Chapter 6 MOBILE IP AND TCP

Similar documents
Chapter 13 TRANSPORT. Mobile Computing Winter 2005 / Overview. TCP Overview. TCP slow-start. Motivation Simple analysis Various TCP mechanisms

Mobile Communications Chapter 8: Network Protocols/Mobile IP

Outline 9.2. TCP for 2.5G/3G wireless

CSE 4215/5431: Mobile Communications Winter Suprakash Datta

Mobile Transport Layer

Mobile Communications Chapter 9: Mobile Transport Layer

Mobile Communications Chapter 9: Network Protocols/Mobile IP

Mobile Communications Chapter 9: Mobile Transport Layer

Mobile Communications Mobility Support in Network Layer

CSE 4215/5431: Mobile Communications Winter Suprakash Datta

Mobile Transport Layer

Mobile IP. Mobile IP 1

Mobile Communications Chapter 8: Network Protocols/Mobile IP. Micro mobility support. Routing protocols. Ad-hoc networks. Problems DHCP.

Mobile & Wireless Networking. Lecture 9: Mobile IP. [Schiller, Section 8.1]

Mobility Management - Basics

SJTU 2018 Fall Computer Networking. Wireless Communication

Mobility Management Basics

Mohammad Hossein Manshaei 1393

Chapter 8 LOCATION SERVICES

Network Security. Security of Mobile Internet Communications. Chapter 17. Network Security (WS 2002): 17 Mobile Internet Security 1 Dr.-Ing G.

Mobile IP and Mobile Transport Protocols

Mobility Management. Advanced Mobile Communication Networks. Integrated Communication Systems Group Ilmenau University of Technology

Mobile Communications Chapter 8: Network Protocols/Mobile IP

Fixed Internetworking Protocols and Networks. IP mobility. Rune Hylsberg Jacobsen Aarhus School of Engineering

Mobility Management. Advanced Mobile Communication Networks. Integrated Communication Systems Group Ilmenau University of Technology

LECTURE 8. Mobile IP

Mobile Computing. Chapter 8: Mobile Network Layer

ECS-087: Mobile Computing

Mobile & Wireless Networking. Lecture 10: Mobile Transport Layer & Ad Hoc Networks. [Schiller, Section 8.3 & Section 9] [Reader, Part 8]

Wireless TCP. TCP mechanism. Wireless Internet: TCP in Wireless. Wireless TCP: transport layer

Supporting mobility only on lower layers up to the network layer is not

IPv6 Protocols and Networks Hadassah College Spring 2018 Wireless Dr. Martin Land

Mobile IP. Mobile Computing. Mobility versus Portability

Chapter 09 Network Protocols

IPv6. IPv4 & IPv6 Header Comparison. Types of IPv6 Addresses. IPv6 Address Scope. IPv6 Header. IPv4 Header. Link-Local

Introduction to IPv6. IPv6 addresses

Chapter 12 Network Protocols

Module 28 Mobile IP: Discovery, Registration and Tunneling

This chapter introduces protocols and mechanisms developed for the network

Advanced Computer Networks. Wireless TCP

ECS-087: Mobile Computing

Mobile IPv6 Overview

TRANSMISSION CONTROL PROTOCOL

Improving Reliable Transport and Handoff Performance in Cellular Wireless Networks

Wireless Challenges : Computer Networking. Overview. Routing to Mobile Nodes. Lecture 25: Wireless Networking

Wireless Transmission and Mobility

Page 1. Outline : Wireless Networks Lecture 16: Wireless and the Internet. Internet Architecture Assumptions. Mobility. Link Heterogeneity

TCP over Wireless PROF. MICHAEL TSAI 2016/6/3

II. Principles of Computer Communications Network and Transport Layer

ET4254 Communications and Networking 1

TRANSMISSION CONTROL PROTOCOL

11. IP Mobility 최 양 희 서울대학교 컴퓨터공학부

IPv6: An Introduction

Introduction to IPv6. IPv6 addresses

Da t e: August 2 0 th a t 9: :00 SOLUTIONS

Mobile Routing : Computer Networking. Overview. How to Handle Mobile Nodes? Mobile IP Ad-hoc network routing Assigned reading

CIS 632 / EEC 687 Mobile Computing

Mobility Chapter 5 Ad Hoc a Hoc nd S ensor Net r works rks Roger W r a W ttenhofer fe r 5/1

CMPE 257: Wireless and Mobile Networking

Mobile IP. rek. Petr Grygárek Petr Grygarek, Advanced Computer Networks Technologies 1

UNIT IV -- TRANSPORT LAYER

T Computer Networks II. Mobility Issues Contents. Mobility. Mobility. Classifying Mobility Protocols. Routing vs.

