A Robust Method for Soft IP Handover

Size: px
Start display at page:

Download "A Robust Method for Soft IP Handover"

Transcription

1 A Robust Method for Soft IP Handover The mobile multimedia streaming protocol supports bicasting and forward error correction for end-to-end connections, increasing the quality of wireless multimedia applications. Hosei Matsuoka, Takeshi Yoshimura, and Tomoyuki Ohya NTT DoCoMo Multimedia streaming over wireless networks often called mobile multimedia streaming lets users access music, movie, and news services at any time, regardless of location. Given that multimedia streaming is a key goal of third-generation and future wireless networks, vendors will soon deploy streaming clients in advanced mobile terminals. Current mobile terminals, however, fail to adequately support mobile multimedia communication because wireless networks have high packet-loss rates. Packets passing over wireless links are more susceptible to loss than those passing over wired links for two main reasons: Mobile terminals frequently move between radio access points, requiring a handover between points. If the new access point is associated with a new subnet, changes in the IP address of a mobile terminal might occur and packets destined for that terminal would be undeliverable. Mobile IP tackles this problem by offering IP handover in the network layer level. 1 However, until the sender is notified of the new address, packets can still be dropped during handover. While retransmission can recover missing packets, this is inadequate for some real-time applications because delays can hinder the VCR-like functionalities, such as fast forward and rewind, in interactive streaming applications. The delays are much more grave for bidirectional real-time communications. Most wireless links suffer severe fading, noise, and other interference factors, and so have relatively high biterror rates. Our work addresses both of these problems. To eliminate packet loss during handover, we use a packet path diversity scheme 2 and an end-to-end bicasting mechanism that enables soft IP handover. To offset wireless errors, we use a forward 18 MARCH APRIL 2003 Published by the IEEE Computer Society /03/$ IEEE IEEE INTERNET COMPUTING

2 Soft IP Handover error correction (FEC) scheme 3 and embed it in the bicasting mechanism. Our bicasting method encodes the data stream and then splits it, providing more effective diversity than general bicasting, which sends the same data down both paths. 4 To support our method, we propose the mobile multimedia streaming protocol (MMSP), a new transport-layer protocol that supports multihoming and bicasting in combination with FEC. Our main design goal was to ensure that the existing IP network not be changed, as changes can hinder wide and rapid deployment. Although IPv6 s value and technical potential is clear, its deployment is rather slow. Therefore, we decided not to require alterations to either the existing IPv4 network or the forthcoming IPv6 network. Adding this new protocol to the current transport layer will let future networks support a much wider variety of applications. Problem Overview To realize terminal mobility among IP subnets, the Internet Engineering Task Force proposed Mobile IP, and Mobile IPv6 is now on its way to becoming a standard ( mobileip-charter.html). Mobile IP lets a host transparently change its IP network attachment point. In both IPv4 and IPv6 networks, however, handover causes packet loss of some duration. Until the mobile node notifies the home agent of the change in the mobile node s address (the care-of address), mobile node traffic is sent to the old address and is thus dropped. If the mobile node is some distance from the home agent, it might take upwards of 100 milliseconds to send the binding updates. This routing update latency can drop many packets bound for the mobile node. Mobile IPv6 route optimization allows direct communication between the correspondent node and the mobile node, but the packet-loss duration during handover would increase with the distance between the two nodes. Hierarchical mobile IPv6 5 partially solves this problem, using mobility anchor points in foreign networks to manage routing changes within their domain. Correspondent nodes contain the mobile agent s regional or hierarchical address rather than the mobile node s address. This solution reduces the duration of packet loss. Fast handover 6 also minimizes packet-loss duration. The mobile node obtains a new address for the new access router while still connected to the old access router. The mobile node then sends the binding update to the old access router, which redirects packets to the new Cost of network change FMIPv6 (Fast handover) HMIPv6 (Hierarchical mobile IP) Packet loss duration during handover care-of address. When the mobile node reaches the new link and establishes Layer 2 connectivity, it can restart the packet-receiving process. No extra delay is necessary for establishing Layer 3 connectivity because the old access router is already sending packets to the new address. This mechanism can reduce packet loss duration to the time required by the Layer 2 handover if the mobile node s redirection and actual movement are synchronized. Fast handover with simultaneous bindings and bicasting 4 works well and does not need synchronization. However, these solutions require considerable changes to existing IP networks. End-to-end approaches are another proposed solution. 7 Such methods require no change to the IP substrate, but instead modify the transport layer and end-host applications. The Domain Name Service already provides a host-location service; mobile nodes typically use DNS support of secure dynamic updates 8 to update their location as they change their networks and attachment points. The IP address serves as a routing locator, reflecting the addressee s attachment point in the network topology. In such an architecture, there is no need for an additional third-party agent. However, the packet-loss duration during handover becomes considerable when the mobile node is some distance from the correspondent node. As Figure 1 shows, current solutions to the packet-loss problem create a trade-off between the costs of network change and packet-loss duration during handover. Mobile IP with Fast Handover eliminates handover loss, but requires additional functions in all network access routers, increasing network End-to-end approaches Figure 1. Trade-offs in current solutions to packet loss problems. As the duration of packet loss diminishes, the cost of network changes IEEE INTERNET COMPUTING MARCH APRIL

3 deployment costs. End-to-end approaches require no changes to the existing network, but they suffer considerable packet loss during handover. A New Mobility Architecture The mobility architecture we developed at DoCo- Mo is basically an end-to-end approach that provides multihoming and bicasting mechanisms combined with FEC. Our approach eliminates both packet loss during handover and network changes; the trade-off is that the connection s bandwidth doubles during handover. Multihoming Using multihoming, a single end point can use more than one IP network interface within a connection. Each interface can obtain its own IP address using any address-allocation mechanism, such as the dynamic host configuration protocol (DHCP) or the router advertisement on IPv6. A single connection can involve the IP addresses of multiple interfaces. Multihoming s advantages are load sharing, connection redundancy, and performance improvement. In our system, multihoming s main target is the soft handover between two different IP addresses at the same end point. Multihoming also forces the host to choose the source and destination addresses. TCP makes this choice when the connection is instantiated, while the stream control transmission protocol (SCTP) 9 makes similar choices throughout the connection s lifetime, and the user datagram protocol (UDP) makes the choice either for each packet or at the beginning of an association. In our method, the host assigns a priority to each source and destination address, which lets it choose the addresses with the highest priority. The host can dynamically change address priority based on Layer 2 information, such as the received signal intensity and the available bandwidth. When the host has addresses associated with wideband code division multiple access (W CDMA) and wireless LAN links, for example, the address associated with the wireless LAN link would have higher priority because its wireless bandwidth is wider. When the host has two addresses associated with different wireless LAN links, it would prioritize the address associated with the link offering higher signal strength. Bicasting When the mobile node moves to another network attachment point during a connection, the correspondent node is directly informed of the mobile node s new IP address. We assume that the mobile node passes through a region where two different cells overlap and it can access two different access points simultaneously. When the mobile node enters the overlap region and gets a new IP address, it sends a packet requesting that the correspondent node add the mobile node s new IP address to its destination address list. When the mobile node leaves the overlap region and the old IP address becomes inactive, the mobile node sends a packet requesting that the correspondent node delete the mobile node s stale IP address from the destination address list. Because the communication involves more than one access point, bicasting can offer soft IP handover. When the mobile node is in a cell-overlap region, it might have two different IP addresses; if both links have a weak signal strength, then both addresses have the same low priority. In this situation, the correspondent node copies the packets and sends copies to each destination address. On receipt, the mobile node discards the duplicated packets. If the signal strength of one link exceeds a certain threshold, then its associated address has high priority. In such cases, the mobile node informs the correspondent node of a change in the link s address priority and stops copying and sending packets to the other destination address. The mobile node can move from one cell to another without interrupting packet reception. This bicasting method can manage both soft horizontal handover and soft vertical handover because it is based on the prioritized IP addresses and is independent of network type. Also, even if the mobile node moves into the blackout area, it can start receiving packets again when it reenters the service area. The method s differences in delay and bandwidth, however, demand that the application intelligently adapt. Bicasting and FEC Sending exactly the same packet stream through different paths is inefficient in terms of error resiliency because the duplicate packets received are unnecessary. Our architecture supports a simple way to improve robustness against wireless errors. When the mobile node is in an overlap region, the radio waves from both radio access points are usually weak, and bit-error rates are likely to be high. If the same packet is lost on both wireless links due to bit errors, the packet cannot be received. To improve error resiliency, our architecture uses a Reed-Solomon FEC algorithm to code the original packet stream, and then splits the encoded stream. Although Reed-Solomon codes can overcome both erasures and bit-level corruption, MARCH APRIL IEEE INTERNET COMPUTING

