2 Graphs and Functions © 2008 Pearson Addison-Wesley. All rights reserved Sections 2.8.
Wireless and Mobile Networks Reading: Sections 2.8 and 4.2.5
-
Upload
raphael-ford -
Category
Documents
-
view
29 -
download
0
description
Transcript of Wireless and Mobile Networks Reading: Sections 2.8 and 4.2.5
![Page 1: Wireless and Mobile Networks Reading: Sections 2.8 and 4.2.5](https://reader036.fdocuments.net/reader036/viewer/2022062517/568130a7550346895d96aade/html5/thumbnails/1.jpg)
Wireless and Mobile NetworksReading: Sections 2.8 and 4.2.5
COS 461: Computer NetworksSpring 2010 (MW 3:00-4:20 in COS 105)
Mike Freedmanhttp://www.cs.princeton.edu/courses/archive/spring10/cos461/
1
![Page 2: Wireless and Mobile Networks Reading: Sections 2.8 and 4.2.5](https://reader036.fdocuments.net/reader036/viewer/2022062517/568130a7550346895d96aade/html5/thumbnails/2.jpg)
Goals of Today’s Lecture• Wireless links: unique channel characteristics
– High, time-varying bit-error rate– Broadcast where some nodes can’t hear each other
• Ad-hoc routing: no fixed infrastrucuture• Mobile hosts: addressing and routing challenges
– Keeping track of host’s changing attachment point– Maintaining a data transfer as the host moves
• Some specific examples– Wireless: 802.11 wireless LAN (aka “WiFi”)– Ad-hoc routing: DSR and AODV– Mobility: Boeing Connexion and Mobile IP
2( Many slides adapted from Jim Kurose’s lectures at UMass-Amherst and Seth Goldstein at CMU )
![Page 3: Wireless and Mobile Networks Reading: Sections 2.8 and 4.2.5](https://reader036.fdocuments.net/reader036/viewer/2022062517/568130a7550346895d96aade/html5/thumbnails/3.jpg)
Widespread Deployment• Worldwide cellular subscribers
– 1993: 34 million– 2005: more than 2 billion– 2009: more than 4 billion
> landline subscribers
• Wireless local area networks– Wireless adapters built in to
most laptops, and even PDAs– More than 220,000 known
WiFi locations in 134 countries– Probably many, many more
(e.g., home networks, corporate networks, …)
3
![Page 4: Wireless and Mobile Networks Reading: Sections 2.8 and 4.2.5](https://reader036.fdocuments.net/reader036/viewer/2022062517/568130a7550346895d96aade/html5/thumbnails/4.jpg)
Wireless Links and Wireless Networks
4
![Page 5: Wireless and Mobile Networks Reading: Sections 2.8 and 4.2.5](https://reader036.fdocuments.net/reader036/viewer/2022062517/568130a7550346895d96aade/html5/thumbnails/5.jpg)
Wireless Links: High Bit Error Rate
• Decreasing signal strength– Disperses as it travels greater distance– Attenuates as it passes through matter
5
![Page 6: Wireless and Mobile Networks Reading: Sections 2.8 and 4.2.5](https://reader036.fdocuments.net/reader036/viewer/2022062517/568130a7550346895d96aade/html5/thumbnails/6.jpg)
Wireless Links: High Bit Error Rate
• Interference from other sources– Radio sources in same frequency band– E.g., 2.4 GHz wireless phone interferes with 802.11b
wireless LAN– Electromagnetic noise (e.g., microwave oven)
6
![Page 7: Wireless and Mobile Networks Reading: Sections 2.8 and 4.2.5](https://reader036.fdocuments.net/reader036/viewer/2022062517/568130a7550346895d96aade/html5/thumbnails/7.jpg)
Wireless Links: High Bit Error Rate
• Multi-path propagation– Electromagnetic waves reflect off objects– Taking many paths of different lengths– Causing blurring of signal at the receiver
7
receivertransmitter
![Page 8: Wireless and Mobile Networks Reading: Sections 2.8 and 4.2.5](https://reader036.fdocuments.net/reader036/viewer/2022062517/568130a7550346895d96aade/html5/thumbnails/8.jpg)
Dealing With Bit Errors• Wireless vs. wired links
– Wired: most loss is due to congestion– Wireless: higher, time-varying bit-error rate
• Dealing with high bit-error rates– Sender could increase transmission power
• Requires more energy (bad for battery-powered hosts)• Creates more interference with other senders
– Stronger error detection and recovery• More powerful error detection/correction codes• Link-layer retransmission of corrupted frames
• (Many research proposals for TCP alternatives /extensions for wireless) 8
![Page 9: Wireless and Mobile Networks Reading: Sections 2.8 and 4.2.5](https://reader036.fdocuments.net/reader036/viewer/2022062517/568130a7550346895d96aade/html5/thumbnails/9.jpg)