IP - The Internet Protocol

Fundamental Questions to Answer About Computer Networking, Jan 2009 Prof. Ying-Dar Lin,

Wireless Challenges : Computer Networking. Overview. Routing to Mobile Nodes. Lecture 24: Mobile and Wireless

Outline. CS5984 Mobile Computing. Host Mobility Problem 1/2. Host Mobility Problem 2/2. Host Mobility Problem Solutions. Network Layer Solutions Model

Introduction to IPv6. IPv6 addresses

Outline. CS6504 Mobile Computing. Host Mobility Problem 1/2. Host Mobility Problem 2/2. Dr. Ayman Abdel-Hamid. Mobile IPv4.

Charles Perkins Nokia Research Center 2 July Mobility Support in IPv6 <draft-ietf-mobileip-ipv6-14.txt> Status of This Memo

CMPE 257: Wireless and Mobile Networking

Paper solution Subject: Computer Networks (TE Computer pattern) Marks : 30 Date: 5/2/2015

Mobile Application Protocols

Mobile Communications Chapter 8: Network Protocols/Mobile IP

CSE 123A Computer Netwrking

IP Mobility vs. Session Mobility

EITF25 Internet Techniques and Applications L7: Internet. Stefan Höst

Last time. BGP policy. Broadcast / multicast routing. Link virtualization. Spanning trees. Reverse path forwarding, pruning Tunneling

Network Layer. Mobile IP. Slides adapted from Prof. Dr.-Ing. Jochen H. Schiller and W. Stallings

CMPE 257: Wireless and Mobile Networking

MIP4 Working Group. Generic Notification Message for Mobile IPv4 draft-ietf-mip4-generic-notification-message-16

SEN366 (SEN374) (Introduction to) Computer Networks

Introduction Mobility Support Handover Management Conclutions. Mobility in IPv6. Thomas Liske. Dresden University of Technology

Mobile Transport Layer Lesson 10 Timeout Freezing, Selective Retransmission, Transaction Oriented TCP and Explicit Notification Methods

Lecture 3: The Transport Layer: UDP and TCP

CSE 123b Communications Software

Quick announcements. CSE 123b Communications Software. Today s issues. Last class. The Mobility Problem. Problems. Spring 2004

6.1 Internet Transport Layer Architecture 6.2 UDP (User Datagram Protocol) 6.3 TCP (Transmission Control Protocol) 6. Transport Layer 6-1

LOGICAL ADDRESSING. Faisal Karim Shaikh.

MOBILE IP AND WIRELESS APPLICATION PROTOCOL

Internet. 1) Internet basic technology (overview) 3) Quality of Service (QoS) aspects

User Datagram Protocol

Communications Software. CSE 123b. CSE 123b. Spring Lecture 10: Mobile Networking. Stefan Savage

Quick announcement. CSE 123b Communications Software. Last class. Today s issues. The Mobility Problem. Problems. Spring 2003

Mobile IPv6. Washington University in St. Louis

ICS 351: Networking Protocols

Does current Internet Transport work over Wireless? Reviewing the status of IETF work in this area

On using Mobile IP Protocols

RMIT University. Data Communication and Net-Centric Computing COSC 1111/2061. Lecture 2. Internetworking IPv4, IPv6

What is mobility? Mobile IP. Mobility Impact on Protocol Stack (cont.) Advanced Topics in Computer Networks

Networking for Data Acquisition Systems. Fabrice Le Goff - 14/02/ ISOTDAQ

Transcription:

Chapter 6 MOBILE IP AND TCP Distributed Computing Group Mobile Computing Summer 2004

Overview Network Protocols / Mobile IP Motivation Data transfer Encapsulation Problems DHCP Mobile Transport Layer / TCP Motivation Various TCP mechanisms Distributed Computing Group MOBILE COMPUTING R. Wattenhofer 6/2