4 Soft IP Handover Application layer Application data Fragmentation Transport layer D1 D2 D3 Create redundant symbols D1 D2 D3 F1 F2 F3 Attach transport layer headers D1 D2 D3 F1 F2 F3 Network layer D1 D3 F2 D2 F1 F3 Attach IP headers for destination 1 Attach IP headers for destination 2 D1 D3 F2 D2 F1 F3 Figure 2. Fragmentation and forward error correction. The transport layer creates an equal number of redundant symbols as data symbols, then splits the symbols into two groups and sends one to each destination address. an IP network requires only erasure codes because the network layer detects and discards corrupted packets. Packet-level Reed-Solomon code 11 requires byte-organized data. By extending each message from k symbols to n symbols through the addition of (n k) redundant symbols, we can detect and recover up to (n k) corrupted symbols within the extended message. Figure 2 shows the fragmentation and FEC encoding process. The transport layer fragments an application message into segments, padding the last segment to align the segment size. It then creates the same number of redundant symbols as data symbols, that is, n = 2k. Next, the transport layer and network layer add each layer header to each data symbol and redundant symbol. Then, the network layer transmits half of them to each destination address. In this case, it can recover any missing packets up to a total of k on both network paths. The data loss probability is therefore much lower than it would be if the data were simply copied. Implementation To support our mobility architecture, we implemented an MMSP stack in the FreeBSD 4.5 kernel. Like UDP, MMSP is a datagram-oriented protocol. Protocol Header Format Figure 3 shows the MMSP header fields. Without options, MMSP s typical header size is 12 bytes. General header Source port number MMSP length Packet type Block sequence Move option Address operation Packet sequence Address family Network address 32 bit Destination port number MMSP checksum Address priority Block length Reserved Figure 3. Mobile multimedia streaming protocol (MMSP) header format. Each line is transmitted in order and equals 4 bytes in the 32-bit value. The Move option is attached in move packets following the MMSP s general header. The port numbers identify the sending and receiving processes. The header also includes: The MMSP length field (16 bits), which is the length, in bytes, of the MMSP header and the data. The MMSP checksum field (16 bits), which covers the MMSP header and the data (as in UDP). The packet type field (3 bits), which specifies the MMSP message as a data packet, FEC packet, move packet, or acknowledgment (ACK) packet. IEEE INTERNET COMPUTING MARCH APRIL

5 The block sequence field (5 bits), which identifies the application message to be reconstructed from the packet and is incremented by one for each application message. The packet-sequence field (8 bits), which identifies either the data packets position within the data block or the redundant packet s calculated multiplier in the infinite field GF(2 8 ), which MMSP uses to calculate Reed-Solomon code. The block-length field (16 bits), which identifies the application message s length. The address-operation field (8 bits), which identifies the request types (add address, delete address, or change priority). The address family field (8 bits), which specifies the address family of the contained address. The address priority field (8 bits), which specifies the priority of the contained address. ACK packets are sent in response to move packets; move packets are retransmitted upon timeout unless the ACK packets return. User Data Fragmentation MMSP uses the path maximum transmission unit (MTU) metric to determine the packet size needed for FEC partitioning. When a packet is larger than the outgoing link s MTU, a router sends an Internet control message protocol (ICMP) message stating that it cannot forward the packet. This message contains the MTU of the next-hop link. The information is then passed to the MMSP stack, which thereby determines the MTU metric. MMSP lets applications specify the FEC partitioning size using an additional application programming interface. Large packets are vulnerable to bit error in wireless links, thus causing relatively high packet losses. While small packets increase the protocol header overhead, they might provide better multimedia streaming quality. Routing Table Searches One of bicasting s big problems is routing table searches. When it sends packets to the correspondent node, the mobile node searches its routing table using the destination address as a search key to select the interface to send the packet out on. Therefore, even if the mobile node has two interfaces for bicasting, it sends all packets through the same interface. To distribute them to each interface, the protocol control blocks (PCBs) maintain, in pairs, the source IP address and the next-hop router s IP address, which they extract from the DHCPOFFER message or, in IPv6, from the router advertisement message. When the mobile node sends packets, it looks up the next-hop router s IP address from the outgoing packets source IP address, and uses the next-hop router s IP address to conduct a routing table search and address resolution protocol (ARP) request or, in IPv6, neighbor discovery. MMSP can decide which interface to send a packet to by filling in the packet header s source IP address field with the selected interface s IP address. Layer 2 Triggers To receive Layer 2 information, we slightly modified the b device driver and the end hosts IP stack. When a new access point becomes available and the b device generates a hardware interrupt, the host sends either a DHCPDISCOVER packet or a router solicitation packet. If either packet contains a new IP address, it is passed to the MMSP stack. The MMSP stack has its own PCBs, which can maintain multiple source and destination IP addresses. The MMSP adds the new IP address to the PCBs. When an access point becomes inaccessible and the device generates a hardware interrupt, the network layer removes the stale IP address and passes it to the MMSP stack. The MMSP removes the stale IP address from the PCBs. When the received signal strength exceeds or falls under some threshold, the driver then informs the upper layers that the priority of the link s associated address has changed. MMSP changes the priority of the address maintained in the PCBs. Performance Measurement We measured our implemented kernel s FEC encoding and decoding time, and evaluated the FEC s impact on the quality of MPEG-4 streaming applications. FEC Encoding and Decoding One of FEC s problems is the amount of calculation required to encode and decode the redundant symbols. We conducted a detailed performance analysis of FEC overhead, taking measurements while the system encoded the correspondent node and decoded the mobile node. Both nodes were IBM PC clones with single Intel Pentium III processors running at 1.2 GHz; the FreeBSD 4.5 system contained our implemented kernel. In the experiment, application message size ranged from 1,000 to 8,000 bytes, and fragmentation size was fixed at 500 bytes. The correspondent node created and sent redundant packets; the system discarded all the data packets at the intermediate router so we could measure the redundant 22 MARCH APRIL IEEE INTERNET COMPUTING

