MSC Computer Science Advance Networking Concepts
MSC Computer Science Advance Networking Concepts
MSC Computer Science Advance Networking Concepts
(CS)
SEMESTER - I (CBCS)
ADVANCED NETWORKING
CONCEPTS
Module - I
1. Networking - I 01
2. Networking - II 26
3. Networking - III 44
4. Networking - IV 62
Module - II
5. Network Virtualization 75
Module - III
Module - IV
Syllabus Advanced Networking Concepts
Semester I
Unit I: Networking
Internet and Intranet, Protocol layer and their services, Network
Applications like Web, HTTP, FTP and Electronic Mail in the Internet,
Domain Name System, Transport-Layer Services, Multiplexing and
Demultiplexing, UDP, TCP, TCP Congestion Control, Network Layer,
Virtual Circuit and Datagram Networks, Need of Router, The Internet
Protocol (IP), Routing Algorithms, Routing in the Internet.
Unit II: Network Virtualization
Need for Virtualization, The Virtual Enterprise, Transport Virtualization-
VNs, Central Services Access: Virtual Network Perimeter, A
Virtualization Technologies primer: theory, Network Device
Virtualization, Data-Path Virtualization, Control-Plane Virtualization,
Routing Protocols.
Unit III: Adhoc Networking
Introduction, application of MANET, challenges, Routing in Ad hoc
networks, topology & position based approaches, Routing protocols:
topology based, position based, Broadcasting, Multicasting, & Geocasting,
Wireless LAN, Transmission techniques, MAC protocol issues, Wireless
PANs, The Bluetooth technology.
Unit IV: Wireless Sensor networks:
Need and application of sensor networks, sensor networks design
considerations, empirical energy consumption, sensing and
communication range, design issues, localization scheme, clustering of
SNs, Routing layer, Sensor networks in controlled environment and
actuators, regularly placed sensors, network issues, RFID as passive
sensors.
Text book:
Computer Networking: A Top-Down Approach 6th edition, James F.
Kurose, Keith W. Ross, Pearson (2012).
Network Virtualization, Victor Moreno, Kumar Reddy, Cisco Press
(2006).
Ad Hoc and Sensor Networks: Theory and Applications 2nd edition;
Carlos de Morais Cordeiro, Dharma Prakash Agrawal, World
Scientific Publishing Company; 2 edition (2011)
Reference book:
TCP/IP Protocol Suite 4 edition, Behrouz Forouzan, McGraw-Hill
Science ( 2009)
Mobile Ad Hoc Networks: Current Status and Future Trends, Jonathan
Loo, Jaime Lloret Mauri, Jesús Hamilton Ortiz, CRC Press(2011)
Fundamentals of Sensor Network Programming: Applications and
Technology, S. Sitharama Iyengar, Nandan Parameshwaran, Vir V.
Phoha, N. Balakrishnan, Chuka D. Okoye, Wiley-IEEE Press (2010).
I
Module I
1
NETWORKING - I
Unit Structure
1.1 Objective
1.2 Introduction
1.3 Internet and Intranet
1.4 Protocol layer and their services,
1.5 Network Applications like web, HTTP, FTP and Electronic Mail in the
Internet
1.5.1 Overview of HTTP
1.5.2 Non-Persistent and Persistent Connections
1.5.3 HTTP Message Format
1.5.4 HTTP Response Message
1.5.5 User-Server Interaction: Cookies
1.6 FTP
1.7 Electronic mail in the internet
1.7.1 SMTP
1.7.2 Comparison with HTTP
1.7.3 Mail message formats
1.7.4 Mail access protocols
1.8 Domain Name System,
1.8.1 Services provided by DNS
1.8.2 Overview of how DNS works
1.8.3 DNS records and messages
1.9 Summary
2.0 Reference for further reading
2.1 Unit End Exercises
1.1 OBJECTIVE
1.2 INTRODUCTION
2
Fig.1 Internet & Intranet
Application Layer
The application layer is a network application and their
application-layer protocols reside on this layer. The Internet’s application
layer includes different protocols like, the HTTP protocol which provides
for web document request and transfer, SMTP which administers for the
transfer of e-mail messages, and FTP which provides for the transfer of
files between two systems.
Transport Layer
The Internet’s transport layer carries application-layer messages
between application endpoints. In
The two transport protocols, TCP and UDP, any one of them can
transport application layer messages to each other’s. TCP provides a
connection-oriented service to its applications. This includes guaranteed
delivery of message or packets to the destination and flow control.
Network Layer
Network layer is responsible for moving network-layer packets
known as datagrams from one host to another host. The Internet transport-
layer protocol such as TCP & UDP in a source host passes a transport-
layer segment and a destination address to the network layer, like the
postal service a letter with a destination address. The network layer
provides the service of delivering the chunk of message to the transport
layer in the destination host.
Link Layer
The network layer directs a datagram through a list of routers
between the source and destination. To move a packet from one router to
the next route in the route, the network layer confides on the services of
the link layer. At every node the network layer sends the datagram packet
down to the link layer, which delivers the datagram packet to the next
node along the route information. At this point next node, the link layer
passes the datagram up to the network layer.
Physical Layer
In Physical Layer, a period of time the function of the link layer is
to move entire frames from one network element to an adjacent network
element; the job of the physical layer is to shift the individual bits within
the frame from one node to the next node. The protocol link is dependent
and furthers relies on the actual transmission medium of the protocol link,
for example, twisted-pair copper wire, single-mode fiber optics. For e.g.
4
Ethernet has numerous physical-layer protocols, one for twisted-pair
copper wire, another for coaxial cable, another for fiber, and so on.
Web
The web was the first Internet application that was used
everywhere in today's world. It drastically & continuously changes how
people collaborate inside and outside their work environment. It raised the
Internet from just one of many data networks to essentially the one and
only one data network. Maybe what appeals the most to users is that the
web operates on requirement. Web users receive what they need, when
they want it at any time. This is far from traditional broadcast radio and
television systems, which force users to tune in when the content provider
makes the content available to all users in the world. Web available on
user demand. It is extremely simple for any individual to make
information available over the web for every user can be a publishes at too
little cost. Hyperlinks and search engines help us guide through
information. Forms, JavaScript, Java applets, and many others devices
empower us to relate with different web pages and websites. The web and
its protocols assist as a platform for YouTube, web-based email, and most
mobile Internet applications, including Instagram and Google Maps.
5
web server, which implement the server side of HTTP, web objects, each
addressable by a URL. Well liked web servers include Apache and
Microsoft Internet Information Server.
HTTP states how web clients request web pages from web servers
and how servers transfer web pages to clients. When a user requests a
particular web page, the browser sends HTTP request messages and
requests objects which are available on the server side. The server receives
the requests via HTTP and responds with HTTP response messages that
include the objects. HTTP uses TCP/IP as its underlying transport
protocol. The HTTP client first begins a TCP connection with the server.
After the connection is formed, the browser and the server processes
access TCP through their socket interfaces.
After the server sends the object, the connection does not persist
for others objects. Each TCP connection transports exactly one request
7
message and one response message. Thus, in this example, when a user
requests the web page, 11 TCP connections are generated.
This message is written in ASCII text, the human can easily read
this. The second division of the message has five lines, each followed by a
carriage return and a line feed. The end line of the message is followed by
an additional carriage return and line feed. Even though this particular
request message has five lines, a request message can have many more
lines. The first line of an HTTP request message is called the request line
and the future lines are called the header lines.
9
The User agent specifies the header line, that the browser type
that is building the request to the server, at this moment the user agent is
mozilla, a firefox browser. This header line is helpful because the server
sends different varieties of the same object to different types of user
agents.
10
The response Message has three sections: an initial status line, six
header lines, and then the entity body. The entity body is the meat of the
message; it contains the requested object itself.
The status line has three fields: the protocol version field, a status
code, and a corresponding status message. In this example, the status line
indicates that the server is using HTTP/1.1.
11
Fig. 5 General format of an HTTP response message
Set-cookie: 1678
Cookie: 1678
1.6 FTP
In a typical FTP session the user is sitting in front of one host i.e.
the local host and remote host. If the user to access the remote account, the
user must provide a user identification and a password during file transfer.
After providing authorization information, the user can transfer files from
the local file system to the remote file system and vice versa. As shown in
Figure 7, the user interacts with FTP through an FTP user agent. The user
must provide the hostname of the remote host, causing the FTP client
process in the local host to setup a TCP connection with the FTP server
process in the remote host. The user then provides the user recognition and
password, which are sent over the TCP connection as part of FTP. Once
the server has authenticated the user, the user copies one or more files
stored in the local file system into the remote file system or vice versa.
Fig. 7 FTP moves files between local and remote file systems
Electronic mail has been around since the birth of the internet. It
was the most popular application, and has become more improved and
powerful over the years. It is the most important and utilized application.
As it is the same like postal mail service, e-mail is an asynchronous
communication medium people send and read messages when it is
15
convenient for them, without having to interrelate with others people’s
schedules. Electronic mail is fast, easy to distribute, and cheap. The
current email application has many powerful features, including messages
with attachments, hyperlinks, html-formatted text, embedded photos and
much more. His application-layer protocols are the heart of internet e-
mail.
A high-level view of the internet mail system and its key components:
16
Fig. 9 a High-Level view of the internet E-Mail System
1.7.1 SMTP
17
4. After some initial SMTP handshaking, the SMTP client sends Amit's
message into the TCP connection.
5. At shyam’s mail server, the server side of SMTP receives the message.
shyam’s mail server then places the message in shyam’s mailbox.
