S.Zahoor Ul Huq et al. / International Journal of Engineering Science and Technology Vol. 2(3), 2010, 227-231 ANALYSIS OF EFFICIENT ADDRESS ALLOCATION SCHEMES IN MOBILE AD HOC NETWORKS S.ZAHOOR UL HUQ*1, Dr. K.E.SREENIVASA MURTHY2, Dr. B.SATYANARAYANA3, D.KAVITHA4 1 Associate Professor, Computer Science & Engineering Department, G. Pulla Reddy Engineering College, Kurnool, Andhra Pradesh, India s_zahoor_2000@yahoo.com 2 3 Principal, G. Pullaiah College of Engineering & Technology, Kurnool, Andhra Pradesh, India kesmurthy@gmail.com Professor in Master of Computer Applications Department, Sri Krishna Devaraya University, Anantapur, Andhra Pradesh, India bachalasatya@yahoo.com 4 Associate Professor, Computer Science & Engineering Department, G. Pulla Reddy Engineering College, Kurnool, Andhra Pradesh, India dwaramkavithareddy@yahoo.com ABSTRACT A Mobile Ad-hoc Network (MANET) can be implemented anywhere where there is little or no communication infrastructure, or the existing infrastructure is inconvenient to use. A number of mobile devices may connect together to form one network. Address auto-configuration is an important issue for ad hoc networks in order to provide autonomous networking and self-management. In this paper we take into account various parameters for designing an efficient address allocation scheme in MANETs and consider the best of them to build an efficient protocol for Address allocation in MANETs. Keywords: IP Address Auto-Configuration; Ad Hoc Address Allocation, Address Conflicts, Resolution schemes, DAD Schemes, Addressing Structure. 1. Introduction In the wired networks the address of the devices or nodes is static and does not change as the autoconfiguration is done by the Dynamic Host Configuration Protocol (DHCP)[4]. But, the addresses of mobile or wireless devices change from time to time. The wireless nodes, moving from one place to another have different points of presence in the network. An auto-configuration method such as DHCP, unfortunately is not suitable for mobile and wireless devices. Another area where DHCP and other solutions for fixed networks, such as Internet Engineering Task Force (IETF) Zeroconf[5], do not provide a good solution is mobile ad hoc networks (MANETSs)[1]. Such networks consist of mobile devices that communicate with each other with wireless communication technologies in an ad hoc fashion. The nodes also act as routers and relay packets that cannot reach the destination in one hop. This makes the network multihop, and this multihop characteristic of a MANET makes existing addressing solutions for fixed networks inadequate. The protocols that are designed for a single LAN topology, with the assumption that every node can reach all the others by link layer broadcasts or multicasts are not true for most MANETs. All nodes are not guaranteed to be reachable through link local broadcasting. Different protocols are therefore required for MANETs. We cannot trust the Mac Addresses for data transfer as Mac Addresses works at Layer 2, and the another reasons are the Mac Addresses are not unique as some manufacturers sell network adapters with non-registered MAC addresses or the MAC address may be corrupt while manufacturing. Most of the network adapters allow users to change the MAC address to arbitrary values and some of the adapters may not be having IEEE MAC addresses at all. Above all because of the privacy interface identifiers are generated randomly [2]. ISSN: 0975-5462 227 S.Zahoor Ul Huq et al. / International Journal of Engineering Science and Technology Vol. 2(3), 2010, 227-231 The major requirement of ad hoc addressing schemes is ensuring the uniqueness of node addresses so that no ambiguity appears when they try to communicate. This is not as trivial as it seems, especially because of the dynamic topology of ad hoc networks. A MANET can be split into several parts and several MANETs can merge into one. Tens to thousands of nodes coexisting in a single network may participate concurrently in the configuration process. Moreover, the wireless nature, such as limited bandwidth, power, and high error rate makes the problem even more challenging. Besides handling a dynamic topology, the protocols much take into account scalability, robustness, and effectiveness. Various protocols use various initial methods for address allocation like Perkins et al[9] uses Duplicate Address Detection (DAD), Boleng[13] uses Agent discovery, Patchipulusu [14] uses Leader Discovery and PACMAN [15] directly. Also most of the papers discuss about the IP auto-configuration when a new node joins or when the subnetwork joins another network but none of them discusses when a new network is initialized and there is no assignment of addresses or there is no Leader and there is no coordinator in the network. Consider the case during Military Operations or during the war where the soldiers carry the mobile devices which help them in communication among themselves, which happens in a remote place where is no network available, in such places a new network has to be initialized to initiate the communication among the devices. In such a place there are no address assignment done to the nodes or there is no DAD scheme or there is no Leader or coordinator among the mobile devices. We want to build IP address auto-configuration for such an network. Section 2 discusses about the requirements for IP Addresses configuration. Section 3 focuses on two types of Addressing Structure, Section 4 discusses about Allocation Methods, Section 5 regarding Addressing and finally Section 6 Conclusion. 