6 Soft IP Handover packet scheme s recovery time. With an application message size of 8,000 bytes, for example, the correspondent node split the application message into 16 data packets and encoded 16 redundant packets. Because the 16 data packets were discarded at the intermediate router, the mobile node received only the 16 redundant packets; it decoded these to recover the 16 data packets. Figure 4 shows the correlation between the application message size and encoding/decoding time. Both times were proportional to the square of the application message size. When the application message size was 8,000 bytes, FEC encoding and decoding took a total of 44.8 milliseconds. This shows that current CPUs can perform FEC encoding and decoding in a reasonable time. Error Resiliency To evaluate the effectiveness of combining bicasting with FEC, we used an MPEG-4 video stream to compare error resiliency in copy bicasting versus FEC bicasting. The video contained a 60-second sequence of CIF size ( ) frames encoded at 384 Kbps, with a frame rate of 15 frames per second and a 5-second I-picture interval (that is, we inserted I-pictures, which are coded with no reference to any other frame, at 5-second intervals during the video sequence). All other frames were P- pictures, which are predicted from the frames that immediately precede them. Each video packet occupied approximately 5,000 bytes, creating a 5,000- byte application message. The fragmentation size was fixed at 500 bytes. For copy bicasting, the MPEG-4 stream sender sent the receiver the exact same packets through two different network paths. For FEC bicasting, the sender sent data packets through one network path and redundant packets through the other. On both paths, we simulated the same wireless bit-error rates, which ranged from 10E-6 to 10E-4 (from to percent). Figure 5 shows the average peak signal noise ratio (PSNR) of all video frames for both bicasting schemes. Missing video packets cause block noise, which can propagate to the next video frame and degrade the video quality. With copy bicasting, the PSNR falls dramatically when the bit-error rates exceed 10E-5. In contrast, FEC bicasting keeps the quality high. Time (ms) Figure 4. FEC encoding and decoding. The time required for encoding and decoding correlates with the square of the message size. 1.0E-06 Encode Copy bicasting 1.0E-05 Bit error rate Decode Application message size (Kbytes) FEC bicasting Figure 5. Error resiliency for copy bicasting and FEC bicasting. Copy bicasting s peak signal noise ratio falls dramatically when the biterror rates exceed 10E-5, while FEC bicasting keeps the quality high. Conclusions The main disadvantage of our architecture is that it doubles connection bandwidth during handover. However, our proposed bicasting mechanism can offset much higher bit-error rates than copy bicasting, thus providing high-quality multimedia applications even under high bit-error rates. This suggests that MMSP will help reduce the energy-perbit requirements of wireless access links. The end-to-end model for path diversity might also assist multiple-description video coding. 12 Although our architecture s FEC encoding causes a slight delay, such a delay is allowable, and using FEC significantly improves multimedia streaming quality. We are currently exploring an end-to-end security mechanism for MMSP that will prevent connection hijacking. We are also planning to conduct wide-area experiments using DoCoMo s public wireless LAN access service. References 1. C. Perkins, IP Mobility Support for IPv4, Internet Eng. Task Force RFC 3220, Jan. 2002; rfc3220.txt E-04 IEEE INTERNET COMPUTING MARCH APRIL

7 2. Y.J. Liang, E.G. Steinbach, and B. Girod, MultiStream Voice over IP Using Packet Path Diversity, Proc. IEEE 4th Workshop Multimedia Signal Processing, IEEE CS Press, Oct. 2001, pp ; mmsp.pdf. 3. J-C. Bolot, S. Fosse-Parisis, and D. Towsle, Adaptive FEC- Based Error Control for Internet Telephony, Proc. Infocom 99, IEEE CS Press, Mar. 1999, pp K. El-Malki and H. Soliman, Simultaneous Bindings for Mobile IPv6 Fast Handoffs, Internet draft, IETF, June 2002; work in progress. 5. H. Soliman et al., Hierarchical MIPv6 Mobility Management (HMIPv6), Internet draft, IETF, July, 2001; work in progress. 6. R. Koodli, Fast Handovers for Mobile IPv6, Internet draft, IETF, Mar. 2002; work in progress. 7. A.C. Snoeren and H. Balakrishnan, An End-to-End Approach to Host Mobility, Proc. 6th ACM/IEEE Int l Conf. Mobile Computing and Networking (Mobicom 00), ACM Press, 2000, pp D. Eastlake, Secure Domain Name System Dynamic Update, IETF RFC 2137, Apr. 1977; rfc2137.txt. 9. R. Stewart et al., Stream Control Transmission Protocol, IETF RFC 2960, Oct. 2000; I.S. Reed and G. Solomon, Polynomial Codes over Certain Finite Fields, SIAM J. Applied Math., vol. 8, no. 2, June 1960, pp J. Plank, A Tutorial on Reed-Solomon Coding for Fault- Tolerance in RAID-like Systems, Software Practice and Experience, vol. 27, no. 9, May 1990, pp J.G. Apostolopoulos, Reliable Video Communication over Lossy Packet Networks Using Multiple State Encoding and Path Diversity, Proc. Visual Comm. and Image Processing (VCIP), ACM Press, 2001, pp Hosei Matsuoka is a research engineer at NTT DoCoMo s Multimedia Laboratories. His research interests are in multimedia streaming technology and QoS architectures for future mobile communications networks. Matsuoka has a BS and an MS in information science from the Tokyo Institute of Technology. Contact him at matsuoka@spg. yrp.nttdocomo.co.jp. Takeshi Yoshimura is a research engineer at NTT DoCoMo s Multimedia Laboratories. His research interests include mobile streaming media technology and content delivery network architecture. Yoshimura has a BE and an ME from the Department of Information and Communication Engineering at the University of Tokyo. Contact him at yoshi@spg.yrp.nttdocomo.co.jp. Tomoyuki Ohya is a research engineer at NTT DoCoMo s Multimedia Laboratories, where he is involved in research and development of digital speech coding technologies for IMT His research interests are in multimedia signal processing and QoS architectures for future mobile communications networks. Ohya has a BE and an ME in electronic engineering from Kyoto University, and an MS in management of technology from the Massachusetts Institute of Technology. Contact him at ohya@spg. yrp.nttdocomo.co.jp. Get access to individual IEEE Computer Society documents online. More than 67,000 articles and conference papers available! US$9 per article for members US$19 for nonmembers 24 MARCH APRIL IEEE INTERNET COMPUTING

Multi-path Forward Error Correction Control Scheme with Path Interleaving

Multi-path Forward Error Correction Control Scheme with Path Interleaving Multi-path Forward Error Correction Control Scheme with Path Interleaving Ming-Fong Tsai, Chun-Yi Kuo, Chun-Nan Kuo and Ce-Kuen Shieh Department of Electrical Engineering, National Cheng Kung University,

More information

Mobile SCTP for IP Mobility Support in All-IP Networks

Mobile SCTP for IP Mobility Support in All-IP Networks Mobile SCTP for IP Mobility Support in All-IP Networks Seok Joo Koh sjkoh@cs.knu.ac.kr Abstract The Stream Control Transmission Protocol (SCTP) is a new transport protocol that is featured multi-streaming