6. Shyam calls on his user agent to read the message at his
convenience.
1. HTTP & SMTP protocols are used to transfer files from one host to
another host
2. HTTP transfers files from a web server to a web client.
3. SMTP transfers e-mail messages from one mail server to another mail
server.
4. In SMTP & HTTP, when transferring the files, both persistent HTTP
and SMTP use persistent connections. Both two protocols have
common characteristics.
5. HTTP is mainly a pull protocol whose someone loads information on
a web server and users use HTTP to pull the information from the
server at their benefit.
6. SMTP is primarily a push protocol; the sending mail server pushes the
file to the receiving mail server. On the other hand the TCP connection
is initiated by the machine that wants to send the file.
7. SMTP requires each message, including the body of each message, to
be in 7-bit ASCII format. If the message contains characters that are
not 7-bit ASCII then the message has to be encoded into 7-bit ASCII.
HTTP data does not impose this constraint.
8. Internet mail places all of this message’s objects into one message.
Each and every header must have a from: header line and a to:
header line. a header may include a Subject: header line as well as others
optional header lines. it is important to note that these header lines are
different from the SMTP commands, the commands were part of the
SMTP handshaking protocol. The header lines checked in this section are
part of the mail message itself. a typical message header shown below:
from: amit@crepes.fr
to: shyam@hamburger.edu
subject: searching for the meaning of life.
After the message header, a blank line follows, and then the
message body follows. It must use telnet to send a message to a mail
server that contains some header lines, including the subject: header line.
Once SMTP server delivers the message from Amit's mail server
to Shyam's mail server, the message is placed in Shyam's mailbox. Then
shyam reads his mail by logging onto the server host and then executing a
mail reader that runs on that host. In the early 1990s this was the standard
way of doing things. But today, mail access uses client-server architecture.
The typical user reads email with a client that executes on the user’s end
system, for example, on an office pc, a laptop, or a smartphone. By
executing a mail client on a local pc, users enjoy a rich set of features,
including the ability to view multimedia messages and attachments
19
Internet hosts can be identified in many ways like humans. One
identifier for a host is its hostname. Hostnames such as ibn.com,
www.yahoo.com, somaiya.edu, and mu.ac.in are mnemonic and are
therefore appreciated by humans. However, hostnames provide little, if
any, information about the location within the internet of the host. (A
hostname such as www.mu.ac.in, which ends with the country code .in,
tells us that the host is probably in India, but doesn’t say much more.)
Furthermore, because hostnames can consist of variable length
alphanumeric characters, they would be difficult to process by routers. For
these reasons, hosts are also identified by IP addresses.
The DNS protocol runs over UDP and uses PORT 53.
20
3. The DNS client sends a query containing the hostname to a DNS
server.
4. The DNS client eventually receives a reply, which includes the IP
address for the hostname.
5. Once the browser receives the IP address from DNS, it can initiate a
TCP connection to the HTTP server process located at PORT 80 at
that IP address.
A simple design for DNS would have one DNS server that
contains all the mappings. In this centralized design, clients simply direct
all queries to the single DNS server, and the DNS server responds directly
to the querying clients. Although the simplicity of this design is attractive,
it is inappropriate for today’s internet, with its vast (and growing) number
of hosts. The problems with a centralized design include:
a. A single point of failure. If the DNS server crashes, so does the entire
internet!
b. Traffic volume. A single DNS server would have to handle all DNS
queries.
c. Distant centralized database. A single DNS server cannot be “close
to” all the querying clients. If we put the single DNS server in Mumbai
city, then all queries from Australia must travel to the other side of the
globe, maybe over slow and congested links. This can lead to
significant delays.
d. Maintenance. The single DNS server would have to keep records for
all internet hosts. Not only would this centralized database be large,
but it would have to be updated frequently to account for every new
host.
22
below, we ignore the TTL field. The meaning of name and value depend
on type:
DNS messages
There are only two types of DNS messages. Both query and reply
messages have the same format, as shown in figure 3.the semantics of the
various fields in a DNS message are as follows:
23
Fig. 11 DNS message format
b. The question part of the message contains information about the query
that is being made. This part of message includes a name field that
contains the name that is being queried, and a type field that indicates
the type of question being asked about the name for example, a host
address associated with a name (Type A) or the mail server for a name
(Type MX).
c. In a reply from a DNS server, the answer part of the message contains
the resource records for the name that was originally queried.
Recollect that in each resource record those is the type (for example,
A, NS, CNAME, and MX), the value, and the TTL. A reply can return
multiple RRS in the answer part of the message, since a hostname can
have multiple IP addresses.
d. The authority section of the message contains records of other
authoritative servers.
e. The additional section of the message contains other helpful records.
For example, the answer field in reply to an MX query contains a
resource record providing the canonical hostname of a mail server.
1.7 SUMMARY
24
4. We have also learn difference between Non-Persistent and Persistent
Connections
5. We have seen the HTTP Message format & HTTP Response Message.
25
2
NETWORKING - II
Unit Structure
2.1 Objective
2.2 Transport-Layer Services,
2.2.1 Relationship Between Transport And Network Layers
2.2.2 Overview Of The Transport Layer In The Internet
2.3 Multiplexing And Demultiplexing,
2.4 Udp
2.4.1 User Datagram
2.4.2 Udp Services
2.4.3 Udp Applications
2.5 Tcp
2.5.1 Tcp Features
2.5.2 Segment
2.6 Tcp Congestion Control
2.7 Summary
2.8 Reference For Further Reading
2.9 Unit End Exercises
2.1 OBJECTIVE
27
Fig. 4 the transport layer provides logical rather than physical
communication between application processes
The sockets have unique identifiers, and that each segment has
special fields that indicate the socket to which the segment is to be
delivered. These special fields, Shown in figure 6, are the source port
number field and the destination port number field, The 16-bit port
number, between 0 to 65535. The port numbers ranging from 0 to 1023
are called well-known port numbers and are restricted, which means that
they are reserved for use by well-known application protocols such as
HTTP and FTP.
29
Connectionless Multiplexing and Demultiplexing
The program running in a host can create a UDP socket with the line
clientsocket.bind((‘’, 19157))
One best difference between a TCP socket and a UDP socket is that a
TCP socket is identified by a four-tuple:
1. sourceip address.
2. source port number.
3. destinationip address.
4. destination port number.
when a TCP segment arrives from the network to a host, the host uses all
four values to direct the segment to the appropriate socket. In contrast with
udp, two arriving TCP segments with different source IP addresses or
source port numbers will be directed to two different sockets. to gain
further insight, let’s rethink the TCP client-server programming.
❏ The TCP server application has a “welcome socket,” that waits for
connection establishment requests from TCP clients on port
number 12000.
❏ The TCP client creates a socket and sends a connection
establishment request message with the lines:
30
clientsocket = socket(af_inet, sock_stream)
clientsocket.connect((servername,12000))
❏ A connection initiation request is nothing more than a TCP
segment with destination port number 12000 and a special
connection-establishment bit set in the TCP header. The message
also includes a source port number that was chosen by the user.
❏ The host OS of the computer running the server process receives
the incoming connection-request segment with destination port
12000, it locates the server process that is waiting to accept a
connection on port number 12000. the server process then creates a
new socket:
connectionsocket, addr = serversocket.accept()
❏ The transport layer at the server notes the following four values in
the connection-request segment:
a. the source port number in the segment
b. the ip address of the source host
c. the destination port number in the segment
d. its own ip address.
2.4 UDP
31
Second responsibility is to provide control mechanisms at the transport
level. UDP doesn't have a flow control mechanism and no
acknowledgement for received packets. UDP does provide error control to
some extent. If UDP detects an error in the received packet, it drops it.
32
● Length.
1. Length is a 16-bit field that defines the total length of the user
datagram, header plus data.
2. It defines a total length of 0 to 65,535 bytes.
3. A user datagram is enclosed in an IP datagram.
4. There is a field in the IP datagram that defines the total length.
5. There is another field in the IP datagram that defines the length of
the header.
● Checksum. This field is used to detect errors over the entire user
datagram (header
plus data). The checksum is discussed in the next section.
Example
The following is a dump of a UDP header in hexadecimal format.
CB84000D001C001C
33
Table 1. Well-known Ports used with UDP
Connectionless Services
UDP provides a connectionless service. The user datagram sent by
UDP is an independent datagram. There is no connection between the
different user datagrams even if they are coming from the same source
process and going to the same destination program. The user datagrams
are not numerical. There is no connection establishment and no connection
termination as is the case for TCP. This means that each user datagram can
travel on a different path.
Flow Control
UDP is a very simple protocol. There is no flow control, and hence
no window mechanism. The receiver may overflow with incoming
messages. The lack of flow control means that the process using UDP
should provide for this service, if needed.
Error Control
There is no error control mechanism in UDP except for the
checksum. The sender does not realize that if a message has been lost or
duplicated. When the receiver found an error through the checksum, the
user datagram is discarded.
Checksum
UDP checksum calculation is different from the one for IP. Here
the checksum includes three sections:
1. A pseudo header,
2. UDP header, and
3. Data coming from the application layer
34
Fig. 10 UDP Header
Congestion Control
UDP is a connectionless protocol; it does not provide congestion
control. UDP assumes that the packets sent are small and sporadic, and
cannot create congestion in the network.
35
Encapsulation
In Encapsulation, it passes the message to UDP along with a pair
of socket addresses and the length of data. UDP receives the data and adds
the UDP header. UDP then passes the user datagram to IP with the socket
addresses. IP adds its own header, using the value 17 in the protocol field,
indicating that the data has come from the UDP protocol. The IP datagram
is then passed to the data link layer. The data link layer receives the IP
datagram, adds its own header and passes it to the physical layer. The
physical layer encodes the bits into electrical or optical signals and sends it
to the remote machine.
