Professional Documents
Culture Documents
Infrastructure Devices
Dahlan Abdullah
Email : dahlan@unimal.ac.id
Web: http://www.dahlan.web.id
Access Point
3 Mode Konfigurasi AP
Root
Mode
Repeater Mode
Bridge Mode
Root Mode
Bridge Mode
Repeater Mode
Wireless Bridge
Root Mode
Non-root Mode
Repeater Mode
or Detachable Antennas
Advanced Filtering Capabilities
Removable (modular) Radio cards
Variable Output Power
Varied Types of Wired Connectivity
Penggunaan Wireless
Workgroup Bridges
Wireless Adapters
Types
Infrastructure based
Adhoc
Advantages
Flexible deployment
Minimal wiring difficulties
More robust against disasters (earthquake etc)
Disadvantages
Low bandwidth compared to wired networks (1-10 Mbit/s)
Proprietary solutions
Need to follow wireless spectrum regulations
wired network
AP
ad-hoc network
Source: Schiller
Infrared
uses IR diodes, diffuse light,
multiple reflections (walls,
furniture etc.)
Advantages
simple, cheap, available in
many mobile devices
no licenses needed
simple shielding possible
Disadvantages
interference by sunlight, heat
sources etc.
many things shield or absorb IR
light
low bandwidth
Example
IrDA (Infrared Data Association)
interface available everywhere
Radio
typically using the license free
ISM band at 2.4 GHz
Advantages
experience from wireless WAN
and mobile phones can be used
coverage of larger areas
possible (radio can penetrate
walls, furniture etc.)
Disadvantages
very limited license free
frequency bands
shielding more difficult,
interference with other electrical
devices
Example
WaveLAN, HIPERLAN,
Bluetooth
Source: Schiller
Wireless LAN
B
C
A
Traditional routing
based on IP destination address
network prefix determines physical subnet
change of physical subnet implies
change of IP address (conform to new subnet), or
special routing table entries to forward packets to new subnet
Changing of IP address
DNS updates take to long time
TCP connections break
security problems
Changing entries in routing tables
does not scale with the number of mobile hosts and frequent
changes in the location
security problems
Solution requirements
retain same IP address, use same layer 2 protocols
authentication of registration messages,
MN
Router
3
Home
agent
Router
1
Router
2
Source: Vaidya
MN
Foreign agent
Home agent
Router
1
Router
2
Source: Vaidya
MN
home network
Internet
receiver
3
FA
CN
sender
foreign
network
home network
MN
sender
Internet
FA
foreign
network
CN
receiver
Source: Schiller
MN
home network
Internet
sender
1
FA
CN
receiver
foreign
network
1. MN sends to FA
2. FA tunnels packets to HA
by encapsulation
3. HA forwards the packet to the
receiver (standard case)
Source: Schiller
Reverse Tunneling
firewalls permit only topological correct addresses
a packet from the MN encapsulated by the FA is now topological correct
Agent Advertisement
HA/FA periodically send advertisement messages into their physical subnets
MN listens to these messages and detects, if it is in home/foreign network
MN reads a COA from the FA advertisement messages
Registration
MN signals COA to the HA via the FA
HA acknowledges via FA to MN
limited lifetime, need to be secured by authentication
Optimizations
Triangular Routing
HA informs sender the current location of MN
Change of FA
new FA informs old FA to avoid packet loss, old FA now forwards remaining
packets to new FA
Source: Vaidya
Routing in MANET
Traditional Routing
A
Source: Keshav
Source: Keshav
Source: Keshav
Reactive protocols
Determine route if and when needed
Source initiates route discovery
Example: DSR (dynamic source routing)
Proactive protocols
Extension of traditional routing protocols
Maintain routes between every host pair at all times
Example: DSDV (destination sequenced distance vector)
Hybrid protocols
Adaptive; Combination of proactive and reactive
Example : ZRP (zone routing protocol)
Multicast routing
When source S wants to send a packet to destination D, but does not know
a route to D, S initiates a route discovery
S floods Route Request (RREQ)
Each node appends its own identifier when forwarding RREQ
D on receiving the first RREQ, sends a Route Reply (RREP)
RREP sent on route obtained by reversing the route appended in RREQ
RREP includes the route from S to D, on which RREQ was received by D
S on receiving RREP, caches the route included in the RREP
When S sends a data packet to D, entire route is included in the header
Intermediate nodes use the source route in the packet header to determine
to whom a packet should be forwarded
Y
Z
E
F
G
H
K
I
D
N
Broadcast transmission
[S]
S
Z
E
F
G
H
K
I
D
N
Y
Z
[S,E]
F
[S,C]
H
G
K
D
N
Y
Z
E
F
[S,E,F]
G
H
I
[S,C,G] K
D
N
Y
Z
E
[S,E,F,J]
G
H
K
I
D
[S,C,G,K]
Y
Z
[S,E,F,J,M]
G
H
Y
Z
RREP [S,E,F,J,D]
F
G
H
K
I
D
N
DATA [S,E,F,J,D]
S
E
F
G
H
K
I
D
N
DSR Issues
Advantages
Disadvantages
Packet header size grows with route length due to source routing
Flood of route requests may potentially reach all nodes in the network
Route Reply Storm problem: Many intermediate nodes reply from local
cache
Stale caches will lead to increased overhead
Destination-Sequenced
Distance-Vector (DSDV)
Reactive protocols
Lower overhead since routes are determined on demand
Significant delay in route determination
Employ flooding (global search)
Control traffic may be bursty
Proactive protocols
Always maintain routes
Little or no delay for route determination
Consume bandwidth to keep routes up-to-date
Maintain routes which may never be used
ZRP: Example
SELESAI
TERIMA KASIH