Transcript Sample
Mobile Computing Gihwan Cho [email protected] Distributed Computing Lab. 1 2001 Fall Mobile Computing Content Getting start distributed computing, what means for MC? Internet protocol, and its considerations for MC Next generation Internet Cellular technology overview Internet host mobility INTERNET routing optimization Distributed Computing Lab. 2 2001 Fall Mobile Computing Distributed Computing (I) What’s distributed computing? by Donovan A computing paradigm which is provided by a collection of computers connected by a communications subnet and logically integrated in varying degrees by a distributed operating system and/or distributed database system on purpose to resolve a task co-operatively Each node has autonomous mechanisms which also coordinate their operations through a global mechanism Background price vs. performance revolution in computer hardware cost effective and efficient communication subnets Distributed Computing Lab. 3 2001 Fall Mobile Computing Distributed Computing (II) Why distributed computing? by Donovan Technical Aims distributed nature of real world equipment cost user know-how and control flexibility and configurability etc. resource sharing location transparency Models system : client-server programming : RPC (Remote Procedure Call), CORBA Distributed Computing Lab. 4 2001 Fall Mobile Computing Distributed Computing (III) Transparencies Advantages good performance, reliability, resource sharing and extensibility... Application Spectrum location, execution, device, program code ... e-mail ... command & control ... resource sharing ... Using Fields banking, university computing, factory, office automation ... Distributed Computing Lab. 5 2001 Fall Mobile Computing OS Perspectives NOS (Network OS) vs. DOS (Distributed OS) Host 1 Host 2 Host 3 Host 4 NOS NOS NOS NOS Unix Ultrix VMS OS/2 Host 1 Host 2 Host 3 Host 4 Mach Mach Distributed Computing Lab. Mach Mach 6 DOS Examples : V system, Eden, Amoeba Locus, Mach, Spring... 2001 Fall Mobile Computing Multiprocessor System vs. Distributed System Tightly-coupled vs. Loosely-coupled A Computer Processor Shared I/O Devices Memory & I/O Device Processor Shared Memory Computer Computer Memory & I/O Device Network Memory & I/O Device Computer Distributed Computing Lab. Computer 7 2001 Fall Memory & I/O Device Mobile Computing Why should be Distributed Algorithms changed? Underlying network structure changes with host’s moving Mobile hosts may disconnect or doze off! no more logical structure of infrastructure can be utilized whenever an algorithm tries to refer overall structure, a physical structure which reflects current situation should be repeatedly reconstructed, and then convert it to a logical structure communication costs are no longer the same for all hosts in a logical subnet (source host would be still keep moving) offload and/or download Broadcast communication is available for a group of hosts using only one transmission Distributed Computing Lab. 8 2001 Fall Mobile Computing Ex) Distributed Mutual Exclusion Lamports Algorithm each host maintains a logical clock each host maintains a request queue that contains messages in increasing order of timestamps host hj requires a resource by sending a timestamped request message to all others and inserts it into its queue. Each host which gets this send a timestamped reply message, and inserts this request into its queue hj can access the resource when its request is at the head of the queue, and it has received replies from all other hosts with higher timestamps when it is done with the resource, it sends a release message to all others. The recipients delete the request from their queues Distributed Computing Lab. 9 2001 Fall Mobile Computing Ex) Distributed Mutual Exclusion (Suppl. -1) Enters critical region 8 {0, 8} 0 8 1 8 12 12 {0, 8} 0 OK 2 1 12 {0, 8} {2,12} {2,12} OK OK OK {2,12} 0 2 1 2 {0, 8} {2,12} {2,12} {2,12} Make a Decision Enters critical region {host id, timestamp} Distributed Computing Lab. 10 2001 Fall Mobile Computing What problems and what should be changed? Problems high search costs for all MH - MH messages all hosts required to participate with running the algorithm, so no doze or disconnect can be allowed data structures need to be maintained at the MHs (with lots of messages exchanged), so higher power usage The algorithm be possibly changed as: only MA participates in the coordination (Indirect model). An MA treats all requests from MHs within its cell as if they were its own requests an MH simply initiates the process by sending a init_req() message to the MA. The MA then processes, waits and maintains the request on behalf of the MH when this virtual request is ready for execution, the MA sends a grant_req() message to the MH the MH sends a rel_req() when it is done, the MA then sends a release message to all others Distributed Computing Lab. 11 2001 Fall Mobile Computing The Internet (I) The collection of networks and gateways that use the TCP/IP protocol suite and function as a single, cooperative virtual network Virtual Circuit connection set up at the beginning connection remains throughout reliable Communications ex) TCP Datagram each datagram routed separately each contains an address no guarantee of delivery ex) IP and UDP Distributed Computing Lab. 12 2001 Fall Mobile Computing The Internet (II) The TCP/IP Stack Host A Host B Application Application Uses TCP/IP Services Virtual Circuit TCP Gateway G TCP IP IP IP Network Interface Network Interface Network Interface Hardware Hardware