Decapsulation
When the message arrives at the destination host, the physical
layer decodes the signals into bits and passes it to the data link layer. The
data link layer uses the header to check the data. If there is no error, the
header and trailer are dropped and the datagram is passed to IP. The IP
software does its own checking. If there is no error, the header is dropped
and the user datagram is passed to UDP with the sender and receiver IP
addresses. UDP uses the checksum to check the entire user datagram. If
there is no error, the header is dropped and the application data along with
the sender socket address is passed to the process. The sender socket
address is passed to the process in case it needs to respond to the message
received.
Queuing
In UDP, queues are associated with ports At the client site, when a
process starts, it requests a port number from the operating system. Some
implementations create both an incoming and an outgoing queue
associated with each process. Other implementations create only an
incoming queue associated with each process
2.5 TCP
Process-to-Process Communication
As with UDP, TCP provides process-to-process communication
using port numbers.
Table 2 & 3 lists some well-known port numbers used by TCP.
37
Table 3. Well-known Ports used by TCP
38
Segments
At the transport layer, TCP groups a number of bytes together into
a packet called a segment. TCP adds a header to each segment and
delivers the segment to the IP layer for transmission. The segments are
encapsulated in an IP datagram and transmitted. This entire operation is
transparent to the receiving process. Figure 16 shows how segments are
created from the bytes in the buffers.
Full-Duplex Communication
TCP offers full-duplex service, where data can flow in both
directions at the same time. Each TCP endpoint then has its own sending
and receiving buffer, and segments move in both directions.
Connection-Oriented Service
TCP, unlike UDP, is a connection-oriented protocol. when a
process at site A wants to send to and receive data from another process at
site B, the following three phases occur:
1. The two TCPs establish a virtual connection between them.
2. Data is exchanged in both directions.
3. The connection is terminated.
Reliable Service
TCP is a reliable transport protocol. It uses an acknowledgment
mechanism to check the safe and sound arrival of data. We will discuss
this feature further in the section on error control.
Numbering System
TCP software keeps track of the segments being transmitted or
received, there is no field for a segment number value in the segment
header. Instead, there are two fields called the sequence number and the
acknowledgment number. These two fields refer to a byte number.
39
Byte Number
The bytes of data being transferred in each connection are
numbered by TCP. The numbering starts with an arbitrarily generated
number.
Sequence Number
After the bytes have been numbered, TCP assigns a sequence
number to each segment that is being sent. The sequence number for each
segment is the number of the first byte of data carried in that segment.
Acknowledgment Number
When a connection is established, both parties can send and
receive data at the same time. Each party numbers the bytes, usually with
a different starting byte number. The sequence number in each direction
shows the number of the first byte carried by the segment. Each party also
uses an acknowledgment number to confirm the bytes it has received.
Flow Control
UDP provides flow control. The sending TCP controls how much
data can be accepted from the sending process; the receiving TCP controls
how much data can be sent by the sending TCP. This is done to prevent
the receiver from being overwhelmed with data. The numbering system
allows TCP to use a byte oriented flow control.
Error Control
To provide reliable service, TCP implements an error control
mechanism. error control considers a segment as the unit of data for error
detection, error control is byte-oriented.
Congestion Control
TCP, unlike UDP, takes into account congestion in the network.
The amount of data sent by a sender is not only controlled by the receiver
(flow control), but is also determined by the level of congestion, if any, in
the network.
2.5.2 SEGMENT
Format
The format of a segment is shown in Figure 17. The segment
consists of a header of 20 to 60 bytes, followed by data from the
application program. The header is 20 bytes if there are no options and up
to 60 bytes if it contains options.
40
Fig. 17 TCP segment format
● Source port address. This is a 16-bit field that defines the port
number of the application program in the host that is sending the
segment.
● Destination port address. This is a 16-bit field that defines the port
number of the application program in the host that is receiving the
segment.
● Sequence number. This 32-bit field defines the number assigned to
the first byte of data contained in this segment.
● Acknowledgment number. This 32-bit field defines the byte number
that the receiver of the segment is expecting to receive from the other
party.
● Header length. This 4-bit field indicates the number of 4-byte words
in the TCP header. The length of the header can be between 20 and 60
bytes. Therefore, the value of this field is always between 5 (5× 4= 20)
and 15 (15× 4= 60).
● Reserved. This is a 6-bit field reserved for future use.
● Control. This field defines 6 different control bits or flags as shown in
Figure 18 One or more of these bits can be set at a time. These bits
enable flow control, connection establishment and termination,
connection abortion, and the mode of data transfer in TCP.
41
● Window size. This field defines the window size of the sending
TCP in bytes. Note that the length of this field is 16 bits, which
means that the maximum size of the window is 65,535 bytes.
● Checksum. This 16-bit field contains the checksum.
● Urgent pointer. This 16-bit field, which is valid only if the urgent
flag is set, is used when the segment contains urgent data.
● Options. There can be up to 40 bytes of optional information in
the TCP header.
Congestion Window
If the network cannot deliver the data as fast as it is created by the
sender, it must tell the sender to slow down. In other words, in addition to
the receiver, the network is a second entity that determines the size of the
sender’s window.
Congestion Policy
TCP’s general policy for handling congestion is based on three
phases: slow start, congestion avoidance, and congestion detection. In the
slow start phase, the sender starts with a slow rate of transmission, but
increases the rate rapidly to reach a threshold. When the threshold is
reached, the rate of increase is reduced. Finally if ever congestion is
42
detected, the sender goes back to the slow start or congestion avoidance
phase, based on how the congestion is detected.
2.7 SUMMARY
43
3
NETWORKING - III
Unit Structure
3.1 Objective
3.2 Introduction
3.3 Network Layer
3.3.1 Switching
3.3.2 Packet Switching At Network Layer
3.4 Virtual Circuit and Datagram Networks
3.5 Need of Router
3.6 The Internet Protocol (IP),
3.7 Summary
3.8 Reference for further reading
3.9 Unit End Exercises
3.1 OBJECTIVE
3.2 INTRODUCTION
For example a simple network with two hosts, X1 and X2, and
several routers on the path between X1 and X2. Suppose that X1 is
sending data to X2, and consider the role of the network layer in these
hosts and in the intervening routers. The network layer in X1 takes
messages from the transport layer in X1, encapsulates each message into a
datagram and then sends the datagrams to its nearby router, R1. At the
receiving host, X2, the network layer receives the datagrams from its
nearby router R2, extracts the transport-layer segments, and delivers the
segments up to the transport layer at X2. The primary role of the routers is
to forward datagrams from input links to output links.
44
Fig. 1 Network Layer
The role of the network layer is simple to move data packets from
a sending host to a receiving host.
Two network-layer functions:
1. Forwarding. When a packet comes at a router’s input link, the
router must move the packet to the appropriate output link. For
example, a packet arriving from Host X1 to Router R1 must be
forwarded to the next router on a path to X2.
2. Routing. The network layer must determine the route or path taken
by data packets as they flow from a sender to a receiver. The
algorithms that calculate these ride are referred to as routing
algorithms. A routing algorithm would determine, for example, the
path along which packets flow from X1 to X2.
46
Constant bit rate (CBR) ATM network service. This was the first ATM
service model to be standardized, reflecting early interest by the telephone
companies in ATM and the suitability of CBR service for carrying real-
time, constant bit rate audio and video traffic. The goal of CBR service is
conceptually simple to provide a flow of packets with a virtual pipe whose
properties are the same as if a devoted fixed-bandwidth transmission link
existed between sending and receiving hosts. With CBR service, a flow of
ATM cells is carried across the network in such a way that a cell’s end-to-
end delay, the variability in a cell’s end-to-end delay, and the selection of
cells that are lost or delivered late are all guaranteed to be less than
specified values. These values are acknowledged upon by the sending host
and the ATM network when the CBR connection is first established.
3.3.1 Switching
Circuit Switching
47
Packet Switching
The network layer in the The Internet today is a packet-switched
network. In this type of network, a message from the upper layer is
divided into manageable packets and each packet is sent through the
network. The source of the message sends the packets one by one; the
destination of the message receives the packets one by one. The
destination waits for all packets belonging to the same message to arrive
before delivering the message to the upper layer. The connecting devices
in a packet-switching network still need to decide how to route the packets
to the final destination. Today, a packet-switched network can use two
different approaches to route the packets: the datagram approach and the
virtual circuit approach.
Connectionless Service
The network layer was designed to provide a connectionless
service, in which the network layer protocol treats each packet
independently, with each packet having no relationship to any other
packet. The packets in a message may or may not travel the same path to
their destination. When the Internet started, it was decided to make the
network layer a connectionless service to make it simple. The idea was
that the network layer is only responsible for delivery of packets from the
source to the destination.
48
Connection-Oriented Service
Characteristics:
1. As in a circuit-switched network, there are setup and teardown
phases in addition to the data transfer phase.
2. Resources can be assign during the setup phase, as in a circuit-
switched network, or on demand, as in a datagram network.
3. As in a datagram network, data is packetized and each packet
carries an address in the header. The reader may ask how the
intermediate switches know where to send the packet if there is no
final destination address carried by a packet.
4. Circuit-switched network, all packets follow the same path formed
during the connection.
5. A virtual-circuit network is implemented in the data link layer,
while a circuit-switched network is implemented in the physical
layer and a datagram network in the network layer.
