Wireless and Mobile Networks

Similar documents
Wireless and Mobile Networks Reading: Sections 2.8 and 4.2.5

Last Lecture: Data Link Layer

Wireless Networks. Wireless Links. Mike Freedman hap:// Interference / bit errors

Data Communication & Networks G Session 5 - Main Theme Wireless Networks. Dr. Jean-Claude Franchitti

15-441: Computer Networking. Wireless Networking

CPSC 826 Internetworking. Wireless and Mobile Networks. Wireless Networks Wireless Hosts

CSCI-1680 Wireless Chen Avin

Topic 2b Wireless MAC. Chapter 7. Wireless and Mobile Networks. Computer Networking: A Top Down Approach

15-441: Computer Networking. Lecture 24: Ad-Hoc Wireless Networks

ECE 4450:427/527 - Computer Networks Spring 2017

Wireless and Mobile Networks 7-2

Computer Networks. Wireless and Mobile Networks. László Böszörményi Computer Networks Mobile - 1

Wireless Networks. CSE 3461: Introduction to Computer Networking Reading: , Kurose and Ross

6.9 Summary. 11/20/2013 Wireless and Mobile Networks (SSL) 6-1. Characteristics of selected wireless link standards a, g point-to-point

Chapter 6 Wireless and Mobile Networks

Mobile Routing : Computer Networking. Overview. How to Handle Mobile Nodes? Mobile IP Ad-hoc network routing Assigned reading

CSC 4900 Computer Networks: Wireless Networks

Wireless Network and Mobility

Multiple Access in Cellular and Systems

Shared Access Networks Wireless. 1/27/14 CS mywireless 1

Wireless Challenges : Computer Networking. Overview. Routing to Mobile Nodes. Lecture 25: Wireless Networking

Wireless and WiFi. Daniel Zappala. CS 460 Computer Networking Brigham Young University

Home Area Networks. Outline

Mohammad Hossein Manshaei 1393

15-441: Computer Networking

Mobile and Sensor Systems

Module 6: Wireless Mobile Networks

COMP 3331/9331: Computer Networks and Applications

Medium Access Control

CSC 8560 Computer Networks: Wireless and Mobility

Wireless Security Background

Chapter 6 Wireless and Mobile Networks. Chapter 6 outline. Chapter 6: Wireless and Mobile Networks. Elements of a wireless network.

Wireless Challenges : Computer Networking. Overview. Routing to Mobile Nodes. Lecture 24: Mobile and Wireless

CS 332 Computer Networks Wireless Networks

Wireless Mul*hop Ad Hoc Networks

Review. Error Detection: CRC Multiple access protocols. LAN addresses and ARP Ethernet. Slotted ALOHA CSMA/CD

Computer Networks, Andrew Tannenbaum, Chapter 5.6. Computer Networking: A Top Down Approach Featuring the

CS551 Ad-hoc Routing

Wireless Networks. CSE 3461: Introduction to Computer Networking Reading: , Kurose and Ross ( 6th ed.); , Kurose and Ross (7th ed.

CS118 Discussion 1A, Week 9. Zengwen Yuan Dodd Hall 78, Friday 10:00 11:50 a.m.

Elements of a wireless network. Elements of a wireless network. Some wireless link standards. Elements of a wireless network

Elements of a wireless network. Elements of a wireless network. Characteristics of selected wireless link standards. Elements of a wireless network

Arvind Krishnamurthy Fall 2003

M06:Wireless and Mobile Networks. Corinna Schmitt

No lecture on Thurs. Last homework will be out this week (not due, covers wireless) Extra office hours for next week and the week after.

COMP 3331/9331: Computer Networks and Applications

Links Reading: Chapter 2. Goals of Todayʼs Lecture. Message, Segment, Packet, and Frame

LECTURE 9. Ad hoc Networks and Routing

MULTIPLE ACCESS PROTOCOLS 2. 1

Wireless Internet Routing. Review of Wireless Networking (with Routing in Mind)

Chapter 6 Wireless and Mobile Networks. Chapter 6 outline. Chapter 6: Wireless and Mobile Networks. Elements of a wireless network

Chapter 7. Wireless and Mobile Networks. Computer Networking: A Top Down Approach

Wireless LANs. ITS 413 Internet Technologies and Applications

Announcements: Assignment 4 due now Lab 4 due next Tuesday Assignment 5 posted, due next Thursday

CMPE 257: Wireless and Mobile Networking

Link Layer. 5.1 Introduction and services 5.2 Error detection and correction 5.3Multiple access protocols 5.4 Link-Layer Addressing 5.