More information

Handover Management for Mobile Nodes in IPv6 Networks

Handover Management for Mobile Nodes in IPv6 Networks TECHNOLOGY ADVANCES FOR 3G AND BEYOND Handover Management for Mobile Nodes in IPv6 Networks Nicolas Montavont and Thomas Noël LSIIT Louis Pasteur University CNRS, Strasbourg ABSTRACT In this article we

More information

An Approach to Efficient and Reliable design in Hierarchical Mobile IPv6

An Approach to Efficient and Reliable design in Hierarchical Mobile IPv6 An Approach to Efficient and Reliable design in Hierarchical Mobile IPv6 Taewan You 1, Seungyun Lee 1, Sangheon Pack 2, and Yanghee Choi 2 1 Protocol Engineering Center, ETRI, 161 Gajoung-dong, Yusong-gu,

More information

Charles Perkins Nokia Research Center 2 July Mobility Support in IPv6 <draft-ietf-mobileip-ipv6-14.txt> Status of This Memo

Charles Perkins Nokia Research Center 2 July Mobility Support in IPv6 <draft-ietf-mobileip-ipv6-14.txt> Status of This Memo IETF Mobile IP Working Group INTERNET-DRAFT David B. Johnson Rice University Charles Perkins Nokia Research Center 2 July 2000 Mobility Support in IPv6 Status of This

More information

Module 6 STILL IMAGE COMPRESSION STANDARDS

Module 6 STILL IMAGE COMPRESSION STANDARDS Module 6 STILL IMAGE COMPRESSION STANDARDS Lesson 19 JPEG-2000 Error Resiliency Instructional Objectives At the end of this lesson, the students should be able to: 1. Name two different types of lossy

More information

IPv6 Protocols and Networks Hadassah College Spring 2018 Wireless Dr. Martin Land

IPv6 Protocols and Networks Hadassah College Spring 2018 Wireless Dr. Martin Land IPv6 1 IPv4 & IPv6 Header Comparison IPv4 Header IPv6 Header Ver IHL Type of Service Total Length Ver Traffic Class Flow Label Identification Flags Fragment Offset Payload Length Next Header Hop Limit

More information

Architecture and Performance of SIGMA: A Seamless Mobility Architecture for Data Networks

Architecture and Performance of SIGMA: A Seamless Mobility Architecture for Data Networks Architecture and Performance of : A Seamless Mobility Architecture for Data Networks Shaojian Fu, Liran Ma, Mohammed Atiquzzaman, Yong-Jin Lee Telecommunications and Networks Research Lab School of Computer

More information

Chapter 09 Network Protocols

Chapter 09 Network Protocols Chapter 09 Network Protocols Copyright 2011, Dr. Dharma P. Agrawal and Dr. Qing-An Zeng. All rights reserved. 1 Outline Protocol: Set of defined rules to allow communication between entities Open Systems

More information

Does current Internet Transport work over Wireless? Reviewing the status of IETF work in this area

Does current Internet Transport work over Wireless? Reviewing the status of IETF work in this area Does current Internet Transport work over Wireless? Reviewing the status of IETF work in this area Sally Floyd March 2, 2000 IAB Workshop on Wireless Internetworking 1 Observations: Transport protocols

More information

User Datagram Protocol

User Datagram Protocol Topics Transport Layer TCP s three-way handshake TCP s connection termination sequence TCP s TIME_WAIT state TCP and UDP buffering by the socket layer 2 Introduction UDP is a simple, unreliable datagram

More information

CMPE 257: Wireless and Mobile Networking

CMPE 257: Wireless and Mobile Networking CMPE 257: Wireless and Mobile Networking Katia Obraczka Computer Engineering UCSC Baskin Engineering Lecture 10 CMPE 257 Spring'15 1 Student Presentations Schedule May 21: Sam and Anuj May 26: Larissa

More information

SJTU 2018 Fall Computer Networking. Wireless Communication

SJTU 2018 Fall Computer Networking. Wireless Communication SJTU 2018 Fall Computer Networking 1 Wireless Communication Internet Protocol Stack 2 Application: supporting network applications - FTP, SMTP, HTTP Transport: data transfer between processes - TCP, UDP

More information

IPv6. IPv4 & IPv6 Header Comparison. Types of IPv6 Addresses. IPv6 Address Scope. IPv6 Header. IPv4 Header. Link-Local

IPv6. IPv4 & IPv6 Header Comparison. Types of IPv6 Addresses. IPv6 Address Scope. IPv6 Header. IPv4 Header. Link-Local 1 v4 & v6 Header Comparison v6 Ver Time to Live v4 Header IHL Type of Service Identification Protocol Flags Source Address Destination Address Total Length Fragment Offset Header Checksum Ver Traffic Class

More information

Fast Location Opposite Update Scheme for Minimizing Handover Latency over Wireless/Mobile Networks

Fast Location Opposite Update Scheme for Minimizing Handover Latency over Wireless/Mobile Networks Fast Location Opposite Update Scheme for Minimizing Handover Latency over Wireless/Mobile Networks Sunguk Lee Research Institute of Industrial Science and Technology Pohang, Gyeongbuk, 790-330, S.KOREA

More information

Impact of transmission errors on TCP performance. Outline. Random Errors

Impact of transmission errors on TCP performance. Outline. Random Errors Impact of transmission errors on TCP performance 1 Outline Impact of transmission errors on TCP performance Approaches to improve TCP performance Classification Discussion of selected approaches 2 Random

More information

Adaptive Local Route Optimization in Hierarchical Mobile IPv6 Networks

Adaptive Local Route Optimization in Hierarchical Mobile IPv6 Networks Adaptive Local Route Optimization in Hierarchical Mobile IPv6 Networks Sangheon Pack, Taekyoung Kwon, and Yanghee Choi School of Computer Science and Engineering Seoul National University, Seoul, Korea

More information

Chapter 13 TRANSPORT. Mobile Computing Winter 2005 / Overview. TCP Overview. TCP slow-start. Motivation Simple analysis Various TCP mechanisms

Chapter 13 TRANSPORT. Mobile Computing Winter 2005 / Overview. TCP Overview. TCP slow-start. Motivation Simple analysis Various TCP mechanisms Overview Chapter 13 TRANSPORT Motivation Simple analysis Various TCP mechanisms Distributed Computing Group Mobile Computing Winter 2005 / 2006 Distributed Computing Group MOBILE COMPUTING R. Wattenhofer

More information

An Industry view of IPv6 Advantages

An Industry view of IPv6 Advantages An Industry view of IPv6 Advantages March 2002 Yanick.Pouffary@Compaq.Com Imagine what IPv6 can do for you! 1 Where we are Today IPv4 a victim of its own success IPv4 addresses consumed at an alarming

More information

On using Mobile IP Protocols

On using Mobile IP Protocols Journal of Computer Science 2 (2): 211-217, 2006 ISSN 1549-3636 2006 Science Publications On using Mobile IP Protocols Fayza A. Nada Faculty of Computers and Information, Suez Canal University, Ismailia,

More information

CC-SCTP: Chunk Checksum of SCTP for Enhancement of Throughput in Wireless Network Environments

CC-SCTP: Chunk Checksum of SCTP for Enhancement of Throughput in Wireless Network Environments CC-SCTP: Chunk Checksum of SCTP for Enhancement of Throughput in Wireless Network Environments Stream Control Transmission Protocol (SCTP) uses the 32-bit checksum in the common header, by which a corrupted