49
Figure 4 is an example of a virtual-circuit network. The network
has switches that allow traffic from sources to destinations. A source or
destination can be a computer, packet switch, bridge, or any other device
that connects other networks.
Virtual-Circuit Networks
2. Data transfer. As shown in Figure 6, once the virtual circuit has been
established, packets can begin to flow along the virtual circuit .
The messages that the end systems send into the network to initiate
or terminate a Virtual Circuits, and the messages passed between the
routers to set up the Virtual Circuits are known as signaling messages, and
the protocols used to exchange these messages are often referred to as
signaling protocols. Virtual Circuits setup is shown pictorially in Figure 6.
Datagram Networks:
In a datagram network, a packet is sent to an end system, it stamps
the packet with the address of the destination end system and then pops
the packet into the network. As shown in Figure 7, there is no Virtual
Circuits setup and routers do not maintain any Virtual Circuits state
information.
51
As a packet is transmitted from source system to destination
system, it passes through a series of routers. All of these routers use the
packet’s destination address to forward the packet. especially.. Each router
has a forwarding table that maps destination addresses to link interfaces.
when a packet arrives at the router, the router uses the packet’s destination
address to look up the appropriate output link interface in the forwarding
table. The router then purposely forwards the packet to that output link
interface.
52
● Input ports
An input port performs several key functions. It executes the physical
layer function of terminating an incoming physical link at a router; this
is shown in the leftmost box of the input port and the rightmost box of
the output port in Figure.
● Switching fabric
The switching fabric connects the router’s input ports with its output
ports. This switching fabric is totally contained within the router a
network inside of a network router.
● Output ports
An output port stores packets received from the switching fabric and
sends these packets on the outgoing link by performing the necessary
link-layer and physical-layer functions.
● Routing processor
The routing processor accomplish the routing protocols, maintains
routing tables and attached link state information, and computes the
forwarding table for the router. It also performs the network
management functions.
The function of IP, how addressing and forwarding are done on the
Internet. The important components of the Internet Protocol (IP) is internet
addressing and forwarding. There are two versions of IP. IP protocol
version 4, which is usually referred to simply as IPv4. IP version 6, which
has been proposed to replace IPv4.
53
Fig. 3 A look inside the Internet’s network layer
.
As shown in Figure 3, the Internet’s network layer has three major
components.
54
Fig. 4 IPv4 datagram format
IP Datagram Fragmentation
56
Fig. 5 IP fragmentation and reassembly
A host has only a single link into the network, when the IP in the
host wants to send a datagram, it does so over this link. The wall between
the host and the physical link is called an interface. Now consider a router
and its interfaces. The function of a router is to receive a datagram on one
link and forward the datagram on some other link, a router necessarily has
two or more links to which it is connected to each other. The partition
between the router and any one of its links is also called an interface. A
router has multiple interfaces, one for each of its links. Every host and
router is capable of sending and receiving IP datagrams, IP requires each
host and router interface to have its own IP address. An IP address is
technically connected with an interface, rather than with the host or router
containing that interface. Each IP address is 32 bits long (4 bytes), and
there are thus a total of 232 possible IP addresses. By approximating 210
by 103, it is easy to see that there are about 4 billion possible IP addresses.
These addresses are written in dotted-decimal notation, in which each byte
of the address is written in its decimal form and is separated by a period
(dot) from other bytes in the address. For example, consider the IP address
193.32.216.9. The 193 is the decimal point equivalent of the first 8 bits of
the address; the 32 is the decimal equivalent of the second 8 bits of the
address, and so on. Thus, the address 193.32.216.9 in binary notation is
57
The four interfaces are interconnected to each other by a network that
contains no routers at all.
58
ICMP echo reply. Most TCP/IP implementations support the ping server
directly in the operating system; that is, the server is not a process.
3.6.4 IPv6
59
real-time service. For example, audio and video transmission might
likely be treated as a flow. On the other hand, the more traditional
applications, such as file transfer and e-mail, might not be treated as
flows.
1. Version. This 4-bit field identifies the IP version number. IPv6 carries
a value of 6 in this field. Note that putting a 4 in this field does not
create a valid IPv4 datagram.
2. Traffic class. This 8-bit field is similar in spirit to the TOS field we
saw in IPv4.
3. Flow label. this 20-bit field is used to identify a flow of datagrams.
4. Payload length. This 16-bit value is treated as an unsigned integer
giving the number of bytes in the IPv6 datagram following the fixed-
length, 40-byte datagram header.
5. Next header. This field identifies the protocol to which the contents
(data field) of this datagram will be delivered (for example, to TCP or
UDP). The field uses the same values as the protocol field in the IPv4
header.
6. Hop limit. The contents of this field are decremented by one by each
router that forwards the datagram. If the hop limit count reaches zero,
the datagram is discarded.
7. Source and destination addresses. The various formats of the IPv6
128-bit address are described in RFC 4291
8. Data. This is the payload portion of the IPv6 datagram. When the
datagram reaches its destination, the payload will be removed from the
IP datagram and passed on to the protocol specified in the next header
field.
60
3.7 SUMMARY
61
4
NETWORKING - IV
Unit Structure
4.1 Objective
4.2 Introduction
4.3 Routing Algorithms & Routing in the Internet.
4.3.1 Distance Vector Routing: RIP
4.3.2 Link State Routing: OSPF
4.3.3 Path Vector Routing: BGP
4.4 Summary
4.5 Reference for further reading
4.6 Unit End Exercises
4.1 OBJECTIVE
4.2 INTRODUCTION
62
switches. Common-purpose computers also forward packets and perform
routing, they have no specially optimized hardware for the task.
Intra-domain routing:
Routing inside an autonomous system is referred to as intra-
domain routing.
Inter-domain routing
Routing between two or more autonomous systems is referred to as
inter-domain routing.
63
Fig. 10 Classification of routing protocol
In distance vector routing, each node shares its routing table with
its instant neighbors periodically and when there is a change. In distance
vector routing, the least cost route between any two nodes is the route with
minimum distance. In this protocol, as the name implies, each node
maintains a vector table of minimum distances to every node. The table
which at each node also guides the packets to the desired node by showing
the next stop in the route (next-hop routing).Example, nodes as the cities
in an area and the lines as the roads connecting them. A vector table can
show a tourist the minimum distance between cities. In Figure 11, we
show a system of five nodes with their corresponding tables.
1. Initialization of DV table
This state is stable, each node knows how to reach any other node
and the cost of that node. At the beginning, anyhow this is not the case.
Each node can know only the distance between itself and its immediate
neighbors, those directly connected to it through proper link. Let us
assume that each node can send a message to the immediate neighbors and
find the distance between itself and these neighbors’ nodes. Figure 11
shows the initial vector tables for each node. The distance for any entry
that is not a neighbor is marked as an infinite loop.
65
Fig. 12 Initialization of tables in distance vector routing
66
2. The receiving node requires to add the name of the sending node to
each row as the third column if the receiving node uses
information from any row. The sending/dispatch node is the next
node in the route.
3. The receiving node requires comparing each row of its old table
with the corresponding row of the modified version of the received
table.
a. If the next-node entry is different from one, the receiving node
chooses the row with the smaller cost. If there is a bind, the old
one is kept.
b. If the next node appearance is the same, the receiving node
chooses the new row. For example, suppose node C has
previously advertised a route to node X with distance between.
c. For example that now there is no path between C and X; node
C now advertises this route with a distance of infinity. Node A
must not ignore this value even though its old entry is smaller
than the new one. The old route does not exist anymore. The
new route has a distance of infinity.
Figure 13 shows how node A updates its routing table after receiving the
partial table from node C.
67
1. A node receives a table from a neighbor, resulting in changes in its
own table after updating.
2. A node detects some failure in the neighboring links which results
in a distance change to infinity.
RIP
The Routing Information Protocol (RIP) is an intradomain routing
protocol used inside an autonomous system. It is a very straightforward
protocol based on distance vector routing. RIP implements distance vector
routing directly with some considerations:
1. In an autonomous system, dealing with routers and networks or
links. The routers have routing tables, networks do not.
2. The destination in a routing table is a network, which means the
first column defines a network address.
3. The metric used by RIP is very simple, the distance is defined as
the number of links (networks) to reach the destination. For this
reason, the metric in RIP protocol is called a hop count.
4. Infinity is defined as 16, which means that any route in an
autonomous system using RIP cannot have more than 15 hops.
5. The next-node tables column defines the address of the router to
which the packet is to be sent to reach its destination.
The above figure shows a simple domain with five nodes. Each
node uses the same topology to create a routing table, but the routing table
68
for each node is distinctive because the calculations are based on different
interpretations of the topology. This is comparable to a city map. While
each person may have the same map, each needs to take a different route
to reach her specified destination.
OSPF
The Open Shortest Path First OSPF protocol is an intradomain
routing protocol based on the concept of link state routing. Its domain is
also called an autonomous system. OSPF protocol divides an autonomous
69
system into areas and subsections. An area is a group of networks, hosts,
and routers all contained within an autonomous system. An autonomous
system can be split into many different areas. All networks inside an area
must be connected to each other through a link. Routers inside an area
flood the area with the help of routing information. At the border of an
area, special routers called area border routers. the areas inside an
autonomous system is a special area called the backbone AS. All the areas
inside an autonomous system must be connected to the backbone. The area
identification of the backbone is zero. Figure 16 shows an autonomous
system and its areas.
70
b. A transient link is a network link with several routers attached with
each other. The data can come into the network through any of the
routers and leave through any router. For example, consider the
Ethernet in Figure 18. Router A has routers B, C, D, and E as
neighbor’s node. Router B has routers A, C, D, and E as neighbor’s
nodes.