2. Requirements The Ad Hoc address auto-configuration protocol must detect and resolve address conflicts in a timely manner and on an ongoing basis, and it should allow the conflicted address replaced with another. The Address allocation scheme should minimize the damage, such as loss of delivered packets due to address replacement. Addresses should be allocated or auto-configured in a way that minimizes the probability that two or more nodes will have the same address. The address allocation scheme must capable of providing IP address in a reasonable delay, must be capable of discovering whether an IP address is currently in use or not, must detect and resolved IP address conflicts in a timely manner and on an ongoing basis, and must timely validate auto-configured IP addresses when powering up or rebooting and also may timely validate auto-configured IP addresses when moving into a new network. The scheme should be able to process the address conflict due to manual address configuration, should minimize the influence of autoconfiguration traffic on the ongoing MANET communication performance, and may get the aid of ad hoc protocol so as to detect duplicate addresses. This scheme should not me modifying the existing MANET routing protocol and may get the aid of ad hoc routing protocol so as to minimize the probability that two or more nodes will have the same address. When MANET Partitions merge, ad hoc address auto-configuration protocol should be performed in the way it avoids congestion caused by messages sent for the purpose of duplicate address detection. Should minimize the damage, such as loss of delivered packets due to address replacement for supporting the survivability of upper-layer sessions, such as TCP. Using this scheme the IP addresses are allocated to mobile nodes in a way that minimizes the probability that two or more nodes will have the same address. The reclamation of the addresses unused any more may be considered. An IP address is assigned only for the duration the node stays in the network. When the node departs the network, its IP address may become available for assignment to other nodes. In this case, address auto-conf protocol should not immediately reuse the released IP addresses as soon as they become available, in order to reduce address conflicts. 3. Addressing Structure The two types of addressing Structure followed are flat and hierarchical. Networks generally use a flat addressing scheme (e.g. the MAC hardware address, the IP network address), where the actual address used does not have a relationship to the hierarchical name which it represents. This type of address is easily administered and assumes no specific network topology. Although easy to administer, a flat address scheme provides no indication of the location of a computer in the network. It is therefore complex to arrange routing between end systems in a large flat network. The social security system is an example of a flat address space. Social security numbers are allocated to people in the order in which they are processed in a particular area. The number itself says nothing about the individual or where she/he may be found (the only information is the social security office where the person's records were processed!) ISSN: 0975-5462 228 S.Zahoor Ul Huq et al. / International Journal of Engineering Science and Technology Vol. 2(3), 2010, 227-231 Whereas in the hierarchical address structure, the network may use this information to help perform the routing. A typical example of a hierarchical addressing system is the telephone numbering scheme. For example, the international phone number 643482009 can be parsed as 64-348-2009 where 64designates a country code (New Zealand), 3 an area within the country (city of Christchurch), 48 a telephone exchange, and 2009 a subscriber line. Both hierarchical and flat address spaces have advantages. Hierarchical addresses can simplify routing, since successive steps may depend on individual fields. For example, successively locating a country, an area, a central office, and a subscriber. It is also simple to assign hierarchical addresses without the need for a central authority. Abbreviation of addresses for local use is easy; for example, country and area codes do not need to be dialed for local phone calls. On the other hand, hierarchical address must be changed if subscribers move and the address space may be inefficiently used since the number of addresses available at a hierarchy level is largely independent of how many are needed. Both types of addressing are common. In our case the network is small/medium and the number of nodes are limited, the addressing type followed is local. The type of Ad Hoc network is mostly standalone. Supports handling network merging and partitioning. There is no Leader whose functionality is address maintenance. 