Wireless Links: Broadcast Limitations
• Wired broadcast links– E.g., Ethernet bridging, in wired LANs– All nodes receive transmissions from all other nodes
• Wireless broadcast: hidden terminal problem
9
A
B
C • A and B hear each other• B and C hear each other• But, A and C do not
So, A and C are unaware of their interference at B
• A and B hear each other• B and C hear each other• But, A and C do not
So, A and C are unaware of their interference at B
![Page 10: Wireless and Mobile Networks Reading: Sections 2.8 and 4.2.5](https://reader036.fdocuments.net/reader036/viewer/2022062517/568130a7550346895d96aade/html5/thumbnails/10.jpg)
Wireless Links: Broadcast Limitations
• Wired broadcast links– E.g., Ethernet bridging, in wired LANs– All nodes receive transmissions from all other nodes
• Wireless broadcast: fading over distance
10
A B C
A’s signalstrength
space
C’s signalstrength
• A and B hear each other• B and C hear each other• But, A and C do not
So, A and C are unaware of their interference at B
• A and B hear each other• B and C hear each other• But, A and C do not
So, A and C are unaware of their interference at B
![Page 11: Wireless and Mobile Networks Reading: Sections 2.8 and 4.2.5](https://reader036.fdocuments.net/reader036/viewer/2022062517/568130a7550346895d96aade/html5/thumbnails/11.jpg)
Example Wireless Link Technologies
• Data networks– Indoor (10-30 meters)
• 802.11n: 200 Mbps• 802.11a and g: 54 Mbps• 802.11b: 5-11 Mbps• 802.15.1: 1 Mbps
– Outdoor (50 meters to 20 kmeters)• 802.11a and g point-to-point: 54 Mbps• WiMax: 5-11 Mbps
• Cellular networks, outdoors– 3G enhanced: 4 Mbps– 3G: 384 Kbps– 2G: 56 Kbps
11
![Page 12: Wireless and Mobile Networks Reading: Sections 2.8 and 4.2.5](https://reader036.fdocuments.net/reader036/viewer/2022062517/568130a7550346895d96aade/html5/thumbnails/12.jpg)
Wireless Network: Wireless Link
12
network infrastructure
Wireless link
• Typically used to connect mobile(s) to base station
• Also used as backbone link
• Multiple access protocol coordinates link access
Wireless link
• Typically used to connect mobile(s) to base station
• Also used as backbone link
• Multiple access protocol coordinates link access
![Page 13: Wireless and Mobile Networks Reading: Sections 2.8 and 4.2.5](https://reader036.fdocuments.net/reader036/viewer/2022062517/568130a7550346895d96aade/html5/thumbnails/13.jpg)
Wireless Network: Wireless Hosts
13
network infrastructure
Wireless host
• Laptop, PDA, IP phone
• Run applications
• May be stationary (non-mobile) or mobile
Wireless host
• Laptop, PDA, IP phone
• Run applications
• May be stationary (non-mobile) or mobile
![Page 14: Wireless and Mobile Networks Reading: Sections 2.8 and 4.2.5](https://reader036.fdocuments.net/reader036/viewer/2022062517/568130a7550346895d96aade/html5/thumbnails/14.jpg)
Wireless Network: Base Station
14
network infrastructure
Base station
• Typically connected to wired network
• Relay responsible for sending packets between wired network and wireless host(s) in its “area”
• E.g., cell towers, 802.11 access points
Base station
• Typically connected to wired network
• Relay responsible for sending packets between wired network and wireless host(s) in its “area”
• E.g., cell towers, 802.11 access points
![Page 15: Wireless and Mobile Networks Reading: Sections 2.8 and 4.2.5](https://reader036.fdocuments.net/reader036/viewer/2022062517/568130a7550346895d96aade/html5/thumbnails/15.jpg)
Wireless Network: Infrastructure
15
network infrastructure
Network infrastructure
• Larger network with which a wireless host wants to communicate
• Typically a wired network
• Provides traditional network services
• May not always exist
Network infrastructure
• Larger network with which a wireless host wants to communicate
• Typically a wired network
• Provides traditional network services
• May not always exist
![Page 16: Wireless and Mobile Networks Reading: Sections 2.8 and 4.2.5](https://reader036.fdocuments.net/reader036/viewer/2022062517/568130a7550346895d96aade/html5/thumbnails/16.jpg)
Scenario #1: Infrastructure Mode
16
network infrastructure
Infrastructure mode
• Base station connects mobiles into wired network