Lecture 6. Reminder: Homework 2, Programming Project 2 due on Thursday. Questions? Tuesday, September 13 CS 475 Networks - Lecture 6 1

Link Layer. w/ credit to Rick Graziani (Cabrillo) for some of the anima<ons

Chapter 6 Wireless and Mobile Networks

Mobile devices for wireless

Chapter 5 Wireless and Mobile Networks

Ethernet. Lecture 6. Outline. Ethernet - Physical Properties. Ethernet - Physical Properties. Ethernet

Wireless and Mobile Networks

Chapter 6 Wireless and Mobile Networks

Announcements: ECE/CS 372 introduction to computer networks. Assign 4 is due this Thursday Lab 4 is due next Tuesday Assignment 5 posted soon

CSCI-1680 Wireless Rodrigo Fonseca

Link Layer. w/ much credit to Cisco CCNA and Rick Graziani (Cabrillo)

Announcements / Wireless Networks and Applications Lecture 9: Wireless LANs Wireless. Regular Ethernet CSMA/CD.

Mobile Communications. Ad-hoc and Mesh Networks

CIS 551 / TCOM 401 Computer and Network Security. Spring 2007 Lecture 8

Link State Rou.ng Reading: Sec.ons 4.2 and 4.3.4

Announcements: ECE/CS 372 introduction to computer networks. Assignment 4 due now. Chapter 7

Mobile & Wireless Networking. Lecture 10: Mobile Transport Layer & Ad Hoc Networks. [Schiller, Section 8.3 & Section 9] [Reader, Part 8]

Link State Rou.ng Reading: Sec.ons 4.2 and 4.3.4

Communications Software. CSE 123b. CSE 123b. Spring Lecture 10: Mobile Networking. Stefan Savage

Quick announcement. CSE 123b Communications Software. Last class. Today s issues. The Mobility Problem. Problems. Spring 2003

Computer Network Fundamentals Spring Week 3 MAC Layer Andreas Terzis

CSC 4900 Computer Networks: Mobility

Addressing: when mobile is moving around. Mobile Registration. Principles of Mobile Routing. Mobility via Indirect Routing

Wireless and Mobile Networks

Lecture 15 Networking Fundamentals. Today s Plan

A and C cant see each other, both send to B RTS/CTS can help

Chapter 6 Wireless and Mobile Networks

CMPE 257: Wireless and Mobile Networking

CSE 123b Communications Software

Quick announcements. CSE 123b Communications Software. Today s issues. Last class. The Mobility Problem. Problems. Spring 2004

Multiple Access Links and Protocols

CMPE 257: Wireless and Mobile Networking

Lecture 13: Routing in multihop wireless networks. Mythili Vutukuru CS 653 Spring 2014 March 3, Monday

High Level View. EE 122: Ethernet and Random Access protocols. Medium Access Protocols

Wireless Local Area Networks (WLANs)) and Wireless Sensor Networks (WSNs) Computer Networks: Wireless Networks 1

(Wireless) Internet Routing. Review of Wireless Networking (with Routing in Mind)

UNIT II NETWORKING

Lecture 6. Data Link Layer (cont d) Data Link Layer 1-1

Ethernet and WiFi. h-p://xkcd.com/466/

CSCD 433 Network Programming Fall Lecture 7 Ethernet and Wireless

Lecture 5 The Data Link Layer. Antonio Cianfrani DIET Department Networking Group netlab.uniroma1.it

Last time?! MPLS! Label distribution protocols! Multi Protocol Label Switching! Layer 2.5 protocol! LDP! RSVP!