More information

OSI Network Layer. Network Fundamentals Chapter 5. Version Cisco Systems, Inc. All rights reserved. Cisco Public 1

OSI Network Layer. Network Fundamentals Chapter 5. Version Cisco Systems, Inc. All rights reserved. Cisco Public 1 OSI Network Layer Network Fundamentals Chapter 5 Version 4.0 1 Objectives Identify the role of the Network Layer, as it describes communication from one end device to another end device. Examine the most

More information

A Scheme of Primary Path Switching for Mobile Terminals using SCTP Handover

A Scheme of Primary Path Switching for Mobile Terminals using SCTP Handover Proceedings of the 2007 WSEAS International Conference on Computer Engineering and Applications, Gold Coast, Australia, January 17-19, 2007 218 A Scheme of Primary Path Switching for Mobile Terminals using

More information

Wireless Challenges : Computer Networking. Overview. Routing to Mobile Nodes. Lecture 25: Wireless Networking

Wireless Challenges : Computer Networking. Overview. Routing to Mobile Nodes. Lecture 25: Wireless Networking Wireless Challenges 15-441: Computer Networking Lecture 25: Wireless Networking Force us to rethink many assumptions Need to share airwaves rather than wire Don t know what hosts are involved Host may

More information

Internet Protocols (chapter 18)

Internet Protocols (chapter 18) Internet Protocols (chapter 18) CSE 3213 Fall 2011 Internetworking Terms 1 TCP/IP Concepts Connectionless Operation Internetworking involves connectionless operation at the level of the Internet Protocol

More information

Mobile IP and Mobile Transport Protocols

Mobile IP and Mobile Transport Protocols Mobile IP and Mobile Transport Protocols 1 IP routing Preliminaries Works on a hop-by-hop basis using a routing table 32 bits: 129.97.92.42 Address = subnet + host (Mobility No packet for you) Two parts»

More information

OSI Layer OSI Name Units Implementation Description 7 Application Data PCs Network services such as file, print,

OSI Layer OSI Name Units Implementation Description 7 Application Data PCs Network services such as file, print, ANNEX B - Communications Protocol Overheads The OSI Model is a conceptual model that standardizes the functions of a telecommunication or computing system without regard of their underlying internal structure

More information

Mobility Management. Advanced Mobile Communication Networks. Integrated Communication Systems Group Ilmenau University of Technology

Mobility Management. Advanced Mobile Communication Networks. Integrated Communication Systems Group Ilmenau University of Technology Mobility Management Advanced Mobile Communication Networks Integrated Communication Systems Group Ilmenau University of Technology Motivation The Internet and mobile communication networks are experiencing

More information

An Analysis of the Flow-Based Fast Handover Method for Mobile IPv6 Network. Jani Puttonen, Ari Viinikainen, Miska Sulander and Timo Hämäläinen

An Analysis of the Flow-Based Fast Handover Method for Mobile IPv6 Network. Jani Puttonen, Ari Viinikainen, Miska Sulander and Timo Hämäläinen An Analysis of the Flow-Based Fast Handover Method for Mobile IPv6 Network Jani Puttonen, Ari Viinikainen, Miska Sulander and Timo Hämäläinen Emails: janput@cc.jyu.fi, arjuvi@mit.jyu.fi, sulander@cc.jyu.fi,

More information

UNIT IV -- TRANSPORT LAYER

UNIT IV -- TRANSPORT LAYER UNIT IV -- TRANSPORT LAYER TABLE OF CONTENTS 4.1. Transport layer. 02 4.2. Reliable delivery service. 03 4.3. Congestion control. 05 4.4. Connection establishment.. 07 4.5. Flow control 09 4.6. Transmission

More information

UDP-Lite Enhancement Through Checksum Protection

UDP-Lite Enhancement Through Checksum Protection IOP Conference Series: Materials Science and Engineering PAPER OPEN ACCESS UDP-Lite Enhancement Through Checksum Protection To cite this article: Suherman et al 2017 IOP Conf. Ser.: Mater. Sci. Eng. 180

More information

Extended Correspondent Registration Scheme for Reducing Handover Delay in Mobile IPv6

Extended Correspondent Registration Scheme for Reducing Handover Delay in Mobile IPv6 Extended Correspondent Registration Scheme for Reducing Handover Delay in Mobile IPv6 Ved P. Kafle Department of Informatics The Graduate University for Advanced Studies Tokyo, Japan Eiji Kamioka and Shigeki

More information

Chapter 12 Network Protocols

Chapter 12 Network Protocols Chapter 12 Network Protocols 1 Outline Protocol: Set of defined rules to allow communication between entities Open Systems Interconnection (OSI) Transmission Control Protocol/Internetworking Protocol (TCP/IP)

More information

Mobile Transport Layer

Mobile Transport Layer Mobile Transport Layer 1 Transport Layer HTTP (used by web services) typically uses TCP Reliable transport between TCP client and server required - Stream oriented, not transaction oriented - Network friendly:

More information

A Fast Handover Protocol for Mobile IPv6 Using Mobility Prediction Mechanism

A Fast Handover Protocol for Mobile IPv6 Using Mobility Prediction Mechanism A Fast Handover Protocol for Mobile IPv6 Using Mobility Prediction Mechanism Dae Sun Kim 1 and Choong Seon Hong 2 1 School of Electronics and Information, Kyung Hee Univerity 1 Seocheon, Giheung, Yongin,

More information

Networking for Data Acquisition Systems. Fabrice Le Goff - 14/02/ ISOTDAQ

Networking for Data Acquisition Systems. Fabrice Le Goff - 14/02/ ISOTDAQ Networking for Data Acquisition Systems Fabrice Le Goff - 14/02/2018 - ISOTDAQ Outline Generalities The OSI Model Ethernet and Local Area Networks IP and Routing TCP, UDP and Transport Efficiency Networking

More information

Performance Analysis of Hierarchical Mobile IPv6 in IP-based Cellular Networks

Performance Analysis of Hierarchical Mobile IPv6 in IP-based Cellular Networks Performance Analysis of Hierarchical Mobile IPv6 in IP-based Cellular Networks Sangheon Pack and Yanghee Choi School of Computer Science & Engineering Seoul National University Seoul, Korea Abstract Next-generation

More information

Last time. Wireless link-layer. Introduction. Characteristics of wireless links wireless LANs networking. Cellular Internet access

Last time. Wireless link-layer. Introduction. Characteristics of wireless links wireless LANs networking. Cellular Internet access Last time Wireless link-layer Introduction Wireless hosts, base stations, wireless links Characteristics of wireless links Signal strength, interference, multipath propagation Hidden terminal, signal fading

More information

Performance Evaluation of Mesh - Based Multicast Routing Protocols in MANET s

Performance Evaluation of Mesh - Based Multicast Routing Protocols in MANET s Performance Evaluation of Mesh - Based Multicast Routing Protocols in MANET s M. Nagaratna Assistant Professor Dept. of CSE JNTUH, Hyderabad, India V. Kamakshi Prasad Prof & Additional Cont. of. Examinations

More information

IP - The Internet Protocol. Based on the slides of Dr. Jorg Liebeherr, University of Virginia

IP - The Internet Protocol. Based on the slides of Dr. Jorg Liebeherr, University of Virginia IP - The Internet Protocol Based on the slides of Dr. Jorg Liebeherr, University of Virginia Orientation IP (Internet Protocol) is a Network Layer Protocol. IP: The waist of the hourglass IP is the waist