• Network provides services (addressing, routing, DNS)
• Handoff: mobile changes base station providing connection to wired network
Infrastructure mode
• Base station connects mobiles into wired network
• Network provides services (addressing, routing, DNS)
• Handoff: mobile changes base station providing connection to wired network
![Page 17: Wireless and Mobile Networks Reading: Sections 2.8 and 4.2.5](https://reader036.fdocuments.net/reader036/viewer/2022062517/568130a7550346895d96aade/html5/thumbnails/17.jpg)
17
Ad hoc mode
• No base stations
• Nodes can only transmit to other nodes within link coverage
• Nodes self-organize and route among themselves
Ad hoc mode
• No base stations
• Nodes can only transmit to other nodes within link coverage
• Nodes self-organize and route among themselves
Scenario #2: Ad-Hoc Networks
![Page 18: Wireless and Mobile Networks Reading: Sections 2.8 and 4.2.5](https://reader036.fdocuments.net/reader036/viewer/2022062517/568130a7550346895d96aade/html5/thumbnails/18.jpg)
Infrastructure vs. Ad Hoc
• Infrastructure mode– Wireless hosts are associated with a base station– Traditional services provided by the connected network– E.g., address assignment, routing, and DNS resolution
• Ad hoc networks– Wireless hosts have no infrastructure to connect to– Hosts themselves must provide network services
• Similar in spirit to the difference between– Client-server communication– Peer-to-peer communication
18
![Page 19: Wireless and Mobile Networks Reading: Sections 2.8 and 4.2.5](https://reader036.fdocuments.net/reader036/viewer/2022062517/568130a7550346895d96aade/html5/thumbnails/19.jpg)
Different Types of Wireless Networks
Infrastructure-based Infrastructure-less
Single-hop Base station connected to larger wired network (e.g., WiFi wireless LAN, and cellular telephony networks)
No wired network; one node coordinates the transmissions of the others (e.g., Bluetooth, and ad hoc 802.11)
Multi-hop Base station exists, but some nodes must relay through other nodes (e.g., wireless sensor networks, and wireless mesh networks)
No base station exists, and some nodes must relay through others (e.g., mobile ad hoc networks, like vehicular ad hoc networks)
19
![Page 20: Wireless and Mobile Networks Reading: Sections 2.8 and 4.2.5](https://reader036.fdocuments.net/reader036/viewer/2022062517/568130a7550346895d96aade/html5/thumbnails/20.jpg)
WiFi: 802.11 Wireless LANs
20
![Page 21: Wireless and Mobile Networks Reading: Sections 2.8 and 4.2.5](https://reader036.fdocuments.net/reader036/viewer/2022062517/568130a7550346895d96aade/html5/thumbnails/21.jpg)
802.11 LAN Architecture
21
• Access Point (AP)– Base station that
communicates with the wireless hosts
• Basic Service Set (BSS)– Coverage of one AP– AP acts as the master– Identified by an “network
name” known as an SSID
• Access Point (AP)– Base station that
communicates with the wireless hosts
• Basic Service Set (BSS)– Coverage of one AP– AP acts as the master– Identified by an “network
name” known as an SSIDBSS 1
BSS 2
Internet
hub, switchor routerAP
AP
SSID: Service Set Identifier
![Page 22: Wireless and Mobile Networks Reading: Sections 2.8 and 4.2.5](https://reader036.fdocuments.net/reader036/viewer/2022062517/568130a7550346895d96aade/html5/thumbnails/22.jpg)
Channels and Association
• Multiple channels at different frequencies– Network administrator chooses frequency for AP– Interference if channel is same as neighboring AP
• Access points send periodic beacon frames– Containing AP’s name (SSID) and MAC address– Host scans channels, listening for beacon frames– Host selects an access point to associate with
22
• Beacon frames from APs• Associate request from host• Association response from AP
• Beacon frames from APs• Associate request from host• Association response from AP
![Page 23: Wireless and Mobile Networks Reading: Sections 2.8 and 4.2.5](https://reader036.fdocuments.net/reader036/viewer/2022062517/568130a7550346895d96aade/html5/thumbnails/23.jpg)
Mobility Within the Same Subnet
• H1 remains in same IP subnet– IP address of the host can remain same– Ongoing data transfers can continue uninterrupted
• H1 recognizes the need to change– H1 detects a weakening signal– Starts scanning for stronger one