Motivation for Mobile IP Routing based on IP destination address, network prefix (e.g. 129.132.13) determines physical subnet change of physical subnet implies change of IP address to have a topological correct address (standard IP) or needs special entries in the routing tables Changing the IP-address? adjust the host IP address depending on the current location almost impossible to find a mobile system, DNS updates are too slow TCP connections break security problems Change/Add routing table entries for mobile hosts? worldwide! does not scale with the number of mobile hosts and frequent changes in their location Distributed Computing Group MOBILE COMPUTING R. Wattenhofer 6/3

Requirements to Mobile IP (RFC 2002) Compatibility support of the same layer 2 protocols as IP no changes to current end-systems and routers required mobile end-systems can communicate with fixed systems Transparency mobile end-systems keep their IP address continuation of communication after interruption of link possible point of connection to the fixed network can be changed Efficiency and scalability only little additional messages to the mobile system required (connection typically via a low bandwidth radio link) world-wide support of a large number of mobile systems Security authentication of all registration messages Distributed Computing Group MOBILE COMPUTING R. Wattenhofer 6/4

Example network HA MN router home network Internet mobile end-system (physical home network for the MN) router FA foreign network CN (current physical network for the MN) end-system router Distributed Computing Group MOBILE COMPUTING R. Wattenhofer 6/5

Data transfer to the mobile system HA 2 MN home network Internet 3 receiver FA foreign network CN sender 1 1. Sender sends to the IP address of MN, HA intercepts packet (proxy ARP) 2. HA tunnels packet to COA, here FA, by encapsulation 3. FA forwards the packet to the MN Distributed Computing Group MOBILE COMPUTING R. Wattenhofer 6/6

Data transfer from the mobile system HA 1 MN home network Internet sender FA foreign network CN 1. Sender sends to the IP address of the receiver as usual, FA works as default router receiver Distributed Computing Group MOBILE COMPUTING R. Wattenhofer 6/7

Terminology Mobile Node (MN) system (node) that can change the point of connection to the network without changing its IP address Home Agent (HA) system in the home network of the MN, typically a router registers the location of the MN, tunnels IP datagrams to the COA Foreign Agent (FA) system in the current foreign network of the MN, typically a router typically the default router for the MN Care-of Address (COA) address of the current tunnel end-point for the MN (at FA or MN) actual location of the MN from an IP point of view can be chosen, e.g., via DHCP Correspondent Node (CN) Distributed Computing Group MOBILE COMPUTING R. Wattenhofer 6/8

Overview COA home network router HA router FA MN Internet foreign network CN router home network router HA 2. router FA 3. 4. MN Internet foreign network 1. CN router Distributed Computing Group MOBILE COMPUTING R. Wattenhofer 6/9

Network integration Agent Advertisement HA and FA periodically send advertisement messages into their physical subnets MN listens to these messages and detects, if it is in the home or a foreign network (standard case for home network) MN reads a COA from the FA advertisement messages Registration (always limited lifetime!) MN signals COA to the HA via the FA, HA acknowledges via FA to MN these actions have to be secured by authentication Advertisement HA advertises the IP address of the MN (as for fixed systems), i.e. standard routing information routers adjust their entries, these are stable for a longer time (HA responsible for a MN over a longer period of time) packets to the MN are sent to the HA, independent of changes in COA/FA Distributed Computing Group MOBILE COMPUTING R. Wattenhofer 6/10

Agent advertisement 0 7 8 15 16 23 24 31 type code checksum #addresses addr. size lifetime router address 1 preference level 1 router address 2 preference level 2... type length sequence number registration lifetime R B H F M G V reserved COA 1 COA 2... Distributed Computing Group MOBILE COMPUTING R. Wattenhofer 6/11

Registration COA @ FA: COA @ MN: MN FA HA t MN HA registration request registration request registration request registration reply registration reply registration reply t Distributed Computing Group MOBILE COMPUTING R. Wattenhofer 6/12

Mobile IP registration request & reply 0 7 8 15 16 23 24 31 type = 1 S B DMG V rsv home address lifetime home agent COA identification extensions... 0 7 8 15 16 31 type = 3 code home address lifetime home agent identification extensions... Distributed Computing Group MOBILE COMPUTING R. Wattenhofer 6/13

Tunneling and Encapsulation original IP header original data new IP header new data outer header inner header original data Distributed Computing Group MOBILE COMPUTING R. Wattenhofer 6/14

