Weak Duplicate Address Detection in Mobile Ad Hoc Networks

Slides:



Advertisements
Similar presentations
Extensible Manet Auto-configuration Protocol (EMAP) draft-ros-autoconf-emap-02.txt Pedro M. Ruiz Francisco J. Ros March, 2006 Dallas, USA 65 th IETF.
Advertisements

Multicasting in Mobile Ad hoc Networks By XIE Jiawei.
1IETF57 MANET WG Ad Hoc IP Address Autoconfiguration Jaehoon Paul Jeong ETRI 16 th July th IETF.
IP Forwarding Relates to Lab 3.
Network Layer Routing Issues (I). Infrastructure vs. multi-hop Infrastructure networks: Infrastructure networks: ◦ One or several Access-Points (AP) connected.
DSR The Dynamic Source Routing Protocol Students: Mirko Gilioli Mohammed El Allali.
Improving TCP Performance over Mobile Ad Hoc Networks by Exploiting Cross- Layer Information Awareness Xin Yu Department Of Computer Science New York University,
Doc.: IEEE /1183r0 Submission September 2011 Masataka Ohta, Tokyo Institute of TechnologySlide 1 IP over Congested WLAN Date: Authors:
CSE University of Washington Multipath Routing Protocols in AdHoc Networks.
Secure Data Communication in Mobile Ad Hoc Networks Authors: Panagiotis Papadimitratos and Zygmunt J Haas Presented by Sarah Casey Authors: Panagiotis.
Centre for Wireless Communications University of Oulu, Finland
Anonymous Gossip: Improving Multicast Reliability in Mobile Ad-Hoc Networks Ranveer Chandra (joint work with Venugopalan Ramasubramanian and Ken Birman)
Mobile and Wireless Computing Institute for Computer Science, University of Freiburg Western Australian Interactive Virtual Environments Centre (IVEC)
1IETF-59 MANET WG Ad Hoc IP Address Autoconfiguration Jaehoon Jeong ETRI 3 rd February 2004 draft-jeong-adhoc-ip-addr-autoconf-01.txt.
Component-Based Routing for Mobile Ad Hoc Networks Chunyue Liu, Tarek Saadawi & Myung Lee CUNY, City College.
Address Auto-configuration in Mobile Ad Hoc Networks Current Approaches and Future Directions Date : 2005 / 1 / 20 Speaker : Xu Jia-Hao Advisor : Ke Kai-Wei.
ROUTING PROTOCOL IGRP. REVIEW 4 Purpose of Router –determine best path to destination –pass the frames to the destination 4 Protocols –routed - used by.
1 Some Issues in Ad Hoc Networks Nitin Vaidya University of Illinois at Urbana-Champaign Keynote talk presented at the International.
Ad Hoc Wireless Routing COS 461: Computer Networks
Mobile IP: Introduction Reference: “Mobile networking through Mobile IP”; Perkins, C.E.; IEEE Internet Computing, Volume: 2 Issue: 1, Jan.- Feb. 1998;
Network Kernel Architectures and Implementation ( ) Naming and Addressing Chaiporn Jaikaeo Department of Computer Engineering.
Itrat Rasool Quadri ST ID COE-543 Wireless and Mobile Networks
1 Introducing Routing 1. Dynamic routing - information is learned from other routers, and routing protocols adjust routes automatically. 2. Static routing.
Mobile Routing protocols MANET
Mobile Adhoc Network: Routing Protocol:AODV
1 Heterogeneity in Multi-Hop Wireless Networks Nitin H. Vaidya University of Illinois at Urbana-Champaign © 2003 Vaidya.
Ad Hoc Routing: The AODV and DSR Protocols Speaker : Wilson Lai “Performance Comparison of Two On-Demand Routing Protocols for Ad Hoc Networks”, C. Perkins.
Chapter 19 - Binding Protocol Addresses
Dynamic Source Routing (DSR) Sandeep Gupta M.Tech - WCC.
DSR: Introduction Reference: D. B. Johnson, D. A. Maltz, Y.-C. Hu, and J. G. Jetcheva, “The Dynamic Source Routing Protocol for Mobile Ad Hoc Networks,”
SRL: A Bidirectional Abstraction for Unidirectional Ad Hoc Networks. Venugopalan Ramasubramanian Ranveer Chandra Daniel Mosse.
ICMPv6 Error Message Types Informational Message Types.
PRIN WOMEN PROJECT Research Unit: University of Naples Federico II G. Ferraiuolo
Ασύρματες και Κινητές Επικοινωνίες Ενότητα # 10: Mobile Network Layer: Mobile IP Διδάσκων: Βασίλειος Σύρης Τμήμα: Πληροφορικής.
ECE 544 Project3 Group 9 Brien Range Sidhika Varshney Sanhitha Rao Puskuru.
Doc.: IEEE /1183r1 Submission September 2011 Masataka Ohta, Tokyo Institute of TechnologySlide 1 IP over Congested WLAN Date: Authors:
1 Computer Networks Chapter 5. Network layer The network layer is concerned with getting packets from the source all the way to the destination. Getting.
A Cluster-based Routing Protocol for Mobile Ad hoc Networks
GeoTORA: A Protocol for Geocasting in Mobile Ad Hoc Networks
Author:Zarei.M.;Faez.K. ;Nya.J.M.
Chapter 9: Transport Layer
Introduction Wireless devices offering IP connectivity
A Location-Based Routing Method for Mobile Ad Hoc Networks
Instructor Materials Chapter 9: Transport Layer
Booting up on the Home Link
MZR: A Multicast Protocol based on Zone Routing
Basic Router Troubleshooting
21-2 ICMP(Internet control message protocol)
UNIT-V Transport Layer protocols for Ad Hoc Wireless Networks
Requirements for Ad Hoc IP Address Autoconfiguration
Mobicom ‘99 Per Johansson, Tony Larsson, Nicklas Hedman
Internet Protocol: Connectionless Datagram Delivery
A comparison of Ad-Hoc Routing Protocols
Switching Techniques In large networks there might be multiple paths linking sender and receiver. Information may be switched as it travels through various.
CSE 4340/5349 Mobile Systems Engineering
Net 323: NETWORK Protocols
Fault-Tolerant Routing
Chapter 5 The Network Layer.
任課教授:陳朝鈞 教授 學生:王志嘉、馬敏修
Chapter 5: Dynamic Routing
ECE 544 Protocol Design Project 2016
Temporally-Ordered Routing Algorithm (TORA)
Overlay Networking Overview.
Chapter 2: Static Routing
Practical Considerations for Securely Deploying Mobility
EIGRP.
Cisco networking, CNET-448
Detect and Prevent Rogue Traffic in Mobile Ad Hoc Networks
Lecture 4a Mobile IP 1.
Routing in Mobile Wireless Networks Neil Tang 11/14/2008
Presentation transcript:

Weak Duplicate Address Detection in Mobile Ad Hoc Networks Nitin Vaidya University of Illinois

Address Auto-configuration Auto-configuration important for autonomous operation of an ad hoc network IPv4 and IPv6 auto-configuration mechanisms have been proposed Need to be adapted for ad hoc networks

Auto-Configuration in Ad Hoc Networks Worst case network delays may be unknown, or highly variable Partitions may occur, and merge

Duplicate Address Detection in Ad Hoc Networks Several proposals One example [Perkins]: Host picks an address randomly Host performs route discovery for the chosen address If a route reply is received, address duplication is detected

Example: Initially Partitioned Network D’s packets for address a routed to A

Merged Network Duplicate address detection (DAD) important To avoid misrouting

Strong DAD Detect duplicate addresses within t seconds Not possible to guarantee strong DAD in presence of unbounded delays May occur due to partitions Even when delays are bounded, bound may be difficult to calculate Unknown network size

DAD Strong DAD impossible with unbounded delay How to achieve DAD ?

Design Principle If you cannot solve a problem Change the problem

Weak DAD: Requirement Packets from a given host to a given address should be routed to the same destination, despite duplication of the address

Example: Initially Partitioned Network D’s packets for address a routed to A

Merged Network: Acceptable Behavior with Weak DAD Packets from D to address a still routed to host A

Merged Network: Unacceptable behavior Packets from D to address a routed to host K instead of A

Weak DAD: Implementation Integrate duplicate address detection with route maintenance

Weak DAD with Link State Routing Each host has a unique (with high probability) key May include MAC address, serial number, … May be large in size In all routing-related packets (link state updates) IP addresses tagged by keys (IP, key) pair

Weak DAD with Link State Routing Address duplication not always detected Duplication detected before misrouting can occur Weak  Reliable, but potentially delayed, DAD

Link State Routing (LSR): Example

Weak DAD with LSR

Weak DAD with LSR X Host X with key K_x joins and choose IP_A (address duplication)

Weak DAD with LSR If host D receives a link state update containing (IP_A, K_x), host D detects duplication of address IP_A Two pairs with identical IP address but distinct keys imply duplication

Just-in-Time DAD Duplication detected before routing tables could be mis-configured

Higher Layer Interaction Higher layers interaction may result in undesirable behavior

Example Q discovers service Foo at address a

Example: Networks merge Node A performs service discovery for Foo, and learns from Q that Foo is available at address a

Example: Networks merge Node A’s packets to a are delivered to M R provides service Foo not M

Enhanced Weak DAD If the status of host A above the network layer depends on state of host B (State A  state B)  then network layer of host A should be aware of (IP, key) pairs know to B

Enhanced Weak DAD Works despite upper layer interaction

Weak DAD: Other Issues (please see paper for details) Duplicate MAC addresses within two hops of each other bad Need a duplicate MAC address detection scheme Network layers performing unicasts using multicast/flooding Limited-time address leases DAD with other routing protocols Possible. Paper also discusses DSR.

Summary Strong DAD – Not always possible Weak DAD feasible Combines DAD with route maintenance Overhead of weak DAD Expected to be low, but unknown presently