Mobile Ip and TCP
Mobile Ip and TCP
Overview
Network Protocols / Mobile IP
Motivation Data transfer Encapsulation Problems DHCP
MOBILE COMPUTING
R. Wattenhofer
8/2
Transparency
mobile end-systems keep their IP address continuation of communication after interruption of link possible point of connection to the fixed network can be changed
Security
authentication of all registration messages
Distributed Computing Group MOBILE COMPUTING R. Wattenhofer 8/4
Example network
HA MN
router home network (physical home network for the MN) router (current physical network for the MN) Internet mobile end-system
FA foreign
network
CN
end-system
Distributed Computing Group
router
MOBILE COMPUTING R. Wattenhofer 8/5
MN
3
FA
CN
sender
1. Sender sends to the IP address of MN, HA intercepts packet (proxy ARP) 2. HA tunnels packet to COA, here FA, by encapsulation 3. FA forwards the packet to the MN
MOBILE COMPUTING R. Wattenhofer 8/6
MN
sender
FA
foreign network
CN
receiver
Distributed Computing Group
1. Sender sends to the IP address of the receiver as usual, FA works as default router
MOBILE COMPUTING
R. Wattenhofer
8/7
Terminology
Mobile Node (MN)
system (node) that can change the point of connection to the network without changing its IP address
Overview
COA home network router HA Internet router FA MN foreign network
CN
router
home network
router HA
2.
router FA
3. MN 4. foreign network
Internet
1. CN router
MOBILE COMPUTING
R. Wattenhofer
8/9
Network integration
Agent Advertisement
HA and FA periodically send advertisement messages into their physical subnets MN listens to these messages and detects, if it is in the home or a foreign network (standard case for home network) MN reads a COA from the FA advertisement messages
Advertisement
HA advertises the IP address of the MN (as for fixed systems), i.e. standard routing information routers adjust their entries, these are stable for a longer time (HA responsible for a MN over a longer period of time) packets to the MN are sent to the HA, independent of changes in COA/FA
Distributed Computing Group MOBILE COMPUTING R. Wattenhofer 8/10
Agent advertisement
7 8
15 16
type #addresses
code addr. size router address 1 preference level 1 router address 2 preference level 2 ...
23 24 checksum lifetime
31
MOBILE COMPUTING
R. Wattenhofer
8/11
Registration
COA @ FA:
MN re FA gist requ ration es
t regi s requ tration est tion stra regi y repl
HA
COA @ MN:
MN re HA gist requ ration es
t tion stra regi y repl
MOBILE COMPUTING
R. Wattenhofer
8/12
0 type
7 8
23 24 lifetime
31
MOBILE COMPUTING
R. Wattenhofer
8/13
original IP header
original data
MOBILE COMPUTING
R. Wattenhofer
8/14
IP-in-IP Encapsulation
Mandatory in RFC 2003 tunnel between HA and COA
ver.
IHL TOS length IP identification flags fragment offset TTL IP-in-IP IP checksum IP address of HA Care-of address COA ver. IHL TOS length IP identification flags fragment offset TTL lay. 4 prot. IP checksum IP address of CN IP address of MN TCP/UDP/ ... payload
MOBILE COMPUTING
R. Wattenhofer
8/15
Minimal Encapsulation
optional avoids repetition of identical fields such as TTL, IHL, version, TOS only applicable for unfragmented packets, no space left for fragment identification
IHL TOS length IP identification flags fragment offset TTL min. encap. IP checksum IP address of HA care-of address COA lay. 4 protoc. S reserved IP checksum IP address of MN IP address of CN (only if S=1) TCP/UDP/ ... payload ver.
MOBILE COMPUTING
R. Wattenhofer
8/16
original data
new header IHL TOS length IP identification flags fragment offset TTL GRE IP checksum IP address of HA Care-of address COA CR K S s rec. rsv. ver. protocol checksum (optional) offset (optional) key (optional) sequence number (optional) routing (optional) ver. IHL TOS length IP identification flags fragment offset TTL lay. 4 prot. IP checksum IP address of CN IP address of MN TCP/UDP/ ... payload ver.
MOBILE COMPUTING
R. Wattenhofer
8/17
Solutions
sender learns the current location of MN direct tunneling to this location HA informs a sender about the location of MN big security problems
Change of FA
packets on-the-fly during the change can be lost new FA informs old FA to avoid packet loss, old FA now forwards remaining packets to new FA this information also enables the old FA to release resources for the MN
MOBILE COMPUTING
R. Wattenhofer
8/18
registration
data
data
MOBILE COMPUTING
R. Wattenhofer
8/19
MN
sender
FA
foreign network
CN
receiver
Distributed Computing Group
MN
sender
FA foreign
network
CN
receiver
1. MN sends to FA 2. FA tunnels packets to HA by encapsulation 3. HA forwards the packet to the receiver (standard case)
MOBILE COMPUTING
R. Wattenhofer
8/21
MOBILE COMPUTING
R. Wattenhofer
8/22
MOBILE COMPUTING
R. Wattenhofer
8/23
Client/Server-Model
the client sends via a MAC broadcast a request to the DHCP server (might be via a DHCP relay)
DHCPDISCOVER DHCPDISCOVER server client relay client
MOBILE COMPUTING
R. Wattenhofer
8/24
selection of configuration DHCPREQUEST (reject) DHCPREQUEST (options) DHCPACK initialization completed release DHCPRELEASE confirmation of configuration
delete context
MOBILE COMPUTING
R. Wattenhofer
8/25
DHCP characteristics
Server
several servers can be configured for DHCP, coordination not yet standardized (i.e., manual configuration)
Renewal of configurations
IP addresses have to be requested periodically, simplified protocol
Options
available for routers, subnet mask, NTP (network time protocol) timeserver, SLP (service location protocol) directory, DNS (domain name system)
Security problems
no authentication of DHCP information specified
MOBILE COMPUTING
R. Wattenhofer
8/26
TCP Overview
Transport control protocols typically designed for
Fixed end-systems in wired networks
Research activities
Performance Congestion control Efficient retransmissions
MOBILE COMPUTING
R. Wattenhofer
8/27
TCP slow-start
sender calculates a congestion window for a receiver start with a congestion window size equal to one segment exponential increase* of the congestion window up to the congestion threshold, then linear increase missing acknowledgement causes the reduction of the congestion threshold to one half of the current congestion window congestion window starts again with one segment
*slow-start vs. exponential increase: window is increased by one for each acknowledgement, that is, 1 2 4 8 In other words, the slow-start mechanism is rather a quick-start.
