Seamless Handover in Heterogeneous Radio Access Networks

Size: px
Start display at page:

Download "Seamless Handover in Heterogeneous Radio Access Networks"

Transcription

1 Seamless Handover in Heterogeneous Radio Access Networks Christina Thorpe University College Dublin, Ireland Contact: nnect.ie Sean Murphy University College Dublin, Ireland Contact: m Liam Murphy University College Dublin, Ireland Contact: Abstract This paper provides a detailed discussion of the problem of Seamless Handover in Heterogeneous Radio Access Networks. Brief descriptions of several wireless access technologies are included to provide some background information and to illustrate the importance of solving the seamless handover problem for network subscribers. Several approaches to providing a handover solution have been proposed, some of which will be described and compared, in order to indicate possible directions for continuing to search for a seamless handover solution. Various problems are present in the existing solutions, and are discussed in this paper. These problems are significant enough to warrant further investigation in the handover area, and leave scope for modifications and improvements. 1. Introduction. Wireless Communications is the main source of expansion in the area of communications in recent years; it has evolved rapidly and is one of the most promising areas of research. Third generation networks, with provision for streaming applications, internet access and gaming have now been commercially realized and the standardization of fourth generation technology has already begun. Wireless communication brings fundamental changes to data networking and makes integrated networks a reality; their main objective being the ubiquitous availability of personal communications. With these advancements comes the inevitable demand to enable mobile hosts to move seamlessly between the available networks. The main objective of this paper is to determine the most desirable approach to the seamless handover problem in heterogeneous radio access networks. The results of this comparative study will point to future investigative work, where the process of simulating scenarios will be used to determine the most efficient protocol to solve the handover problem. There have been many approaches to solving the handover problem, some dealing with the network layer and others higher up in transport layer. The network layer solution proposed which will be discussed is Mobile IP. Details will be provided to illustrate the functionality and features of this mobility solution; the problems existing in this technology will also be mentioned. These problems are significant enough to call into question the wide adoption of this solution, and therefore leave scope for alternative solutions. Two such alternatives include msctp, which is a modification to the Stream Control Transmission Protocol; and TCP Migrate, which is a modification to the Transmission Control Protocol. The remainder of this paper is structured as follows: Section 2 contains background information, provided to clearly demonstrate the significance of research carried out in the seamless handover area. Section 3 will provide a high level definition of what the problem of seamless handover actually is, and illustrates why it is an important issue in wireless communication. This section is then further divided to discuss the three handover solutions proposed. Section 3.1, 3.2, and 3.3 discuss Mobile IP, msctp and TCP Migrate respectively, with details on the features, handover processes and problems present in each. Section 4 details preliminary simulations carried out and possible future simulation work to be performed on the two transport layer protocols. Finally, section 5 will conclude the research carried out and presented in this paper.

2 2. Background. Wireless networks have been growing and evolving rapidly in recent years. Their straightforward, cost effective and fast deployment, together with their mobility support, has made them a popular alternative to the traditional wired networks. As a result many wireless standards have been ratified by standardization bodies such as IEEE and ETSI; for example , , , Bluetooth, and 3G, each of which aim to solve different problems. A typical wireless system uses one or more Base Stations (BSs) or Access Points (AP) to connect users to a network. Many of the existing standards for wireless systems are illustrated in Figure 1 below. Seamless handover is when a handover from one cell to another takes place without perceptible interruption of the radio connection. Seamless handover is a fundamental concern in any system with mobility. Its major goal is to hide from the application (or user) any difference between the normal service offered within a domain and during a migration. Explanations of the actual handover procedure will be given with the help of Figure 3 below. The network scenario used is two wireless access routers A and B, and a wired access router C, all connected through the Internet. The coverage areas of both wireless routers are overlapping, and the mobile node connected to access router A is communicating with the correspondent node connected to access router C. If the mobile node decides to move from the coverage area of A towards B and passes through the overlapping area, communication should hand over from A to B without loss of connection or noticeable decrease in performance. Figure 1. Wireless technologies 2.4 Current Trends. The current Internet is constructed from various kinds of wired and wireless access networks. To connect with these networks, mobile hosts have multiple network interfaces. In such an environment, it is an essential problem to enable mobile hosts to move across these different networks without loss of connection or degradation of communication quality. Moreover, since real-time communications, such as gaming and voice over IP, are expected to increase more than non real time communications, keeping the quality of a real time communication during handover is essential. Many equipment vendors already offer multimode devices which have integrated WLAN interfaces included in their design, a trend which will continue for the foreseeable future. 3. Handover Solutions. Figure Mobile IP. Seamless handover Mobile IP can be thought of as comprising of three major subsystems. First, there is a discovery mechanism defined so that mobile computers can determine their new attachment points when the move from the coverage area of one access router into the coverage area of another. Second, once the mobile computer knows the IP address at its new attachment point, it registers with an agent representing its home network. Lastly, it defines mechanisms to deliver datagrams to the mobile node when it s away from its home network [1]. Agent discovery is the method by which a mobile node first establishes contact with an agent

3 on the local network to which it is attached. The main goals of agent discovery include: Agent/Node communication - messages are sent between the agent and the node. Orientation - the node uses the agent discovery process to determine where it is. Care-of address assignment the agent discovery process is the method used to tell a mobile node the care of address it should use. Once a mobile node has completed agent discovery, it knows whether it is on its home network or a foreign network. If it is at home, it communicates as a regular IP device; but if it is away, it must activate Mobile IP. The main purpose of registration is to actually trigger the activation of Mobile IP. The mobile node must contact the home agent and tell it that it is on a foreign network and request that datagram forwarding be turned on. It also must let the home agent know its care-of address so the home agent knows where to send the forwarded datagrams. Successful registration establishes a mobility binding between the home agent and mobile node. The mobile node is supposed to manage its registration and handle various events using several actions [2]: The mobile node must register when it first detects it has moved away from home. The mobile node must deregister when it returns to its home network. Finally, the mobile node must update its registration when it moves to a new foreign network or if its current registration is about to expire. Encapsulation is required because each datagram which is intercepted and forwarded needs to be resent over the network to the device s care-of address. The default encapsulation process used in Mobile IP is called IP encapsulation within IP defined in RFC2003. It is a relatively simple method that describes how to take an IP datagram and make it the payload of another IP datagram. Two other encapsulation methods may be used: Minimal Encapsulation within IP defined in RFC2004, and Generic routing Encapsulation defined in RFC1701. To use either of these, the mobile node must request the appropriate method in its registration request and the home agent must agree to use it. The encapsulation process creates a tunnel between the device that encapsulates and the device that decapsulates. The tunnel represents a conduit over which datagrams are forwarded across the internet. In Mobile IP, the start of the tunnel is the home agent, which does the encapsulation. The end of the tunnel depends on what sort of care-of address is used. With a foreign agent care-of address the foreign agent is the end of the tunnel. With a co-located care-of address, the mobile node is the end of the tunnel Agent Node Communication. Mobile agents are routers that have additional functionality to make them Mobile IP aware. There is considerable similarity between agent discovery and normal router discovery, therefore, it made sense to implement agent discovery as a modification to the existing process rather than to set up a whole new system. Provision already exists for the communication between a device on an IP network and it s local router, in the form of ICMP messages; namely, Router Advertisement and Router Solicitation messages. The modified messages for communication between a mobile node and it s local agent are Agent Advertisement and Agent Solicitation. The first is transmitted regularly by a router acting as a mobile agent; it consists of a regular router advertisement message with some extensions added to it. Agent Solicitation messages can be sent by a mobile node to request a local agent to send an advertisement. Two new message types have been defined in Mobile IP to perform registration: registration request and registration reply [3] Tunnelling. The diagram shown in Figure 4 below illustrates the tunnelling process used for the co-located care-of addresses 1. If the mobile node moves from its home network to a foreign network, it will detect this by the agent advertisement messages it receives. It will then obtain a care of address and must inform its home agent that it is away from home and request that datagram forwarding be turned on; this creates a mobility binding. If the correspondent node sends a packet to the mobile node at its home network, this packet will be intercepted by the home agent, encapsulated and forwarded on to the mobile node s care of address. In the case of a co-located care of address the encapsulated datagram will be sent directly to the mobile node, where it will be decapsulated. However, if a foreign agent care of address is used the datagram will be sent to the 1 The other type of tunnelling that may be used is for the foreign agent care of address and is quite similar.

