configuration The following describes how to configure Flexible NetFlow and NTP servers on your ISR. Configuring a Network Element, page 1 NTP Configuration, page 1 NetFlow Configuration, page 2 Configuring a Network

More information

Chapter 09 Network Protocols

Chapter 09 Network Protocols Chapter 09 Network Protocols Copyright 2011, Dr. Dharma P. Agrawal and Dr. Qing-An Zeng. All rights reserved. 1 Outline Protocol: Set of defined rules to allow communication between entities Open Systems

More information

CS 457 Lecture 11 More IP Networking. Fall 2011

CS 457 Lecture 11 More IP Networking. Fall 2011 CS 457 Lecture 11 More IP Networking Fall 2011 IP datagram format IP protocol version number header length (bytes) type of data max number remaining hops (decremented at each router) upper layer protocol

More information

Ch.6 Mapping Internet Addresses to Physical Addresses (ARP)

Ch.6 Mapping Internet Addresses to Physical Addresses (ARP) CSC521 Communication Protocols 網路通訊協定 Ch.6 Mapping Internet Addresses to Physical Addresses (ARP) 吳俊興國立高雄大學資訊工程學系 Internetworking With TCP/IP, Vol I: Sixth Edition, Douglas E. Comer Outline 1 Introduction

More information

AppleTalk Commands show appletalk remap. To display domain remapping information, use the show appletalk remap EXEC command.

AppleTalk Commands show appletalk remap. To display domain remapping information, use the show appletalk remap EXEC command. AppleTalk Commands show appletalk remap show appletalk remap To display domain remapping information, use the show appletalk remap EXEC command. show appletalk remap [domain domain-number [{in out} [{to

More information

Impementing and extending the Optimized Link State Routing Protocol. Andreas Tønnesen UniK University Graduate Center University of Oslo

Impementing and extending the Optimized Link State Routing Protocol. Andreas Tønnesen UniK University Graduate Center University of Oslo UNIVERSITY OF OSLO Department of Informatics Impementing and extending the Optimized Link State Routing Protocol Andreas Tønnesen UniK University Graduate Center University of Oslo andreto@olsr.org Abstract

More information

What is Multicasting? Multicasting Fundamentals. Unicast Transmission. Agenda. L70 - Multicasting Fundamentals. L70 - Multicasting Fundamentals

What is Multicasting? Multicasting Fundamentals. Unicast Transmission. Agenda. L70 - Multicasting Fundamentals. L70 - Multicasting Fundamentals What is Multicasting? Multicasting Fundamentals Unicast transmission transmitting a packet to one receiver point-to-point transmission used by most applications today Multicast transmission transmitting

More information

ECE 4450:427/527 - Computer Networks Spring 2017

ECE 4450:427/527 - Computer Networks Spring 2017 ECE 4450:427/527 - Computer Networks Spring 2017 Dr. Nghi Tran Department of Electrical & Computer Engineering Lecture 6.2: IP Dr. Nghi Tran (ECE-University of Akron) ECE 4450:427/527 Computer Networks

More information

CS 356: Computer Network Architectures. Lecture 10: IP Fragmentation, ARP, and ICMP. Xiaowei Yang

CS 356: Computer Network Architectures. Lecture 10: IP Fragmentation, ARP, and ICMP. Xiaowei Yang CS 356: Computer Network Architectures Lecture 10: IP Fragmentation, ARP, and ICMP Xiaowei Yang xwy@cs.duke.edu Overview Homework 2-dimension parity IP fragmentation ARP ICMP Fragmentation and Reassembly

More information

Chapter 17 Configuring IPX (9300 Series Only)

Chapter 17 Configuring IPX (9300 Series Only) Chapter 17 Configuring IPX (9300 Series Only) This chapter describes how to configure the IPX protocol on the ProCurve Routing Switches using the CLI and Web management interface. For information about

More information

CS5984 Mobile Computing

CS5984 Mobile Computing CS5984 Mobile Computing Dr. Ayman Abdel-Hamid Computer Science Department Virginia Tech Part II 1 Outline Routing Protocols for Ad hoc Networks DSDV: Highly Dynamic Destination-Sequenced Distance- Vector