BGP
Border Gateway Protocol is an interdomain routing protocol, It
uses path vector routing. For example, a large business that manages its
own network and has full control over it is an autonomous system. A local
ISP that provides services to local customers is called an autonomous
system. This divides autonomous systems into three categories: stub,
multihomed, and transit.
71
Stub AS. A stub AS has only one connection to another AS. The
interdomain data traffic in a stub AS can be either created or terminated in
the AS.
AS-PATH:
This attribute contains the ASs through which the advertisement
for the prefix has passed. When a prefix is passed into an AS, the AS adds
its ASN to the ASPATH attribute.
NEXT-HOP:
Providing the critical link between the inter-AS and intra-AS
routing protocols, the NEXT-HOP attribute has a subtle but important use.
The NEXT-HOP is the router interface that begins the AS-PATH.
72
1. Routes are assigned a local priority value as one of their attributes. The
local priority of a route could have been set by the router. This is a
policy decision that is boost up to the AS’s network administrator. The
routes with the giant local preference values are selected.
2. The route with the shortest path (AS-PATH) is selected. If this rule
applies the only rule for route selection, then BGP would be using a
DV algorithm for path determination, where the distance metric uses
the number of AS hops preferably than the number of router hops.
3. From the remaining routes the route with the closest NEXT-HOP
router is selected. Here, closest means cost of the least-cost path, set
on by the intra-AS algorithm, is the smallest
4. If more than one route still leftover, the router uses BGP identifiers to
select the route.
4.4 SUMMARY
73
4.6 UNIT END EXERCISES
74
Module - II
5
NETWORK VIRTUALIZATION
Unit Structure
5.0 Objectives
5.1 Introduction
5.2 An Overview
5.3 Need for Virtualization
5.4 The virtual Enterprise
5.5 Network Device Virtualization
5.6 Summary
5.0 OBJECTIVES:
Introduction:
Virtualization is utilization of computer resources which is not in
used 100%.
5.2 AN OVERVIEW:
75
5.3 NEED FOR VIRTUALIZATION
Fig (1-1)
76
A VE operates over a virtual Value Chain, i.e., a chain whose
links are owned by a company and its partners, blurring the borders
between the Value Chain of the firm and the Value Network it is a part of.
Transport Virtualization-VNs
The authors of Network Virtualization define the technical
requirements posed by the need to virtualize the network. Based on these
requirements, they propose an architectural framework comprised of the
functional areas necessary to successfully support concurrent virtual
networks (VNs) over a shared enterprise physical network.
77
as the central services site, and the security devices here deployed can be
shared by many VNs.
fig-(1-2)
78
Figure shows an additional firewall separating the fusion area from
the Internet. This firewall is optional. Whether to use it or not depends on
the need to keep common services or transit traffic in the fusion area
protected from the Internet.
79
Why Network Virtualization?
Network virtualization is rewriting the rules for the way services
are delivered, from the software-defined data center (SDDC), to the cloud,
to the edge. This approach moves networks from static, inflexible, and
inefficient to dynamic, agile, and optimized. Modern networks must keep
up with the demands for cloud-hosted, distributed apps, and the increasing
threats of cybercriminals while delivering the speed and agility you need
for faster time to market for your applications. With network
virtualization, you can forget about spending days or weeks provisioning
the infrastructure to support a new application. Apps can be deployed or
updated in minutes for rapid time to value.
Example:
One example of network virtualization is virtual LAN (VLAN). A
VLAN is a subsection of a local area network (LAN) created with
software that combines network devices into one group, regardless of
80
physical location. VLANs can improve the speed and performance of busy
networks and simplify changes or additions to the network.
Layer 2: VLANs
VLANs are a good example of a piece of the virtualization puzzle that
has been around for quite some time. A VLAN is a logical grouping of
ports on a switch that form a single broadcast domain. Ports in a
VLAN can communicate only with other ports in the same VLAN.
How a given switch does this is implementation dependent, but a
common solution is for the switch to tag each frame with a VLAN
number as it arrives on a port. When a frame is sent to other ports, the
output hardware copies the packet only if it is configured with the
VLAN number carried in the frame.
81
VRFA VPN Routing/Forwarding instance. A VRF consists of an IP
routing table, a derived forwarding table, a set of interfaces that use the
forwarding table, and a set of rules and routing protocols that determine
what goes into the forwarding table.
Unlike the VLAN scenario, where an extra column in the MAC table is
adequate, a VRF partitions a router by creating multiple routing tables and
multiple forwarding instances. Dedicated interfaces are bound to each
VRF.
The RIB is the memory structure that contains classic routing data. The
RIB can contain recursive routes. If a packet destination is not in the FIB,
the router "punts" the packet to a slow processing path and resolves the
destination next hop using the RIB.
84
If that did not make much sense, it is useful to have some
background on the service itself, namely Virtual Private LAN Services
(VPLS), to understand VFIs.
85
Virtual Firewall Contexts
Device virtualization is not limited to switches and routers. As a
final example, consider a firewall device. For essentially economic
reasons, you might want to share a single firewall between multiple
different customers or network segments. Each logical firewall needs to
have a complete set of policies, dedicated interfaces for incoming and
outgoing traffic, and users authorized to manage the firewall.
87
it. You can lose a lot of data waiting for an RP to detect a problem in this
way and reconverge. Cisco added a keepalive option to its GRE
implementation. This option sends a packet through the tunnel at a
configurable period. After a certain number of missed keepalives (the
number is configurable), the router declares the tunnel interface as down.
A routing protocol would detect the interface down event and react
accordingly.
The tunnel source and tunnel destination addresses are part of the
transport network address space. They need to match on both endpoints so
that a source address on one router is the destination address on the remote
device. The router must also have a path in its routing table to the tunnel
destination address. The next hop to the tunnel destination must point to a
real interface and not the tunnel interface.
IPsec
88
IPsec provides a comprehensive suite of security services for IP
networks. IPsec was originally conceived to provide secure transport over
IP networks. The security services include strong authentication
(Authentication Header [AH]) and Encryption (Header [EH]) protocols
and ciphers and key-exchange mechanisms. IPsec provides a way for
peers to interoperate by negotiating capabilities and keys and security
algorithms.
90
Fig (2-6).MPLS Forwarding
91
removing a label is also called disposition. PHP avoids recursive
lookups on edge LSR D.
4 After the label is removed, the packet is forwarded using standard IP
. routing.
92
The complete end-to-end set of labels from LSR A to LSR D form an
LSP. An LSP is unidirectional. There is another LSP, identified by a
different set of labels, for return traffic from LSR D to LSR A.
Understand that two operations must complete for the LSP from
LSR A to 192.168.2.0 to be functional:
The backbone routing protocol must converge so that LSR A has a
route to 192.168.2.0.
LDP must converge so that labels are propagated across the
network.
Fig (2-6) does not show a numeric value for the label between LSR
B and LSR D. In fact, as already discussed, the packet on this link has no
label at all, because of PHP. Nevertheless, LSR D does still advertise a
special value in LDP, called an implicit null (which has a reserved value
of 3), so that LSR B performs PHP.
93
protocol, configured only on endpoints. MPLS creates a new forwarding
path and is configured on all hops in a network.
Control-Plane Virtualization
Refers to all the protocols, databases, and tables necessary to make
forwarding decisions and maintain a functional network topology free of
loops or unintended blackholes. This plane could be said to draw a clear
picture of the topology for the network device. A virtualized device must
posses a unique picture of each VN it is to handle, hence the requirement
to virtualize the control-plane components.
94
Fig-(2-7)
VRF-Aware Routing
Cisco's major interior gateway protocol (IGP) routing protocol
implementations are VRF aware. This means that they understand that
certain routes may be placed only in certain routing tables. The routing
protocols manage this by peering within a constrained topology, where a
routing protocol instance in a VRF peers with other instances in the same
VN. No special information is added to the route advertisements to
identify VRF names, so routing instances must communicate over private
links.
Multi-Topology Routing
Multi-Topology Routing (MTR) is a recent innovation at Cisco. As
the name suggests, it creates multiple routing topologies across a shared,
common infrastructure. However, MTR does not try to be yet another
VPN solution. Instead, it creates paths through a network that you can map
to different applications or classes of applications, with the understanding
that, by separating traffic in this way, you can provide better performance
characteristics to certain critical applications.
MTR bases its operation on the creation of separate RIBs and FIBs
for each topology. The separate RIBs and FIBs are created within a
common address space. Thus, MTR creates smaller topologies that are a
subset of the full topology (also known as the base topology). The main
difference between MTR and a VPN technology is that, with MTR, a
single address space is tailored into many topologies that could overlap;
whereas VPNs create totally separate and independent address spaces.
At each hop, there will be a set of prefixes and routes in the RIB for
each topology. The contents of these RIBs are dynamically updated by
routing protocol colored updates. Based on this RIB information, a
separate FIB is built for each topology.
95
To forward traffic over different topologies, the router looks for a
code point in each packet and chooses an FIB based on this code point. A
first implementation of MTR uses differentiated services (DiffServ) code
point (DSCP) as such a code point, but other code points could be used by
future implementations. The DSCP value is used as a pointer to the correct
forwarding table, and the packet's destination address is used to make a
forwarding decision based on the information in the topology's FIB. MTR
uses the terminology of color to refer to separate topologies. So, a RED
value in a packet's DSCP field is recognized by the router, which will
forward the packet using the RED forwarding table (FIB).