4 foreign agent, where it will be decapsulated and sent on to the mobile node. Figure 3. MIP tunnelling Mobile IP Issues. The biggest problem with MIP is that it will take a long time to roll out it requires a lot of changes to the network infrastructure, and history teaches us that any technology that requires changes to the network infrastructure either fails or takes a long time to reach significant penetration (e.g. IPV6). There are some efficiency issues with MIP as all sending devices must communicate through the home agent. For example, the greatest inefficiency results when the sending device is actually on the foreign network that the mobile node is visiting, which is often the case. If the mobile node s home network is in London and it is visiting a network in Tokyo the following process ensues: if device A is on the mobile node's current network in Tokyo, it must send all the way to London and then have the result forwarded all the way back again to Tokyo. To make matters worse, consider what happens if reverse tunneling is used, which may be convenient when the routing is dependent on the source address. Here, tunneling is done not just for datagrams sent to the mobile node but sent from it as well. In the worst case example, a request/reply pair from the mobile node to another device on the foreign network requires two complete round-trips from Tokyo to London and back. In terms of operation, Mobile IP has a number of risks due to it using a registration system and then forwarding datagrams across an unsecured Internet. A malicious device could interfere with the registration process, causing the datagrams intended for a mobile device to be diverted. An attacker might also interfere with the data forwarding process itself, by encapsulating a bogus datagram to trick a mobile node into thinking it was sent something that it never was. While Mobile IP includes authentication measures for registration messages, it does not for other types of messages. It also doesn't specify authentication of encapsulated datagrams being forwarded from the home agent to the mobile node. Encryption is also not provided to safeguard the privacy of either control messages or forwarded datagrams. Although the problems mentioned above are significant, however, there are some solutions provided by IPv6 to address some of them. 3.2 msctp. SCTP was originally designed for the transport of message based signalling information over IP networks [4]. SCTP is a reliable transport protocol operating on top of a potentially unreliable connectionless packet service such as IP. It offers acknowledged error-free nonduplicated transfer of SCTP messages. Protection of data corruption, loss or duplication of data is achieved using checksum sequence numbers. A selective retransmission mechanism is applied to correct loss and errors. SCTP transfers data units that are called chunks. The protocol determines the maximum possible size of a chunk at which IP packets can be sent to a destination without being segmented. It segments large messages into chunks that will fit into an IP packet; several small chunks resulting from small messages may be multiplexed into one IP packet by a process called bundling. SCTP flow and congestion control mechanisms have been designed specifically so that SCTP traffic behaves in the same way as TCP traffic; this allows the seamless introduction of SCTP services into existing IP networks. SCTP provides a message-oriented data delivery service; it is different to TCP, which is byte-oriented. Because of the message-oriented nature of SCTP, the application does not have to concern itself with maintaining message boundaries as these are automatically conserved. An important difference between SCTP and TCP is the support of multi-homed nodes that may be reached via several IP addresses. If one of the multi-homed node s IP addresses fails (possibly from an interface or link failure or severe congestion), the destination host can still receive

5 data through an alternative source interface. SCTP keeps track of each destination address s reachability using two mechanisms: acknowledgements of the data chunks, and heart beat chunks. Multi-streaming is a novel service that SCTP includes; an SCTP stream is a uni-directional logical dataflow within an SCTP association. The SCTP endpoints negotiate application requested streams during association setup that exist for the life of the association. Within streams, SCTP uses stream sequence numbers to preserve the data order and reliability for each data chunk; between streams, however, no data order is preserved. This approach avoids the TCP head-of-line blocking problem, in which successfully transmitted segments must wait in the receiver s queue until the TCP sending endpoint retransmits any previously lost segments. In SCTP, if data on a stream is lost only that particular stream is blocked at the receiver while awaiting retransmission. Figure 5. SCTP association setup Recent work on SCTP includes the so-called ADDIP extension: this enables an SCTP endpoint to add a new IP address or delete an unnecessary IP address, and also to change the primary IP address used for the association while the association is active [5]. When events such as add, delete or change occurs during an association, the SCTP endpoint will notify the corresponding event to the remote endpoint by sending an SCTP ASCONF chunk (Association Configuration chunk). The correspondent node will then reply with an ASCONF ACK chunk. Figure 4. SCTP multi-streaming SCTP uses a four-way handshake (Figure 6) in which a cookie mechanism establishes an association that prevents blind SYN attacks. If host A initiates an association with host B, the following actions occur: Host A sends an INIT chunk to host B. When host B receives the INIT, it returns an INIT ACK to host A. This initialisation acknowledgement contains a cookie composed of information that only B can verify. The cookie helps to check if host A is legitimate. Unlike in the case of TCP, host B does not allocate any memory to maintain state for the requested association at this point, helping to prevent blind SYN attacks. When host A receive the INIT ACK it replies with a cookie echo chunk, this may contain A s first data and as the name indicates it echoes the cookie that host B sent. On receiving the cookie echo chunk, host B checks the cookie s validity; a valid cookie establishes hosts A s legitimacy. Only at this point does SCTP establish the association and allocate resources at host B. Figure 6. Mobile SCTP After initiation of an SCTP association the mobile node moves from the access router A to the access router B, as shown in Figure 6 above. It is assumed that the mobile node initiates an association with the correspondent node. The resulting SCTP association consists of an IP address for the mobile node and IP address for the corresponding node. If the mobile node moves from the access router A to the access router B and is now in the overlapping region, the mobile node will obtain a new IP address from the access router B by using some suitable address configuration protocol. A mobile SCTP node informs its corresponding node that it will be using a new IP

6 address by sending it an ASCONF chunk. The mobile node receives an ASCONF ACK chunk from the corresponding node. While the mobile node continues to move towards access router B, it needs to change the new IP address to be its primary IP address according to an appropriate rule. Research has been performed using combinations of two different Add IP rules with two different Primarychange rules. These are as follows: Aggressive Add-IP with Aggressive Primary- Change; Aggressive Add-IP with Conservative Primary Change; Conservative Add-IP with Aggressive Primary Change; Conservative Add-IP with Conservative Primary-Change. Where, Aggressive Add-IP ensures that the new IP address is added to the association only if the signal strength is greater than a given threshold. The Aggressive Primary-Change sets the threshold higher than the Conservative Primary-Change. Conservative Add-IP ensures that a new IP address is added to the association if its signal strength is greater than those for the current IP address. As the mobile node progresses to move toward the access router B, if the old IP address becomes inactive, the mobile node must delete it from the address list [6] SCTP Issues. The key issue with msctp is that SCTP is not used by applications, hence to have msctp used in widespread fashion would involve modifying lots of applications. The protocol can also be inefficient if the mobile node keeps moving back and forth between two bases. Signalling is required for every correspondent node when a mobile node changes its network attachment point: this can result in a lot of overhead if there are many correspondent nodes. Both endpoints must support msctp which again would require changes in the network terminals. However, it is significantly easier to implement changes to the terminal than to the network infrastructure, as in the case of Mobile IP. The simultaneous handover of two correspondent nodes, although possible, may lead to the loss of the connection. Simultaneous handover is problematic as each node is unable to inform the other about its address change. This problem can be addressed with the use of other location management mechanisms such as MIP and dynamic DNS. 3.3 TCP Migrate. TCP Migrate is an end-to-end architecture for Internet host mobility. It uses dynamic updates to the domain name system to track host location and has functionality to enable the handover of existing TCP connections [7]. Existing TCP connections are retained using secure and efficient connection migration, enabling established connections to negotiate a change in end point IP addresses without the need for a third party. The architecture is secure name updates are effected via the secure DNS update protocol, while TCP connection migration involves the exchange of a new set of specifically designed migrate options. It provides a pure end-system alternative to routing based approaches such as Mobile IP. To locate mobile hosts as they change their network attachment point, TCP Migrate takes advantage of the widely deployed domain name system and its ability to support secure dynamic updates. Because most Internet applications resolve hostnames to an IP address at the beginning of a transaction or connection, this approach is viable for initiating new sessions with mobile hosts. When a host changes its network attachment point, it sends a secure DNS update to one of the name servers in its home domain updating its current location. The name-to-address mappings for these hosts are uncachable by other domains, so stale mappings are eliminated. The ability to support continuous communication during periods of mobility without modifying the network infrastructure is a more challenging problem. Two communicating peers must securely negotiate a change in the underlying network layer IP address and then seamlessly continue communication. A new TCP option was designed to support the secure migration of an established TCP connection across an IP address change. The Migrate option allows hosts to divert established TCP connections to a new IP address/tcp port pair by referencing them with a cryptographic token. Security is achieved through the use of this connection identifier or a token, which may be secured by a shared secret key negotiated through an ECDH key exchange during initial connection