More information

ET4254 Communications and Networking 1

ET4254 Communications and Networking 1 Topic 9 Internet Protocols Aims:- basic protocol functions internetworking principles connectionless internetworking IP IPv6 IPSec 1 Protocol Functions have a small set of functions that form basis of

More information

TCP PERFORMANCE FOR FUTURE IP-BASED WIRELESS NETWORKS

TCP PERFORMANCE FOR FUTURE IP-BASED WIRELESS NETWORKS TCP PERFORMANCE FOR FUTURE IP-BASED WIRELESS NETWORKS Deddy Chandra and Richard J. Harris School of Electrical and Computer System Engineering Royal Melbourne Institute of Technology Melbourne, Australia

More information

A Study on Mobile IPv6 Based Mobility Management Architecture

A Study on Mobile IPv6 Based Mobility Management Architecture UDC 621.396.69:681.32 A Study on Mobile IPv6 Based Mobility Management Architecture VTsuguo Kato VRyuichi Takechi VHideaki Ono (Manuscript received January 19, 2001) Mobile IPv6 is considered to be one

More information

Fixed Internetworking Protocols and Networks. IP mobility. Rune Hylsberg Jacobsen Aarhus School of Engineering

Fixed Internetworking Protocols and Networks. IP mobility. Rune Hylsberg Jacobsen Aarhus School of Engineering Fixed Internetworking Protocols and Networks IP mobility Rune Hylsberg Jacobsen Aarhus School of Engineering rhj@iha.dk 1 2011 ITIFN Mobile computing Vision Seamless, ubiquitous network access for mobile

More information

ECS-087: Mobile Computing

ECS-087: Mobile Computing ECS-087: Mobile Computing TCP over wireless TCP and mobility Most of the Slides borrowed from Prof. Sridhar Iyer s lecture IIT Bombay Diwakar Yagyasen 1 Effect of Mobility on Protocol Stack Application:

More information

King Fahd University of Petroleum and Minerals College of Computer Sciences and Engineering Department of Computer Engineering

King Fahd University of Petroleum and Minerals College of Computer Sciences and Engineering Department of Computer Engineering Student Name: Section #: King Fahd University of Petroleum and Minerals College of Computer Sciences and Engineering Department of Computer Engineering COE 344 Computer Networks (T072) Final Exam Date

More information

Mobile IPv6 Overview

Mobile IPv6 Overview Sungkyunkwan University Prepared by H. Choo Copyright 2000-2018 Networking Laboratory Lecture Outline Network Layer Mobile IPv6 Proxy Mobile IPv6 Networking Laboratory 2/87 Sungkyunkwan University Network

More information

Wireless TCP. TCP mechanism. Wireless Internet: TCP in Wireless. Wireless TCP: transport layer

Wireless TCP. TCP mechanism. Wireless Internet: TCP in Wireless. Wireless TCP: transport layer Wireless TCP W.int.2-2 Wireless Internet: TCP in Wireless Module W.int.2 Mobile IP: layer, module W.int.1 Wireless TCP: layer Dr.M.Y.Wu@CSE Shanghai Jiaotong University Shanghai, China Dr.W.Shu@ECE University

More information

Outline 9.2. TCP for 2.5G/3G wireless

Outline 9.2. TCP for 2.5G/3G wireless Transport layer 9.1 Outline Motivation, TCP-mechanisms Classical approaches (Indirect TCP, Snooping TCP, Mobile TCP) PEPs in general Additional optimizations (Fast retransmit/recovery, Transmission freezing,

More information

An Enhancement of Mobile IP by Home Agent Handover

An Enhancement of Mobile IP by Home Agent Handover An Enhancement of Mobile IP by Home Agent Handover Li-Sheng Yu and Chun-Chuan Yang Multimedia and Communications Laboratory Department of Computer Science and Information Engineering National Chi Nan University,

More information

msctp for Vertical Handover Between Heterogeneous Networks

msctp for Vertical Handover Between Heterogeneous Networks msctp for Vertical Handover Between Heterogeneous Networks Seok Joo Koh and Sang Wook Kim Department of Computer Science, Kyungpook National University, Daegoo, Korea {sjkoh, swkim}@cs.knu.ac.kr Abstract.

More information

Mobile IP. Mobile Computing. Mobility versus Portability

Mobile IP. Mobile Computing. Mobility versus Portability Mobile IP Mobile Computing Introduction Amount of mobile/nomadic computing expected to increase dramatically in near future. By looking at the great acceptance of mobile telephony, one can foresee a similar

More information

Effect of RED and different packet sizes on Multimedia performance over wireless networks

Effect of RED and different packet sizes on Multimedia performance over wireless networks Effect of RED and different packet sizes on Multimedia performance over wireless networks T. Vu TU Ilmenau, Germany Abstract. We consider the adaptation of random early detection (RED) as an active queue

More information

Introduction to Internetworking

Introduction to Internetworking Introduction to Internetworking Introductory terms Communications Network Facility that provides data transfer services An internet Collection of communications networks interconnected by bridges and/or

More information

CS 457 Multimedia Applications. Fall 2014

CS 457 Multimedia Applications. Fall 2014 CS 457 Multimedia Applications Fall 2014 Topics Digital audio and video Sampling, quantizing, and compressing Multimedia applications Streaming audio and video for playback Live, interactive audio and

More information

Mobile IPv6 performance in networks: handover optimizations on the link and network layer

Mobile IPv6 performance in networks: handover optimizations on the link and network layer Mobile IPv6 performance in 802.11 networks: handover optimizations on the link and network layer LaTe project, Networking laboratory, TKK Mikko Hautala mhautala@cc.hut.fi 16.03.2006 Supervisor: Instructor:

More information

LECTURE 8. Mobile IP

LECTURE 8. Mobile IP 1 LECTURE 8 Mobile IP What is Mobile IP? The Internet protocol as it exists does not support mobility Mobile IP tries to address this issue by creating an anchor for a mobile host that takes care of packet

More information

Network Working Group

Network Working Group Network Working Group Request for Comments: 2961 Category: Standards Track L. Berger LabN Consulting, LLC D. Gan Juniper Networks, Inc. G. Swallow Cisco Systems, Inc. P. Pan Juniper Networks, Inc. F. Tommasi

More information

IPv6: An Introduction

IPv6: An Introduction Outline IPv6: An Introduction Dheeraj Sanghi Department of Computer Science and Engineering Indian Institute of Technology Kanpur dheeraj@iitk.ac.in http://www.cse.iitk.ac.in/users/dheeraj Problems with

More information

Internetwork Protocols

Internetwork Protocols Internetwork Protocols Background to IP IP, and related protocols Internetworking Terms (1) Communications Network Facility that provides data transfer service An internet Collection of communications

More information

ECS-087: Mobile Computing

ECS-087: Mobile Computing ECS-087: Mobile Computing Mobile IP Most of the slides borrowed from Prof. Sridhar Iyer Diwakar Yagyasen.1 Effect of Mobility on Protocol Stack Application: new applications and adaptations Transport:

More information

TRANSMISSION CONTROL PROTOCOL

TRANSMISSION CONTROL PROTOCOL COMP 635: WIRELESS & MOBILE COMMUNICATIONS TRANSMISSION CONTROL PROTOCOL Jasleen Kaur Fall 2017 1 Impact of Wireless on Protocol Layers Application layer Transport layer Network layer Data link layer Physical