MTR does not change how routing works; it just runs across
multiple topologies (using a single process with colored updates).
Routing Protocols
Routing Protocols are the set of defined rules used by the routers
to communicate between source & destination. They do not move the
information to the source to a destination, but only update the routing table
that contains the information.
96
Routing Protocols
Advantages
No overhead on router CPU.
No unused bandwidth between links.
Only the administrator is able to add routes
Disadvantages
The administrator must know how each router is connected.
Not an ideal option for large networks as it is time intensive.
Whenever link fails all the network goes down which is not
feasible in small networks.
Advantage:
Easier to configure even on larger networks.
It will be dynamically able to choose a different route in case if a
link goes down.
It helps you to do load balancing between multiple links.
Disadvantage:
97
Updates are shared between routers, so it consumes bandwidth.
Routing protocols put an additional load on router CPU or RAM.
Advantages:
Updates of the network are exchanged periodically, and it is
always broadcast.
This protocol always trusts route on routing information received
from neighbor routers.
Disadvantages:
As the routing information are exchanged periodically,
unnecessary traffic is generated, which consumes available
bandwidth.
Advantages:
This protocol maintains separate tables for both the best route and
the backup routes, so it has more knowledge of the inter-network
than any other distance vector routing protocol.
Concept of triggered updates are used, so it does not consume any
unnecessary bandwidth.
Partial updates will be triggered when there is a topology change,
so it does not need to update where the whole routing table is
exchanged.
99
EIGRP is a hybrid routing protocol that provides routing protocols,
distance vector, and link-state routing protocols. The full form routing
protocol EIGRP is Enhanced Interior Gateway Routing Protocol. It will
route the same protocols that IGRP routes using the same composite
metrics as IGRP, which helps the network select the best path destination.
Here are some main difference between these Distance Vector and
Link State routing protocols:
100
This type of routing protocol sends updated router table data when
changes are made. Therefore, there is no auto-discovery of topology
changes, which means that the user needs to configure BGP manually.
5.5 SUMMARY:
Classful/
Classful Classless Classful Classless Classless
Classless
Composite,
Composite
Metric Hop Hop Bandwidth Bandwidth,
Bandwidth, Delay.
Delay.
Advertising 224.0.0.5
255.255.255.255.255 223.0.0.9 255.255.255.255.255 224.0.0.10
Address 224.0.0.6
Distance
Category Distance Vector Distance Vector Link State Hybrid
Vector
101
Features RIP V1 RIP V2 IGRP OSPF EIGRP
Distance
102
Module - III
6
ADHOC NETWORKING
Unit Structure
6.1 Introduction
6.2 Application of MANET
6.3 Challenges:
6.4 Broadcasting
6.5 Fundamentals of WLANs
6.6 Infrared vs Radio Transmission
6.1 INTRODUCTION
102
Following figures shows the difference between infrastructure based
wireless network and Ad hoc wireless network.
103
Vehicular Ad hoc Network (VANET) uses travelling cars as nodes
in a network to create a mobile network. Wireless Sensor Network (WSN)
consists of autonomous sensors to control the environmental actions. The
importance of ad hoc network has been highlighted in many fields which
are described below:
6.3 CHALLENGES:
Limited Bandwidth
The wireless networks have a limited bandwidth in comparison to
the wired networks. Wireless link has lower capacity as compare to
infrastructure networks. The effect of fading, multiple accesses,
interference condition is very low in ADHOC networks in comparison to
maximum radio transmission rate.
Dynamic topology
Due to dynamic topology the nodes has less trust between them. I
some settlement are found between the nodes then it also makes trust level
questionable.
High Routing
In ADHOC networks due to dynamic topology some nodes change
their position which affects the routing table.
Mobility
Due to the dynamic behaviour and changes in the network
topology by the movement of the nodes. ADHOC networks faces path
breaks and it also changes in the route frequently.
Security threats
New security challenges bring by Ad hoc networks due to its
wireless nature. In Ad hoc networks or wireless networks, the trust
management between the nodes leads to the numerous security attacks.
105
There are basic 4 types of routing in ad hoc network is present
listed below.
1) Table-driven (proactive) routing
2) On-demand (reactive) routing
3) Hybrid (both proactive and reactive) routing
4) Hierarchical routing protocols
106
4) Hierarchical routing protocols
With this type of protocol, the choice of proactive and of reactive
routing depends on the hierarchic level in which a node resides.
The routing is initially established with some proactively
prospected routes and then serves the demand from additionally
activated nodes through reactive flooding on the lower levels.
The choice for one or the other method requires proper
attributation for respective levels.
107
route discovery before packets are exchanged between communication
nodes. Second, even though route discovery is restricted to the routes
currently in use, it may still generate a significant amount of network
traffic when the topology of the network changes frequently.
Position based
Position based routing are as follows:
1) GFG
2) GOAFR
3) GOAFR+
4) AFR
108
5) OGPR
6) GPVFR
7) LAR
1) GFG
Nearly Stateless Routing with Guaranteed Delivery is schemes
where nodes maintain only some local information to perform routing.
The face routing and Greedy-Face-Greedy (GFG) schemes were described
in. In order to ensure message delivery, the face routing (called perimeter
algorithm) constructs a planar and connected so-called Gabriel sub graph
of the unit graph, and then applies routing along the faces of the sub graph
(e.g. by using the right hand rule) that intersect the line between the source
and the destination. If a face is traversed using the right hand rule then a
loop will be created, since a face will never exist. Forwarding in the right
hand rule is performed using the directional approach.
2) GOAFR
A greedy routing approach is not only worth being considered due
to its simplicity in both concept and implementation. Above all in dense
networks such an algorithm can also be expected to end paths of good
quality efficiently here, the straightforwardness of a greedy strategy
contrasts highly the inexible exploration of faces inherent to face routing.
For practical purposes it is inevitable to improve the performance of a face
routing variant by leveraging the potential of a greedy approach. Such a
combination of greedy routing and our OAFR algorithm forms Greedy
Other Adaptive Face Routing GOAFR. In principle greedy routing is used
as long as possible. Local minima potentially met under ways are escaped
from by use of OAFR.
3) GOAFR+
The GOAFR+ algorithm is a combination of greedy routing and
face routing. Whenever possible the algorithm tries to route greedily, that
is by forwarding the message at each intermediate node to the neighbour
located closest to the destination. Doing so, however, the algorithm can
reach a local minimum with respect to the distance from destination that is
a node um none of whose neighbours is located closer to destination than
itself. In order to overcome such a local minimum, GOAFR+ applies a
face routing technique, borrowing from the Face Routing algorithm.
4) AFR
The basis of this algorithm is formed by Face Routing. At the heart
of Face Routing lies the exploration of the boundaries of faces in a planar
graph, employing the local right hand rule (in analogy to following the
right hand wall in a maze). On its way around a face, the algorithm keeps
track of the points where it crosses the line connecting the source and the
destination. Having completely surrounded a face, the algorithm returns to
the one of these intersections lying closest to the destination, where it
proceeds by exploring the next face closer to destination. If the source and
the destination are connected, Face Routing always ends a path to the
destination.
5) OGPR
OGPR is an efficient and scalable routing protocol, that inherits the
well-known techniques for routing,
1) Greedy forwarding
2) Reactive route discovery
3) Source routing
6) GPVFR
In this section we describe Greedy PVFR, a non-oblivious routing
algorithm that does not require the participating nodes to have complete
face information. GPVFR is designed as a tri-modal algorithm with the
following modes
Greedy: greedy forwarding using neighbour information,
OPVFR: greedy forwarding using face information, and
Perimeter: perimeter traversal (as in GPSR).
7) LAR
The Location Aided Routing proposal does not define a location-
based routing protocol but instead proposes the use of position information
to enhance the route discovery phase of reactive ad hoc routing
approaches. Reactive ad hoc routing protocols frequently use flooding as a
means of route discovery.
The request zone typically includes the expected zone. The first is
a rectangular geographic region. In this case, nodes will forward the route
discovery packet only if they are within that specific region. The second is
defined by specifying (estimated) destination coordinates plus the distance
to the destination. In this case, each forwarding node overwrites the
distance field with its own current distance to the destination. A node is
allowed to forward the packet again only if it is at most some δ (system
parameter) farther away than the previous node.
6.4 BROADCASTING
Multicasting
In multicasting routing, the data are transmitted from one source to
multiple destinations. Multicast protocols can be categorized into two
types, namely tree-based multicast and mesh based multicast. The tree
based multicast routing protocols utilize the network resource in efficient
manner. Mesh based protocols are robust due to formation of many
redundant paths between the nodes and in high packet delivery ratio.
Geocasting
Geocast routing protocols have the combined features of both
geographical and multicast routing protocols. The major advantage of
Geocast routing protocols are performance improvement and minimizing
the control overhead.
112
Geocast protocol for mobile ad hoc network based on GRID
(GEOGRID): GeoGRID routing protocol was developed by Liao et al. [7]
GeoGrid extends on the unicasting routing protocol GRID. GeoGRID
exploit location information in route discovery to define the forwarding
zone or geographical area.
Wireless Lan
Wireless LAN stands for Wireless Local Area Network. It is also
called LAWN (Local Area Wireless Network). WLAN is one in which a
mobile user can connect to a Local Area Network (LAN) through a
wireless connection.
113
In some instance wireless LAN technology is used to save costs and avoid
laying cable, while in other cases, it is the only option for providing high-
speed internet access to the public. Whatever the reason, wireless solutions
are popping up everywhere.