IP-in-IP Encapsulation Mandatory in RFC 2003 tunnel between HA and COA ver. IHL TOS length IP identification flags fragment offset TTL IP-in-IP IP checksum IP address of HA Care-of address COA ver. IHL TOS length IP identification flags fragment offset TTL lay. 4 prot. IP checksum IP address of CN IP address of MN TCP/UDP/... payload Distributed Computing Group MOBILE COMPUTING R. Wattenhofer 6/15

Minimal Encapsulation optional avoids repetition of identical fields such as TTL, IHL, version, TOS only applicable for unfragmented packets, no space left for fragment identification ver. IHL TOS length IP identification flags fragment offset TTL min. encap. IP checksum IP address of HA care-of address COA lay. 4 protoc. S reserved IP checksum IP address of MN IP address of CN (only if S=1) TCP/UDP/... payload Distributed Computing Group MOBILE COMPUTING R. Wattenhofer 6/16

Generic Routing Encapsulation original header original data outer header GRE header original header original data new header new data ver. IHL TOS length IP identification flags fragment offset TTL GRE IP checksum IP address of HA Care-of address COA CR K S s rec. rsv. ver. protocol checksum (optional) offset (optional) key (optional) sequence number (optional) routing (optional) ver. IHL TOS length IP identification flags fragment offset TTL lay. 4 prot. IP checksum IP address of CN IP address of MN TCP/UDP/... payload Distributed Computing Group MOBILE COMPUTING R. Wattenhofer 6/17

Optimization of packet forwarding Triangular Routing sender sends all packets via HA to MN higher latency and network load Solutions sender learns the current location of MN direct tunneling to this location HA informs a sender about the location of MN big security problems Change of FA packets on-the-fly during the change can be lost new FA informs old FA to avoid packet loss, old FA now forwards remaining packets to new FA this information also enables the old FA to release resources for the MN Distributed Computing Group MOBILE COMPUTING R. Wattenhofer 6/18

Change of foreign agent CN HA FA old FA new MN request update ACK data registration data registration MN changes location update data warning data ACK data update ACK data data t Distributed Computing Group MOBILE COMPUTING R. Wattenhofer 6/19

Data transfer from the mobile system HA 1 MN home network Internet sender FA foreign network CN receiver Problems: Firewall at CN TTL Multicast Distributed Computing Group MOBILE COMPUTING R. Wattenhofer 6/20

Reverse tunneling (RFC 2344) HA 2 MN home network Internet 1 sender FA foreign network CN receiver 3 1. MN sends to FA 2. FA tunnels packets to HA by encapsulation 3. HA forwards the packet to the receiver (standard case) Distributed Computing Group MOBILE COMPUTING R. Wattenhofer 6/21

Mobile IP with reverse tunneling Router accept often only topologically correct addresses (firewall!) a packet from the MN encapsulated by the FA is now topologically correct furthermore multicast and TTL problems solved (TTL in the home network correct, but MN is too far away from the receiver) Reverse tunneling does not solve problems with firewalls, the reverse tunnel can be abused to circumvent security mechanisms (tunnel hijacking) optimization of data paths, i.e. packets will be forwarded through the tunnel via the HA to a sender (double triangular routing) Reverse tunneling is backwards compatible the extensions can be implemented easily and cooperate with current implementations without these extensions Distributed Computing Group MOBILE COMPUTING R. Wattenhofer 6/22

Mobile IP and IPv6 Mobile IP was developed for IPv4, but IPv6 simplifies the protocols security is integrated and not an add-on, authentication of registration is included COA can be assigned via auto-configuration (DHCPv6 is one candidate), every node has address auto-configuration no need for a separate FA, all routers perform router advertisement which can be used instead of the special agent advertisement MN can signal a sender directly the COA, sending via HA not needed in this case (automatic path optimization) soft hand-over, i.e. without packet loss, between two subnets is supported MN sends the new COA to its old router the old router encapsulates all incoming packets for the MN and forwards them to the new COA authentication is always granted Distributed Computing Group MOBILE COMPUTING R. Wattenhofer 6/23

Problems with mobile IP Security authentication with FA problematic, for the FA typically belongs to another organization no protocol for key management and key distribution has been standardized in the Internet patent and export restrictions Firewalls QoS typically mobile IP cannot be used together with firewalls, special setups are needed (such as reverse tunneling) many new reservations in case of RSVP tunneling makes it hard to give a flow of packets a special treatment needed for the QoS Security, firewalls, QoS etc. are topics of current research and discussions! Distributed Computing Group MOBILE COMPUTING R. Wattenhofer 6/24