More information

Wireless Network Security Spring 2016

Wireless Network Security Spring 2016 Wireless Network Security Spring 2016 Patrick Tague Class #11 - Identity Mgmt.; Routing Security 2016 Patrick Tague 1 Class #11 Identity threats and countermeasures Basics of routing in ad hoc networks

More information

Table of Contents 1 MSDP Configuration 1-1

Table of Contents 1 MSDP Configuration 1-1 Table of Contents 1 MSDP Configuration 1-1 MSDP Overview 1-1 Introduction to MSDP 1-1 How MSDP Works 1-2 Protocols and Standards 1-7 MSDP Configuration Task List 1-7 Configuring Basic Functions of MSDP

More information

Auto-Networking Technologies for IPv6 Mobile Ad Hoc Networks

Auto-Networking Technologies for IPv6 Mobile Ad Hoc Networks Auto-Networking Technologies for IPv6 Mobile Ad Hoc Networks Jaehoon Jeong, Jungsoo Park, and Hyoungjun Kim Protocol Engineering Center, ETRI, 161 Gajeong-dong, Yuseong-gu, Daejeon 305 350, Korea {paul,pjs,khj}@etri.re.kr

More information

FiberstoreOS IPv6 Service Configuration Guide

FiberstoreOS IPv6 Service Configuration Guide FiberstoreOS IPv6 Service Configuration Guide Contents 1 Configuring IPv6 over IPv4 Tunnel...5 1.1 Overview...5 1.1.2 Manual Tunnel...6 1.1.3 6to4 Tunnel...6 1.1.4 ISATAP Tunnel...7 1.2 Configure Manual

More information

Ahoy: A Proximity-Based Discovery Protocol

Ahoy: A Proximity-Based Discovery Protocol Master s Thesis Computer Science Ahoy: A Proximity-Based Discovery Protocol Robbert Haarman January 18, 2007 Graduation Committee Dr. Ir. Geert Heijenk (University of Twente) Ir. Patrick Goering (University

More information

Outline. CS5984 Mobile Computing. Taxonomy of Routing Protocols AODV 1/2. Dr. Ayman Abdel-Hamid. Routing Protocols in MANETs Part I

Outline. CS5984 Mobile Computing. Taxonomy of Routing Protocols AODV 1/2. Dr. Ayman Abdel-Hamid. Routing Protocols in MANETs Part I CS5984 Mobile Computing Dr. Ayman Abdel-Hamid Computer Science Department Virginia Tech Part I Outline Routing Protocols for Ad hoc Networks Example of a reactive routing protocol AODV: Ad hoc On-demand

More information

IPv6 Neighbor Discovery

IPv6 Neighbor Discovery The IPv6 neighbor discovery process uses Internet Control Message Protocol (ICMP) messages and solicited-node multicast addresses to determine the link-layer address of a neighbor on the same network (local

More information

Internetworking/Internetteknik, Examination 2G1305 Date: August 18 th 2004 at 9:00 13:00 SOLUTIONS

Internetworking/Internetteknik, Examination 2G1305 Date: August 18 th 2004 at 9:00 13:00 SOLUTIONS Internetworking/Internetteknik, Examination 2G1305 Date: August 18 th 2004 at 9:00 13:00 SOLUTIONS 1. General (5p) a) The so-called hourglass model (sometimes referred to as a wine-glass ) has been used

More information

A COMPARISON OF REACTIVE ROUTING PROTOCOLS DSR, AODV AND TORA IN MANET

A COMPARISON OF REACTIVE ROUTING PROTOCOLS DSR, AODV AND TORA IN MANET ISSN: 2278 1323 All Rights Reserved 2016 IJARCET 296 A COMPARISON OF REACTIVE ROUTING PROTOCOLS DSR, AODV AND TORA IN MANET Dr. R. Shanmugavadivu 1, B. Chitra 2 1 Assistant Professor, Department of Computer

More information

Configuring Rapid PVST+ Using NX-OS

Configuring Rapid PVST+ Using NX-OS Configuring Rapid PVST+ Using NX-OS This chapter describes how to configure the Rapid per VLAN Spanning Tree (Rapid PVST+) protocol on Cisco NX-OS devices. This chapter includes the following sections:

More information

IPv6 Multicast Listener Discovery Protocol

IPv6 Multicast Listener Discovery Protocol Finding Feature Information, on page 1 Restrictions for, on page 1 Information About, on page 2 How to Configure, on page 4 Verifying, on page 11 Finding Feature Information Your software release may not

More information

Configuring PIM. Information About PIM. Send document comments to CHAPTER

Configuring PIM. Information About PIM. Send document comments to CHAPTER CHAPTER 3 This chapter describes how to configure the Protocol Independent Multicast (PIM) features on Cisco NX-OS switches in your IPv4 networks. This chapter includes the following sections: Information

More information

Address Resolution Protocol (ARP), RFC 826

Address Resolution Protocol (ARP), RFC 826 Address Resolution Protocol (ARP), RFC 826 Prof. Lin Weiguo Copyleft 2009~2017, School of Computing, CUC Sept. 2017 ARP & RARP } Note: } The Internet is based on IP addresses } Data link protocols (Ethernet,

More information

IPv6 Multicast Listener Discovery Protocol

IPv6 Multicast Listener Discovery Protocol IPv6 Multicast Listener Discovery Protocol Last Updated: October 16, 2012 IPv6 Multicast Listener Discovery (MLD) is used by IPv6 devices to discover multicast listeners (nodes that want to receive multicast

More information

MANET Architecture and address auto-configuration issue

MANET Architecture and address auto-configuration issue MANET Architecture and address auto-configuration issue Namhi Kang Catholic University E-mail: kang@catholic.ac.kr Contents Background Information Overview Common MANET misperception Multilink subnet issue

More information

C19: User Datagram and Multicast

C19: User Datagram and Multicast CISC 3120 C19: User Datagram and Multicast Hui Chen Department of Computer & Information Science CUNY Brooklyn College 4/18/2018 CUNY Brooklyn College 1 Outline Recap Network fundamentals IPv4, IPv6 addresses

More information

OMOLSR Developer s Guide 1.0

OMOLSR Developer s Guide 1.0 OMOLSR Developer s Guide 1.0 Grup de recerca en Arquitectura i Serveis Telemàtics (AST) Departament d Enginyeria Informàtica i Matemàtiques Universitat Rovira i Virgili May 2008 Index Index 2 1 General

More information

Configuring Rapid PVST+

Configuring Rapid PVST+ This chapter contains the following sections: Information About Rapid PVST+, page 1, page 16 Verifying the Rapid PVST+ Configuration, page 24 Information About Rapid PVST+ The Rapid PVST+ protocol is the

More information

Multi Hop Send Protocol Tool for TinyNodes Semesterthesis

Multi Hop Send Protocol Tool for TinyNodes Semesterthesis Multi Hop Send Protocol Tool for TinyNodes Semesterthesis Author: Supervisor: Tutor: Remo Niedermann Prof. Dr. Roger Wattenhofer Roland Flury Zurich, February 19, 2009 Acknowledgment At first I want to

More information

Network Layer PREPARED BY AHMED ABDEL-RAOUF

Network Layer PREPARED BY AHMED ABDEL-RAOUF Network Layer PREPARED BY AHMED ABDEL-RAOUF Network layer transport segment from sending to receiving host on sending side encapsulates segments into datagrams on receiving side, delivers segments to transport

More information

IPv6 Neighbor Discovery

IPv6 Neighbor Discovery About, page 1 Prerequisites for, page 2 Guidelines for, page 2 Defaults for, page 4 Configure, page 5 View and Clear Dynamically Discovered Neighbors, page 10 History for, page 11 About The IPv6 neighbor

More information

Contents. Configuring MSDP 1

Contents. Configuring MSDP 1 Contents Configuring MSDP 1 Overview 1 How MSDP works 1 MSDP support for VPNs 6 Protocols and standards 6 MSDP configuration task list 7 Configuring basic MSDP features 7 Configuration prerequisites 7

More information

Network+ Guide to Networks, Seventh Edition Chapter 2, Solutions

Network+ Guide to Networks, Seventh Edition Chapter 2, Solutions Network+ Guide to Networks, Seventh Edition Chapter 2, Solutions Review Questions 1. Which part of a MAC address is unique to each manufacturer? A. The network identifier B. The OUI C. The device identifier