4. Allocation Method The IP Address assignment can be done by using either Conflict detection allocation (CDA) or Conflict-free allocation (CFA). CDA works on selecting an address from a pool of available addresses and then performing DAD (Duplicate Address Detection). DAD is intended to detect conflicts with local addresses. In contrast to CDA, no duplicate detection is performed by the CFA method. The uniqueness of the allocated address can be assured without any cross check. Duplicate Address Detection (DAD) is important to avoid misrouting. DAD is of two types Strong Dad and Weak DAD. Strong DAD: Let Ainode(t) be the address assigned temporarily to node inode at time t. Ainode(t) is undefined when node inode has not chosen any address at time t. For each address addr, addr != undefined, define set saddr(t) = { j | Ainode(t) = addr}. That is saddr(t) is the set of nodes that are assigned address addr at time t. A Strong DAD algorithm must ensure that, within a finite bounded time interval after t, at least one node in saddr(t) will detect that | saddr(t) | > 1. The Strong DAD is impossible under certain conditions if partitions can occur for unbounded intervals of time then strong DAD is impossible. Say, two partitions, and remain so for an unbounded interval of time. In this case if two nodes in the two partitions choose the same address addr, no algorithm can detect these duplicates within a bounded time interval, since the nodes in the two partitions cannot communicate with each other in a timely manner. In practice, particularly in presence of partition, it may not be possible to bound message delays Weak DAD: is proposed in [3], by which the messages can be delivered correctly even when duplicate addresses occur: (i) Delays in ad hoc networks are not always bounded. (ii) Even if the message delays were bounded, determining the bound is not trivial (Particularly when size of the network may be large and possibly unknown). (iii) Impossibility of Strong DAD in presence of unbounded delays implies that timeout-based duplicate address detection schemes will not always detect duplicate addresses. (iv) Weak DAD, unlike strong DAD, can be achieved despite unbounded message delays. (v) Weak DAD relaxes the requirements on duplicate address detection by not requiring detection of all duplicate addresses. (vi) Informally, weak DAD requires that packets “meant for” one node must not be routed to another node, even if the two nodes have chosen the same address. Weak DAD is proposed in [3], by which the messages can still be delivered correctly even when duplicated addresses occur. Protocol overhead is caused by processes that must be completed by each protocol. Consider a network of N nodes then [6], [7], [8], [9] uses the CDA allocation method and has the protocol overhead of O(N2). Where as [10], [11], [12] uses the CFA allocation method and has the protocol overhead of O(N). Although Weak DAD and other methods are existing, Strong DAD is considered to be efficient to find the uniqueness of the IP Addresses. In our Scheme we propose to implement CDA & CFA methods for address allocation. First we propose to use CFA then CDA ISSN: 0975-5462 229 S.Zahoor Ul Huq et al. / International Journal of Engineering Science and Technology Vol. 2(3), 2010, 227-231 5. Addressing The address type can be classified as Tentative and Definite. A Tentative address is the address whose uniqueness is being verified, prior to its assignment to the node. This type of address is not considered assigned to the node in the usual sense. Before the IP Address is assigned to a node and used, however, a node must attempt to verify that this tentative address is not already in use by another node in the network. Specifically, it can be done by Strong DAD containing the tentative address as the target. If another node is already using that address, it will return a message saying so. If another node is also attempting to use the same address, it will also send the message for the target as well, and on getting the acknowledgment of it, the node has to change its tentative address and repeat the process again. The exact delay time for the DAD is network specific and may be set by network management. An address on which the DAD procedure is applied is said to be tentative until the procedure is completed successfully. A tentative address is not considered “assigned to a node” in the traditional sense. It should be noted that DAD must be performed prior to assigning an address to a node in order to prevent multiple nodes from using the same address simultaneously. If a node begins using the address in parallel with DAD, and another node is already using the address, the node performing DAD will erroneously process traffic intended for the other node, resulting in such possible negative consequences as the resetting of open TCP connections. The detection and resolution of address conflicts are the indispensable part of address auto-conf protocol operation 6. Conclusions Much effort has been put into the creation of routing algorithms to handle route setup and maintenance. Most researches