C06 Internet Protocols
C06 Internet Protocols
Schiller
Inst. of Computer Science
Freie Universität Berlin
Germany
Mobile Communications
Chapter 6: Internet Protocols
TCP-mechanisms
Classical approaches, PEPs in general
Additional optimizations
Compatibility
- support of the same layer 2 protocols as IP
- no changes to current end-systems and routers required
- mobile end-systems can communicate with fixed systems
Security
- authentication of all registration messages
HA
MN
router
end-system router
Prof. Dr.-Ing. Jochen H. Schiller www.jochenschiller.de Mobile Communications 8.5
Data transfer to the mobile system
HA
2
MN
FA foreign
network
HA
1 MN
FA foreign
network
receiver
Prof. Dr.-Ing. Jochen H. Schiller www.jochenschiller.de Mobile Communications 8.7
Overview
COA
home router
router MN
network FA
HA
foreign
Internet network
CN router
3.
home router router
2. MN
network HA FA
4.
foreign
Internet network
1.
CN router
Advertisement
- HA advertises the IP address of the MN (as for fixed systems), i.e. standard routing information
- routers adjust their entries, these are stable for a longer time (HA responsible for a MN over a longer period of
time)
- packets to the MN are sent to the HA,
- independent of changes in COA/FA
MN re FA HA MN re HA
gi s t gi s t
r equ r at ion r equ r at ion
es t e st
regi
s
r equ t r at ion
es t
t ion
s t ra
regi
y
n repl
o
g i s t rat i
re
repl
y t
o n
g i s t rat i
re
y
repl
0 7 8 15 16 23 24 31
type = 1 S B DMG r T x lifetime
home address
home agent
COA
identification
extensions . . .
S: simultaneous bindings
B: broadcast datagrams
D: decapsulation by MN
M mininal encapsulation
G: GRE encapsulation
r: =0, ignored
T: reverse tunneling requested
x: =0, ignored
GRE original
outer header original data
header header
“Solutions”
- sender learns the current location of MN
- direct tunneling to this location
- HA informs a sender about the location of MN
- big security problems!
Change of FA
- packets on-the-fly during the change can be lost
- new FA informs old FA to avoid packet loss, old FA now forwards remaining packets to new FA
- this information also enables the old FA to release resources for the MN
Data Data
MN changes
location
Update Registration
ACK
Data
Data Data
Warning
Request
Update
ACK
Data
Data
t
HA
2
MN
FA foreign
network
1. MN sends to FA
3 2. FA tunnels packets to HA
CN by encapsulation
3. HA forwards the packet to the
receiver (standard case)
receiver
Firewalls
- typically mobile IP cannot be used together with firewalls, special set-ups are needed (such as reverse
tunneling)
QoS
- many new reservations in case of resource reservation protocols
- tunneling makes it hard to give a flow of packets a special treatment needed for the QoS
Security, firewalls, QoS etc. are always topics of research and discussions…
„Soft“ hand-over
- no packet loss due to change of subnets
- MN sends the new COA to its old router
- the old router encapsulates all incoming packets for the MN and forwards them to the new COA
- authentication is always granted
Micro-mobility support:
- Efficient local handover inside a foreign domain
without involving a home agent
- Reduces control traffic on backbone
- Especially needed in case of route optimization
Important criteria:
Security Efficiency, Scalability, Transparency, Manageability
Operation:
- Network contains mobility anchor point (MAP)
- mapping of regional COA (RCOA) to link COA (LCOA)
- Upon handover, MN informs Internet
HA
MAP only
- gets new LCOA, keeps RCOA RCOA
- HA is only contacted if MAP
MAP
changes
Potential problems:
- Decentralized security-critical functionality (handover processing) in mobility anchor points
- MNs can (must!) directly influence routing entries via binding updates (authentication necessary)
- Not transparent to MNs
- Handover efficiency in wireless mobile scenarios:
- All routing reconfiguration messages sent over wireless link
A B C
Examples
- Single-hop: All partners max. one hop apart
- Bluetooth piconet, tablets in a room,
gaming devices…
Mobile
Router
Manet
Mobile
Devices
Mobile IP,
DHCP
Fixed
Network
N4 N4
N5 N5
time = t1 time = t2
good link
weak link
Link State