More information

Page 1. Review: Internet Protocol Stack. Transport Layer Services EEC173B/ECS152C. Review: TCP. Transport Layer: Connectionless Service

Page 1. Review: Internet Protocol Stack. Transport Layer Services EEC173B/ECS152C. Review: TCP. Transport Layer: Connectionless Service EEC7B/ECS5C Review: Internet Protocol Stack Review: TCP Application Telnet FTP HTTP Transport Network Link Physical bits on wire TCP LAN IP UDP Packet radio Do you remember the various mechanisms we have

More information

Information Network Systems The network layer. Stephan Sigg

Information Network Systems The network layer. Stephan Sigg Information Network Systems The network layer Stephan Sigg Tokyo, November 1, 2012 Error-detection and correction Decoding of Reed-Muller codes Assume a second order (16, 11) code for m = 4. The r-th order

More information

OPTIMIZING MOBILITY MANAGEMENT IN FUTURE IPv6 MOBILE NETWORKS

OPTIMIZING MOBILITY MANAGEMENT IN FUTURE IPv6 MOBILE NETWORKS OPTIMIZING MOBILITY MANAGEMENT IN FUTURE IPv6 MOBILE NETWORKS Sandro Grech Nokia Networks (Networks Systems Research) Supervisor: Prof. Raimo Kantola 1 SANDRO GRECH - OPTIMIZING MOBILITY MANAGEMENT IN

More information

CSE 4215/5431: Mobile Communications Winter Suprakash Datta

CSE 4215/5431: Mobile Communications Winter Suprakash Datta CSE 4215/5431: Mobile Communications Winter 2013 Suprakash Datta datta@cse.yorku.ca Office: CSEB 3043 Phone: 416-736-2100 ext 77875 Course page: http://www.cse.yorku.ca/course/4215 Some slides are adapted

More information

CS 268: Wireless Transport Protocols. Kevin Lai Feb 13, 2002

CS 268: Wireless Transport Protocols. Kevin Lai Feb 13, 2002 CS 268: Wireless Transport Protocols Kevin Lai Feb 13, 2002 Motivation! Wireless connectivity proliferating - Satellite, line-of-sight microwave, line-of-sight laser, cellular data (CDMA, GPRS, 3G), wireless

More information

Mobile Communications Chapter 9: Mobile Transport Layer

Mobile Communications Chapter 9: Mobile Transport Layer Prof. Dr.-Ing Jochen H. Schiller Inst. of Computer Science Freie Universität Berlin Germany Mobile Communications Chapter 9: Mobile Transport Layer Motivation, TCP-mechanisms Classical approaches (Indirect

More information

Improving Reliable Transport and Handoff Performance in Cellular Wireless Networks

Improving Reliable Transport and Handoff Performance in Cellular Wireless Networks Improving Reliable Transport and Handoff Performance in Cellular Wireless Networks H. Balakrishnan, S. Seshan, and R. H. Katz ACM Wireless Networks Vol. 1, No. 4, pp. 469-482 Dec. 1995 P. 1 Introduction

More information

Lecture 3: The Transport Layer: UDP and TCP

Lecture 3: The Transport Layer: UDP and TCP Lecture 3: The Transport Layer: UDP and TCP Prof. Shervin Shirmohammadi SITE, University of Ottawa Prof. Shervin Shirmohammadi CEG 4395 3-1 The Transport Layer Provides efficient and robust end-to-end

More information

Location Management Agent for SCTP Handover in Mobile Network

Location Management Agent for SCTP Handover in Mobile Network Location Management Agent for SCTP Handover in Mobile Network Yong-Jin Lee Department of Technology Education, Korea National University of Education 250 Taesungtapyon-ro, Heungduk-ku, Cheongju, South

More information

Cross-layer TCP Performance Analysis in IEEE Vehicular Environments

Cross-layer TCP Performance Analysis in IEEE Vehicular Environments 24 Telfor Journal, Vol. 6, No. 1, 214. Cross-layer TCP Performance Analysis in IEEE 82.11 Vehicular Environments Toni Janevski, Senior Member, IEEE, and Ivan Petrov 1 Abstract In this paper we provide

More information

Improving the quality of H.264 video transmission using the Intra-Frame FEC over IEEE e networks

Improving the quality of H.264 video transmission using the Intra-Frame FEC over IEEE e networks Improving the quality of H.264 video transmission using the Intra-Frame FEC over IEEE 802.11e networks Seung-Seok Kang 1,1, Yejin Sohn 1, and Eunji Moon 1 1Department of Computer Science, Seoul Women s

More information

Mohammad Hossein Manshaei 1393

Mohammad Hossein Manshaei 1393 Mohammad Hossein Manshaei manshaei@gmail.com 1393 Mobile IP 2 Mobile Network Layer: Problems and Concerns Entities and Terminology in Mobile IP Mobile Indirect Routing Mobile IP Agent Advertisement Registration

More information

CS 641 Project Report Error resilient video transmission over wireless networks. December Gang Ding

CS 641 Project Report Error resilient video transmission over wireless networks. December Gang Ding CS 64 Project Report Error resilient video transmission over wireless networks December 00 Gang Ding Abstract This report proposes a general architecture for error resilient video transmission over mobile

More information

Performance of UMTS Radio Link Control

Performance of UMTS Radio Link Control Performance of UMTS Radio Link Control Qinqing Zhang, Hsuan-Jung Su Bell Laboratories, Lucent Technologies Holmdel, NJ 77 Abstract- The Radio Link Control (RLC) protocol in Universal Mobile Telecommunication

More information

Performance Comparison and Analysis on MIPv6, Fast MIPv6 Bi-casting and Eurecom IPv6 Soft Handover over IEEE802.11b WLANs

Performance Comparison and Analysis on MIPv6, Fast MIPv6 Bi-casting and Eurecom IPv6 Soft Handover over IEEE802.11b WLANs Performance Comparison and Analysis on MIPv6, Fast MIPv6 Bi-casting and Eurecom IPv6 Soft Handover over IEEE802.11b WLANs Farouk Belghoul, Yan Moret, Christian Bonnet Department of Mobile Communications,

More information

Stream Control Transmission Protocol (SCTP)

Stream Control Transmission Protocol (SCTP) Stream Control Transmission Protocol (SCTP) Definition Stream control transmission protocol (SCTP) is an end-to-end, connectionoriented protocol that transports data in independent sequenced streams. SCTP

More information

Wireless TCP Performance Issues

Wireless TCP Performance Issues Wireless TCP Performance Issues Issues, transport layer protocols Set up and maintain end-to-end connections Reliable end-to-end delivery of data Flow control Congestion control Udp? Assume TCP for the

More information

Chapter 7 Mobility Management at Transport Layer

Chapter 7 Mobility Management at Transport Layer Chapter 7 Mobility Management at Transport Layer This chapter is dedicated to transport-layer mobility support schemes, which follow an end-to-end philosophy, putting the notion of mobility at the end

More information

Introduction to Networks and the Internet

Introduction to Networks and the Internet Introduction to Networks and the Internet CMPE 80N Announcements Project 2. Reference page. Library presentation. Internet History video. Spring 2003 Week 7 1 2 Today Internetworking (cont d). Fragmentation.