Wireless Mesh Networks

Data and Computer Communications. Chapter 13 Wireless LANs

Transcription:

Wireless and Mobile Networks Reading: Sec7ons 2.8 and 4.2.5 COS 461: Computer Networks Spring 2010 (MW 3:00 4:20 in COS 105) Mike Freedman hkp://www.cs.princeton.edu/courses/archive/spring10/cos461/ 1

Goals of Today s Lecture Wireless links: unique channel characteris7cs High, 7me varying bit error rate Broadcast where some nodes can t hear each other Ad hoc rou7ng: no fixed infrastrucuture Mobile hosts: addressing and rou7ng challenges Keeping track of host s changing akachment point Maintaining a data transfer as the host moves Some specific examples Wireless: 802.11 wireless LAN (aka WiFi ) Ad hoc rou7ng: DSR and AODV Mobility: Boeing Connexion and Mobile IP ( Many slides adapted from Jim Kuroseʼs lectures at UMass-Amherst and Seth Goldstein at CMU ) 2

Widespread Deployment Worldwide cellular subscribers 1993: 34 million 2005: more than 2 billion 2009: more than 4 billion > landline subscribers Wireless local area networks Wireless adapters built in to most laptops, and even PDAs More than 220,000 known WiFi loca7ons in 134 countries Probably many, many more (e.g., home networks, corporate networks, ) 3

Wireless Links and Wireless Networks 4

Wireless Links: High Bit Error Rate Decreasing signal strength Disperses as it travels greater distance AKenuates as it passes through maker 5

Wireless Links: High Bit Error Rate Interference from other sources Radio sources in same frequency band E.g., 2.4 GHz wireless phone interferes with 802.11b wireless LAN Electromagne7c noise (e.g., microwave oven) 6

Wireless Links: High Bit Error Rate Mul7 path propaga7on Electromagne7c waves reflect off objects Taking many paths of different lengths Causing blurring of signal at the receiver receiver transmitter 7

Dealing With Bit Errors Wireless vs. wired links Wired: most loss is due to conges7on Wireless: higher, 7me varying bit error rate Dealing with high bit error rates Sender could increase transmission power Requires more energy (bad for bakery powered hosts) Creates more interference with other senders Stronger error detec7on and recovery More powerful error detec7on/correc7on codes Link layer retransmission of corrupted frames (Many research proposals for TCP alterna7ves / extensions for wireless) 8

Wireless Links: Broadcast Limita7ons Wired broadcast links E.g., Ethernet bridging, in wired LANs All nodes receive transmissions from all other nodes Wireless broadcast: hidden terminal problem C A and B hear each other B and C hear each other But, A and C do not A B So, A and C are unaware of their interference at B 9

Wireless Links: Broadcast Limita7ons Wired broadcast links E.g., Ethernet bridging, in wired LANs All nodes receive transmissions from all other nodes Wireless broadcast: fading over distance A B C A s signal strength C s signal strength A and B hear each other B and C hear each other But, A and C do not So, A and C are unaware of their interference at B space 10

Example Wireless Link Technologies Data networks Indoor (10 30 meters) 802.11n: 200 Mbps 802.11a and g: 54 Mbps 802.11b: 5 11 Mbps 802.15.1: 1 Mbps Outdoor (50 meters to 20 kmeters) 802.11a and g point to point: 54 Mbps WiMax: 5 11 Mbps Cellular networks, outdoors 3G enhanced: 4 Mbps 3G: 384 Kbps 2G: 56 Kbps 11

Wireless Network: Wireless Link network infrastructure Wireless link Typically used to connect mobile(s) to base station Also used as backbone link Multiple access protocol coordinates link access 12

Wireless Network: Wireless Hosts network infrastructure Wireless host Laptop, PDA, IP phone Run applications May be stationary (nonmobile) or mobile 13

Wireless Network: Base Sta7on network infrastructure Base station Typically connected to wired network Relay responsible for sending packets between wired network and wireless host(s) in its area E.g., cell towers, 802.11 access points 14

Wireless Network: Infrastructure network infrastructure Network infrastructure Larger network with which a wireless host wants to communicate Typically a wired network Provides traditional network services May not always exist 15

Scenario #1: Infrastructure Mode network infrastructure Infrastructure mode Base station connects mobiles into wired network Network provides services (addressing, routing, DNS) Handoff: mobile changes base station providing connection to wired network 16

Scenario #2: Ad Hoc Networks Ad hoc mode No base stations Nodes can only transmit to other nodes within link coverage Nodes self-organize and route among themselves 17

Infrastructure vs. Ad Hoc Infrastructure mode Wireless hosts are associated with a base sta7on Tradi7onal services provided by the connected network E.g., address assignment, rou7ng, and DNS resolu7on Ad hoc networks Wireless hosts have no infrastructure to connect to Hosts themselves must provide network services Similar in spirit to the difference between Client server communica7on Peer to peer communica7on 18