IP Micro-mobility support Micro-mobility support: Efficient local handover inside a foreign domain without involving a home agent Reduces control traffic on backbone Especially needed in case of route optimization Example approaches: Cellular IP HAWAII Hierarchical Mobile IP (HMIP) Important criteria: Security Efficiency, Scalability, Transparency, Manageability Distributed Computing Group MOBILE COMPUTING R. Wattenhofer 6/25

Cellular IP Operation: CIP Nodes maintain routing entries (soft state) for MNs Multiple entries possible Routing entries updated based on packets sent by MN CIP Gateway: Mobile IP tunnel endpoint Initial registration processing Security provisions: all CIP Nodes share network key MN key: MD5(net key, IP addr) MN gets key upon registration data/control packets from MN 1 BS MN1 BS Internet CIP Gateway BS MN2 Mobile IP packets from MN2 to MN 1 Distributed Computing Group MOBILE COMPUTING R. Wattenhofer 6/26

Cellular IP: Security Advantages: Initial registration involves authentication of MNs and is processed centrally by CIP Gateway All control messages by MNs are authenticated Replay-protection (using timestamps) Potential problems: MNs can directly influence routing entries Network key known to many entities (increases risk of compromise) No re-keying mechanisms for network key No choice of algorithm (always MD5, prefix+suffix mode) Proprietary mechanisms (not, e.g., IPSec AH) Distributed Computing Group MOBILE COMPUTING R. Wattenhofer 6/27

Cellular IP: Other issues Advantages: Simple and elegant architecture Mostly self-configuring (little management needed) Integration with firewalls / private address support possible Potential problems: Not transparent to MNs (additional control messages) Public-key encryption of MN keys may be a problem for resource-constrained MNs Multiple-path forwarding may cause inefficient use of available bandwidth Distributed Computing Group MOBILE COMPUTING R. Wattenhofer 6/28

HAWAII Operation: MN obtains co-located COA 1 and registers with HA 2 Handover: MN keeps COA, new BS answers Reg. Request and updates routers 4 MN views BS as foreign agent Security provisions: MN-FA authentication mandatory Challenge/Response Extensions mandatory 3 BS BS Mobile IP 3 MN Crossover Router 4 Internet HA Backbone Router 2 Mobile IP BS MN 1 DHCP Server DHCP Distributed Computing Group MOBILE COMPUTING R. Wattenhofer 6/29

HAWAII: Security Advantages: Mutual authentication and C/R extensions mandatory Only infrastructure components can influence routing entries Potential problems: Co-located COA raises DHCP security issues (DHCP has no strong authentication) Decentralized security-critical functionality (Mobile IP registration processing during handover) in base stations Authentication of HAWAII protocol messages unspecified (potential attackers: stationary nodes in foreign network) MN authentication requires PKI or AAA infrastructure Distributed Computing Group MOBILE COMPUTING R. Wattenhofer 6/30

HAWAII: Other issues Advantages: Mostly transparent to MNs (MN sends/receives standard Mobile IP messages) Explicit support for dynamically assigned home addresses Potential problems: Mixture of co-located COA and FA concepts may not be supported by some MN implementations No private address support possible because of co-located COA Distributed Computing Group MOBILE COMPUTING R. Wattenhofer 6/31

Hierarchical Mobile IPv6 (HMIPv6) Operation: Network contains mobility anchor point (MAP) mapping of regional COA (RCOA) to link COA (LCOA) Upon handover, MN informs MAP only gets new LCOA, keeps RCOA HA is only contacted if MAP changes Security provisions: no HMIP-specific security provisions binding updates should be authenticated binding update Internet HA RCOA MAP AR AR LCOA LCOA new old MN MN Distributed Computing Group MOBILE COMPUTING R. Wattenhofer 6/32

Hierarchical Mobile IP: Security Advantages: Local COAs can be hidden, which provides some location privacy Direct routing between CNs sharing the same link is possible (but might be dangerous) Potential problems: Decentralized security-critical functionality (handover processing) in mobility anchor points MNs can (must!) directly influence routing entries via binding updates (authentication necessary) Distributed Computing Group MOBILE COMPUTING R. Wattenhofer 6/33

Hierarchical Mobile IP: Other issues Advantages: Handover requires minimum number of overall changes to routing tables Integration with firewalls / private address support possible Potential problems: Not transparent to MNs Handover efficiency in wireless mobile scenarios: Complex MN operations All routing reconfiguration messages sent over wireless link Distributed Computing Group MOBILE COMPUTING R. Wattenhofer 6/34