More information

ROUTING INTRODUCTION TO IP, IP ROUTING PROTOCOLS AND PROXY ARP

ROUTING INTRODUCTION TO IP, IP ROUTING PROTOCOLS AND PROXY ARP IP ROUTING INTRODUCTION TO IP, IP ROUTING PROTOCOLS AND PROXY ARP Peter R. Egli 1/37 Contents 1. IP Routing 2. Routing Protocols 3. Fragmentation in the IP Layer 4. Proxy ARP 5. Routing and IP forwarding

More information

Content. 1. Introduction. 2. The Ad-hoc On-Demand Distance Vector Algorithm. 3. Simulation and Results. 4. Future Work. 5.

Content. 1. Introduction. 2. The Ad-hoc On-Demand Distance Vector Algorithm. 3. Simulation and Results. 4. Future Work. 5. Rahem Abri Content 1. Introduction 2. The Ad-hoc On-Demand Distance Vector Algorithm Path Discovery Reverse Path Setup Forward Path Setup Route Table Management Path Management Local Connectivity Management

More information

ECE 158A: Lecture 13. Fall 2015

ECE 158A: Lecture 13. Fall 2015 ECE 158A: Lecture 13 Fall 2015 Random Access and Ethernet! Random Access! Basic idea: Exploit statistical multiplexing Do not avoid collisions, just recover from them When a node has packet to send Transmit

More information

Web Mechanisms. Draft: 2/23/13 6:54 PM 2013 Christopher Vickery

Web Mechanisms. Draft: 2/23/13 6:54 PM 2013 Christopher Vickery Web Mechanisms Draft: 2/23/13 6:54 PM 2013 Christopher Vickery Introduction While it is perfectly possible to create web sites that work without knowing any of their underlying mechanisms, web developers

More information

Chapter 16 Networking

Chapter 16 Networking Chapter 16 Networking Outline 16.1 Introduction 16.2 Network Topology 16.3 Network Types 16.4 TCP/IP Protocol Stack 16.5 Application Layer 16.5.1 Hypertext Transfer Protocol (HTTP) 16.5.2 File Transfer

More information

Configuring MLD Snooping

Configuring MLD Snooping This module contains details of configuring MLD snooping Finding Feature Information, page 1 Information About Configuring IPv6 MLD Snooping, page 1 How to Configure IPv6 MLD Snooping, page 5 Displaying

More information

CMPE 257: Wireless and Mobile Networking

CMPE 257: Wireless and Mobile Networking CMPE 257: Wireless and Mobile Networking Katia Obraczka Computer Engineering UCSC Baskin Engineering Lecture 6 CMPE 257 Winter'11 1 Announcements Project proposals. Student presentations. 10 students so

More information

IPv6 Multicast Listener Discovery Protocol

IPv6 Multicast Listener Discovery Protocol Finding Feature Information, page 1 New and Changed Information, page 2 Restrictions for, page 2 Information About, page 2 How to Configure, page 5 Verifying, page 12 Additional References, page 14 Finding

More information

A Performance Comparison of Multi-Hop Wireless Ad Hoc Network Routing Protocols

A Performance Comparison of Multi-Hop Wireless Ad Hoc Network Routing Protocols A Performance Comparison of Multi-Hop Wireless Ad Hoc Network Routing Protocols By Josh Broch, David A. Maltz, David B. Johnson, Yih- Chun Hu, Jorjeta Jetcheva Presentation by: Michael Molignano Jacob

More information

Internet Protocol, Version 6

Internet Protocol, Version 6 Outline Protocol, Version 6 () Introduction to Header Format Addressing Model ICMPv6 Neighbor Discovery Transition from to vs. Taken from:chun-chuan Yang Basics: TCP/ Protocol Suite Protocol (IP) Features:

More information

TCP/IP Protocol Suite

TCP/IP Protocol Suite TCP/IP Protocol Suite Computer Networks Lecture 5 http://goo.gl/pze5o8 TCP/IP Network protocols used in the Internet also used in today's intranets TCP layer 4 protocol Together with UDP IP - layer 3 protocol