More information

Mobile Communications Chapter 9: Mobile Transport Layer

Mobile Communications Chapter 9: Mobile Transport Layer Prof. Dr.-Ing Jochen H. Schiller Inst. of Computer Science Freie Universität Berlin Germany Mobile Communications Chapter 9: Mobile Transport Layer Motivation, TCP-mechanisms Classical approaches (Indirect

More information

Transmission Control Protocol. ITS 413 Internet Technologies and Applications

Transmission Control Protocol. ITS 413 Internet Technologies and Applications Transmission Control Protocol ITS 413 Internet Technologies and Applications Contents Overview of TCP (Review) TCP and Congestion Control The Causes of Congestion Approaches to Congestion Control TCP Congestion

More information

TRANSMISSION CONTROL PROTOCOL

TRANSMISSION CONTROL PROTOCOL COMP 635: WIRELESS NETWORKS TRANSMISSION CONTROL PROTOCOL Jasleen Kaur Fall 2015 1 Impact of Wireless on Protocol Layers Application layer Transport layer Network layer Data layer Physical layer service

More information

Paper solution Subject: Computer Networks (TE Computer pattern) Marks : 30 Date: 5/2/2015

Paper solution Subject: Computer Networks (TE Computer pattern) Marks : 30 Date: 5/2/2015 Paper solution Subject: Computer Networks (TE Computer- 2012 pattern) Marks : 30 Date: 5/2/2015 Q1 a) What is difference between persistent and non persistent HTTP? Also Explain HTTP message format. [6]

More information

Mobile & Wireless Networking. Lecture 10: Mobile Transport Layer & Ad Hoc Networks. [Schiller, Section 8.3 & Section 9] [Reader, Part 8]

Mobile & Wireless Networking. Lecture 10: Mobile Transport Layer & Ad Hoc Networks. [Schiller, Section 8.3 & Section 9] [Reader, Part 8] 192620010 Mobile & Wireless Networking Lecture 10: Mobile Transport Layer & Ad Hoc Networks [Schiller, Section 8.3 & Section 9] [Reader, Part 8] Geert Heijenk Outline of Lecture 10 Mobile transport layer

More information

Mobile Routing : Computer Networking. Overview. How to Handle Mobile Nodes? Mobile IP Ad-hoc network routing Assigned reading

Mobile Routing : Computer Networking. Overview. How to Handle Mobile Nodes? Mobile IP Ad-hoc network routing Assigned reading Mobile Routing 15-744: Computer Networking L-10 Ad Hoc Networks Mobile IP Ad-hoc network routing Assigned reading Performance Comparison of Multi-Hop Wireless Ad Hoc Routing Protocols A High Throughput

More information

What is the difference between unicast and multicast? (P# 114)

What is the difference between unicast and multicast? (P# 114) 1 FINAL TERM FALL2011 (eagle_eye) CS610 current final term subjective all solved data by eagle_eye MY paper of CS610 COPUTER NETWORKS There were 30 MCQs Question no. 31 (Marks2) Find the class in 00000001.001011.1001.111

More information

Problem 7. Problem 8. Problem 9

Problem 7. Problem 8. Problem 9 Problem 7 To best answer this question, consider why we needed sequence numbers in the first place. We saw that the sender needs sequence numbers so that the receiver can tell if a data packet is a duplicate

More information

Internet. 1) Internet basic technology (overview) 3) Quality of Service (QoS) aspects

Internet. 1) Internet basic technology (overview) 3) Quality of Service (QoS) aspects Internet 1) Internet basic technology (overview) 2) Mobility aspects 3) Quality of Service (QoS) aspects Relevant information: these slides (overview) course textbook (Part H) www.ietf.org (details) IP

More information

Outline. Routing. Introduction to Wide Area Routing. Classification of Routing Algorithms. Introduction. Broadcasting and Multicasting

Outline. Routing. Introduction to Wide Area Routing. Classification of Routing Algorithms. Introduction. Broadcasting and Multicasting Outline Routing Fundamentals of Computer Networks Guevara Noubir Introduction Broadcasting and Multicasting Shortest Path Unicast Routing Link Weights and Stability F2003, CSG150 Fundamentals of Computer

More information

Page 1. Review: Internet Protocol Stack. Transport Layer Services. Design Issue EEC173B/ECS152C. Review: TCP

Page 1. Review: Internet Protocol Stack. Transport Layer Services. Design Issue EEC173B/ECS152C. Review: TCP EEC7B/ECS5C Review: Internet Protocol Stack Review: TCP Application Telnet FTP HTTP Transport Network Link Physical bits on wire TCP LAN IP UDP Packet radio Transport Layer Services Design Issue Underlying

More information

Unit 5: Internet Protocols skong@itt-tech.edutech.edu Internet Protocols She occupied herself with studying a map on the opposite wall because she knew she would have to change trains at some point. Tottenham

More information

ET4254 Communications and Networking 1

ET4254 Communications and Networking 1 Topic 2 Aims:- Communications System Model and Concepts Protocols and Architecture Analog and Digital Signal Concepts Frequency Spectrum and Bandwidth 1 A Communications Model 2 Communications Tasks Transmission

More information

A Hybrid Load Balance Mechanism for Distributed Home Agents in Mobile IPv6

A Hybrid Load Balance Mechanism for Distributed Home Agents in Mobile IPv6 A Hybrid Load Balance Mechanism for Distributed Home Agents in Mobile IPv6 1 Hui Deng 2Xiaolong Huang 3Kai Zhang 3 Zhisheng Niu 1Masahiro Ojima 1R&D Center Hitachi (China) Ltd. Beijing 100004, China 2Dept.

More information

Outline. Connecting to the access network: DHCP and mobile IP, LTE. Transport layer: UDP and TCP

Outline. Connecting to the access network: DHCP and mobile IP, LTE. Transport layer: UDP and TCP Outline Connecting to the access network: DHCP and mobile IP, LTE Transport layer: UDP and TCP IETF TCP/IP protocol suite User application, e.g., http with Mozilla Communication for each process on computer

More information

TCP over wireless links

TCP over wireless links CSc 450/550 Computer Communications & Networks TCP over wireless links Jianping Pan (stand-in for Dr. Wu) 1/31/06 CSc 450/550 1 TCP over wireless links TCP a quick review on how TCP works Wireless links

More information

Foreword xxiii Preface xxvii IPv6 Rationale and Features

Foreword xxiii Preface xxvii IPv6 Rationale and Features Contents Foreword Preface xxiii xxvii 1 IPv6 Rationale and Features 1 1.1 Internet Growth 1 1.1.1 IPv4 Addressing 1 1.1.2 IPv4 Address Space Utilization 3 1.1.3 Network Address Translation 5 1.1.4 HTTP

More information

Mobile Communications Chapter 8: Network Protocols/Mobile IP

Mobile Communications Chapter 8: Network Protocols/Mobile IP Mobile Communications Chapter 8: Network Protocols/Mobile IP Motivation Data transfer, Encapsulation Security, IPv6, Problems Micro mobility support DHCP Ad-hoc networks, Routing protocols Prof. Jó Ueyama

More information

Supporting mobility only on lower layers up to the network layer is not

Supporting mobility only on lower layers up to the network layer is not Mobile transport layer Supporting mobility only on lower layers up to the network layer is not enough to provide mobility support for applications. Most applications rely on a transport layer, such as

More information