DHCP: Dynamic Host Configuration Protocol Application simplification of installation and maintenance of networked computers supplies systems with all necessary information, such as IP address, DNS server address, domain name, subnet mask, default router etc. enables automatic integration of systems into an Intranet or the Internet, can be used to acquire a COA for Mobile IP Client/Server-Model the client sends via a MAC broadcast a request to the DHCP server (might be via a DHCP relay) DHCPDISCOVER DHCPDISCOVER server client client relay Distributed Computing Group MOBILE COMPUTING R. Wattenhofer 6/35

time DHCP - protocol mechanisms server (not selected) determine the configuration client initialization DHCPDISCOVER DHCPDISCOVER DHCPOFFER DHCPOFFER collection of replies selection of configuration server (selected) determine the configuration DHCPREQUEST (reject) DHCPREQUEST (options) DHCPACK confirmation of configuration initialization completed release DHCPRELEASE delete context Distributed Computing Group MOBILE COMPUTING R. Wattenhofer 6/36

DHCP characteristics Server several servers can be configured for DHCP, coordination not yet standardized (i.e., manual configuration) Renewal of configurations IP addresses have to be requested periodically, simplified protocol Options available for routers, subnet mask, NTP (network time protocol) timeserver, SLP (service location protocol) directory, DNS (domain name system) Security problems no authentication of DHCP information specified Distributed Computing Group MOBILE COMPUTING R. Wattenhofer 6/37

TCP Overview Transport control protocols typically designed for Fixed end-systems in wired networks Research activities Performance Congestion control Efficient retransmissions TCP congestion control packet loss in fixed networks typically due to (temporary) overload situations router have to discard packets as soon as the buffers are full TCP recognizes congestion only indirectly via missing acknowledgements, retransmissions unwise, they would only contribute to the congestion and make it even worse Distributed Computing Group MOBILE COMPUTING R. Wattenhofer 6/38

TCP slow-start sender calculates a congestion window for a receiver start with a congestion window size equal to one segment exponential increase* of the congestion window up to the congestion threshold, then linear increase missing acknowledgement causes the reduction of the congestion threshold to one half of the current congestion window congestion window starts again with one segment *slow-start vs. exponential increase: window is increased by one for each acknowledgement, that is, 1! 2! 4! 8 In other words, the slow-start mechanism is rather a quick-start. Distributed Computing Group MOBILE COMPUTING R. Wattenhofer 6/39

TCP fast retransmit/fast recovery TCP sends an acknowledgement only after receiving a packet If a sender receives several acknowledgements for the same packet, this is due to a gap in received packets at the receiver Sender can retransmit missing packets (fast retransmit) Also, the receiver got all packets up to the gap and is actually receiving packets Therefore, packet loss is not due to congestion, continue with current congestion window (fast recovery) In the following simplied analysis, we do consider neither fast retransmit nor fast recovery. Distributed Computing Group MOBILE COMPUTING R. Wattenhofer 6/40

TCP on lossy (wireless) link Without fast retransmit/fast recovery [Lakshman/Madhow] Very high loss probability High loss probability Distributed Computing Group MOBILE COMPUTING R. Wattenhofer 6/41

Simple analysis model for lossy TCP Segment loss probability q = 1 p We are interested in the throughput T If there are no losses (and all ACKs are received in time): Number of segments S first doubles up to threshold W (slow start phase) Number of segments S is incremented after S successful ACKs At some point we reach the bandwidth of the channel B If there is a loss We go back to S = 1 Distributed Computing Group MOBILE COMPUTING R. Wattenhofer 6/42

Simple analysis of lossy TCP For not too high error probability q we are usually in the congestion mode (that is: not the slow start mode). The expected number of successful transmission E before we get an error is In the equilibrium, we are in the states 1, 2, 3,, S-1, S, and then back to 1 because we have a missing ACK, that is, we have 1+2+ +S ¼ S 2 /2 successful transmissions. Distributed Computing Group MOBILE COMPUTING R. Wattenhofer 6/43

Lossy TCP: Graphical Interpretation Plot of T(p), with B = 50 Note that 1% faulty transmissions is enough to degrade the throughput to about 14% of the bandwidth. 10% error rate gives about 4% of possible bandwidth. The higher the bandwidth, the worse the relative loss. Distributed Computing Group MOBILE COMPUTING R. Wattenhofer 6/44