Different Types of Wireless Networks Single-hop Multi-hop Infrastructure-based Base station connected to larger wired network (e.g., WiFi wireless LAN, and cellular telephony networks) Base station exists, but some nodes must relay through other nodes (e.g., wireless sensor networks, and wireless mesh networks) Infrastructure-less No wired network; one node coordinates the transmissions of the others (e.g., Bluetooth, and ad hoc 802.11) No base station exists, and some nodes must relay through others (e.g., mobile ad hoc networks, like vehicular ad hoc networks) 19

WiFi: 802.11 Wireless LANs 20

802.11 LAN Architecture Internet Access Point (AP) Base station that communicates with the wireless hosts BSS 1 AP hub, switch or router Basic Service Set (BSS) Coverage of one AP AP acts as the master Identified by an network name known as an SSID AP BSS 2 SSID: Service Set Identifier 21

Channels and Associa7on Mul7ple channels at different frequencies Network administrator chooses frequency for AP Interference if channel is same as neighboring AP Access points send periodic beacon frames Containing AP s name (SSID) and MAC address Host scans channels, listening for beacon frames Host selects an access point to associate with Beacon frames from APs Associate request from host Associa7on response from AP 22

Mobility Within the Same Subnet H1 remains in same IP subnet IP address of the host can remain same Ongoing data transfers can con7nue uninterrupted H1 recognizes the need to change H1 detects a weakening signal Starts scanning for stronger one Changes APs with same SSID H1 disassociates from one And associates with other Switch learns new loca7on Self learning mechanism BBS 1 AP 1 router hub or switch AP 2 H1 BBS 2 23

CSMA: Carrier Sense, Mul7ple Access Mul7ple access: channel is shared medium Sta7on: wireless host or access point Mul7ple sta7ons may want to transmit at same 7me Carrier sense: sense channel before sending Sta7on doesn t send when channel is busy To prevent collisions with ongoing transfers But, detec7ng ongoing transfers isn t always possible C A B C A B A s signal strength C s signal strength space 24

CA: Collision Avoidance, Not Detec7on Collision detec7on in wired Ethernet Sta7on listens while transmilng Detects collision with other transmission Aborts transmission and tries sending again Problem #1: cannot detect all collisions Hidden terminal problem Fading 25

CA: Collision Avoidance, Not Detec7on Collision detec7on in wired Ethernet Sta7on listens while transmilng Detects collision with other transmission Aborts transmission and tries sending again Problem #1: cannot detect all collisions Hidden terminal problem Fading Problem #2: listening while sending Strength of received signal is much smaller Expensive to build hardware that detects collisions So, 802.11 does not do collision detec7on 26

Medium Access Control in 802.11 Collision avoidance, not detec7on First exchange control frames before transmilng data Sender issues Request to Send (RTS), including length of data Receiver responds with Clear to Send (CTS) If sender sees CTS, transmits data (of specified length) If other node sees CTS, will idle for specified period If other node sees RTS but not CTS, free to send Link layer acknowledgment and retransmission CRC to detect errors Receiving sta7on sends an acknowledgment Sending sta7on retransmits if no ACK is received Giving up amer a few failed transmissions 27

Hidden Terminal Problem A B C A and C can t see each other, both send to B RTS/CTS can help Both A and C would send RTS that B would see first B only responds with one CTS (say, echo ing A s RTS) C detects that CTS doesn t match and won t send 28

Exposed Terminal Problem A B C D B sending to A, C wants to send to D As C receives B s packets, carrier sense would prevent it from sending to D, even though wouldn t interfere RTS/CTS can help C hears RTS from B, but not CTS from A C knows it s transmission will not interfere with A C is safe to transmit to D 29

Ad hoc rou7ng protocols 30

Tradi7onal Rou7ng vs Ad Hoc Tradi7onal network: Well structured ~O(N) nodes & links All links work ~= well Ad Hoc network N^2 links but many bad! Topology may be really weird Reflec7ons & mul7path cause strange interference Change is frequent 31

Problems using DV or LS DV loops are very expensive Wireless bandwidth << fiber bandwidth LS protocols have high overhead N^2 links cause very high cost Periodic updates waste power Need fast, frequent convergence 32