• Changes APs with same SSID– H1 disassociates from one– And associates with other
• Switch learns new location– Self-learning mechanism
23
hub or switch
AP 2
AP 1
H1 BBS 2
BBS 1
router
![Page 24: Wireless and Mobile Networks Reading: Sections 2.8 and 4.2.5](https://reader036.fdocuments.net/reader036/viewer/2022062517/568130a7550346895d96aade/html5/thumbnails/24.jpg)
CSMA: Carrier Sense, Multiple Access
• Multiple access: channel is shared medium– Station: wireless host or access point– Multiple stations may want to transmit at same time
• Carrier sense: sense channel before sending– Station doesn’t send when channel is busy– To prevent collisions with ongoing transfers– But, detecting ongoing transfers isn’t always possible
24
AB
CA B C
A’s signalstrength
space
C’s signalstrength
![Page 25: Wireless and Mobile Networks Reading: Sections 2.8 and 4.2.5](https://reader036.fdocuments.net/reader036/viewer/2022062517/568130a7550346895d96aade/html5/thumbnails/25.jpg)
CA: Collision Avoidance, Not Detection
• Collision detection in wired Ethernet– Station listens while transmitting– Detects collision with other transmission– Aborts transmission and tries sending again
• Problem #1: cannot detect all collisions– Hidden terminal problem– Fading
25
![Page 26: Wireless and Mobile Networks Reading: Sections 2.8 and 4.2.5](https://reader036.fdocuments.net/reader036/viewer/2022062517/568130a7550346895d96aade/html5/thumbnails/26.jpg)
CA: Collision Avoidance, Not Detection
• Collision detection in wired Ethernet– Station listens while transmitting– Detects collision with other transmission– Aborts transmission and tries sending again
• Problem #1: cannot detect all collisions– Hidden terminal problem– Fading
• Problem #2: listening while sending– Strength of received signal is much smaller– Expensive to build hardware that detects collisions
• So, 802.11 does not do collision detection26
![Page 27: Wireless and Mobile Networks Reading: Sections 2.8 and 4.2.5](https://reader036.fdocuments.net/reader036/viewer/2022062517/568130a7550346895d96aade/html5/thumbnails/27.jpg)
Medium Access Control in 802.11• Collision avoidance, not detection
– First exchange control frames before transmitting data• Sender issues “Request to Send” (RTS), including length of data• Receiver responds with “Clear to Send” (CTS)
– If sender sees CTS, transmits data (of specified length)– If other node sees CTS, will idle for specified period– If other node sees RTS but not CTS, free to send
• Link-layer acknowledgment and retransmission– CRC to detect errors– Receiving station sends an acknowledgment– Sending station retransmits if no ACK is received– Giving up after a few failed transmissions
27
![Page 28: Wireless and Mobile Networks Reading: Sections 2.8 and 4.2.5](https://reader036.fdocuments.net/reader036/viewer/2022062517/568130a7550346895d96aade/html5/thumbnails/28.jpg)
Hidden Terminal Problem
• A and C can’t see each other, both send to B• RTS/CTS can help
– Both A and C would send RTS that B would see first– B only responds with one CTS (say, echo’ing A’s RTS) – C detects that CTS doesn’t match and won’t send
28
CBA
![Page 29: Wireless and Mobile Networks Reading: Sections 2.8 and 4.2.5](https://reader036.fdocuments.net/reader036/viewer/2022062517/568130a7550346895d96aade/html5/thumbnails/29.jpg)
Exposed Terminal Problem
• B sending to A, C wants to send to D• As C receives B’s packets, carrier sense would prevent
it from sending to D, even though wouldn’t interfere• RTS/CTS can help
– C hears RTS from B, but not CTS from A– C knows it’s transmission will not interfere with A– C is safe to transmit to D 29
CBA D
![Page 30: Wireless and Mobile Networks Reading: Sections 2.8 and 4.2.5](https://reader036.fdocuments.net/reader036/viewer/2022062517/568130a7550346895d96aade/html5/thumbnails/30.jpg)
Ad-hoc routing protocols
30
![Page 31: Wireless and Mobile Networks Reading: Sections 2.8 and 4.2.5](https://reader036.fdocuments.net/reader036/viewer/2022062517/568130a7550346895d96aade/html5/thumbnails/31.jpg)
Traditional Routing vs Ad Hoc
• Traditional network:– Well-structured– ~O(N) nodes & links– All links work ~= well
• Ad Hoc network– N^2 links - but many bad!– Topology may be really weird