Mobility and TCP TCP assumes congestion if packets are dropped typically wrong in wireless networks, here we often have packet loss due to transmission errors furthermore, mobility itself can cause packet loss, if e.g. a mobile node roams from one access point (e.g. foreign agent in Mobile IP) to another while there are still packets in transit to the wrong access point and forwarding is not possible The performance of an unchanged TCP degrades severely however, TCP cannot be changed fundamentally due to the large base of installation in the fixed network, TCP for mobility has to remain compatible the basic TCP mechanisms keep the whole Internet together Distributed Computing Group MOBILE COMPUTING R. Wattenhofer 6/45

Early Approach: Indirect TCP (I-TCP) segments the connection no changes to the TCP protocol for hosts connected to the wired Internet, millions of computers use (variants of) this protocol optimized TCP protocol for mobile hosts splitting of the TCP connection at, e.g., the foreign agent into two TCP connections, no real end-to-end connection any longer hosts in the fixed part of the net do not notice the characteristics of the wireless part mobile host access point (foreign agent) wired Internet wireless TCP standard TCP Distributed Computing Group MOBILE COMPUTING R. Wattenhofer 6/46

I-TCP socket and state migration access point 1 socket migration and state transfer Internet mobile host access point 2 Distributed Computing Group MOBILE COMPUTING R. Wattenhofer 6/47

Indirect TCP Advantages and Disadvantages + no changes in the fixed network necessary, no changes for the hosts (TCP protocol) necessary, all current optimizations to TCP still work + transmission errors on the wireless link do not propagate into the fixed network + simple to control, mobile TCP is used only for one hop, between a foreign agent and a mobile host + therefore, a very fast retransmission of packets is possible, the short delay on the mobile hop is known loss of end-to-end semantics, an acknowledgement to a sender does now not any longer mean that a receiver really got a packet, foreign agents might crash higher latency possible due to buffering of data with the foreign agent and forwarding to a new foreign agent high trust at foreign agent; end-to-end encryption impossible Distributed Computing Group MOBILE COMPUTING R. Wattenhofer 6/48

Early Approach: Snooping TCP Transparent extension of TCP within the foreign agent buffering of packets sent to the mobile host lost packets on the wireless link (both directions!) will be retransmitted immediately by the mobile host or foreign agent, respectively (so called local retransmission) the foreign agent therefore snoops the packet flow and recognizes acknowledgements in both directions, it also filters ACKs changes of TCP only within the foreign agent local retransmission foreign agent wired Internet mobile host snooping of ACKs buffering of data end-to-end TCP connection correspondent host Distributed Computing Group MOBILE COMPUTING R. Wattenhofer 6/49

Snooping TCP Data transfer to the mobile host FA buffers data until it receives ACK of the MH, FA detects packet loss via duplicated ACKs or time-out fast retransmission possible, transparent for the fixed network Data transfer from the mobile host FA detects packet loss on the wireless link via sequence numbers, FA answers directly with a NACK to the MH MH can now retransmit data with only a very short delay Integration of the MAC layer MAC layer often has similar mechanisms to those of TCP thus, the MAC layer can already detect duplicated packets due to retransmissions and discard them Problems snooping TCP does not isolate the wireless link as good as I-TCP snooping might be useless depending on encryption schemes Distributed Computing Group MOBILE COMPUTING R. Wattenhofer 6/50

Early Approach: Mobile TCP Special handling of lengthy and/or frequent disconnections M-TCP splits as I-TCP does unmodified TCP fixed network to supervisory host (SH) optimized TCP SH to MH Supervisory host no caching, no retransmission monitors all packets, if disconnection detected set sender window size to 0 sender automatically goes into persistent mode old or new SH re-open the window + maintains end-to-end semantics, supports disconnection, no buffer forwarding does not solve problem of bad wireless link, only disconnections adapted TCP on wireless link; new software needed Distributed Computing Group MOBILE COMPUTING R. Wattenhofer 6/51

Fast retransmit/fast recovery Problem: Change of foreign agent often results in packet loss TCP reacts with slow-start although there is no congestion Solution: Forced fast retransmit as soon as the mobile host has registered with a new foreign agent, the MH sends (three) duplicated acknowledgements on purpose this forces the fast retransmit mode at the communication partners additionally, the TCP on the MH is forced to continue sending with the actual window size and not to go into slow-start after registration + simple changes result in significant higher performance what a hack Distributed Computing Group MOBILE COMPUTING R. Wattenhofer 6/52