Proposed protocols Basic Taxonomy: Reac7ve (on demand) Proac7ve (table driven) Source rou7ng Hop by hop rou7ng Des7na7on Sequenced Distance Vector (DSDV) Dynamic Source Rou7ng (DSR) Ad Hoc On Demand Distance Vector (AODV) 33

Dynamic Source Rou7ng Source rou7ng Intermediate nodes can be out of date On demand route discovery Don t need periodic route adver7sements (Design point: on demand may be beker or worse depending on traffic pakerns ) 34

DSR Components Route discovery The mechanism by which a sending node obtains a route to des7na7on Route maintenance The mechanism by which a sending node detects that the network topology has changed and its route to des7na7on is no longer valid 35

DSR Route Discovery Route discovery basic idea Source broadcasts route request to Des6na6on Each node forwards request by adding own address and re broadcas7ng Requests propagate outward un7l: Target is found, or A node that has a route to Des7na7on is found 36

C Broadcasts Route Request to F A D Route Request Source C B E Destination F G H 37

C Broadcasts Route Request to F A D Route Request Source C B E Destination F G H 38

H Responds to Route Request A D E Source C B Destination F G H G,H,F Using reversed path if links bidirec7onal (802.11) Using own route discovery if links unidirec7onal 39

C Transmits a Packet to F A D E Source C G,H,F B Destination F G H,F H F 40

Forwarding Route Requests A request is forwarded if: Node is not the des7na7on Node not already listed in recorded source route Node has not seen request with same sequence number Node doesn t already have cached answer IP TTL field may be used to limit scope Des7na7on copies route into a Route reply packet and sends it back to Source 41

Route Cache All source routes learned by a node are kept in Route Cache (reduces cost of discovery) If intermediate node receives RR for des7na7on and has entry cached, it responds to RR and does not propagate RR further Nodes overhearing RR/RP may insert routes in cache (remember it s a broadcast channel) 42

Sending Data Check cache for route to des7na7on If route exists then If reachable in one hop Send packet Else insert rou7ng header to des7na7on and send If route does not exist, buffer packet and ini7ate route discovery 43

Discussion Source rou7ng is good for on demand routes instead of a priori distribu7on But, high packet overhead Route discovery protocol used to obtain routes on demand Caching used to minimize use of discovery No Periodic messages But, need to buffer packets Why esp important? 44

Ad Hoc On Demand Distance Vector On demand protocol Table driven, distance vector rou7ng Similar to DSR in finding routes, but Uses sequence numbers on route updates Has an idea of freshness of a route RouteREQuest includes normal stuff plus src seq, dest seq, broadcast seq, hop count 45

Route Requests On RREQ REPLY If my dest seq >= received dest seq OR I am des7nta7on DISCARD If src adr & broadcast seq were seen Re broadcast otherwise 46

Route Maintanience Update rou7ng table when receive informa7on that improves on the rou7ng metric: No previous route known Smaller hop count with same dst seq number Larger dst seq number (fresher) 47

C Broadcasts Route Request to F A D Route Request Source C B E Destination F G H 48

C Broadcasts Route Request to F A D Route Request Source C B E Destination F G H 49

F unicasts RREP to C A D Route Request Source C B E Destination F G H 50

Route Maintanience Update rou7ng table when receive informa7on that improves on the rou7ng metric: No previous route known Smaller hop count with same dst seq number Larger dst seq number (fresher) Eavesdrop Periodic hellos (unlike DSR) Higher network overhead vs. smaller connec7on setup 7me 51

Host Mobility 52

Varying Degrees of User Mobility Moves only within same access network Single access point: mobility is irrelevant Mul7ple access points: only link link layer changes Either way, users is not mobile at the network layer Shuts down between changes access networks Host gets new IP address at the new access network No need to support any ongoing transfers Applica7ons have become good at suppor7ng this Maintains connec7ons while changing networks Surfing the net while driving in a car or flying a plane Need to ensure traffic con7nues to reach the host 53

Maintaining Ongoing Transfers Seamless transmission to a mobile host A B 54

E.g., Keep Track of Friends on the Move Sending a leker to a friend who moves omen How do you know where to reach him? Op7on #1: have him update you Friend contacts you on each move So you can mail him directly E.g., Boeing Connexion service Op7on #2: ask his parents when needed Parents serve as permanent address So they can forward your leker to him E.g., Mobile IP 55

