Ch-03 Mobile Networking
Ch-03 Mobile Networking
Access Control
CE-BE-MCC
Suvarna Chaure
Assistant Professor
Dept. of Computer Engineering,
SIES Graduate School of Technology
Topics To Be Covered
•Motivation
• Collision avoidance, MACA
• CDMA
2
Motivation
Example CSMA/CD
• Carrier Sense Multiple Access with Collision Detection
• send as soon as the medium is free, listen into the medium if a collision
occurs (original method in IEEE 802.3)
Problems in wireless networks
• signal strength decreases proportional to the square of the distance
• the sender would apply CS and CD, but the collisions happen at the
receiver
• it might be the case that a sender cannot “hear” the collision, i.e., CD does
not work
• furthermore, CS might not work if, e.g., a terminal is “hidden”
Motivation - hidden and exposed terminals
Hidden terminals
A sends to B, C cannot receive A
C wants to send to B, C senses a “free” medium (CS fails)
collision at B, A cannot receive the collision (CD fails)
A is “hidden” for C
Motivation - hidden and exposed terminals
Exposed terminals
B sends to A, C wants to send to another terminal (not A or B)
C has to wait, CS signals a medium in use
but A is outside the radio range of C, therefore waiting is not necessary
C is “exposed” to B
A B C
Motivation - near and far terminals
Terminals A and B send, C receives
• signal strength decreases proportional to the square of the distance
• the signal of terminal B therefore drowns out A’s signal
• C cannot receive A
If C for example was an arbiter for sending rights, terminal B would drown out
terminal A already on the physical layer
Also severe problem for CDMA-networks - precise power control needed!
Access methods SDMA/FDMA/TDMA
SDMA (Space Division Multiple Access)
• segment space into sectors, use directed antennas
• cell structure
FDMA (Frequency Division Multiple Access)
• assign a certain frequency to a transmission channel between a sender and a
receiver
• permanent (e.g., radio broadcast), slow hopping (e.g., GSM), fast hopping (FHSS,
Frequency Hopping Spread Spectrum)
TDMA (Time Division Multiple Access)
• assign the fixed sending frequency to a transmission channel between a sender
and a receiver for a certain amount of time
idle idle
RTS; RxBusy
ACK: positive acknowledgement RxBusy: receiver busy
NAK: negative acknowledgement
Access method CDMA
• CDMA (Code Division Multiple Access)
• all terminals send on the same frequency probably at the same time and can
use the whole bandwidth of the transmission channel
• each sender has a unique random number, the sender XORs the signal with
this random number
• the receiver can “tune” into this signal if it knows the pseudo random number,
tuning is done via a correlation function
• Disadvantages:
• higher complexity of a receiver (receiver cannot just listen into the medium and
start receiving if there is a signal)
• all signals should have the same strength at a receiver
• Advantages:
• all terminals can use the same frequency, no planning needed
• huge code space (e.g. 232) compared to frequency space
• interferences (e.g. white noise) is not coded
• forward error correction and encryption can be easily integrated
CDMA in theory
Sender A
sends Ad = 1, key Ak = 010011 (assign: „0“= -1, „1“= +1)
sending signal As = Ad * Ak
= (-1, +1, -1, -1, +1, +1)
Sender B
sends Bd = 0, key Bk = 110101 (assign: „0“= -1, „1“= +1)
sending signal Bs = Bd * Bk
= (-1, -1, +1, -1, +1, -1)
Both signals superimpose in space
interference neglected (noise etc.)
As + Bs
= (-2, 0, 0, -2, +2, 0)
CDMA in theory
Receiver wants to receive signal from sender A
apply key Ak bitwise (inner product)
Ae = (-2, 0, 0, -2, +2, 0) • Ak
=2+0+0+2+2+0=6
result greater than 0, therefore, original bit was „1“
receiving B
Be = (-2, 0, 0, -2, +2, 0) • Bk
= -2 + 0 + 0 - 2 - 2 + 0 = -6, i.e. „0“
CDMA on signal level I
data A
key A
key
sequence A
data ⊕ key
signal A
CE-BE-MCC
Suvarna Chaure
Assistant Professor
Dept. of Computer Engineering,
SIES Graduate School of Technology
18
Topics To Be Covered
• Motivation
• Data transfer , Encapsulation
• Security, IPv6, Problems
• DHCP
• Ad-hoc networks, Routing protocols
Motivation for Mobile IP
• Routing based on IP destination address, network prefix (e.g. 129.13.42) determines
physical subnet
• change of physical subnet implies change of IP address to have a topological correct
address (standard IP) or needs special entries in the routing tables
Specific routes to end-systems?
