Académique Documents
Professionnel Documents
Culture Documents
Sonali Singh Assistant Professor Dept. of Computer Science, Kanya Gurukul Mahavidyalya, Dehradun. Email : sonalisagi@yahoo.com Dr. (Mrs.) Nipur Associate Professor Dept. of Computer Science, Kanya Gurukul Mahavidyalya, Dehradun. Email : nipursingh@hotmail.com
1. Introduction
Wireless mobile networks are composed of mobile nodes interconnected by wireless multi-hop communication paths. Unlike conventional wireless networks, ad hoc network have infrastructure less communication over the shared wireless channel. Communication is directly between nodes or through intermediate nodes acting as router. The main advantage of such a network is rapid deployment. MANET can be established extremely flexibly without any fixed base station in battle field, military applications and other emergency and disaster situation. In such conditions, where the wired network is not available, ad hoc network provide the only feasible means for communication and information access. Ad hoc network are suited for use in situations where an infrastructure is unavailable or to deploy one is not cost effective. MANET can be used in establishing efficient, dynamic communication for rescue, emergency and military operations. The major issues in MANET are routing, multicasting/broadcasting, address auto-configuration, transport layer management, power management, security, Quality of service, products [Kuma 06].
3. Issues in Auto-configuration
Any address auto-configuration mechanism should address the following issues: Dynamic nature of nodes: Adhoc nodes are mobile and could join and leave the network at any moment without notification. Network Partitioning: A mobile network can split into two or more network, if one or more nodes decide to leave the network. In such a case, dynamics of the network can change. These network partitions may or may not merge back together. Network merging: Two or more independent MANETs may be merged into one big network.
Because the MANETs are separately configured, so there could be some duplicate address in them. Therefore some or all nodes in one partition may need to change their address.
Stateful Approaches
Stateless Approaches
Hybrid Approaches
MANETconf[Nesa 02] When a new node wishes to join the network, it broadcast a message to its neighborhood. Then it chooses the first neighbor who replies as the initiator and send an address request query to it. The initiator then chooses a free IP address from its allocation table and floods the network with an initiator request message. If all the existing nodes reply positively, it concludes that the address is free and assign it to the requester and flood this information in the MANET so that all other nodes can also update their table. If at least one response is negative, another address is selected and another attempt is initiated to assign address to the requester. MANETconf also addresses network partitioning and merging. Each network is assigned a partition ID. This ID is periodically flooded within the network and the node which doesnt receive it for sometime assumes that the network is partitioned. Similarly, when a node sees another node with the different partition ID, it assumes a network merger. Though MANETconf guarantees address uniqueness and is totally distributed but this protocol is highly complex in term of communication, table maintenance and synchronization. Buddy Protocol[Mohs 02] This scheme uses the concept of binary split. At the beginning there is only one node that has the entire pool of addresses, this node detects no neighbors, thus it auto configure with the first IP of the predefined address range. When a new node joins and requests an address, the initiator assigns an address and also divide the set of IP addresses into two and give one half to the requesting node. This process continues and eventually, all the nodes in the network have a set of addresses to assign. The synchronization of the address table involves each node to periodically broadcast its address table. The detection of IP address leaks is accomplished by buddy nodes. If one node detects that the other is missing, it merges its IP range with its own pool. To distinguish between different networks, a network is associated always with a network ID. When networks merge, one of the conflicting nodes has to give up its address space and acquire a new set of addresses. This protocol guarantees address uniqueness , generates no unnecessary address changes and distributed but it is complex to be implemented and consistent flooding increases network overhead.
know about duplicate addressing. Each node maintains an allocation table used for assigning addresses. PACMAN uses multi-layer information from the routing protocol traffic and has modular architecture. After networks merge, address conflicts are detected by PDAD. PACMAN can efficiently configure entire network within seconds, even if all nodes star up simultaneously. It can lower the routing protocol overhead significantly by using IP address encoding. PACMAN uses multi-layer information from the routing protocol traffic and has modular architecture. PACMAN is a complex protocol, which supports selective protocols like OLSR and FSR. The technique also demands modification in AODV.
References
[Thom 98]: S. Thomson and T. Nortan, IPV6 stateless Address Autoconfiguration , Network workin group, RFC 2462, December 1998. [Weni 04]: K.Weniger and M.Zitterbart, Address autoconfiguration in mobile ad hoc networks: current approaches, IEEE Netw. Mag., vol.18, no.4, pp. 6-11, July 2004. [Drom 97]: R. Droms, Dynamic Host Configuration Protocol, network working group, IETF RFC 2131, March 1997. [Perk 00]: C. Perkins, J. Malinen, R. Wakikawa, E. Belding-Royer, and Y. Sun, IP Address Autoconfiguration For Ad Hoc Networks,in draft-ietfmanet-autoconf-01.txt, Internet draft: Internet Engineering Task Force, MANET working Group, 2000. [Nesa 02]: S. Nesargi and R. Prakash, MANETconf: Configuration of hosts in a mobile ad hoc network,Proc. IEEE INFOCOM, New York, NY, June 2002. [Mohs 02]: M. Mohsin and R. Prakash, IP address assignment in a mobile ad hoc network, Proc. IEEE MILCOM, Anaheim, CA, Oct. 2002. [Vaid 02]: N. H. Vaidya, Weak duplicate address detection in mobile ad hoc networks, Proc. ACM MobiHoc, Lausanne, Switzerland, pp.206216, June 2002. [Sun 03]: Y.Sun and E.M. Belding Royer, Dynamic address configuration in mobile ad hoc networks, UCSB tech. rep., Santa Barbara, CA, June 2003. [Perk 01]: C. Perkins, J. T. Malinen, R. Wakikawa, E. M. Belding-Royer, and Y. Sun, IP address auto-configuration for ad hoc networks, IETF Draft, 2001. [Weni 05]: K.Weniger, PACMAN: Passive autoconfiguration for mobile ad hoc networks, IEEE JSAC, vol.23, no.3, pp.507-509, Mar. 2005. [Weni 03]: K. Weniger, Passive duplicate address detection in mobile ad hoc networks, Proc. IEEE WCNC, New Orleans, LA, Mar. 2003. [Lee 06]: Dongkeun Lee, Jaepil Yoo, Keecheon Kim, and Kyunglim Kang, IPv6 Stateless Address Autoconfiguration in Mobile Ad Hoc Network,APWeb Workshops 2006, LNCS 3842, pp. 360-367, 2006.
6. Conclusion
Automatic address allocation is more difficult in a MANET environment than that in hard wired networks due to instability of mobile nodes, low bandwidth of wireless links, openness of MANET, and lack of centralized administration In this paper we summarized some mechanism related to the address auto-configuration and classified the approaches into three main categories, stateful, stateless, and hybrid. We also discussed the issues of host joining and departing a MANET, also MANET merger and partition. Other than the above, there are some more issues like security, scalability, power limitations etc which must be taken into account.