More information

ROUTE OPTIMIZATION EXTENSION FOR THE MOBILE INTERNET PROTOCOL IN LINUX

ROUTE OPTIMIZATION EXTENSION FOR THE MOBILE INTERNET PROTOCOL IN LINUX ROUTE OPTIMIZATION EXTENSION FOR THE MOBILE INTERNET PROTOCOL IN LINUX M. L. Jiang and Y. C. Tay ABSTRACT The base Mobile Internet Protocol (Mobile IP)[1] provides a means for portable computers to roam

More information

INF3190 Mandatory Assignment:

INF3190 Mandatory Assignment: INF3190 Mandatory Assignment: Formally: This assignment must be completed individually. The submission must be approved prior to submission of the Home Exam 1. To pass the submission must meet the requirements

More information

LECTURE 8. Mobile IP

LECTURE 8. Mobile IP 1 LECTURE 8 Mobile IP What is Mobile IP? The Internet protocol as it exists does not support mobility Mobile IP tries to address this issue by creating an anchor for a mobile host that takes care of packet

More information

Symbols INDEX. <cr> xvii? command xvi

Symbols INDEX. <cr> xvii? command xvi INDEX Symbols xvii? command xvi P3R-154 A access control DECnet P3R-141, P3R-153 VINES P3R-59 to P3R-61 XNS extended P3R-366 standard P3R-369 access groups DECnet P3R-121 access-list (connect initiate)

More information

Mobile IPv6 Overview

Mobile IPv6 Overview Sungkyunkwan University Prepared by H. Choo Copyright 2000-2018 Networking Laboratory Lecture Outline Network Layer Mobile IPv6 Proxy Mobile IPv6 Networking Laboratory 2/87 Sungkyunkwan University Network

More information

CS 268: Computer Networking. Taking Advantage of Broadcast

CS 268: Computer Networking. Taking Advantage of Broadcast CS 268: Computer Networking L-12 Wireless Broadcast Taking Advantage of Broadcast Opportunistic forwarding Network coding Assigned reading XORs In The Air: Practical Wireless Network Coding ExOR: Opportunistic

More information

Vorlesung Kommunikationsnetze

Vorlesung Kommunikationsnetze Picture 15 13 Vorlesung Kommunikationsnetze Prof. Dr. H. P. Großmann mit B. Wiegel sowie A. Schmeiser und M. Rabel Sommersemester 2009 Institut für Organisation und Management von Informationssystemen

More information

IP - The Internet Protocol. Based on the slides of Dr. Jorg Liebeherr, University of Virginia

IP - The Internet Protocol. Based on the slides of Dr. Jorg Liebeherr, University of Virginia IP - The Internet Protocol Based on the slides of Dr. Jorg Liebeherr, University of Virginia Orientation IP (Internet Protocol) is a Network Layer Protocol. IP: The waist of the hourglass IP is the waist

More information

The Link Layer and LANs: Ethernet and Swiches

The Link Layer and LANs: Ethernet and Swiches The Link Layer and LNs: Ethernet and Swiches EECS3214 2018-03-21 Link layer, LNs: outline 6.1 introduction, services 6.2 error detection, correction 6.3 multiple access protocols 6.4 LNs addressing, RP

More information

Chapter 24 PIM Commands

Chapter 24 PIM Commands Chapter 24 PIM Commands bsr-candidate Configures the Routing Switch as a candidate PIM Sparse Bootstrap Router (BSR). To configure the Routing Switch as a candidate BSR, enter a command such as the following:

More information

Proposal of autonomous transmission timing control scheme for collision avoidance in ad hoc multicasting

Proposal of autonomous transmission timing control scheme for collision avoidance in ad hoc multicasting Proposal of autonomous transmission timing control scheme for collision avoidance in ad hoc multicasting Katsuhiro Naito, Yasunori Fukuda, Kazuo Mori, and Hideo Kobayashi Department of Electrical and Electronic

More information

Configuring MLD Snooping

Configuring MLD Snooping This module contains details of configuring MLD snooping Finding Feature Information, page 1 Information About Configuring IPv6 MLD Snooping, page 1 How to Configure IPv6 MLD Snooping, page 6 Displaying

More information

ET4254 Communications and Networking 1

ET4254 Communications and Networking 1 Topic 9 Internet Protocols Aims:- basic protocol functions internetworking principles connectionless internetworking IP IPv6 IPSec 1 Protocol Functions have a small set of functions that form basis of

More information

The multiple spanning-tree (MST) implementation is based on the IEEE 802.1s standard.