• change of all routing table entries to forward packets to the right destination
• does not scale with the number of mobile hosts and frequent changes in the location,
security problems
Changing the IP-address?
• adjust the host IP address depending on the current location
• almost impossible to find a mobile system, DNS updates take to long time
• TCP connections break, security problems
Requirements for Mobile IPv4
• Transparency
mobile end-systems keep their IP address
continuation of communication after interruption of link possible
point of connection to the fixed network can be changed
• Compatibility
support of the same layer 2 protocols as IP
no changes to current end-systems and routers required
mobile end-systems can communicate with fixed systems
• Security
authentication of all registration messages
• Efficiency and scalability
only little additional messages to the mobile system required (connection typically
via a low bandwidth radio link)
world-wide support of a large number of mobile systems in the whole Internet
Terminology
• Mobile Node (MN)
system (node) that can change the point of connection
to the network without changing its IP address
• Home Agent (HA)
system in the home network of the MN, typically a router
registers the location of the MN, tunnels IP datagrams to the COA
• Foreign Agent (FA)
system in the current foreign network of the MN, typically a router
forwards the tunneled datagrams to the MN, typically also the default router for the
MN
• Care-of Address (COA)
address of the current tunnel end-point for the MN (at FA or MN)
actual location of the MN from an IP point of view can be chosen, e.g., via DHCP
1. Foreign Agent COA
2. Co-located COA
• Correspondent Node (CN)
communication partner
• Home Network(HN)
• Foreign Network(FN)
Overview COA
router
home router MN
FA
network HA
foreign
Internet network
CN router
Example network
HA
MN
router
end-system router
IP Packet Delivery
IP Packet Delivery
HA
2
MN
FA foreign
network
FA foreign
network
receiver
Reverse Tunneling Problems Associated:
1. Firewalls: firewalls only allow packets
with topologically correct addresses to
pass. This provides at least a first and
simple protection against
misconfigured systems of unknown
addresses.
2. Multi-cast: Reverse tunnels are
needed for the MN to participate in a
multicast group.
3. TTL:The TTL might be low enough so
that no packet is transmitted outside a
certain region.
Solution
Reverse tunneling now creates a triangular
routing problem in the reverse direction. All
packets from an MN to a CN go through
the HA.
27
Agent Discovery
1. Agent Advertisement
--HA and FA periodically send advertisement messages into their physical subnets
--MN listens to these messages and detects, if it is in the home or a foreign network (standard
case for home network)
--MN reads a COA from the FA advertisement messages
Registration (always limited lifetime!)
MN signals COA to the HA via the FA, HA acknowledges via FA to MN
these actions have to be secured by authentication
Advertisement
HA advertises the IP address of the MN (as for fixed systems), i.e. standard routing information
routers adjust their entries, these are stable for a longer time (HA responsible for a MN over a
longer period of time)
packets to the MN are sent to the HA,
independent of changes in COA/FA
Agent advertisement 0 7 8 15 16 23 24 31
type = 16 type code checksum
#addresses addr. size lifetime
length = 6 + 4 * #COAs
router address 1
R: registration required
preference level 1
B: busy, no more registrations router address 2
H: home agent preference level 2
F: foreign agent
M: minimal encapsulation ...
G: GRE encapsulation
type = 16 length sequence number
r: =0, ignored (former Van Jacobson compression) registration lifetime
R B H F M G r T reserved
T: FA supports reverse tunneling COA 1
reserved: =0, ignored COA 2
...
Agent Solicitation:
If no agent advertisements are present or the inter arrival time is too high, and an
MN has not received a COA, the mobile node must send agent solicitations. These
solicitations are again bases on RFC 1256 for router solicitations.
30
Registration
The main purpose of the registration is to inform the home agent of the current
location for correct forwarding of packets.
MN FA HA MN HA
t
Mobile IP registration request
0 7 8 15 16 23 24 31
type = 1 S B D MG r T xlifetime
home address
home agent
COA
identification
extensions . . .