Hardware Routes Datagrams Well-known TCP/IP services mail (SMTP), ftp, rlogin, telnet, rcp, X window clients ... rpc, rfs, nfs, rwho ... Distributed Computing Lab. 13 2001 Fall Mobile Computing Internetworking with TCP/IP Distributed Computing Lab. 14 2001 Fall Mobile Computing IP(Internet Protocol) A user thinks of an internet as a single virtual network that interconnects all hosts, and through which communication is possible; its underlying hardware is both hidden and irrelevant IP provides three important definitions defines the basic unit of data transfer performs the routing function includes a set of rules that embody the idea of unreliable packet delivery, such as packet processing, error control Connectionless delivery service := unreliable, best-effort, connectionless Distributed Computing Lab. 15 2001 Fall Mobile Computing Internet Addresses (I) Universal communication service requires a globally accepted method of identifying each computer that attaches to it Three host identifiers names : what object is (a location independent characteristic of a network entity) addresses : where it is (a function of the location of the destination) routes : how to get there (something that depends on both the source and destination) Internet address was made to standardize on compact, binary addresses that make computations such as the selection of a route efficient Distributed Computing Lab. 16 2001 Fall Mobile Computing Internet Addresses (II) Each host on a TCP/IP internet is assigned a unique 32-bit internet address that is used in all communication with that host IP address is a pair (netid, hostid), where netid identifies a network, and hostid identifies a host on that network Because IP addresses encode both a network and a host on that network, they do not specify an individual computer, but a connection to a network Distributed Computing Lab. 17 2001 Fall Mobile Computing Internet Address (III) consists of four “Octets” (8 bit chunks) 0 8 16 24 31 Class A 0 networkid hostid Class B 10 Class C 110 networkid Class D 1110 multicast address 224-239.*.*.* Class E 11110 reserved for future use 240-254.*.*.* networkid 0-127.*.*.* hostid 128-191.*.*.* hostid 192-223.*.*.* ** hostid (or all bits) set to 1 : broadcast ** networkid (or hostid) set to 0 : means “this” Distributed Computing Lab. 18 2001 Fall Mobile Computing IP Address (Considerations) With current IP address, IP datagrams clearly are routed based on the networkid (and subnetid) in the IP address networkid (and subnetid) do not specify an individual machine, but a connection to a network all hosts having addresses with the same networkid (and subnetid) are connected to the same physical network When we consider host mobility, “If a host moves from one network to another, its IP address must change.” - D. E. Comer, Internetworking with TCP/IP, pp 65 4.8 weaknesses in Internet Addressing how it can be resolved? in addition, It may need another facility to trace the physical location of moving host in order to find out the host’s current location Distributed Computing Lab. 19 2001 Fall Mobile Computing Internet Routing Note : the hierarchical structure of the IP address aims to scale internetworking well by providing the abstraction of address clustering. This implies to the routing domain as: allows routers to keep minimal routing information, so a gateway needs to maintain networkid, not full IP address only specifies one step along the path to a destination network make their routing decisions efficiently by allowing a gateway to use default routes to possible distant destinations permits some degree of autonomy to organizations to do their own internal routing structure (with subnetting) Table-driven IP routing Basic principles each router announces which networks it can reach each router remembers the other’s announcements remembered routes time out to delete stale routes Distributed Computing Lab. 20 2001 Fall Mobile Computing Routing Algorithm Route_IP_Datagram(datagram, routing_table) Extract destination IP address, ID, from datagram Compute IP address of destination network, IN if IN matches any directly connected network address send datagram to destination over that network; else if ID appears as a host-specific route route datagram as specified in the table; else if IN appears in routing table route datagram as specified in the table; else if a default route has been specified route datagram to the default gateway; else declare a routing error; Distributed Computing Lab. 21 2001 Fall Mobile Computing Internet Routing (Considerations) The Internet topology is rapidly growing or changing In this situation, in order to provide an Internet-wide routing service, the Internet uses an architectural approach that allows groups to manage local gateway autonomously, adding new network interconnections and routes without changing distant gateways In the mobile computing model, a packet routing path bound for a mobile host is mainly decided on the fixed network Current IP routing mechanisms cannot decouple the host tracing function from an IP address The Internet protocol needs another facility to trace a moving host, and then to deliver the packets following the host based on the location information Distributed Computing Lab. 22 2001 Fall Mobile Computing Which the Internet layer should take charge of host mobility? (I) If applications do this, each time an application wants to communicate with another, it must obtain the current address of its peer. Moreover, it is impossible to provide on-line moving