Transmission/time-out freezing Mobile hosts can be disconnected for a longer time no packet exchange possible, e.g., in a tunnel, disconnection due to overloaded cells or multiplex with higher priority traffic TCP disconnects after time-out completely TCP freezing MAC layer is often able to detect interruption in advance MAC can inform TCP layer of upcoming loss of connection TCP stops sending, but does now not assume a congested link MAC layer signals again if reconnected + scheme is independent of data TCP on mobile host has to be changed, mechanism depends on MAC layer Distributed Computing Group MOBILE COMPUTING R. Wattenhofer 6/53

Selective retransmission TCP acknowledgements are often cumulative ACK n acknowledges correct and in-sequence receipt of packets up to n if single packets are missing quite often a whole packet sequence beginning at the gap has to be retransmitted (go-back-n), thus wasting bandwidth, especially if the bandwidth-delay product is high. Selective retransmission as one solution RFC2018 allows for acknowledgements of single packets, not only acknowledgements of in-sequence packet streams without gaps sender can now retransmit only the missing packets + much higher efficiency more complex software in a receiver, more buffer needed at the receiver Distributed Computing Group MOBILE COMPUTING R. Wattenhofer 6/54

Transaction oriented TCP TCP phases connection setup, data transmission, connection release using 3-way-handshake needs 3 packets for setup and release, respectively thus, even short messages need a minimum of 7 packets! Transaction oriented TCP RFC1644, T-TCP, describes a TCP version to avoid this overhead connection setup, data transfer and connection release can be combined thus, only 2 or 3 packets are needed + Efficiency Requires changed TCP Distributed Computing Group MOBILE COMPUTING R. Wattenhofer 6/55

Comparison of different approaches for a mobile TCP Approach Mechanism Advantages Disadvantages Indirect TCP splits TCP connection isolation of wireless loss of TCP semantics, into two connections link, simple higher latency at Snooping TCP M-TCP Fast retransmit/ fast recovery Transmission/ time-out freezing Selective retransmission Transaction oriented TCP snoops data and acknowledgements, local retransmission splits TCP connection, chokes sender via window size transparent for end-toend connection, MAC integration possible Maintains end-to-end semantics, handles long term and frequent disconnections simple and efficient handover problematic with encryption, bad isolation of wireless link Bad isolation of wireless link, processing overhead due to bandwidth management avoids slow-start after roaming mixed layers, not transparent freezes TCP state at independent of content changes in TCP disconnect, resumes or encryption, works for required, MAC after reconnection longer interrupts dependant retransmit only lost data very efficient slightly more complex receiver software, more buffer needed combine connection setup/release and data transmission Efficient for certain applications changes in TCP required, not transparent [Schiller] Distributed Computing Group MOBILE COMPUTING R. Wattenhofer 6/56

Recent work Initial research work Indirect TCP, Snoop TCP, M-TCP, T/TCP, SACK, Transmission/time-out freezing, TCP over 2.5/3G wireless networks Fine tuning today s TCP Learn to live with Data rates: 64 kbit/s up, 115-384 kbit/s down; asymmetry: 3-6, but also up to 1000 (broadcast systems), periodic allocation/release of channels High latency, high jitter, packet loss Suggestions Large (initial) sending windows, large maximum transfer unit, selective acknowledgement, explicit congestion notification, time stamp, no header compression Already in use i-mode running over FOMA WAP 2.0 ( TCP with wireless profile ) 0.93 MSS BW RTT p max. TCP BandWidth Max. Segment Size Round Trip Time loss probability Distributed Computing Group MOBILE COMPUTING R. Wattenhofer 6/57

Recent work Performance enhancing proxies (PEP, RFC 3135) Transport layer Local retransmissions and acknowledgements Additionally on the application layer Content filtering, compression, picture downscaling E.g., Internet/WAP gateways Web service gateways? Big problem: breaks end-to-end semantics Disables use of IP security Choose between PEP and security! More open issues RFC 3150 (slow links) Recommends header compression, no timestamp RFC 3155 (links with errors) States that explicit congestion notification cannot be used In contrast to 2.5G/3G recommendations! Mobile system wireless PEP Internet Comm. partner Distributed Computing Group MOBILE COMPUTING R. Wattenhofer 6/58