S: simultaneous bindings
B: broadcast datagrams
D: decapsulation by MN
M mininal encapsulation
G: GRE encapsulation
r: =0, ignored
T: reverse tunneling requested
x: =0, ignored
Mobile IP registration reply 0 7 8 15 16 31
type = 3 code lifetime
home address
home agent
identification
Example codes: extensions . . .
registration successful
1 registration accepted
2 registration accepted, but simultaneous mobility bindings unsupported
registration denied by FA
65 administratively prohibited
66 insufficient resources
67mobile node failed authentication
68 home agent failed authentication
69 requested Lifetime too long
registration denied by HA
129 administratively prohibited
131 mobile node failed authentication
133 registration Identification mismatch
135 too many simultaneous mobility bindings
Tunneling and Encapsulation
Packets entering a tunnel are forwarded inside the tunnel and leave the tunnel
unchanged. Tunneling, i.e., sending a packet through a tunnel, is achieved by
using encapsulation.
34
IP-in-IP Encapsulation
37
Generic Routing Encapsulation
Supports other network layer protocols in addition to IP.
Generic routing encapsulation (GRE) allows the encapsulation of packets of one protocol suite into the
payload portion of a packet of another protocol suite.
38
Optimizations
A Japanese and a German meet at a conference on Hawaii. Both want to use their laptops for exchanging
data, both run mobile IP for mobility support.
39
Optimization (Scenario)
If the Japanese sends a packet to the German, his computer sends the data to the HA of the German,
i.e., from Hawaii to Germany. The HA in Germany now encapsulates the packets and tunnels them to
the COA of the German laptop on Hawaii.
This means that although the computers might be only meters away, the packets have to travel around
the world!
40
Methods of Optimization
One way to optimize the route is to inform
the CN of the current location of the MN.
41
Optimized Mobile IP
42
Mobile TCP
E.g. HTTP (used by web services) typically uses
TCP Client Server
Reliable transport between client and server TCP SYN
required TCP SYN/ACK Connection
TCP setup
Steam oriented, not transaction oriented TCP ACK
Network friendly: time-out HTTP request
congestion
Data
slow down transmission HTTP response transmission
Well known – TCP guesses quite often wrong in
wireless and mobile networks >15 s
Packet loss due to transmission errors no data
Packet loss due to change of network GPRS: 500ms! Connection
release
Result
Severe performance degradation
9.43
Motivation I
Transport protocols typically designed for
Fixed end-systems
Fixed, wired networks
Research activities
Performance
Congestion control
Efficient retransmissions
TCP congestion control
packet loss in fixed networks typically due to (temporary) overload
situations
router have to discard packets as soon as the buffers are full
TCP recognizes congestion only indirect via missing acknowledgements,
retransmissions unwise, they would only contribute to the congestion and
make it even worse
slow-start algorithm as reaction
9.44
Motivation II
TCP slow-start algorithm
sender calculates a congestion window for a receiver
start with a congestion window size equal to one segment
exponential increase of the congestion window up to the congestion threshold, then linear
increase
missing acknowledgement causes the reduction of the congestion threshold to one half of the
current congestion window
congestion window starts again with one segment
9.45
Influences of mobility on TCP-mechanisms
9.46
Classical TCP Improvements
1. Indirect TCP (I-TCP)
Indirect TCP or I-TCP segments the connection
no changes to the TCP protocol for hosts connected to the wired Internet, millions of computers
use (variants of) this protocol
optimized TCP protocol for mobile hosts
splitting of the TCP connection at, e.g., the foreign agent into 2 TCP connections, no real end-to-
end connection any longer
hosts in the fixed part of the net do not notice the characteristics of the wireless part
mobile host
access point
(foreign agent) „wired“ Internet
9.47
I-TCP socket and state migration
access point1
socket migration
and state transfer Internet
access point2
mobile host
9.48
Indirect TCP II
Advantages
1. no changes in the fixed network necessary, no changes for the hosts (TCP protocol)
necessary, all current optimizations to TCP still work
2. transmission errors on the wireless link do not propagate into the fixed network
3. simple to control, mobile TCP is used only for one hop between, e.g., a foreign agent
and mobile host
4. therefore, a very fast retransmission of packets is possible, the short delay on the
mobile hop is known
Disadvantages
1. loss of end-to-end semantics, an acknowledgement to a sender does now not any
longer mean that a receiver really got a packet, foreign agents might crash
2. higher handover latency possible due to buffering of data within the foreign agent
and forwarding to a new foreign agent
9.49
2. Snooping TCP
„Transparent“ extension of TCP within the foreign agent
buffering of packets sent to the mobile host
lost packets on the wireless link (both directions!) will be retransmitted immediately by