7 establishment. It requires no third party authenticate migration requests, thereby allowing the end-points to use whatever authentication mechanism they choose to establish a trust relationship. TCP Migrate proves it is possible to implement mobility as an end-to-end service without network layer support Addressing. The key to the scalability of the Internet architecture is that the IP address serve as a routing locators, reflecting the addressee s point of attachment in the network. This enables aggregation based on address prefixes and allows routing to scale well. IP addresses are used to identify the mobile host; when a mobile host moves from one WLAN to another, it loses it s old IP address and therefore needs to obtain a new one. TCP Migrate separates the issues of obtaining an IP address in a foreign domain from locating and communicating with mobile hosts. Any suitable mechanism for address allocation may be employed such as manual assignment, the dynamic host configuration protocol or an auto-configuration protocol. TCP Migrate does not require any forwarding or reverse tunnelling to maintain seamless connectivity. Since no triangle routing anomalies are imposed, end-to-end latency for active connections is better than standard Mobile IP. In a foreign network a mobile host uses a locally obtained interface address valid in the foreign domain as its source address while communicating with other Internet hosts Mobile Host Location. Once a mobile host obtains an IP address, there are two ways in which it can communicate with correspondent hosts. Firstly, as a client, when the mobile host actively opens connections to the correspondent host. In this case, there is no special host location task to be performed, simply using the DNS as before works [9]. If a mobile host were always a client, then no updates need to be made to any third party such as a home agent or the DNS. To support VoIP like services and other applications where Internet hosts actively originate communication with a mobile host, the DNS is used to provide a level of indirection between a host s current location and an invariant end-point identifier. TCP Migrate is not a network layer solution and can avoid the indirection for every packet. It takes advantage of the fact that a hostname lookup is ubiquitously done by most applications that originate communication with a network host, and use the DNS name as an invariant. A DNS name identifies a host and does not assume anything about the network attachment point to which it may be attached. The indirection occurs only when the initial lookup is done via a control message. When a mobile host changes its attachment point, it must detect this and change the hostname-to-address mapping in the DNS. To avoid a stale mapping from being used from the DNS name cache, the time to live field for the mapping is set to zero, which prevents it from being cached Connection Migration. In order to facilitate secure and efficient connection migration a new Migrate TCP option was proposed. This option was included in SYN segments, and identifies the SYN packet as part of a previously established connection, rather than a request for a new connection (Figure 7). This Migrate option contains a token that identifies a previously established connection on the same destination <address, port> pair. The token is negotiated during initial connection establishment through the use of a Migrate-permitted option. After a successful token negotiation, TCP connections may be uniquely identified by either their traditional 4-tuple or a new triple on each host. A mobile host may restart a previously established TCP connection from a new address by sending a special Migrate SYN packet that contains the token identifying the previous connection (communication line 2 in Figure 8 below). The fixed host will then re-synchronise the connection with the mobile host at the new end point (communication line 3 in Figure 8 below). A migrated connection maintains the same control block and state (with different end points), including the sequence number space, so any necessary retransmissions can be requested in the standard fashion. This also ensures that SACK and any similar options continue to operate properly.

8 It is not possible for both endpoints to simultaneously change their network attachment points as this action would lead to the loss of connection. Again there is the issue of making changes to the network terminals in order to make them TCP Migrate enabled. 4. Simulation Work. Figure 7. Connection migration Any options negotiated on the initial SYN exchange remain in effect after connection migration and need not be resent in a migrate SYN. However, they can be if needed. For example it might be useful to renegotiate a new maximum segment size reflecting the properties of the new path. The performance of networking protocols can be analyzed and optimized efficiently using the tools provided by the QualNet simulation tool. A library of protocol models in source form is provided, so developers can build new network functionality. The version being used in this research has a SCTP module; however there is no support for the operation of TCP Migrate. Before simulation of TCP Migrate begins a suitable module must be written and patched into the existing QualNet simulator. Simulations will be performed on the operations of both msctp and TCP Migrate using models of applications such as Skype Voice over IP. Following the completion of the simulation of both protocols, a comparative analysis based on metrics such as handover latency, throughput or delay will be carried out. 4.1 Preliminary simulations. Several tasks have been completed before preliminary simulations of msctp handover for this document could be performed and various other tasks must still be completed for future simulations of TCP Migrate handover, including: Figure 8. TCP Migrate handover TCP Migrate Issues. The problems with TCP Migrate include the high latency that can be involved in it s handover procedure. Before resuming communication, the congestion-related state of the TCP connection must be reset to initial slow-start conditions in order to re-discover the properties of the new path in both directions; this may lead to handover latency. Also, the fact that TCP is mainly used for non delay sensitive traffic such as file transfer may cause some issues; however, Skype uses TCP in certain cases and it would be interesting to simulate the operation of Skype using TCP Migrate TCP Migrate module. Code to implement the TCP Migrate protocol must be written and patched into the existing simulation tool. Work has begun on the implementation of the Migrate Permitted and the Migrate options; however, this task is in the early stages of development and is not yet mature enough to facilitate the execution of experiments Scenario design. The design of logical and appropriate simulation scenarios is necessary in order to generate realistic and valid simulation results. Figure 9 below depicts the scenario design decided upon for preliminary simulation experiments. This scenario consists of various network components; three wireless access points;

9 and two terminal hosts, all connected to two wireless subnets. The mobile node, illustrated with the laptop image, is multi-homed with interfaces connecting it to two wireless APs operating on different channels. The correspondent host is connected to a third wireless access point, and it communicates with the mobile node using a specially designed application called GENERIC/FTP over SCTP. The location of each node shown below is approximately the same as the coordinates specified in the node placement file of the simulation scenario, the values along the x and y axes are representing hundreds of meters. The wireless technology being modelled is b, the default coverage area of which is 378m, ensuring that the coverage areas of access point A and B are overlapping. Figure 9. Simulation scenario The mobility model incorporated in the experimental scenario involves the mobile node traveling in a straight line from access point A to access point B, covering a distance of 500m in 1500sec or 25mins, giving an average velocity of 20m/min. The reasoning behind such slow speeds stems from the default heartbeat mechanism implemented as part of the SCTP protocol. The default HB interval used in the protocol is 30s; this, combined with the default HB error threshold of 6 (the number of consecutive times a heartbeat is not acknowledged before it is declared inactive) exposes SCTP handover to extremely significant latencies. Therefore, in order to ensure that a successful handover is possible, the mobile node must be positioned in the overlapping region of two APs for a period of at least 180s or 3min Running simulations. Determining a correct simulation configuration is an important aspect, which has a direct effect on the quality of the results obtained. The simulations performed in the course of this initial research into the handover performance are basic and the corresponding results preliminary. The configurations and techniques employed are not optimal, but rather, used to obtain results from which we can refine our simulations with the view of improving the overall handover performance. The main concession made in the course of the simulation work is the unsophisticated method by which the mobile node discovers the inactivity of it s primary wireless interface. The rfc contains no definition of how this functionality should be implemented and it therefore poses an interesting research problem. However, due to the preliminary nature of this work, the inactivity of the primary wireless link is detected by the remote correspondent node using heartbeat chunks. The remote node then reports this event to the mobile node by sending it an InactivePrimary Chunk. The receipt of this chunk triggers the mobile node to send an Asconf Chunk instructing the correspondent node to update the association s address list by setting an alternative specified address as the primary destination address. Despite our interest in simulating handover using VoIP traffic, for the sake of convenience, we opted to use GENERIC/FTP/SCTP. This application is a modification to the GENERIC/FTP application, which has been adapted to run over SCTP by facilitating multistreaming Obtaining and analysing results. The scenario detailed previously was run five times, using a different random seed each time. Packet trace and statistics files were generated for each execution and used to determine delay incurred during handover. The simulation length was set to 3000s with the application starting at 800s and the source of communication being the stationary node. The heartbeat interval was set to be 10s. The results obtained from these simulations indicated that the detection of inactivity of a wireless interface took on average approximately 1000s. When the peer failure occurs the DATA chunk sent to the destination addr1 will cause a timeout at endpoint A. This timeout event will increase the total error counter of the peer by one and will trigger the retransmission of the chunk to