The multiple spanning-tree (MST) implementation is based on the IEEE 802.1s standard. CHAPTER 18 This chapter describes how to configure the Cisco implementation of the IEEE 802.1s Multiple STP (MSTP) on the IE 3010 switch. Note The multiple spanning-tree (MST) implementation is based on

More information

Configuring Spanning Tree Protocol

Configuring Spanning Tree Protocol CHAPTER 7 This chapter descibes how to configure Spanning Tree Protocol (STP) on the Cisco wireless mobile interface card (WMIC). Note For complete syntax and usage information for the commands used in

More information

IPv6 Multicast: PIM Sparse Mode

IPv6 Multicast: PIM Sparse Mode Finding Feature Information, page 1 Information About IPv6 Multicast PIM Sparse Mode, page 1 How to Configure IPv6 Multicast PIM Sparse Mode, page 6 Configuration Examples for IPv6 Multicast PIM Sparse

More information

19: Networking. Networking Hardware. Mark Handley

19: Networking. Networking Hardware. Mark Handley 19: Networking Mark Handley Networking Hardware Lots of different hardware: Modem byte at a time, FDDI, SONET packet at a time ATM (including some DSL) 53-byte cell at a time Reality is that most networking

More information

October Copyright (C) The Internet Society (2003). All Rights Reserved.

October Copyright (C) The Internet Society (2003). All Rights Reserved. Network Working Group Request for Comments: 3626 Category: Experimental T. Clausen, Ed. P. Jacquet, Ed. Project Hipercom, INRIA October 2003 Status of this Memo Optimized Link State Routing Protocol (OLSR)

More information

Internet Protocols (chapter 18)

Internet Protocols (chapter 18) Internet Protocols (chapter 18) CSE 3213 Fall 2011 Internetworking Terms 1 TCP/IP Concepts Connectionless Operation Internetworking involves connectionless operation at the level of the Internet Protocol

More information

Table of Contents 1 IPv6 Configuration IPv6 Application Configuration 2-1

Table of Contents 1 IPv6 Configuration IPv6 Application Configuration 2-1 Table of Contents 1 IPv6 Configuration 1-1 IPv6 Overview 1-1 IPv6 Features 1-1 Introduction to IPv6 Address 1-3 Introduction to IPv6 Neighbor Discovery Protocol 1-5 Introduction to IPv6 DNS 1-8 Protocols

More information

IP Multicast. What is multicast?

IP Multicast. What is multicast? IP Multicast 1 What is multicast? IP(v4) allows a host to send packets to a single host (unicast), or to all hosts (broadcast). Multicast allows a host to send packets to a subset of all host called a

More information

Lab 4: Routing using OSPF

Lab 4: Routing using OSPF Network Topology:- Lab 4: Routing using OSPF Device Interface IP Address Subnet Mask Gateway/Clock Description Rate Fa 0/0 172.16.1.17 255.255.255.240 ----- R1 LAN R1 Se 0/0/0 192.168.10.1 255.255.255.252

More information

A Routing Protocol for Utilizing Multiple Channels in Multi-Hop Wireless Networks with a Single Transceiver

A Routing Protocol for Utilizing Multiple Channels in Multi-Hop Wireless Networks with a Single Transceiver 1 A Routing Protocol for Utilizing Multiple Channels in Multi-Hop Wireless Networks with a Single Transceiver Jungmin So Dept. of Computer Science, and Coordinated Science Laboratory University of Illinois

More information

IPv6 Neighbor Discovery

IPv6 Neighbor Discovery IPv6 Neighbor Discovery Last Updated: September 19, 2012 The IPv6 neighbor discovery process uses Internet Control Message Protocol (ICMP) messages and solicited-node multicast addresses to determine the