MOBILE COMPUTING
R. Wattenhofer
8/28
MOBILE COMPUTING
R. Wattenhofer
8/29
MOBILE COMPUTING
R. Wattenhofer
8/30
If there is a loss
We go back to S = 1
MOBILE COMPUTING
R. Wattenhofer
8/31
In the equilibrium, we are in the states 1, 2, 3, , S-1, S, and then back to 1 because we have a missing ACK, that is, we have 1+2++S S2/2 successful transmissions.
MOBILE COMPUTING
R. Wattenhofer
8/32
Plot of T(p), with B = 50 Note that 1% faulty transmissions is enough to degrade the throughput to about 14% of the bandwidth. 10% error rate gives about 4% of possible bandwidth. The higher the bandwidth, the worse the relative loss.
MOBILE COMPUTING
R. Wattenhofer
8/33
MOBILE COMPUTING
R. Wattenhofer
8/34
wireless TCP
standard TCP
MOBILE COMPUTING
R. Wattenhofer
8/35
access point1
Internet
MOBILE COMPUTING
R. Wattenhofer
8/36
Snooping TCP
Transparent extension of TCP within the foreign agent
buffering of packets sent to the mobile host lost packets on the wireless link (both directions!) will be retransmitted immediately by the mobile host or foreign agent, respectively (so called local retransmission) the foreign agent therefore snoops the packet flow and recognizes acknowledgements in both directions, it also filters ACKs changes of TCP only within the foreign agent
local retransmission
mobile host
snooping of ACKs
buffering of data
correspondent host
MOBILE COMPUTING
R. Wattenhofer
8/38
Snooping TCP
Data transfer to the mobile host
FA buffers data until it receives ACK of the MH, FA detects packet loss via duplicated ACKs or time-out fast retransmission possible, transparent for the fixed network
Problems
snooping TCP does not isolate the wireless link as good as I-TCP snooping might be useless depending on encryption schemes
MOBILE COMPUTING
R. Wattenhofer
8/39
Mobile TCP
Special handling of lengthy and/or frequent disconnections M-TCP splits as I-TCP does
unmodified TCP fixed network to supervisory host (SH) optimized TCP SH to MH
Supervisory host
no caching, no retransmission monitors all packets, if disconnection detected
set sender window size to 0 sender automatically goes into persistent mode
+ maintains end-to-end semantics, supports disconnection, no buffer forwarding does not solve problem of bad wireless link, only disconnections adapted TCP on wireless link; new software needed
Distributed Computing Group MOBILE COMPUTING R. Wattenhofer 8/40
MOBILE COMPUTING
R. Wattenhofer
8/41
Transmission/time-out freezing
Mobile hosts can be disconnected for a longer time
no packet exchange possible, e.g., in a tunnel, disconnection due to overloaded cells or multiplex with higher priority traffic TCP disconnects after time-out completely
TCP freezing
MAC layer is often able to detect interruption in advance MAC can inform TCP layer of upcoming loss of connection TCP stops sending, but does now not assume a congested link MAC layer signals again if reconnected
+ scheme is independent of data TCP on mobile host has to be changed, mechanism depends on MAC layer
Distributed Computing Group MOBILE COMPUTING R. Wattenhofer 8/42
Selective retransmission
TCP acknowledgements are often cumulative
ACK n acknowledges correct and in-sequence receipt of packets up to n if single packets are missing quite often a whole packet sequence beginning at the gap has to be retransmitted (go-back-n), thus wasting bandwidth, especially if the bandwidth-delay product is high.
+ much higher efficiency more complex software in a receiver, more buffer needed at the receiver
MOBILE COMPUTING
R. Wattenhofer
8/43
MOBILE COMPUTING
R. Wattenhofer
8/44
Mechanism
splits TCP connection into two connections
Advantages
isolation of wireless link, simple
Disadvantages
loss of TCP semantics, higher latency at handover Snooping TCP snoops data and transparent for end-to- problematic with acknowledgements, local end connection, MAC encryption, bad isolation retransmission integration possible of wireless link M-TCP splits TCP connection, Maintains end-to-end Bad isolation of wireless chokes sender via semantics, handles link, processing window size long term and frequent overhead due to disconnections bandwidth management Fast retransmit/ avoids slow-start after simple and efficient mixed layers, not fast recovery roaming transparent Transmission/ freezes TCP state at independent of content changes in TCP time-out freezing disconnect, resumes or encryption, works for required, MAC after reconnection longer interrupts dependant Selective retransmit only lost data very efficient slightly more complex retransmission receiver software, more buffer needed Transaction combine connection Efficient for certain changes in TCP oriented TCP setup/release and data applications required, not transparent transmission
[Schiller]
Distributed Computing Group MOBILE COMPUTING R. Wattenhofer 8/45