10 destination addr2. This will also cause the RTO of the first address to be doubled. Similarly, this retransmission to addr2 will time out, and the events described above will be repeated again and again, each time with longer RTOs an increased error values. Finally the error counter will exceed the value of the associations max retransmission and the endpoint is declared unreachable. This figure indicates that both the HB interval and the HB error threshold may need to be tuned and in setting optimal values for these parameters may offer significant reduction in the handover latency. One other observation is that, when the mobile node enters the overlapping region, the corresponding node continues using the current primary address, until the mobile node tells the corresponding node to change the primary address. During this time, the data chunks could not be transmitted to the old primary address as the link is not strong enough, which causes reduction in congestion window value and retransmissions. The basic simulation work carried out and detailed in this document helped to identify possible improvements to be made to the SCTP protocol. The latency times experienced are sufficient indications that the performance of the SCTP handover needs to be significantly improved to provide the continuous connectivity required to support real time applications during periods of mobility. The selection policy for the temporary primary destination address is not specified in the SCTP protocol and is an implementation decision. In the SCTP implementation used for this work we assume that all the data chunks marked for retransmission will go to the same alternate destination. Thus, some of the data chunks might go to the same destination as their original with this strategy. This technique is suboptimal in its selection of an alternative destination address, where to send the rtx chunks remains a research issue. The previously mentioned implementation of measuring the health of wireless links is obviously suboptimal; clearly, detection of the inactivity of a link, when performed locally, would be significantly quicker than a remote host reporting the link failure. Therefore, by incorporating some cross layer communication, where the mobile node queries the health of a link from the lower layers, would provide significant performance improvements. 5. Conclusions. A network layer handover solution has the important advantage in that it does not require changes to the applications however, it has significant problems in that it requires substantial changes to the network infrastructure. For this reason, it is interesting from a research perspective to study the transport layer options. Two transport layer options have been presented, each having some advantages and disadvantages. Both are possibly suited to different cases or different types of traffic. For example, TCP Migrate may be used for non delay sensitive traffic such as FTP or HTTP, while msctp may be used for new applications with/without delay sensitive characteristics. The handover problem poses an interesting research prospect and we plan to carry out some simulation work in the next few months. Preliminary results obtained are a positive indication that more research is needed in this area and that significant improvements may be obtained. Acknowledgement The support of the Informatics Research initiative of Enterprise Ireland is gratefully acknowledged. References [1] D. C. Lynch and M. T. Rose (eds.). Internet System Handbook. Addison-Wesley, [2] Perkins, C.E., Mobile networking through Mobile IP, IEEE Internet Computing, Volume2, Issue 1, Jan Feb [3] Andrew S. Tanenbaum, Computer Networks, Fourth Edition. Prentice Hall [4] C. Perkins, IP Mobility for IP v4, revised RFC 3220, January 2002 [5] R. Stewart, Stream Control Transport Protocol RFC 2960, October 2001 [6] M Riguel, M Tuexan, Mobile SCTP, draft-riegeltuexen-mobile-sctp-01.txt [7] Seok Joo Koh; Moon Jeong Chang; Meejeong Lee; msctp for soft handover in transport layer, IEEE Communications Letters Volume 8, Issue 3, March 2004 [8] AC Snoeren, H Balakrishnan, An end-to-end approach to host mobility, 6th ACM/IEEE International Conference on Mobile Computing and Networking (MobiCom 00) [9] W. Stallings. Data and Computer Communication, Seventh Edition. Macmillan, 1988.

Mobile SCTP for IP Mobility Support in All-IP Networks

Mobile SCTP for IP Mobility Support in All-IP Networks Mobile SCTP for IP Mobility Support in All-IP Networks Seok Joo Koh sjkoh@cs.knu.ac.kr Abstract The Stream Control Transmission Protocol (SCTP) is a new transport protocol that is featured multi-streaming

More information

A Scheme of Primary Path Switching for Mobile Terminals using SCTP Handover

A Scheme of Primary Path Switching for Mobile Terminals using SCTP Handover Proceedings of the 2007 WSEAS International Conference on Computer Engineering and Applications, Gold Coast, Australia, January 17-19, 2007 218 A Scheme of Primary Path Switching for Mobile Terminals using

More information

IP Mobility vs. Session Mobility

IP Mobility vs. Session Mobility IP Mobility vs. Session Mobility Securing wireless communication is a formidable task, something that many companies are rapidly learning the hard way. IP level solutions become extremely cumbersome when

More information

msctp for Vertical Handover Between Heterogeneous Networks

msctp for Vertical Handover Between Heterogeneous Networks msctp for Vertical Handover Between Heterogeneous Networks Seok Joo Koh and Sang Wook Kim Department of Computer Science, Kyungpook National University, Daegoo, Korea {sjkoh, swkim}@cs.knu.ac.kr Abstract.

More information

Stream Control Transmission Protocol (SCTP)

Stream Control Transmission Protocol (SCTP) Stream Control Transmission Protocol (SCTP) Definition Stream control transmission protocol (SCTP) is an end-to-end, connectionoriented protocol that transports data in independent sequenced streams. SCTP

More information

Charles Perkins Nokia Research Center 2 July Mobility Support in IPv6 <draft-ietf-mobileip-ipv6-14.txt> Status of This Memo

Charles Perkins Nokia Research Center 2 July Mobility Support in IPv6 <draft-ietf-mobileip-ipv6-14.txt> Status of This Memo IETF Mobile IP Working Group INTERNET-DRAFT David B. Johnson Rice University Charles Perkins Nokia Research Center 2 July 2000 Mobility Support in IPv6 Status of This

More information

Use of SCTP for IP Handover Support

Use of SCTP for IP Handover Support Use of SCTP for IP Handover Support Dong Phil Kim, Jong Shik Ha, Sang Tae Kim, Seok Joo Koh Department of Computer Science Kyungpook National University {dpkim, mugal1, sainpaul1978}@cs.knu.ac.kr Abstract

More information

Location Management Agent for SCTP Handover in Mobile Network

Location Management Agent for SCTP Handover in Mobile Network Location Management Agent for SCTP Handover in Mobile Network Yong-Jin Lee Department of Technology Education, Korea National University of Education 250 Taesungtapyon-ro, Heungduk-ku, Cheongju, South

More information

UNIT IV -- TRANSPORT LAYER

UNIT IV -- TRANSPORT LAYER UNIT IV -- TRANSPORT LAYER TABLE OF CONTENTS 4.1. Transport layer. 02 4.2. Reliable delivery service. 03 4.3. Congestion control. 05 4.4. Connection establishment.. 07 4.5. Flow control 09 4.6. Transmission

More information

Wireless Challenges : Computer Networking. Overview. Routing to Mobile Nodes. Lecture 25: Wireless Networking

Wireless Challenges : Computer Networking. Overview. Routing to Mobile Nodes. Lecture 25: Wireless Networking Wireless Challenges 15-441: Computer Networking Lecture 25: Wireless Networking Force us to rethink many assumptions Need to share airwaves rather than wire Don t know what hosts are involved Host may

More information

IPV6 SIMPLE SECURITY CAPABILITIES.