Op7on #1: Let Rou7ng Protocol Handle It Mobile node has a single, persistent address Address injected into rou7ng protocol (e.g., OSPF) A 12.34.45.0/24 B 12.34.45.7/32 Mobile host with IP address 12.34.45.7 56

Example: Boeing Connexion Service Boeing Connexion service Mobile Internet access provider WiFi hot spot at 35,000 feet moving 600 mph Went out of business in December 2006 Communica7on technology Antenna on the plane to leased satellite transponders Ground sta7ons serve as Internet gateways Using BGP for mobility IP address block per airplane Ground sta7on adver7ses into BGP hkp://www.nanog.org/mtg 0405/abarbanel.html 57

Example: Boeing Connexion Service 12.78.3.0/24 Internet 58

Summary: Lelng Rou7ng Handle It Advantages No changes to the end host Traffic follows an efficient path to new loca7on Disadvantages Does not scale to large number of mobile hosts Large number of rou7ng protocol messages Larger rou7ng tables to store smaller address blocks Alterna7ve Mobile IP 59

Op7on #2: Home Network and Home Agent Home network: permanent home of mobile (e.g., 128.119.40/24) Home agent: entity that will perform mobility functions on behalf of mobile, when mobile is remote Permanent address: address in home network, can always be used to reach mobile e.g., 128.119.40.186 wide area network correspondent Correspondent: wants to communicate with mobile 60

Visited Network and Care of Address Permanent address: remains constant (e.g., 128.119.40.186) Visited network: network in which mobile currently resides (e.g., 79.129.13/24) Care-of-address: address in visited network. (e.g., 79,129.13.2) wide area network Correspondent: wants to communicate with mobile Home agent: entity in visited network that performs mobility functions on behalf of mobile. 61

Mobility: Registra7on home network visited network 2 wide area network foreign agent contacts home agent home: this mobile is resident in my network 1 mobile contacts foreign agent on entering visited network Foreign agent knows about mobile Home agent knows loca7on of mobile 62

Mobility via Indirect Rou7ng home network correspondent addresses packets using home address of mobile home agent intercepts packets, forwards to foreign agent 1 wide area network 2 foreign agent receives packets, forwards to mobile 4 3 visited network mobile replies directly to correspondent 63

Indirect Rou7ng: Efficiency Issues Mobile uses two addresses Permanent address: used by correspondent (making mobile s loca7on is transparent to correspondent) Care of address: used by the home agent to forward datagrams to the mobile Mobile may perform the foreign agent func7ons Triangle rou7ng is inefficient E.g., correspondent and mobile in the same network 64

Mobility via Direct Rou7ng home network correspondent forwards to foreign agent foreign agent receives packets, forwards to mobile 4 visited network correspondent requests, receives foreign address of mobile 2 1 wide area network 3 4 mobile replies directly to correspondent No longer transparent to the correspondent 65

Mobility Today Limited support for mobility E.g., among base sta7ons on a campus Applica7ons increasingly robust under mobility Robust to changes in IP address, and disconnec7ons E.g., e mail client contac7ng the e mail server and allowing reading/wri7ng while disconnected New Google Gears for offline Web applica7ons Increasing demand for seamless IP mobility E.g., con7nue a VoIP call while on the train Increasing integra7on of WiFi and cellular E.g., dual mode cell phones that can use both networks Called Unlicensed Mobile Access (UMA) 66

Impact on Higher Layer Protocols Wireless and mobility change path proper7es Wireless: higher packet loss, not from conges7on Mobility: transient disrup7ons, and changes in RTT Logically, impact should be minimal Best effort service model remains unchanged TCP and UDP can (and do) run over wireless, mobile But, performance definitely is affected TCP treats packet loss as a sign of conges7on TCP tries to es7mate the RTT to drive retransmissions TCP does not perform well under out of order packets Internet not designed with these issues in mind 67

Conclusions Wireless Already a major way people connect to the Internet Gradually becoming more than just an access network Mobility Today s users tolerate disrup7ons as they move and applica7ons try to hide the effects Tomorrow s users expect seamless mobility Challenges the design of network protocols Wireless breaks the abstrac7on of a link, and the assump7on that packet loss implies conges7on Mobility breaks associa7on of address and loca7on Higher layer protocols don t perform as well 68