in the routing area assume that all hosts already have allocated their unique addresses. This assumption is critical and has to be resolved. A mobile device in a MANET must be assigned a free IP address before it may participate in communication. Dynamic address allocation and management is a very difficult problem and challenging in MANETs where nodes join the network and depart from the network unexpectedly. The random mobility of nodes in MANETs can lead to frequent and unpredictable topology changes. In this paper we have presented an exhaustive analysis of different techniques. We described various available techniques and explained the different criteria to include them in the protocol. REFERENCES [1] [2] [3] [4] [5] [6] [7] [8] [9] [10] [11] [12] [13] [14] [15] Mobile Ad-hoc Networks (MANET), www.ietf.org/html.charters/ manet-charter.html Killian A. Weinger, “Passive Autoconfiguration of Mobile Ad hoc Networks”, IEEE Journal of Selected areas in communications. Vol. 23. No.3 March 2005 p.no.507-519 N. H. Vaidya, “Weak Duplicate Address Detection in Mobile Ad Hoc Networks,” Proc. ACM MobiHoc ’02, June 2002, pp. 206 -16. R. Droms, “Dynamic Host Configuration Protocol,” IETF RFC 2131, Mar. 1997. E. Guttman, “Autoconfiguration for IP Networking: Enabling Local Communication,” IEEE Internet Comp., vol. 5, no. 3, May-June 2001, pp.81-86 I.Park, Y. Kim, and S.Lee, “IPv6 Address Allocation in Hybrid Mobile Ad Hoc Networks,” Proc. 2nd IEEE Wksp. Software Technologies for Future Embedded and Ubiquitous Sys., p. 58. J. Jeong, “Ad Hoc IP Address Autoconfiguration,” IETF Internet draft, Jan. 2006. S. Ruffino and P. Stupar, “Automatic Configuration of IPv6 Addresses for Nodes in a MANET with Multiple Gateways,” IETF Internet draft, Feb. 2006. C. Perkins et al., “IP Address Autoconfiguration for Ad Hoc Networks,” IETF draft, 2001. D. O Mahony and S. Toner, “Self Organizing Node Address Management Protocol for Ad Hoc Networks,” LNCS, 2003, pp. 476–83. C. Jelger and T. Noel, “Proactive Address Autoconfiguration and Prefix Continuity in IPv6 Hybrid Ad Hoc Networks,” Proc. IEEE COMSOC, Sept. 2005. P. Patchipulusu, “Dynamic Address Allocation Protocols for Mobile Ad Hoc Networks,” M.Sc. thesis, Comp. Sci., Texas A&M Univ., 2001. J. Boleng, “Efficient Network Layer Addressing for Mobile Ad Hoc Networks,” Proc. Int’l Conf. Wireless Networks, June 2002, pp. 271– 77. P. Patchipulusu, “Dynamic Address Allocation Protocols for Mobile Ad Hoc Networks,” M.Sc. thesis, Comp. Sci., Texas A&M Univ., 2001. M. Mohsin and R. Prakash, “IP Address Assignment in a Mobile Ad Hoc Network,” Proc. MILCOM, vol. 2, Oct. 2002, pp. 856–61. S.Zahoor ul Huq obtained B.Sc(Electronics) from Sri Krishna Devaraya Universty, Anantapur and MCA from Osmania University, Hyderabad, India in the year 1997 and 2000 respectively. He also obtained his M.E in Computer Science & Engineering from Anna University in 2004.He is currently pursuing PhD degree from Sri Krishna Devaraya University, Anantapur, India,. He presented 6 research papers in various international journals. He is presently working as Associate Professor in CSE Department, G. Pulla Reddy Engineering College, Kurnool, A.P, India.His research interests include Computer Networks , Databases and data mining. ISSN: 0975-5462 230 S.Zahoor Ul Huq et al. / International Journal of Engineering Science and Technology Vol. 2(3), 2010, 227-231 Dr. K.E. Sreenivasa Murthy obtained B.Tech and M.Tech degrees in Electronics and Communication Engineering from Sri Venkateswara University, Tirupati, India in 1989 and 1992 respectively and PhD degree from Sri Krishna Devaraya University, Anantapur, India, in 1997. He presented more than 10 research papers in various national and international conferences and journals. He is at present working as principal at G. Pullaiah College of Engineering and Technology, Kurnool, India. His research interests include FPGA and DSP applications. Dr. B. Sathyanarayana graduated from Madras Christian College, Madras University, Tamilnadu India in1985 and post graduated from Madurai Kamaraju University, Tamilnadu in 1988 and obtained PhD from Sri Krishna Devaraya University Ananthapur India in 2000. He Worked as Head of the Departement in Department of Computer Science & Technology. Sri Krishna Devaraya University Ananthapur ,Andhra Pradesh India He Published 11Papers for National and International Journals. He attended for 3-National Conferences His area of interest is on Computer Networks, Network Security and Image Processing. D.Kavitha obatained her B.Tech degree from S.K.University, Anantapur and M.Tech degree from Jawaharlal Nehru Technological University, Anantapur in the year 2001 and 2005 respectively.She is currently pursuing Ph.D at Sri Krishna Devaraya University, Anantapur, India. She is presently working as Associate Professor in the Department of Computer Science and Engineering at G. Pulla Reddy Engineering College, Kurnool, Andhra Pradesh, India. She presented four research papers in national conferences, one in International Conference and one research paper in International Journal.. Her research areas include Computer Networks and Network Security ISSN: 0975-5462 231