IPV6 SIMPLE SECURITY CAPABILITIES. IPV6 SIMPLE SECURITY CAPABILITIES. 50 issues from RFC 6092 edited by J. Woodyatt, Apple Presentation by Olle E. Johansson, Edvina AB. ABSTRACT The RFC which this presentation is based upon is focused on

More information

CS 5520/ECE 5590NA: Network Architecture I Spring Lecture 13: UDP and TCP

CS 5520/ECE 5590NA: Network Architecture I Spring Lecture 13: UDP and TCP CS 5520/ECE 5590NA: Network Architecture I Spring 2008 Lecture 13: UDP and TCP Most recent lectures discussed mechanisms to make better use of the IP address space, Internet control messages, and layering

More information

Mobile IP and Mobile Transport Protocols

Mobile IP and Mobile Transport Protocols Mobile IP and Mobile Transport Protocols 1 IP routing Preliminaries Works on a hop-by-hop basis using a routing table 32 bits: 129.97.92.42 Address = subnet + host (Mobility No packet for you) Two parts»

More information

Chapter 7 Mobility Management at Transport Layer

Chapter 7 Mobility Management at Transport Layer Chapter 7 Mobility Management at Transport Layer This chapter is dedicated to transport-layer mobility support schemes, which follow an end-to-end philosophy, putting the notion of mobility at the end

More information

Communications Software. CSE 123b. CSE 123b. Spring Lecture 10: Mobile Networking. Stefan Savage

Communications Software. CSE 123b. CSE 123b. Spring Lecture 10: Mobile Networking. Stefan Savage CSE 123b CSE 123b Communications Software Spring 2003 Lecture 10: Mobile Networking Stefan Savage Quick announcement My office hours tomorrow are moved to 12pm May 6, 2003 CSE 123b -- Lecture 10 Mobile

More information

Quick announcement. CSE 123b Communications Software. Last class. Today s issues. The Mobility Problem. Problems. Spring 2003

Quick announcement. CSE 123b Communications Software. Last class. Today s issues. The Mobility Problem. Problems. Spring 2003 CSE 123b Communications Software Quick announcement My office hours tomorrow are moved to 12pm Spring 2003 Lecture 10: Mobile Networking Stefan Savage May 6, 2003 CSE 123b -- Lecture 10 Mobile IP 2 Last

More information

CSE 123A Computer Netwrking

CSE 123A Computer Netwrking CSE 123A Computer Netwrking Winter 2005 Mobile Networking Alex Snoeren presenting in lieu of Stefan Savage Today s s issues What are implications of hosts that move? Remember routing? It doesn t work anymore

More information

Introduction Mobility Support Handover Management Conclutions. Mobility in IPv6. Thomas Liske. Dresden University of Technology

Introduction Mobility Support Handover Management Conclutions. Mobility in IPv6. Thomas Liske. Dresden University of Technology 2005 / High Speed Networks II Outline Introduction Mobility Support Overview of IPv6 Mobility Support Handover Management Mobility Support What means Mobility Support? allow transparent routing of IPv6

More information

A Transport Layer Mobility Support Mechanism

A Transport Layer Mobility Support Mechanism A Transport Layer Mobility Support Mechanism Moonjeong Chang 1, Meejeong Lee 1, and Seokjoo Koh 2 1 Dept. of Computer Engineering, Ewha Womans University, Seoul 121-791, Korea {mjchang,lmj}@ewha.ac.kr

More information

LECTURE 8. Mobile IP

LECTURE 8. Mobile IP 1 LECTURE 8 Mobile IP What is Mobile IP? The Internet protocol as it exists does not support mobility Mobile IP tries to address this issue by creating an anchor for a mobile host that takes care of packet

More information

Outline. CS5984 Mobile Computing. Host Mobility Problem 1/2. Host Mobility Problem 2/2. Host Mobility Problem Solutions. Network Layer Solutions Model

Outline. CS5984 Mobile Computing. Host Mobility Problem 1/2. Host Mobility Problem 2/2. Host Mobility Problem Solutions. Network Layer Solutions Model CS5984 Mobile Computing Outline Host Mobility problem and solutions IETF Mobile IPv4 Dr. Ayman Abdel-Hamid Computer Science Department Virginia Tech Mobile IPv4 1 2 Host Mobility Problem 1/2 Host Mobility

More information

Fixed Internetworking Protocols and Networks. IP mobility. Rune Hylsberg Jacobsen Aarhus School of Engineering

Fixed Internetworking Protocols and Networks. IP mobility. Rune Hylsberg Jacobsen Aarhus School of Engineering Fixed Internetworking Protocols and Networks IP mobility Rune Hylsberg Jacobsen Aarhus School of Engineering rhj@iha.dk 1 2011 ITIFN Mobile computing Vision Seamless, ubiquitous network access for mobile

More information

2013 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other uses, in any current or future media,

2013 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other uses, in any current or future media, 2013 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other uses, in any current or future media, including reprinting/republishing this material for advertising

More information

Outline. CS6504 Mobile Computing. Host Mobility Problem 1/2. Host Mobility Problem 2/2. Dr. Ayman Abdel-Hamid. Mobile IPv4.

Outline. CS6504 Mobile Computing. Host Mobility Problem 1/2. Host Mobility Problem 2/2. Dr. Ayman Abdel-Hamid. Mobile IPv4. CS6504 Mobile Computing Outline Host Mobility problem and solutions IETF Mobile IPv4 Dr. Ayman Abdel-Hamid Computer Science Department Virginia Tech Mobile IPv4 1 2 Host Mobility Problem 1/2 Host Mobility

More information

CSE 123b Communications Software

CSE 123b Communications Software CSE 123b Communications Software Spring 2004 Lecture 9: Mobile Networking Stefan Savage Quick announcements Typo in problem #1 of HW #2 (fixed as of 1pm yesterday) Please consider chapter 4.3-4.3.3 to

More information

Quick announcements. CSE 123b Communications Software. Today s issues. Last class. The Mobility Problem. Problems. Spring 2004

Quick announcements. CSE 123b Communications Software. Today s issues. Last class. The Mobility Problem. Problems. Spring 2004 CSE 123b Communications Software Spring 2004 Lecture 9: Mobile Networking Quick announcements Typo in problem #1 of HW #2 (fixed as of 1pm yesterday) Please consider chapter 4.3-4.3.3 to be part of the

More information

ECS-087: Mobile Computing

ECS-087: Mobile Computing ECS-087: Mobile Computing Mobile IP Most of the slides borrowed from Prof. Sridhar Iyer Diwakar Yagyasen.1 Effect of Mobility on Protocol Stack Application: new applications and adaptations Transport:

More information

Novel web agent framework to support seamless mobility for data networks Y.-J. Lee 1 D.-W. Lee 2 M. Atiquzzaman 3

Novel web agent framework to support seamless mobility for data networks Y.-J. Lee 1 D.-W. Lee 2 M. Atiquzzaman 3 Published in IET Communications Received on 11th December 2008 Revised on 20th March 2009 ISSN 1751-8628 Novel web agent framework to support seamless mobility for data networks Y.-J. Lee 1 D.-W. Lee 2

More information

TSIN02 - Internetworking

TSIN02 - Internetworking Lecture 5: SCTP Litterature: RFC3257 SCTP Applicability Statement RFC3286 Introduction to SCTP Forouzan 3 rd ed, Chapter 13 (optional) RFC2960 (optional extra material) RFC3309 (optional extra material)

More information

IPv6 Protocols and Networks Hadassah College Spring 2018 Wireless Dr. Martin Land

IPv6 Protocols and Networks Hadassah College Spring 2018 Wireless Dr. Martin Land IPv6 1 IPv4 & IPv6 Header Comparison IPv4 Header IPv6 Header Ver IHL Type of Service Total Length Ver Traffic Class Flow Label Identification Flags Fragment Offset Payload Length Next Header Hop Limit

More information

On using Mobile IP Protocols

On using Mobile IP Protocols Journal of Computer Science 2 (2): 211-217, 2006 ISSN 1549-3636 2006 Science Publications On using Mobile IP Protocols Fayza A. Nada Faculty of Computers and Information, Suez Canal University, Ismailia,

More information

IPv6. IPv4 & IPv6 Header Comparison. Types of IPv6 Addresses. IPv6 Address Scope. IPv6 Header. IPv4 Header. Link-Local

IPv6. IPv4 & IPv6 Header Comparison. Types of IPv6 Addresses. IPv6 Address Scope. IPv6 Header. IPv4 Header. Link-Local 1 v4 & v6 Header Comparison v6 Ver Time to Live v4 Header IHL Type of Service Identification Protocol Flags Source Address Destination Address Total Length Fragment Offset Header Checksum Ver Traffic Class