• Reflections & multipath cause strange interference
– Change is frequent31
![Page 32: Wireless and Mobile Networks Reading: Sections 2.8 and 4.2.5](https://reader036.fdocuments.net/reader036/viewer/2022062517/568130a7550346895d96aade/html5/thumbnails/32.jpg)
Problems using DV or LS
• DV loops are very expensive– Wireless bandwidth << fiber bandwidth…
• LS protocols have high overhead• N^2 links cause very high cost• Periodic updates waste power• Need fast, frequent convergence
32
![Page 33: Wireless and Mobile Networks Reading: Sections 2.8 and 4.2.5](https://reader036.fdocuments.net/reader036/viewer/2022062517/568130a7550346895d96aade/html5/thumbnails/33.jpg)
Proposed protocols
• Basic Taxonomy:– Reactive (on-demand)– Proactive (table driven)
• Source routing• Hop-by-hop routing
• Destination-Sequenced Distance Vector (DSDV)• Dynamic Source Routing (DSR)• Ad Hoc On-Demand Distance Vector (AODV)
33
![Page 34: Wireless and Mobile Networks Reading: Sections 2.8 and 4.2.5](https://reader036.fdocuments.net/reader036/viewer/2022062517/568130a7550346895d96aade/html5/thumbnails/34.jpg)
Dynamic Source Routing
• Source routing– Intermediate nodes can be out of date
• On-demand route discovery– Don’t need periodic route advertisements
• (Design point: on-demand may be better or worse depending on traffic patterns…)
34
![Page 35: Wireless and Mobile Networks Reading: Sections 2.8 and 4.2.5](https://reader036.fdocuments.net/reader036/viewer/2022062517/568130a7550346895d96aade/html5/thumbnails/35.jpg)
DSR Components
• Route discovery– The mechanism by which a sending node obtains a
route to destination
• Route maintenance– The mechanism by which a sending node detects
that the network topology has changed and its route to destination is no longer valid
35
![Page 36: Wireless and Mobile Networks Reading: Sections 2.8 and 4.2.5](https://reader036.fdocuments.net/reader036/viewer/2022062517/568130a7550346895d96aade/html5/thumbnails/36.jpg)
DSR Route Discovery
• Route discovery - basic idea– Source broadcasts route-request to Destination– Each node forwards request by adding own address
and re-broadcasting– Requests propagate outward until:
• Target is found, or
• A node that has a route to Destination is found
36
![Page 37: Wireless and Mobile Networks Reading: Sections 2.8 and 4.2.5](https://reader036.fdocuments.net/reader036/viewer/2022062517/568130a7550346895d96aade/html5/thumbnails/37.jpg)
C Broadcasts Route Request to F
A
SourceC
G H
DestinationF
E
D
BRoute Request
37
![Page 38: Wireless and Mobile Networks Reading: Sections 2.8 and 4.2.5](https://reader036.fdocuments.net/reader036/viewer/2022062517/568130a7550346895d96aade/html5/thumbnails/38.jpg)
C Broadcasts Route Request to F
A
SourceC
G H
DestinationF
E
D
BRoute Request
38
![Page 39: Wireless and Mobile Networks Reading: Sections 2.8 and 4.2.5](https://reader036.fdocuments.net/reader036/viewer/2022062517/568130a7550346895d96aade/html5/thumbnails/39.jpg)
H Responds to Route Request
A
SourceC
G H
DestinationF
E
D
B
G,H,F
• Using reversed path if links bidirectional (802.11)• Using own route discovery if links unidirectional
• Using reversed path if links bidirectional (802.11)• Using own route discovery if links unidirectional
39
![Page 40: Wireless and Mobile Networks Reading: Sections 2.8 and 4.2.5](https://reader036.fdocuments.net/reader036/viewer/2022062517/568130a7550346895d96aade/html5/thumbnails/40.jpg)
C Transmits a Packet to F
A
SourceC
G H
DestinationF
E
D
B
FH,F
G,H,F
40
![Page 41: Wireless and Mobile Networks Reading: Sections 2.8 and 4.2.5](https://reader036.fdocuments.net/reader036/viewer/2022062517/568130a7550346895d96aade/html5/thumbnails/41.jpg)
Forwarding Route Requests
• A request is forwarded if:– Node is not the destination– Node not already listed in recorded source route– Node has not seen request with same sequence
number– Node doesn’t already have cached answer– IP TTL field may be used to limit scope
• Destination copies route into a Route-reply packet and sends it back to Source
41
![Page 42: Wireless and Mobile Networks Reading: Sections 2.8 and 4.2.5](https://reader036.fdocuments.net/reader036/viewer/2022062517/568130a7550346895d96aade/html5/thumbnails/42.jpg)