Advantages of WLANs
Flexibility: Within radio coverage, nodes can communicate without
further restriction. Radio waves can penetrate walls, senders and
receivers can be placed anywhere (also non-visible, e.g., within
devices, in walls etc.).
Planning: Only wireless ad-hoc networks allow for communication
without previous planning, any wired network needs wiring plans.
Design: Wireless networks allow for the design of independent, small
devices which can for example be put into a pocket. Cables not only
restrict users but also designers of small notepads, PDAs, etc.
Robustness: Wireless networks can handle disasters, e.g.,
earthquakes, flood etc. whereas, networks requiring a wired
infrastructure will usually break down completely in disasters.
Cost: The cost of installing and maintaining a wireless LAN is on
average lower than the cost of installing and maintaining a traditional
wired LAN, for two reasons. First, after providing wireless access to
the wireless network via an access point for the first user, adding
additional users to a network will not increase the cost. And second,
wireless LAN eliminates the direct costs of cabling and the labor
associated with installing and repairing it.
Ease of Use: Wireless LAN is easy to use and the users need very
little new information to take advantage of WLANs.
Disadvantages of WLANs
Quality of Services: Quality of wireless LAN is typically lower than
wired networks. The main reason for this is the lower bandwidth due
to limitations is radio transmission, higher error rates due to
interference and higher delay/delay variation due to extensive error
correction and detection mechanisms.
Proprietary Solutions: Due to slow standardization procedures, many
companies have come up with proprietary solutions offering
standardization functionality plus many enhanced features. Most
components today adhere to the basic standards IEEE 802.11a or
802.11b.
Restrictions: Several govt. and non-govt. institutions world-wide
regulate the operation and restrict frequencies to minimize
interference.
114
Global operation: Wireless LAN products are sold in all countries so,
national and international frequency regulations have to be considered.
Low Power: Devices communicating via a wireless LAN are typically
power consuming, also wireless devices running on battery power.
Whereas the LAN design should take this into account and implement
special power saving modes and power management functions.
License free operation: LAN operators don't want to apply for a
special license to be able to use the product. The equipment must
operate in a license free band, such as the 2.4 GHz ISM band.
Robust transmission technology: If wireless LAN uses radio
transmission, many other electrical devices can interfere with them
(such as vacuum cleaner, train engines, hair dryers, etc.). Wireless
LAN transceivers cannot be adjusted for perfect transmission is a
standard office or production environment.
1. HiperLAN
HiperLAN stands for High performance LAN. While all of the
previous technologies have been designed specifically for an adhoc
environment, HiperLAN is derived from traditional LAN
environments and can support multimedia data and asynchronous data
effectively at high rates (23.5 Mbps).
A LAN extension via access points can be implemented using standard
features of the HiperLAN/1 specification. However, HiperLAN does
not necessarily require any type of access point infrastructure for its
operation.
HiperLAN was started in 1992, and standards were published in 1995.
It employs the 5.15GHz and 17.1 GHz frequency bands and has a data
rate of 23.5 Mbps with coverage of 50m and mobility< 10 m/s.
It supports a packet-oriented structure, which can be used for networks
with or without a central control (BS-MS and ad-hoc). It supports 25
audio connections at 32kbps with a maximum latency of 10 ms, one
video connection of 2 Mbps with 100 ms latency, and a data rate of
13.4 Mbps.
HiperLAN/1 is specifically designed to support adhoc computing for
multimedia systems, where there is no requirement to deploy a
centralized infrastructure. It effectively supports MPEG or other state
of the art real time digital audio and video standards.
The HiperLAN/1 MAC is compatible with the standard MAC service
interface, enabling support for existing applications to remain
unchanged.
115
HiperLAN 2 has been specifically developed to have a wired
infrastructure, providing short-range wireless access to wired networks
such as IP and ATM.
This connection oriented approach makes support for QoS easy, which
in turn depends on how the HiperLAN/2 network incorporates with the
fixed network using Ethernet, ATM, or IP.
116
The HiperLAN/2 architecture shown in the figure allows for
interoperation with virtually any type of fixed network, making the
technology both network and application independent.
2. Home RF Technology
A typical home needs a network inside the house for access to a public
network telephone and internet, entertainment networks (cable
television, digital audio and video with the IEEE 1394), transfer and
sharing of data and resources (printer, internet connection), and home
control and automation.
The device should be able to self-configure and maintain connectivity
with the network. The devices need to be plug and play enabled so that
they are available to all other clients on the network as soon as they are
switched on, which requires automatic device discovery and
identification in the system.
Home networking technology should also be able to accommodate any
and all lookup services, such as Jini. Home RF products allow you to
simultaneously share a single internet connection with all of your
computers - without the hassle of new wires, cables or jacks.
Home RF visualizes a home network as shown in the figure:
117
A network consists of resource providers, which are gateways to
different resources like phone lines, cable modem, satellite dish, and
so on, and the devices connected to them such as cordless phone,
printers and fileservers, and TV.
The goal of Home RF is to integrate all of these into a single network
suitable for all applications and to remove all wires and utilize RF
links in the network suitable for all applications.
This includes sharing PC, printer, fileserver, phone, internet
connection, and so on, enabling multiplayer gaming using different
PCs and consoles inside the home, and providing complete control on
all devices from a single mobile controller.
With Home RF, a cordless phone can connect to PSTN but also
connect through a PC for enhanced services. Home RF makes an
assumption that simultaneous support for both voice and data is
needed.
Advantages of Home RF
In Home RF all devices can share the same connection, for voice or
data at the same time.
Home RF provides the foundation for a broad range of interoperable
consumer devices for wireless digital communication between PCs and
consumer electronic devices anywhere in and around the home.
The working group includes Compaq computer corp. Ericson
enterprise network, IBM Intel corp., Motorola corp. and other.
A specification for wireless communication in the home called the
shared wireless access protocol (SWAP) has been developed.
4. Bluetooth
Bluetooth is one of the major wireless technologies developed to
achieve WPAN (wireless personal area network). It is used to connect
devices of different functions such as telephones, computers (laptop or
desktop), notebooks, cameras, printers, and so on.
118
Architecture of Bluetooth
Bluetooth devices can interact with other Bluetooth devices in several
ways in the figure. In the simplest scheme, one of the devices acts as
the master and (up to) seven other slaves.
A network with a master and one or more slaves associated with it is
known as a piconet. A single channel (and bandwidth) is shared among
all devices in the piconet.
Each of the active slaves has an assigned 3-bit active member address.
many other slaves can remain synchronized to the master though
remaining inactive slaves, referred to as parked nodes.
The master regulates channel access for all active nodes and parked
nodes. Of two piconets are close to each other, they have overlapping
coverage areas.
This scenario, in which nodes of two piconets intermingle, is called a
scatternet. Slaves in one piconet can participate in another piconet as
either a master or slave through time division multiplexing.
In a scatternet, the two (or more) piconets are not synchronized in
either time or frequency. Each of the piconets operates in its own
frequency hopping channel, and any devices in multiple piconets
participate at the appropriate time via time division multiplexing.
The Bluetooth baseband technology supports two link types.
Synchronous connection oriented (SCO) types, used primarily for
voice, and asynchronous connectionless (ACL) type, essentially for
packet data.
119
6.6 INFRARED VS RADIO TRANSMISSION
Infrared Transmission
Infrared technology uses diffuse light reflected at walls, furniture etc.
or a directed light if a line of sight (LOS) exists between sender and
receiver.
Infrared light is the part of the electromagnetic spectrum, and is an
electromagnetic form of radiation. It comes from the heat and thermal
radiation, and it is not visible to the naked eyes.
In infrared transmission, senders can be simple light emitting diodes
(LEDs) or laser diodes. Photodiodes act as receivers.
Infrared is used in wireless technology devices or systems that convey
data through infrared radiation. Infrared is electromagnetic energy at a
wave length or wave lengths somewhat longer than those of red light.
Infrared wireless is used for medium and short range communications
and control. Infrared technology is used in instruction detectors; robot
control system, medium range line of sight laser communication,
cordless microphone, headsets, modems, and other peripheral devices.
Infrared radiation is used in scientific, industrial, and medical
application. Night vision devices using active near infrared
illumination allow people and animals to be observed without the
observer being detected.
Infrared transmission technology refers to energy in the region of the
electromagnetic radiation spectrum at wavelength longer than those of
visible light but shorter than those of radio waves.
Infrared technology allows computing devices to communicate via
short range wireless signals. With infrared transmission, computers
can transfer files and other digital data bidirectional.
Advantages of infrared
The main advantage of infrared technology is its simple and
extremely cheap senders and receivers which are integrated into
nearly all mobile devices available today.
No licenses are required for infrared and shielding is very simple.
PDAs, laptops, notebooks, mobile phones etc. have an infrared
data association (IrDA) interface.
Electrical devices cannot interfere with infrared transmission.
Disadvantages of Infrared
Disadvantages of infrared transmission are its low bandwidth
compared to other LAN technologies.
120
Limited transfer rates to 115 Kbit/s and we know that even 4
Mbit/s is not a particular high data rate.
Their main disadvantage is that infrared is quite easily shielded.
Infrared transmission cannot penetrate walls or other obstacles.
Typically, for good transmission quality and high data rates a LOS
(Line of site), i.e. direct connection is needed.
Radio Transmission
Almost all networks use radio waves for data transmission, e.g.,
GSM at 900, 1800, and 1900 MHz, DECT at 1880 MHz etc. Radio
transmission technologies can be used to set up ad-hoc connections
for work groups, to connect, e.g., a desktop with a printer without a
wire, or to support mobility within a small area.
The two main types of radio transmission are AM (Amplitude
Modulation) and (FM) Frequency Modulation.