More information

Modification to Ipv6 Neighbor Discovery and Mobile Node Operation

Modification to Ipv6 Neighbor Discovery and Mobile Node Operation RESEARCH INVENTY: International Journal of Engineering and Science ISSN: 2278-4721, Vol. 1, Issue 6 (October 2012), PP 39-49 www.researchinventy.com Modification to Ipv6 Neighbor Discovery and Mobile Node

More information

Outline 9.2. TCP for 2.5G/3G wireless

Outline 9.2. TCP for 2.5G/3G wireless Transport layer 9.1 Outline Motivation, TCP-mechanisms Classical approaches (Indirect TCP, Snooping TCP, Mobile TCP) PEPs in general Additional optimizations (Fast retransmit/recovery, Transmission freezing,

More information

Guide to Networking Essentials, 6 th Edition. Chapter 5: Network Protocols

Guide to Networking Essentials, 6 th Edition. Chapter 5: Network Protocols Guide to Networking Essentials, 6 th Edition Chapter 5: Network Protocols Objectives Describe the purpose of a network protocol, the layers in the TCP/IP architecture, and the protocols in each TCP/IP

More information

nsctp: A New Transport Layer Tunnelling Approach to Provide Seamless Handover for Moving Network

nsctp: A New Transport Layer Tunnelling Approach to Provide Seamless Handover for Moving Network nsctp: A New Transport Layer Tunnelling Approach to Provide Seamless Handover for Moving Network Peyman Behbahani City University, London, UK p.behbahani@city.ac.uk Veselin Rakocevic City University, London,

More information

Obsoletes: 2002 January 2002 Category: Standards Track

Obsoletes: 2002 January 2002 Category: Standards Track Network Working Group C. Perkins, Ed. Request for Comments: 3220 Nokia Research Center Obsoletes: 2002 January 2002 Category: Standards Track Status of this Memo IP Mobility Support for IPv4 This document

More information

A Two-level Threshold Recovery Mechanism for SCTP

A Two-level Threshold Recovery Mechanism for SCTP A Two-level Threshold Recovery Mechanism for SCTP Armando L. Caro Jr., Janardhan R. Iyengar, Paul D. Amer, Gerard J. Heinz Computer and Information Sciences University of Delaware acaro, iyengar, amer,

More information

CMPE150 Midterm Solutions

CMPE150 Midterm Solutions CMPE150 Midterm Solutions Question 1 Packet switching and circuit switching: (a) Is the Internet a packet switching or circuit switching network? Justify your answer. The Internet is a packet switching

More information

TSIN02 - Internetworking

TSIN02 - Internetworking TSIN02 - Internetworking Lecture 5: SCTP Litterature: Forouzan 3 rd ed, Chapter 13 RFC3257 SCTP Applicability Statement RFC3286 Introduction to SCTP Outline: What is SCTP? Why SCTP? SCTP Architecture SCTP

More information

Unit 2.

Unit 2. Unit 2 Unit 2 Topics Covered: 1. PROCESS-TO-PROCESS DELIVERY 1. Client-Server 2. Addressing 2. IANA Ranges 3. Socket Addresses 4. Multiplexing and Demultiplexing 5. Connectionless Versus Connection-Oriented

More information

CSE 4215/5431: Mobile Communications Winter Suprakash Datta

CSE 4215/5431: Mobile Communications Winter Suprakash Datta CSE 4215/5431: Mobile Communications Winter 2013 Suprakash Datta datta@cse.yorku.ca Office: CSEB 3043 Phone: 416-736-2100 ext 77875 Course page: http://www.cse.yorku.ca/course/4215 Some slides are adapted

More information

Chapter 6. What happens at the Transport Layer? Services provided Transport protocols UDP TCP Flow control Congestion control

Chapter 6. What happens at the Transport Layer? Services provided Transport protocols UDP TCP Flow control Congestion control Chapter 6 What happens at the Transport Layer? Services provided Transport protocols UDP TCP Flow control Congestion control OSI Model Hybrid Model Software outside the operating system Software inside

More information

Chapter 13 TRANSPORT. Mobile Computing Winter 2005 / Overview. TCP Overview. TCP slow-start. Motivation Simple analysis Various TCP mechanisms

Chapter 13 TRANSPORT. Mobile Computing Winter 2005 / Overview. TCP Overview. TCP slow-start. Motivation Simple analysis Various TCP mechanisms Overview Chapter 13 TRANSPORT Motivation Simple analysis Various TCP mechanisms Distributed Computing Group Mobile Computing Winter 2005 / 2006 Distributed Computing Group MOBILE COMPUTING R. Wattenhofer

More information

User Datagram Protocol (UDP):

User Datagram Protocol (UDP): SFWR 4C03: Computer Networks and Computer Security Feb 2-5 2004 Lecturer: Kartik Krishnan Lectures 13-15 User Datagram Protocol (UDP): UDP is a connectionless transport layer protocol: each output operation

More information

Chapter 3 A New Framework for Multicast Mobility in WiFi Networks

Chapter 3 A New Framework for Multicast Mobility in WiFi Networks Chapter 3 A New Framework for Multicast Mobility in WiFi Networks 3.1 Introduction This chapter presents the designed framework that was produced during this research. The chapter describes about network

More information

Computer Networks, Andrew Tannenbaum, Chapter 5.6. Computer Networking: A Top Down Approach Featuring the

Computer Networks, Andrew Tannenbaum, Chapter 5.6. Computer Networking: A Top Down Approach Featuring the Mobile IP (IPv4 and IPv6) Dr. John Keeney 3BA33 Elements of a wireless Wired infrastructure wireless hosts laptop, PDA, IP phone run applications may be stationary (nonmobile) or mobile wireless does not

More information

Architecture and Performance of SIGMA: A Seamless Mobility Architecture for Data Networks

Architecture and Performance of SIGMA: A Seamless Mobility Architecture for Data Networks Architecture and Performance of : A Seamless Mobility Architecture for Data Networks Shaojian Fu, Liran Ma, Mohammed Atiquzzaman, Yong-Jin Lee Telecommunications and Networks Research Lab School of Computer

More information

Vertical Handoff Characterization for SIP and msctp Based UMTS-WLAN Integration Solutions

Vertical Handoff Characterization for SIP and msctp Based UMTS-WLAN Integration Solutions Vertical Handoff Characterization for SIP and msctp Based UMTS-WLAN Integration Solutions Syed Asadullah, Ashraf S. Mahmoud, Marwan Abu-Amara, Tarek Sheltami Computer Engineering Department King Fahd University

More information

End-to-End Architectures for the Internet Host Mobility: An Overview

End-to-End Architectures for the Internet Host Mobility: An Overview Page 1 of 7 End-to-End Architectures for the Internet Host Mobility: An Overview Bilal Farooq Lahore University of Management Sciences Department of Computer Science bilalf@lums.edu.pk April 7 th, 2003

More information

Mobile IP Overview. Based on IP so any media that can support IP can also support Mobile IP

Mobile IP Overview. Based on IP so any media that can support IP can also support Mobile IP Introduction: Mobile IP Overview An Internet Protocol address (IP address) is a numerical label assigned to each device (e.g., computer, printer) participating in a computer network that uses the Internet

More information

CMPE 257: Wireless and Mobile Networking

CMPE 257: Wireless and Mobile Networking CMPE 257: Wireless and Mobile Networking Katia Obraczka Computer Engineering UCSC Baskin Engineering Lecture 9 CMPE 257 Winter'10 1 Announcements Student presentations: March 8th: Daniel and Teddy March

More information

Internet Engineering Task Force (IETF) Ericsson July 2011

Internet Engineering Task Force (IETF) Ericsson July 2011 Internet Engineering Task Force (IETF) Request for Comments: 6275 Obsoletes: 3775 Category: Standards Track ISSN: 2070-1721 C. Perkins, Ed. Tellabs, Inc. D. Johnson Rice University J. Arkko Ericsson July

More information

Mobile Communications Chapter 9: Mobile Transport Layer

Mobile Communications Chapter 9: Mobile Transport Layer Prof. Dr.-Ing Jochen H. Schiller Inst. of Computer Science Freie Universität Berlin Germany Mobile Communications Chapter 9: Mobile Transport Layer Motivation, TCP-mechanisms Classical approaches (Indirect

More information

Optimized Paging Cache Mappings for efficient location management Hyun Jun Lee, Myoung Chul Jung, and Jai Yong Lee

Optimized Paging Cache Mappings for efficient location management Hyun Jun Lee, Myoung Chul Jung, and Jai Yong Lee Optimized Paging Cache Mappings for efficient location management Hyun Jun Lee, Myoung Chul Jung, and Jai Yong Lee Abstract Cellular IP maintains distributed cache for location management and routing purposes.