Route Cache
• All source routes learned by a node are kept in Route Cache (reduces cost of discovery)
• If intermediate node receives RR for destination and has entry cached, it responds to RR and does not propagate RR further
• Nodes overhearing RR/RP may insert routes in cache (remember it’s a broadcast channel)
42
![Page 43: Wireless and Mobile Networks Reading: Sections 2.8 and 4.2.5](https://reader036.fdocuments.net/reader036/viewer/2022062517/568130a7550346895d96aade/html5/thumbnails/43.jpg)
Sending Data
• Check cache for route to destination
• If route exists then– If reachable in one hop
• Send packet
– Else insert routing header to destination and send
• If route does not exist, buffer packet and initiate route discovery
43
![Page 44: Wireless and Mobile Networks Reading: Sections 2.8 and 4.2.5](https://reader036.fdocuments.net/reader036/viewer/2022062517/568130a7550346895d96aade/html5/thumbnails/44.jpg)
Discussion
• Source routing is good for on demand routes instead of a priori distribution
• But, high packet overhead• Route discovery protocol used to obtain routes on
demand– Caching used to minimize use of discovery
• No Periodic messages• But, need to buffer packets
Why esp important?
44
![Page 45: Wireless and Mobile Networks Reading: Sections 2.8 and 4.2.5](https://reader036.fdocuments.net/reader036/viewer/2022062517/568130a7550346895d96aade/html5/thumbnails/45.jpg)
Ad Hoc On-Demand Distance Vector
• On-demand protocol• Table-driven, distance-vector routing• Similar to DSR in finding routes, but
– Uses sequence numbers on route updates– Has an idea of freshness of a route
• RouteREQuest includes normal stuff plus– src-seq, dest-seq, broadcast-seq, hop-count
45
![Page 46: Wireless and Mobile Networks Reading: Sections 2.8 and 4.2.5](https://reader036.fdocuments.net/reader036/viewer/2022062517/568130a7550346895d96aade/html5/thumbnails/46.jpg)
Route Requests
• On RREQ– REPLY
If my dest-seq >= received dest-seq ORI am destintation
– DISCARDIf src-adr & broadcast-seq were seen
– Re-broadcastotherwise
46
![Page 47: Wireless and Mobile Networks Reading: Sections 2.8 and 4.2.5](https://reader036.fdocuments.net/reader036/viewer/2022062517/568130a7550346895d96aade/html5/thumbnails/47.jpg)
Route Maintanience
• Update routing table when receive information that improves on the routing metric:– No previous route known– Smaller hop-count with same dst-seq number– Larger dst-seq number (fresher)
47
![Page 48: Wireless and Mobile Networks Reading: Sections 2.8 and 4.2.5](https://reader036.fdocuments.net/reader036/viewer/2022062517/568130a7550346895d96aade/html5/thumbnails/48.jpg)
C Broadcasts Route Request to F
A
SourceC
G H
DestinationF
E
D
BRoute Request
48
![Page 49: Wireless and Mobile Networks Reading: Sections 2.8 and 4.2.5](https://reader036.fdocuments.net/reader036/viewer/2022062517/568130a7550346895d96aade/html5/thumbnails/49.jpg)
C Broadcasts Route Request to F
A
SourceC
G H
DestinationF
E
D
BRoute Request
49
![Page 50: Wireless and Mobile Networks Reading: Sections 2.8 and 4.2.5](https://reader036.fdocuments.net/reader036/viewer/2022062517/568130a7550346895d96aade/html5/thumbnails/50.jpg)
F unicasts RREP to C
A
SourceC
G H
DestinationF
E
D
BRoute Request
50
![Page 51: Wireless and Mobile Networks Reading: Sections 2.8 and 4.2.5](https://reader036.fdocuments.net/reader036/viewer/2022062517/568130a7550346895d96aade/html5/thumbnails/51.jpg)
Route Maintanience
• Update routing table when receive information that improves on the routing metric:– No previous route known– Smaller hop-count with same dst-seq number– Larger dst-seq number (fresher)
• Eavesdrop• Periodic hellos (unlike DSR)
– Higher network overhead vs. smaller connection setup time
51
![Page 52: Wireless and Mobile Networks Reading: Sections 2.8 and 4.2.5](https://reader036.fdocuments.net/reader036/viewer/2022062517/568130a7550346895d96aade/html5/thumbnails/52.jpg)
Host Mobility
52
![Page 53: Wireless and Mobile Networks Reading: Sections 2.8 and 4.2.5](https://reader036.fdocuments.net/reader036/viewer/2022062517/568130a7550346895d96aade/html5/thumbnails/53.jpg)
Varying Degrees of User Mobility• Moves only within same access network