the mobile host or foreign agent, respectively (so called “local” retransmission)
the foreign agent therefore “snoops” the packet flow and recognizes
acknowledgements in both directions, it also filters ACKs
changes of TCP only within the foreign agent
9.50
Snooping TCP
Data transfer to the mobile host
FA buffers data until it receives ACK of the MH, FA detects packet loss via duplicated ACKs or time-
out
fast retransmission possible, transparent for the fixed network
Data transfer from the mobile host
FA detects packet loss on the wireless link via sequence numbers, FA answers directly with a NACK
to the MH
MH can now retransmit data with only a very short delay
Integration of the MAC layer
MAC layer often has similar mechanisms to those of TCP
thus, the MAC layer can already detect duplicated packets due to retransmissions and discard them
Problems
snooping TCP does not isolate the wireless link as good as I-TCP
snooping might be useless depending on encryption schemes
9.51
3. Mobile TCP
Special handling of lengthy and/or frequent disconnections
M-TCP splits as I-TCP does
unmodified TCP fixed network to supervisory host (SH)
optimized TCP SH to MH
Supervisory host
no caching, no retransmission
monitors all packets, if disconnection detected
set sender window size to 0
sender automatically goes into persistent mode
old or new SH reopen the window
Advantages
maintains semantics, supports disconnection, no buffer forwarding
Disadvantages
loss on wireless link propagated into fixed network
adapted TCP on wireless link
9.52
4. Fast retransmit/fast recovery
Change of foreign agent often results in packet loss
TCP reacts with slow-start although there is no congestion
Forced fast retransmit
as soon as the mobile host has registered with a new foreign agent, the MH sends duplicated
acknowledgements on purpose
this forces the fast retransmit mode at the communication partners
additionally, the TCP on the MH is forced to continue sending with the actual window size and
not to go into slow-start after registration
Advantage
simple changes result in significant higher performance
Disadvantage
further mix of IP and TCP, no transparent approach
9.53
5. Transmission/time-out freezing
Mobile hosts can be disconnected for a longer time
no packet exchange possible, e.g., in a tunnel, disconnection due to overloaded
cells or mux. with higher priority traffic
TCP disconnects after time-out completely
TCP freezing
MAC layer is often able to detect interruption in advance
MAC can inform TCP layer of upcoming loss of connection
TCP stops sending, but does now not assume a congested link
MAC layer signals again if reconnected
Advantage
scheme is independent of data
Disadvantage
TCP on mobile host has to be changed, mechanism depends on MAC layer
9.54
6. Selective retransmission
TCP acknowledgements are often cumulative
ACK n acknowledges correct and in-sequence receipt of packets up to n
if single packets are missing quite often a whole packet sequence beginning at the gap has to be
retransmitted (go-back-n), thus wasting bandwidth
Selective retransmission as one solution
RFC2018 allows for acknowledgements of single packets, not only acknowledgements of in-
sequence packet streams without gaps
sender can now retransmit only the missing packets
Advantage
much higher efficiency
Disadvantage
more complex software in a receiver, more buffer needed at the receiver
9.55
7. Transaction oriented TCP
TCP phases
connection setup, data transmission, connection release
using 3-way-handshake needs 3 packets for setup and release, respectively
thus, even short messages need a minimum of 7 packets!
Transaction oriented TCP
RFC1644, T-TCP, describes a TCP version to avoid this overhead
connection setup, data transfer and connection release can be combined
thus, only 2 or 3 packets are needed
Advantage
efficiency
Disadvantage
requires changed TCP
mobility not longer transparent
9.56
Comparison of different approaches for a “mobile” TCP
Approach Mechanism Advantages Disadvantages
Indirect TCP splits TCP connection isolation of wireless loss of TCP semantics,
into two connections link, simple higher latency at
handover
Snooping TCP “snoops” data and transparent for end-to- problematic with
acknowledgements, local end connection, MAC encryption, bad isolation
retransmission integration possible of wireless link
M-TCP splits TCP connection, Maintains end-to-end Bad isolation of wireless
chokes sender via semantics, handles link, processing
window size long term and frequent overhead due to
disconnections bandwidth management
Fast retransmit/ avoids slow-start after simple and efficient mixed layers, not
fast recovery roaming transparent
Transmission/ freezes TCP state at independent of content changes in TCP
time-out freezing disconnect, resumes or encryption, works for required, MAC
after reconnection longer interrupts dependant
Selective retransmit only lost data very efficient slightly more complex
retransmission receiver software, more
buffer needed
Transaction combine connection Efficient for certain changes in TCP
oriented TCP setup/release and data applications required, not transparent
transmission
9.57
Thank You!
([email protected])
58