More information

4.0.1 CHAPTER INTRODUCTION

4.0.1 CHAPTER INTRODUCTION 4.0.1 CHAPTER INTRODUCTION Data networks and the Internet support the human network by supplying seamless, reliable communication between people - both locally and around the globe. On a single device,

More information

An SCTP-Protocol Data Unit with several chunks

An SCTP-Protocol Data Unit with several chunks SCTP for Beginners Section 2 SCTP Packets he protocol data units (PDU) of SCTP are called SCTP packets. If SCTP runs over IP (as described in RFC2960 ), an SCTP packet forms the payload of an IP packet.

More information

Wireless TCP. TCP mechanism. Wireless Internet: TCP in Wireless. Wireless TCP: transport layer

Wireless TCP. TCP mechanism. Wireless Internet: TCP in Wireless. Wireless TCP: transport layer Wireless TCP W.int.2-2 Wireless Internet: TCP in Wireless Module W.int.2 Mobile IP: layer, module W.int.1 Wireless TCP: layer Dr.M.Y.Wu@CSE Shanghai Jiaotong University Shanghai, China Dr.W.Shu@ECE University

More information

Extended Correspondent Registration Scheme for Reducing Handover Delay in Mobile IPv6

Extended Correspondent Registration Scheme for Reducing Handover Delay in Mobile IPv6 Extended Correspondent Registration Scheme for Reducing Handover Delay in Mobile IPv6 Ved P. Kafle Department of Informatics The Graduate University for Advanced Studies Tokyo, Japan Eiji Kamioka and Shigeki

More information

UNIT 2 TRANSPORT LAYER

UNIT 2 TRANSPORT LAYER Network, Transport and Application UNIT 2 TRANSPORT LAYER Structure Page No. 2.0 Introduction 34 2.1 Objective 34 2.2 Addressing 35 2.3 Reliable delivery 35 2.4 Flow control 38 2.5 Connection Management

More information

Mohammad Hossein Manshaei 1393

Mohammad Hossein Manshaei 1393 Mohammad Hossein Manshaei manshaei@gmail.com 1393 Mobile IP 2 Mobile Network Layer: Problems and Concerns Entities and Terminology in Mobile IP Mobile Indirect Routing Mobile IP Agent Advertisement Registration

More information

Binding information contains the entries in the mobility binding table.

Binding information contains the entries in the mobility binding table. GLOSSARY Numerics 802.11b/g An IEEE specification for a wireless LAN airlink. A agent advertisement agent discovery agent solicitation An advertisement message constructed by attachment of a special extension

More information

QoS-Aware IPTV Routing Algorithms

QoS-Aware IPTV Routing Algorithms QoS-Aware IPTV Routing Algorithms Patrick McDonagh, Philip Perry, Liam Murphy. School of Computer Science and Informatics, University College Dublin, Belfield, Dublin 4. {patrick.mcdonagh, philip.perry,

More information

Secure SCTP against DoS Attacks in Wireless Internet *

Secure SCTP against DoS Attacks in Wireless Internet * Secure SCTP against DoS Attacks in Wireless Internet * Inwhee Joe College of Information and Communications Hanyang University Seoul, Korea iwj oeshanyang,ac.kr Abstract. The Stream Control Transport Protocol

More information

Measuring MPLS overhead

Measuring MPLS overhead Measuring MPLS overhead A. Pescapè +*, S. P. Romano +, M. Esposito +*, S. Avallone +, G. Ventre +* * ITEM - Laboratorio Nazionale CINI per l Informatica e la Telematica Multimediali Via Diocleziano, 328

More information

IP - The Internet Protocol. Based on the slides of Dr. Jorg Liebeherr, University of Virginia

IP - The Internet Protocol. Based on the slides of Dr. Jorg Liebeherr, University of Virginia IP - The Internet Protocol Based on the slides of Dr. Jorg Liebeherr, University of Virginia Orientation IP (Internet Protocol) is a Network Layer Protocol. IP: The waist of the hourglass IP is the waist

More information

Chapter 2 - Part 1. The TCP/IP Protocol: The Language of the Internet

Chapter 2 - Part 1. The TCP/IP Protocol: The Language of the Internet Chapter 2 - Part 1 The TCP/IP Protocol: The Language of the Internet Protocols A protocol is a language or set of rules that two or more computers use to communicate 2 Protocol Analogy: Phone Call Parties

More information

Mobile Routing : Computer Networking. Overview. How to Handle Mobile Nodes? Mobile IP Ad-hoc network routing Assigned reading

Mobile Routing : Computer Networking. Overview. How to Handle Mobile Nodes? Mobile IP Ad-hoc network routing Assigned reading Mobile Routing 15-744: Computer Networking L-10 Ad Hoc Networks Mobile IP Ad-hoc network routing Assigned reading Performance Comparison of Multi-Hop Wireless Ad Hoc Routing Protocols A High Throughput

More information

CMPE 257: Wireless and Mobile Networking

CMPE 257: Wireless and Mobile Networking CMPE 257: Wireless and Mobile Networking Katia Obraczka Computer Engineering UCSC Baskin Engineering Lecture 8 CMPE 257 Winter'11 1 Announcements: Student presentations: Security: Jim. Seth: security in

More information

Lecture 7: Mobile IP (Part 1) Dr. Reynold Cheng

Lecture 7: Mobile IP (Part 1) Dr. Reynold Cheng Lecture 7: Mobile IP (Part 1) Dr. Reynold Cheng This lecture is based on the textbook W. Stallings, Wireless Communications and Networks, Prentice Hall, 2005, the slides (prepared by Tom Fronckowiak) and

More information

Stream Control Transmission Protocol

Stream Control Transmission Protocol Chapter 13 Stream Control Transmission Protocol Objectives Upon completion you will be able to: Be able to name and understand the services offered by SCTP Understand SCTP s flow and error control and

More information

TCP/IP Networking. Part 4: Network and Transport Layer Protocols

TCP/IP Networking. Part 4: Network and Transport Layer Protocols TCP/IP Networking Part 4: Network and Transport Layer Protocols Orientation Application Application protocol Application TCP TCP protocol TCP IP IP protocol IP IP protocol IP IP protocol IP Network Access

More information

Wireless Challenges : Computer Networking. Overview. Routing to Mobile Nodes. Lecture 24: Mobile and Wireless

Wireless Challenges : Computer Networking. Overview. Routing to Mobile Nodes. Lecture 24: Mobile and Wireless Wireless Challenges 15-441: Computer Networking Lecture 24: Mobile and Wireless Peter Steenkiste Fall 2010 www.cs.cmu.edu/~prs/15-441-f10 Force us to rethink many assumptions Need to share airwaves rather

More information

CS457 Transport Protocols. CS 457 Fall 2014

CS457 Transport Protocols. CS 457 Fall 2014 CS457 Transport Protocols CS 457 Fall 2014 Topics Principles underlying transport-layer services Demultiplexing Detecting corruption Reliable delivery Flow control Transport-layer protocols User Datagram

More information

Handover Management for Mobile Nodes in IPv6 Networks

Handover Management for Mobile Nodes in IPv6 Networks TECHNOLOGY ADVANCES FOR 3G AND BEYOND Handover Management for Mobile Nodes in IPv6 Networks Nicolas Montavont and Thomas Noël LSIIT Louis Pasteur University CNRS, Strasbourg ABSTRACT In this article we

More information

Schahin Rajab TCP or QUIC Which protocol is most promising for the future of the internet?