– Single access point: mobility is irrelevant– Multiple access points: only link-link layer changes– Either way, users is not mobile at the network layer
• Shuts down between changes access networks– Host gets new IP address at the new access network– No need to support any ongoing transfers– Applications have become good at supporting this
• Maintains connections while changing networks– Surfing the ‘net while driving in a car or flying a plane– Need to ensure traffic continues to reach the host
53
![Page 54: Wireless and Mobile Networks Reading: Sections 2.8 and 4.2.5](https://reader036.fdocuments.net/reader036/viewer/2022062517/568130a7550346895d96aade/html5/thumbnails/54.jpg)
Maintaining Ongoing Transfers
• Seamless transmission to a mobile host
54
A B
![Page 55: Wireless and Mobile Networks Reading: Sections 2.8 and 4.2.5](https://reader036.fdocuments.net/reader036/viewer/2022062517/568130a7550346895d96aade/html5/thumbnails/55.jpg)
E.g., Keep Track of Friends on the Move
• Sending a letter to a friend who moves often– How do you know where to reach him?
• Option #1: have him update you– Friend contacts you on each move– So you can mail him directly– E.g., Boeing Connexion service
• Option #2: ask his parents when needed– Parents serve as “permanent address”– So they can forward your letter to him– E.g., Mobile IP
55
![Page 56: Wireless and Mobile Networks Reading: Sections 2.8 and 4.2.5](https://reader036.fdocuments.net/reader036/viewer/2022062517/568130a7550346895d96aade/html5/thumbnails/56.jpg)
Option #1: Let Routing Protocol Handle It
• Mobile node has a single, persistent address• Address injected into routing protocol (e.g., OSPF)
56
B
12.34.45.0/24
A
12.34.45.7/32
Mobile host with IP address 12.34.45.7
![Page 57: Wireless and Mobile Networks Reading: Sections 2.8 and 4.2.5](https://reader036.fdocuments.net/reader036/viewer/2022062517/568130a7550346895d96aade/html5/thumbnails/57.jpg)
Example: Boeing Connexion Service
• Boeing Connexion service– Mobile Internet access provider– WiFi “hot spot” at 35,000 feet moving 600 mph– Went out of business in December 2006…
• Communication technology– Antenna on the plane to leased satellite transponders– Ground stations serve as Internet gateways
• Using BGP for mobility– IP address block per airplane– Ground station advertises into BGP– http://www.nanog.org/mtg-0405/abarbanel.html
57
![Page 58: Wireless and Mobile Networks Reading: Sections 2.8 and 4.2.5](https://reader036.fdocuments.net/reader036/viewer/2022062517/568130a7550346895d96aade/html5/thumbnails/58.jpg)
Example: Boeing Connexion Service
58
Internet
12.78.3.0/24
![Page 59: Wireless and Mobile Networks Reading: Sections 2.8 and 4.2.5](https://reader036.fdocuments.net/reader036/viewer/2022062517/568130a7550346895d96aade/html5/thumbnails/59.jpg)
Summary: Letting Routing Handle It
• Advantages– No changes to the end host– Traffic follows an efficient path to new location
• Disadvantages– Does not scale to large number of mobile hosts
• Large number of routing-protocol messages• Larger routing tables to store smaller address blocks
• Alternative– Mobile IP
59
![Page 60: Wireless and Mobile Networks Reading: Sections 2.8 and 4.2.5](https://reader036.fdocuments.net/reader036/viewer/2022062517/568130a7550346895d96aade/html5/thumbnails/60.jpg)
Option #2: Home Network and Home Agent
60
Home network: permanent “home” of mobile(e.g., 128.119.40/24)
Permanent address: address in home network, can always be used to reach mobilee.g., 128.119.40.186
Home agent: entity that will perform mobility functions on behalf of mobile, when mobile is remote
wide area network
correspondent
Correspondent: wants to communicate with mobile
![Page 61: Wireless and Mobile Networks Reading: Sections 2.8 and 4.2.5](https://reader036.fdocuments.net/reader036/viewer/2022062517/568130a7550346895d96aade/html5/thumbnails/61.jpg)
Visited Network and Care-of Address
61
Care-of-address: address in visited network.(e.g., 79,129.13.2)
wide area network
Visited network: network in which mobile currently resides (e.g., 79.129.13/24)
Permanent address: remains constant (e.g., 128.119.40.186)
Home agent: entity in visited network that performs mobility functions on behalf of mobile.