without modifying the application program itself, so as to re-establish the existing session with the new location If the transport layer do this, it does not see the notion of host with the same reason as above. Thus, host mobility causes increased delays and packet losses. TCP interprets these as signs of network congestion - so, it throttle its transmissions, further degrading performance Distributed Computing Lab. 23 2001 Fall Mobile Computing Which the Internet layer should take charge of host mobility? (II) The internet layer hides the different hardware address, and resolves the exact location of a host on an internetworking its own addressing and routing facilities. Therefore, it could give to higher level protocols the abstraction that the network address remains unchanged If the network interface layer do this, there is no way to maintain host location in the network (with physical address). Also, a bridge-based routing scheme is not enough (too restricted). However, it could have some useful features, such as monitoring connection/disconnection to/from communication medium, then reporting it to higher layer Distributed Computing Lab. 24 2001 Fall Mobile Computing The Internet Protocol (Considerations, I) When the source host specifies the destination host's address, a binding between the address and its route is established, and thereafter no re-evaluation of the binding takes place : in a static network, there is little re-evaluation of the binding In a mobile computing environment, mobile hosts are expected to move from time to time, and in a way that necessitates changing their address - moves to other locations in different parts of the hierarchy In order to re-evaluate of the binding at times, the IPbased approach for supporting host mobility can be formalized as a location problem Distributed Computing Lab. 25 2001 Fall Mobile Computing The Internet Protocol (Considerations, II) The location domain includes an addressing convention for identifying mobile hosts, and acquisition and/or preservation of locale information In addition, it is inevitable that the routing scheme must be re-structured as well, according to the address convention adopted The location issue seems similar with the mapping elaboration between name and address, that is, the mapping what to where is changed to the one knownwhere to current-where Distributed Computing Lab. 26 2001 Fall Mobile Computing Three Addressing Schemes for host mobility PAS (Permanent IP-Address Scheme) each MH has a permanent IP address from the initial (home) administration address space whenever an MH moves, some hosts or routers (at least the home MA) are informed of the current MA’s address the hosts or routers forward packets, which are passing through them, to the current MA using the location information recorded Internet Packets from the Internet MA a {MH a, *} MA k {MH k, MA s} MH a Distributed Computing Lab. MA p MA s {MH k, #} MH k 27 Host Moving 2001 Fall Mobile Computing Three Addressing Schemes (Cont.) TAS (Temporary IP-Address Scheme) a temporary address is assigned dynamically every time a host connects with an MA the location information is managed by supporting a directory or the source host broadcasts a query to find the current location the source host directly routes packets using the location information obtained Who serves MH k at a moment? MA a Internet MA k That’s me! MA p {MH k, -} MH a Distributed Computing Lab. MA s {MH k, MH t} MH k 28 Host Moving 2001 Fall Mobile Computing Three Addressing Schemes (Cont.) ENS (Embedded Network Scheme) each host has a permanent IP-add. and an embedded network add. which consists of the current MA’s add. and a temp. add. the gateways maintain a mapping between IP-addresses and the embedded network address the gateways use the mapping to forward any on-going packets Internet {MH k, (MA s,MH t)} MA a {MH k, (MA s,MH t)} MH a Distributed Computing Lab. MA k Notify MH k’s address to the Internet MA p MA s {MH k, (MA s,MH t)} MH k 29 Host Moving 2001 Fall Mobile Computing Location Considerations A routing decision must be made based on the location information that is available - packet routing efficiency depends critically on how effectively a packet comes across its current address The packet routing paths that go with host mobility depend decisively on the somewhere which holds the information for a mobile host's physical locator A trade-off in devising a location scheme : excessive location preservation can be wasteful of network resource, whilst insufficient location propagation leads to inefficient routing Distributed Computing Lab. 30 2001 Fall Mobile Computing Common Approach Addressing : uses two IP addresses, that is, a separation the dual nature of an IP address into a logical identifier which is the permanent (home) IP address of the host, and a physical locator which is a forwarding (current) IP address Routing : uses tunneling technique, that is, a forwarding mechanism in association with location caches held around the network The arguments that host mobility support system now faces are how to distribute location information, and then how to utilize the information effectively, in order efficiently to deliver packets to moving destinations whilst still limiting costly location updates as much as possible Distributed Computing Lab. 31 2001 Fall Mobile Computing Content Getting start distributed computing, what means for MC? Internet protocol, and its considerations for MC Next generation Internet Cellular technology overview