More information

Table of Contents 1 MSDP Configuration 1-1

Table of Contents 1 MSDP Configuration 1-1 Table of Contents 1 MSDP Configuration 1-1 MSDP Overview 1-1 Introduction to MSDP 1-1 How MSDP Works 1-2 Multi-Instance MSDP 1-7 Protocols and Standards 1-7 MSDP Configuration Task List 1-7 Configuring

More information

ETSF10 Internet Protocols Routing on the Internet

ETSF10 Internet Protocols Routing on the Internet ETSF10 Internet Protocols Routing on the Internet 2013, Part 2, Lecture 1.2 Jens Andersson (Kaan Bür) Routing on the Internet Unicast routing protocols (part 2) [ed.5 ch.20.3] Multicast routing, IGMP [ed.5

More information

Table of Contents 1 IPv6 Configuration IPv6 Application Configuration 2-1

Table of Contents 1 IPv6 Configuration IPv6 Application Configuration 2-1 Table of Contents 1 IPv6 Configuration 1-1 IPv6 Overview 1-1 IPv6 Features 1-1 Introduction to IPv6 Address 1-3 Introduction to IPv6 Neighbor Discovery Protocol 1-6 Introduction to IPv6 DNS 1-8 Protocols

More information

Module 7 Implementing Multicast

Module 7 Implementing Multicast Module 7 Implementing Multicast Lesson 1 Explaining Multicast Why Multicast? Used when sending same data to multiple receivers Better bandwidth utilization Less host/router processing Used when addresses

More information

Figure 7-1 Unicast Static FDB window

Figure 7-1 Unicast Static FDB window 7. Layer 2 Features FDB VLAN Spanning Tree Loopback Detection Link Aggregation L2 Multicast Control LLDP FDB Static FDB Unicast Static FDB This window is used to view and configure the static unicast forwarding

More information

Configuring MSDP. Overview. How MSDP operates. MSDP peers

Configuring MSDP. Overview. How MSDP operates. MSDP peers Contents Configuring MSDP 1 Overview 1 How MSDP operates 1 MSDP support for VPNs 6 Protocols and standards 6 MSDP configuration task list 7 Configuring basic MSDP functions 7 Configuration prerequisites

More information

Configuring LDAP. Finding Feature Information

Configuring LDAP. Finding Feature Information This chapter describes how to configure the Lightweight Directory Access Protocol (LDAP) on Cisco NX-OS devices. This chapter includes the following sections: Finding Feature Information, page 1 Information

More information

CSE 123A Computer Networks

CSE 123A Computer Networks CSE 123A Computer Networks Winter 2005 Lecture 12 Internet Routing: Multicast Today: Multicast routing Multicast service model Host interface Host-router interactions (IGMP) Multicast Routing Limiters

More information

Internet Protocol (IP)

Internet Protocol (IP) CPSC 360 - Network Programming Internet Protocol (IP) Michele Weigle Department of Computer Science Clemson University mweigle@cs.clemson.edu March 14, 2005 http://www.cs.clemson.edu/~mweigle/courses/cpsc360

More information

IPv6 and Multicast. Outline. IPv6 Multicast. S Computer Networks - Spring 2005

IPv6 and Multicast. Outline. IPv6 Multicast. S Computer Networks - Spring 2005 IPv6 and Multicast 188lecture5.ppt Pasi Lassila 1 Outline IPv6 Multicast 2 IPv6 overview Motivation Internet growth (address space depletion and routing information eplosion) CIDR has helped but eventually

More information

Introduction to Information Science and Technology 2017 Networking II. Sören Schwertfeger 师泽仁

Introduction to Information Science and Technology 2017 Networking II. Sören Schwertfeger 师泽仁 II Sören Schwertfeger 师泽仁 Outline Review Network Layer Routing Transport Layer Applications HTTP Demos Internet: Huge network of networks Billions of hosts (computers) Internet Structure Network Edge:

More information

IPv6 Multicast: PIM Sparse Mode

IPv6 Multicast: PIM Sparse Mode IPv6 multicast provides support for intradomain multicast routing using PIM sparse mode (PIM-SM). PIM-SM uses unicast routing to provide reverse-path information for multicast tree building, but it is

More information