- periodic notification of all routers about the current state of all physical links
- router get a complete picture of the network
Example
- ARPA packet radio network (1973), DV-Routing
- every 7.5s exchange of routing tables including link quality
- updating of tables also by reception of packets
- routing problems solved with limited flooding
Reasons
- Classical approaches from fixed networks fail
- Very slow convergence, large overhead
- High dynamicity, low bandwidth, low computing power
Discover a path
- only if a path for sending packets to a certain destination is needed and no path is currently available
Maintaining a path
- only while the path is in use one has to make sure that it can be used continuously
Optimizations
- limit broadcasting if maximum diameter of the network is known
- caching of address lists (i.e. paths) with help of passing packets
- stations can use the cached information for path discovery (own paths or paths for other hosts)
C
G Q
B I
E
K M O
A
H
D L
F J N
B I
E
K M O
A
H
D L
F J N
B I
E
K M O
A
[O,C/E,4711] H
D L
F J N
C
G Q
[O,C/G/I,4711]
B I
E
K M O
A
H
[O,C/E/H,4711]
[O,C/B/A,4711] D L
F J N
[O,C/B/D,4711]
(alternatively: [O,C/E/D,4711])
C
G Q
[O,C/G/I/K,4711]
B I
E
K M O
A
H
D L
F J N
[O,C/E/H/J,4711]
[O,C/B/D/F,4711]
C
G Q
[O,C/G/I/K/M,4711]
B I
E
K M O
A
H
D L
F J N
[O,C/E/H/J/L,4711]
(alternatively: [O,C/G/I/K/L,4711])
C
G Q
B I
E
K M O
A
H
D L
F J N
[O,C/E/H/J/L/N,4711]
C
G Q
Path: M, K, I, G
B I
E
K M O
A
H
D L
F J N
N1
N2
R1
S1 N3
N4
N5 N6 R2
S2
N8 N9
N7
neighbors
(i.e. within radio range)
Differences to MANETs
- Applications: MANET more powerful, more
general WSN more specific
- Devices: MANET more powerful, higher data rates, more resources
WSN rather limited, embedded, interacting with environment
- Scale: MANET rather small (some dozen devices)
WSN can be large (thousands)
- Basic paradigms: MANET individual node important, ID centric
WSN network important, individual node may be dispensable, data centric
- Mobility patterns, Quality-of Service, Energy, Cost per node …
GW Bluetooth, TETRA, …
SN
SN
SN SN
SN SN
GW RM!
A LA
SN
SN A
SN L ARM! LA
RM
SN A
!
GW
Eth SN
AL ern SN
GW et
GPRS WLAN AR
M!
Already today, there are many more communicating systems compared to people – more than 10 billion
In the future:
- Some estimate > 25 billion end of 2020, others estimate > 50 billion – ok, there will be MANY…
- As always great expectations: 202x - 1 trillion $ revenue p.a. estimated by GSMA
Complexity
Source: RIOT OS, www.riot-os.org
- function(#nodes, topology, traffic pattern, stability, legacy, ?) 1,5 kByte RAM, 5 kByte ROM,
real-time, multi-threaded
Assumptions: IEEE 802.15.4 devices are limited in power/memory/energy, have long sleep cycles, are unreliable,
ad-hoc deployment is typical, large number of devices will be seen, …
Problem:
- MAC layer offers only max. 81 byte for data due to PHY limits plus security mechanisms
- IPv6 header requires 40 byte, UDP additional 8 byte, leaving only 33 byte for applications
23 21 40 8 33 2 byte
Result
- Severe performance degradation
Prof. Dr.-Ing. Jochen H. Schiller www.jochenschiller.de Mobile Communications 8.61
Motivation I
Transport protocols typically designed for
- Fixed end-systems
- Fixed, wired networks
Research activities
- Performance
- Congestion control
- Efficient retransmissions
Problems
- snooping TCP does not isolate the wireless link as good as other approaches (e.g. Indirect-TCP)
- snooping might be useless depending on encryption schemes
Advantage
- simple changes result in significant higher performance
Disadvantage
- further mix of IP and TCP, no transparent approach
TCP freezing
- MAC layer is often able to detect interruption in advance
- MAC can inform TCP layer of upcoming loss of connection
- TCP stops sending, but does now not assume a congested link
- MAC layer signals again if reconnected
Advantage
- scheme is independent of data
Disadvantage
- TCP on mobile host has to be changed, mechanism depends on MAC layer
Advantage
- much higher efficiency
“Disadvantage”
- more complex software in a receiver, more buffer needed at the receiver
- Might be a problem in really tiny devices…