FM minimizes noise and provides greater reliability. Both AM and
FM process sounds in patterns that are always varying of electrical
signals.
In an AM transmission the carrier wave has a constant frequency,
but the strength of the wave varies. The FM transmission is just the
opposite; the wave has constant amplitude but a varying frequency.
Usually the radio transmission is used in the transmission of
sounds and pictures. Such as, voice, music and television.
The images and sounds are converted into electrical signals by a
microphone or video camera. The signals are amplified, and
transmitted. If the carrier is amplified it can be applied to an
antenna.
The antenna converts the electrical signals into electromagnetic
waves and sends them out or they can be received. The antenna
consists commonly of a wire or set of wires.
Transmission techniques
122
Module IV
7
WIRELESS SENSOR NETWORKS
Unit Structure
7.0 Objective
7.1 Need and application of sensor networks
7.2 sensor networks design considerations
7.3 empirical energy consumption
7.4 sensing and communication range
7.5 localization scheme
7.6 clustering of SNs
7.7 Routing layer
7.8 Sensor networks in controlled environment and actuators
7.9 regularly placed sensors
7.10 network issues
7.11 RFID as passive sensors
7.12 Unit End Questions
7.0 OBJECTIVES
7.1.1 Introduction
A sensor is a device that measures a change in a physical or
environmental condition
123
The Sensor Network community oftenly states a sensor node as a
small, wireless sensing device, which has the ability to respond to the
action, then process the captured data and transmit the data over the
wireless connection using radio link.
Once we have an idea about what are sensors, now let's look
into what is a sensor network.
Sensor Network
1. Communication Protocol
It consists of a physical layer, data link layer, network layer, transport
layer and application layer
124
2. Management Protocol
It consists of power management, mobility management and task
management planes.
Area monitoring:
The sensor nodes are installed sparsely over an area and the
phenomenon is monitored. The monitored parameters (humidity,
temperature) are then sent to the base stations to take appropriate actions.
Transportation:
WSN helps in collecting traffic information to alert the drivers
regarding the traffic and congestion problems in their path.
Health applications:
WSN also contributes in health applications in monitoring patients,
conducting diagnosis, drug administration in hospitals, monitoring
patient’s physiological data, and tracking & monitoring patients, doctors.
Environmental sensing:
WSN is popularly developed to cover many applications related to
earth science research. This includes sensing earthquakes, glaciers,
volcanoes, oceans, etc.
Structural monitoring:
Sensors can be used to inspect the building structures, monitor the
movement within buildings and durability of the infrastructure such as
bridges, flyovers, tunnels etc. The result of the monitoring helps the civil
architect to take preventive measures against any hazard
Industrial monitoring:
WSN has been developed for implementing machinery on
condition-based maintenance (CBM) as it promotes cost savings and
enables new features and increases productivity.
Agricultural sector:
Wireless sensor network measures the humidity of the soil and
indicates the need of irritation of crops thus increasing the productivity. It
also promotes irrigation automation thus enabling use of water efficiently
and reducing wastage of water.
126
7.2 SENSOR NETWORKS DESIGN CONSIDERATION
Fault Tolerance:
There is a possibility that a node fails, thus changing the topology
of the network. In such a case, the network must be made robust to adopt
the changes so that the functioning of the topology is not disrupted and the
network functions efficiently.
Lifetime:
It is assumed that WSN should work for at least 6 months to 1 year
using a 3 V battery providing good performance and with good energy.
The designer should keep in mind that it consumes less energy thus
making the network to last for longer.
Scalability:
The WSN must be able to support additional nodes at any given
point of time without interfering with the other’s performance. Also some
applications require more number of sensor nodes so the design should be
made in such a way that it supports a large design of network.
Date Aggregation:
The sensor nodes are placed close to each other due to which
similar data can be generated by the nodes which are next to each other.
The data can be collected and duplicate data can be extracted at different
levels.
Cost:
The cost of each sensor node is very expensive and as we all know
the Sensor network is made up of a large number of sensor nodes and
hence the cost will be a major concern. So, the design must be such that all
the data is monitored by optimal usage of the number of nodes.
Environment:
The sensor nodes deployed in WSN must be survivable under all
conditions as the environment may be demanding.
Heterogeneity Support:
The design of the sensor network must support different types of
sensor nodes based on its functionality.
127
Autonomous Operations:
The WSN should be able to operate, organize , and reorganize on
its own without human intervention.
● Sensing Unit:
○ The Sensing transducer captures the physical parameters of the
environment.
○ It does physical signal sampling and then converts it into electrical
signals.
○ Using this component, the energy consumption depends on the
hardware, the application used and the sensing energy spent.
Transmission Energy:
Energy consumed to transmit information is given as follows
Receiver Energy:
Energy consumed to receive k bits.
128
● Commutation Unit:
where Ctotal is the total capacitance switched by the computation and Vdd
is the supply voltage.
Every SN has its own sensing range and to sense the complete area,
the neighboring SNs have to be installed close to each other and at
maximum 2rs distance from each other.
If the Sensor Nodes are uniformly distributed with the node having
density X, then the probability of having ‘m’ Sensor nodes within the area
of S is Poisson distributed as
129
It gives us information about the coverage of the area so that we
understand how many more sensor nodes are needed to be deployed.
130
7.5 LOCALIZATION SCHEME
131
● GPS Based and GPS Free
In GPS-based schemes, every node has a GPS receiver which makes it
very costly. And also the localization accuracy is very high.
GPS-free algorithms are less expensive as they do not have GPS, and
they calculate the distance between the nodes relative to the local network
132
The above figure shows randomly deployed SNs. The Sensor
nodes in a cluster can transmit data to CH directly thus reducing the
energy consumption.
The CH may allot different time slots to the cluster member for
data transmission so as to avoid collision of data. So it is preferable for
each SN to use one specific channel. Sufficient number of SNs are
required to be deployed so as to monitor information of every corner of
the area.
2. Data-centric approach
134
In some wireless sensor networks, the transmission of sensed data
is more important than how the data was collected collecting data from the
nodes.
● The figure above shows the transmission of data using SPIN protocol.
● Firstly the node which has some information broadcasts an ADV
packet to all its neighboring nodes.
● If any node is interested in knowing the data, then that node sends an
REQ message to the advertising node.
● When the receiving node receives the REQ message from a specific
node, it sends the actual DATA to that node who has shown an
interest.
● Once the interested node receives the DATA. It further broadcast the
ADV message to its neighboring nodes. In this way, the data is
transmitted through the network.
135
Figure: Directed diffusion
3. Source-initiated (Src-initiated)
In this approach, if the source node has data to share, it initiates
a route from the source to the destination node.
4. Destination-initiated (Dst-initiated)
Mostly, the route is generated by the source node but sometimes, the
route generation is initiated by the destination node. If this has to be
achieved then there are protocols needed to set up route generation.
Directed Diffusion (DD) & LEACH are the two protocols that
implement the Destination-initiated approach.
137
Figure: Two Dimensional grid format for sensor placement
138
It may be noted that the radio transmission distance between
adjacent SNs need to be such that the sensors can receive data from
adjacent sensors using wireless radio. The three placements also promote
clustering of the Sensor nodes and the size of each cluster can be fixed as
per our requirements. If the sensing and radio transmission ranges are set
to the minimum value, then all the SNs need to be active all the time to
cover the area and function properly. If range is widened , then each sub-
region will require to deploy more than one sensor node to monitor that
range and some selected Sensor nodes can be put to sleep to save energy.
139
One of the most popular technologies is RFID or radio-
frequency identification, or RFID.
RFID sensors are categorised as active and passive.
Passive RFID systems can operate in either low frequency (LF) or
high frequency (HF) or ultra-high frequency (UHF) radio bands
RFID tags are embedded in our day-to-day applications, such as
employee badges, inventory control, retail security tags, pay terminals,
and so.
The range of Passive RFID is roughly around 1-5 meters from the
Passive RFID reader, so a large number of readers will be required to track
the location of an item.
Initially, the Passive tags wait for a signal from an RFID reader. The
reader then sends energy to an antenna which converts that energy into an
Radio Frequency wave that is sent into the read zone. The RFID tag’s
internal antenna draws in energy from the RF waves, once the tag is read
within the read zone. The energy is then moved to the Integrated Circuit
(IC) from the tag’s antenna and powers the chip which generates a signal
back to the RF system. This is known as backscatter. The backscatter is
nothing but a change in the electromagnetic or Radio Frequency wave,
which is detected by the reader through the antenna which interprets the
information.
There are many other types of passive RFID but they are categorized
into two types-
1. hard tags
2. inlays tags.
140
Hard RFID tags -
Hard RFID tags are made of plastic, metal, ceramic and even rubber
and are durable. They also come in all kinds of shapes and sizes and are
designed for a unique function, or application.
Inlays tags are the RFID tags having high volumes, but of low cost.
These inlays are mainly grouped into three types:
1. Dry Inlays – An antenna and RFID microchip (IC) is attached to a
material or a layer called a web. These inlays look like they have been
glazed (coated) with no adhesive.
2. Wet Inlays – A RFID microchip and an antenna is attached to a
substrate, usually PVT or PET, with an adhesive. These inlays can
then be peeled off from their roll and stuck on an item.
3. Paper Face Tags – These tags are basically wet inlays with a poly
face or a white paper. These tags are used for applications that need
printed logos or numbers.
141
All Passive RFID tags do not operate at the same frequency.
Passive RFID tags operate at three different frequencies depending on
parameters such as the attachment materials, read range, and the
application options.
142