Schahin Rajab TCP or QUIC Which protocol is most promising for the future of the internet? Schahin Rajab sr2@kth.se 2016 04 20 TCP or QUIC Which protocol is most promising for the future of the internet? Table of contents 1 Introduction 3 2 Background 4 2.1 TCP 4 2.2 UDP 4 2.3 QUIC 4 2.4 HTTP

More information

Mobile Communications Chapter 9: Mobile Transport Layer

Mobile Communications Chapter 9: Mobile Transport Layer Prof. Dr.-Ing Jochen H. Schiller Inst. of Computer Science Freie Universität Berlin Germany Mobile Communications Chapter 9: Mobile Transport Layer Motivation, TCP-mechanisms Classical approaches (Indirect

More information

User Datagram Protocol

User Datagram Protocol Topics Transport Layer TCP s three-way handshake TCP s connection termination sequence TCP s TIME_WAIT state TCP and UDP buffering by the socket layer 2 Introduction UDP is a simple, unreliable datagram

More information

Mobile Transport Layer

Mobile Transport Layer Mobile Transport Layer 1 Transport Layer HTTP (used by web services) typically uses TCP Reliable transport between TCP client and server required - Stream oriented, not transaction oriented - Network friendly:

More information

Chapter 24. Transport-Layer Protocols

Chapter 24. Transport-Layer Protocols Chapter 24. Transport-Layer Protocols 23.1 Introduction 23.2 User Datagram Protocol 23.3 Transmission Control Protocol 23.4 SCTP Computer Networks 24-1 Position of Transport-Layer Protocols UDP is an unreliable

More information

Active source routing for ad-hoc network: seamless integration of wireless environment

Active source routing for ad-hoc network: seamless integration of wireless environment Active source routing for ad-hoc network: seamless integration of wireless environment 1. Introduction Active networking is the emerging technology that will provide new network environment where lots

More information

Module 28 Mobile IP: Discovery, Registration and Tunneling

Module 28 Mobile IP: Discovery, Registration and Tunneling Module 28 Mobile IP: Discovery, and Tunneling Learning Objectives Introduction to different phases of Mobile IP Understanding how a mobile node search the agents using Discovery process Understand how

More information

Master Course Computer Networks IN2097

Master Course Computer Networks IN2097 Chair for Network Architectures and Services Prof. Carle Department for Computer Science TU München Chair for Network Architectures and Services Prof. Carle Department for Computer Science TU München Master

More information

Internet and Intranet Protocols and Applications

Internet and Intranet Protocols and Applications Internet and Intranet Protocols and Applications Lecture 1b: The Transport Layer in the Internet January 17, 2006 Arthur Goldberg Computer Science Department New York University artg@cs.nyu.edu 01/17/06

More information

IPv6 Neighbor Discovery

IPv6 Neighbor Discovery The IPv6 neighbor discovery process uses Internet Control Message Protocol (ICMP) messages and solicited-node multicast addresses to determine the link-layer address of a neighbor on the same network (local

More information

Aalborg University Institute of Electronic Systems - Communication Networks - 6th Semester

Aalborg University Institute of Electronic Systems - Communication Networks - 6th Semester Aalborg University Institute of Electronic Systems - Communication Networks - 6th Semester TITLE: Experimental Analysis of Mobility Support Schemes for Vertical Handover SUBJECT: Basic Wireless Communication

More information

CCNA Exploration Network Fundamentals. Chapter 04 OSI Transport Layer

CCNA Exploration Network Fundamentals. Chapter 04 OSI Transport Layer CCNA Exploration Network Fundamentals Chapter 04 OSI Transport Layer Updated: 05/05/2008 1 4.1 Roles of the Transport Layer 2 4.1 Roles of the Transport Layer The OSI Transport layer accept data from the

More information

IPv6: An Introduction

IPv6: An Introduction Outline IPv6: An Introduction Dheeraj Sanghi Department of Computer Science and Engineering Indian Institute of Technology Kanpur dheeraj@iitk.ac.in http://www.cse.iitk.ac.in/users/dheeraj Problems with

More information

Mobile IPv6 Overview

Mobile IPv6 Overview Sungkyunkwan University Prepared by H. Choo Copyright 2000-2018 Networking Laboratory Lecture Outline Network Layer Mobile IPv6 Proxy Mobile IPv6 Networking Laboratory 2/87 Sungkyunkwan University Network

More information

Performance Analysis of Hierarchical Mobile IPv6 in IP-based Cellular Networks

Performance Analysis of Hierarchical Mobile IPv6 in IP-based Cellular Networks Performance Analysis of Hierarchical Mobile IPv6 in IP-based Cellular Networks Sangheon Pack and Yanghee Choi School of Computer Science & Engineering Seoul National University Seoul, Korea Abstract Next-generation

More information

RADIO AWARE SCTP EXTENSION FOR HANDOVER DATA IN EGPRS

RADIO AWARE SCTP EXTENSION FOR HANDOVER DATA IN EGPRS RADIO AWARE SCTP EXTENSION FOR HANDOVER DATA IN EGPRS Mériem Afif 1, Philippe Martins 2, Sami Tabbane 3 and Philippe Godlewski 4 1, 3, Mediatron, Ecole Supérieure des Communications de Tunis (Sup'Com),

More information

Utilizing Multiple Home Links in Mobile IPv6

Utilizing Multiple Home Links in Mobile IPv6 Utilizing Multiple Home Links in Mobile IPv6 Hongbo Shi and Shigeki Goto Department of Computer Science, Waseda University 3-4-1 Ohkubo Shijuku-ku, Tokyo, 169-8555 JAPAN Email: {shi, goto}@goto.info.waseda.ac.jp

More information

An Efficient DECT-Mobile IP Interworking for Mobile Computing

An Efficient DECT-Mobile IP Interworking for Mobile Computing An Efficient DECT-Mobile IP Interworking for Mobile Computing Anthony Lo *, Winston Seah * and Edwin Schreuder + * Centre for Wireless Communications 1, National University of Singapore, 20 Science Park

More information

Computer Network Programming

Computer Network Programming Computer Network Programming SCTP Overview Dr. Sam Hsu Computer Science & Engineering Florida Atlantic University SCTP Overview Introduction Motivations Architectural & Functional Views Packet & Chunk

More information

Networked Systems and Services, Fall 2018 Chapter 3

Networked Systems and Services, Fall 2018 Chapter 3 Networked Systems and Services, Fall 2018 Chapter 3 Jussi Kangasharju Markku Kojo Lea Kutvonen 4. Transport Layer Reliability with TCP Transmission Control Protocol (TCP) RFC 793 + more than hundred other

More information

Network Working Group. Category: Standards Track Universitaet Karlsruhe (TH) W. Haddad Ericsson Research May 2007

Network Working Group. Category: Standards Track Universitaet Karlsruhe (TH) W. Haddad Ericsson Research May 2007 Network Working Group Request for Comments: 4866 Category: Standards Track J. Arkko Ericsson Research NomadicLab C. Vogt Universitaet Karlsruhe (TH) W. Haddad Ericsson Research May 2007 Status of This

More information

Introduction to Open System Interconnection Reference Model

Introduction to Open System Interconnection Reference Model Chapter 5 Introduction to OSI Reference Model 1 Chapter 5 Introduction to Open System Interconnection Reference Model Introduction The Open Systems Interconnection (OSI) model is a reference tool for understanding

More information

TCP. CSU CS557, Spring 2018 Instructor: Lorenzo De Carli (Slides by Christos Papadopoulos, remixed by Lorenzo De Carli)

TCP. CSU CS557, Spring 2018 Instructor: Lorenzo De Carli (Slides by Christos Papadopoulos, remixed by Lorenzo De Carli) TCP CSU CS557, Spring 2018 Instructor: Lorenzo De Carli (Slides by Christos Papadopoulos, remixed by Lorenzo De Carli) 1 Sources Fall and Stevens, TCP/IP Illustrated Vol. 1, 2nd edition Congestion Avoidance

More information

Networked Systems and Services, Fall 2017 Reliability with TCP

Networked Systems and Services, Fall 2017 Reliability with TCP Networked Systems and Services, Fall 2017 Reliability with TCP Jussi Kangasharju Markku Kojo Lea Kutvonen 4. Transmission Control Protocol (TCP) RFC 793 + more than hundred other RFCs TCP Loss Recovery

More information

IPv6 Neighbor Discovery

IPv6 Neighbor Discovery The IPv6 neighbor discovery process uses Internet Control Message Protocol (ICMP) messages and solicited-node multicast addresses to determine the link-layer address of a neighbor on the same network (local

More information