Correspondent: wants to communicate with mobile
![Page 62: Wireless and Mobile Networks Reading: Sections 2.8 and 4.2.5](https://reader036.fdocuments.net/reader036/viewer/2022062517/568130a7550346895d96aade/html5/thumbnails/62.jpg)
Mobility: Registration
• Foreign agent knows about mobile• Home agent knows location of mobile
62
wide area network
home network
visited network
1
mobile contacts foreign agent on entering visited network
2
foreign agent contacts home agent home: “this mobile is resident in my network”
![Page 63: Wireless and Mobile Networks Reading: Sections 2.8 and 4.2.5](https://reader036.fdocuments.net/reader036/viewer/2022062517/568130a7550346895d96aade/html5/thumbnails/63.jpg)
Mobility via Indirect Routing
63
wide area network
homenetwork
visitednetwork
3
2
41
correspondent addresses packets using home address of mobile
home agent intercepts packets, forwards to foreign agent
foreign agent receives packets, forwards to mobile
mobile replies directly to correspondent
![Page 64: Wireless and Mobile Networks Reading: Sections 2.8 and 4.2.5](https://reader036.fdocuments.net/reader036/viewer/2022062517/568130a7550346895d96aade/html5/thumbnails/64.jpg)
Indirect Routing: Efficiency Issues
• Mobile uses two addresses– Permanent address: used by correspondent (making
mobile’s location is transparent to correspondent)– Care-of-address: used by the home agent to forward
datagrams to the mobile
• Mobile may perform the foreign agent functions • Triangle routing is inefficient
– E.g., correspondent and mobile in the same network
64
![Page 65: Wireless and Mobile Networks Reading: Sections 2.8 and 4.2.5](https://reader036.fdocuments.net/reader036/viewer/2022062517/568130a7550346895d96aade/html5/thumbnails/65.jpg)
Mobility via Direct Routing
65
wide area network
homenetwork
visitednetwork
4
2
41correspondent requests, receives foreign address of mobile
correspondent forwards to foreign agent
foreign agent receives packets, forwards to mobile
mobile replies directly to correspondent
3
No longer transparent to the correspondent
![Page 66: Wireless and Mobile Networks Reading: Sections 2.8 and 4.2.5](https://reader036.fdocuments.net/reader036/viewer/2022062517/568130a7550346895d96aade/html5/thumbnails/66.jpg)
Mobility Today• Limited support for mobility
– E.g., among base stations on a campus
• Applications increasingly robust under mobility– Robust to changes in IP address, and disconnections– E.g., e-mail client contacting the e-mail server– … and allowing reading/writing while disconnected– New Google Gears for offline Web applications
• Increasing demand for seamless IP mobility– E.g., continue a VoIP call while on the train
• Increasing integration of WiFi and cellular– E.g., dual-mode cell phones that can use both networks– Called Unlicensed Mobile Access (UMA)
66
![Page 67: Wireless and Mobile Networks Reading: Sections 2.8 and 4.2.5](https://reader036.fdocuments.net/reader036/viewer/2022062517/568130a7550346895d96aade/html5/thumbnails/67.jpg)
Impact on Higher-Layer Protocols• Wireless and mobility change path properties
– Wireless: higher packet loss, not from congestion– Mobility: transient disruptions, and changes in RTT
• Logically, impact should be minimal …– Best-effort service model remains unchanged – TCP and UDP can (and do) run over wireless, mobile
• But, performance definitely is affected– TCP treats packet loss as a sign of congestion– TCP tries to estimate the RTT to drive retransmissions– TCP does not perform well under out-of-order packets
• Internet not designed with these issues in mind67
![Page 68: Wireless and Mobile Networks Reading: Sections 2.8 and 4.2.5](https://reader036.fdocuments.net/reader036/viewer/2022062517/568130a7550346895d96aade/html5/thumbnails/68.jpg)
Conclusions• Wireless
– Already a major way people connect to the Internet– Gradually becoming more than just an access network
• Mobility– Today’s users tolerate disruptions as they move– … and applications try to hide the effects– Tomorrow’s users expect seamless mobility
• Challenges the design of network protocols– Wireless breaks the abstraction of a link, and the
assumption that packet loss implies congestion– Mobility breaks association of address and location– Higher-layer protocols don’t perform as well
68