Internet host mobility routing optimization Distributed Computing Lab. 32 2001 Fall Mobile Computing The Internet Protocol Internet is not a physical network, but it is a method of internetworking physical networks and a set of conventions for using networks that allow the computers they reach to Internet The collection of networks and gateways that use the TCP/IP protocol suite and that function as a single, cooperative virtual network Network level interconnection scheme (as opposed to application level interconnection) connectionless packet delivery service reliable stream transport service Distributed Computing Lab. 33 2001 Fall Mobile Computing National Information Infrastructure "The NII will provide all Americans with the information they need, when they need it and where they need it, at an affordable cost." Dr. Jack Gibbons, Presidential Science Advisor ARPA HPCC Symposium, 15 March 1994 "Hundreds of different networks, run by different companies and using different technologies, all connected together in a giant 'network of networks,' providing telephone and interactive digital video to almost every American." Vice President Al Gore, Jr. Address to the ITU, 21 March 1994 Distributed Computing Lab. 34 2001 Fall Mobile Computing Next Generation Internet (NGI) (I) The NGI initiative is a multi-agency federal research and development program, that aims to: http://www.ngi.gov new technologies and services : sponsor research and development in new networking technologies and services in support of the high performance applications requirements testbed(s) : build a high performance network infrastructure (100 to 1,000 times faster end-to-end than today's Internet) in support of both network research and science applications research applications: support demonstration of next generation applications requiring advanced networking technologies It began October 1, 1997, with the following participating agencies: DARPA, NASA, NIH, NIST, NSF, (DE) Distributed Computing Lab. 35 2001 Fall Mobile Computing Distributed Computing Lab. 36 2001 Fall Mobile Computing Internet 2 UCAID (University Corporation for Advanced Internet Development) is supported by over 175 member organizations. universities, corporations have joined to advance networking in higher education http://www.ucaid.edu Internet 2 is a collaborative project by over 120 U.S. research universities engaged in the major challenges facing the next generation of university networks http://www.internet2.edu Abilene is a project to develop a nationwide advanced network to serve as backbone network for the Internet2 http://www.ucaid.edu/html/abilene.html Distributed Computing Lab. 37 2001 Fall Mobile Computing Distributed Computing Lab. 38 2001 Fall Mobile Computing IP Next Generation (IPng) IPng is an IETF WG intended to provide IPv6 which is designed to be an evolutionary step from IPv4 http://www.ietf.org/html.charters/ipngwg-charter.html http://playground.sun.com/pub/ipng/html/ipng-main.html It’s motivations are: limited number of available addresses difficulty in managing routing tables need to support high performance network (e.g. ATM), at the same time, low bandwidth network (e.g. wireless) 6Bone is the IPv6 backbone that was set up to assist in the evolution of IPv6 in the Internet http://www.6bone.net/ Distributed Computing Lab. 39 2001 Fall Mobile Computing 6Bone Distributed Computing Lab. 40 2001 Fall Mobile Computing IP version 6 (I) IPv6 is the formal name of the protocol recommended by the IETF’ IPng group, its objectives are: The Recommendation for the IP Next Generation Protocol, RFC 1752, Jan., 1995 Internet Protocol, Version 6 (IPv6) Specification, Internet Draft, Nov., 1997 support large global internetwork support new low-end Internet devices (PDAs, mobile computers, consumers, devices) support the networked multimedia services Implementations Apple, BSDI,Bull, Dassault, Digital, Epilogue, FTP Software, IBM, INRIA, Linux, Mentat, Microsoft, Novell, NRL, NTHU, Pacific Softworks, Process Software, SICS, SCO, Siemens Nixdorf, Silicon Graphics, Sun, UNH and WIDE Distributed Computing Lab. 41 2001 Fall Mobile Computing The Challenges from IPv4 Plenty of addresses Reduced administrative overhead Opportunity for better routing Support for address renumbering Improved header processing Reasonable security Support for host mobility QoS control capability Distributed Computing Lab. 42 2001 Fall Mobile Computing IPv6 Design (I) : Addressing Two-level structure of the IPv4 address, what? Address paces are: 340,282,366,920,938,463,463,374,607,431,768,211,456 (2^^96 times that of IPv4) An address is represented as x:x:x:x:x:x:x:x (x is 16 bit long) (ex, fedc:ba45:00d4:4354:f345:ad23:546d:232c) compression 0’s (ex, ff01:0:0:0:0:0:0:43 => ff01::43) combination between the IPv4 address and IPv6’s one IPv4 compatible address => ::IPv4 address (eg. x:x:x:x:x:x:d.d.d.d) IPv4 mapped address => ::ffff:IPv4 address IPv6 addresses are identifiers for interfaces, not nodes A single interface may be assigned multiple IPv6 addresses of any type, that is, unicast, anycast, multicast Distributed Computing Lab. 43 2001 Fall Mobile Computing IPv6 Addressing (Cont’) Unicast : provider based address :1/8 fraction of address space 010 REGISTRY PROVIDER SUBSCRIBER SUBNET INTERFACE link (or site) local use address 1/1024 fraction 1111111010 0 INTERFACE 1111111011 0 SUBNET INTERFACE anycast : use unicast address format multicast (4) (4) Usually ID IEEE802 48 bit address GROUP 11111111 FLGS SCOP Distributed Computing Lab. 44 2001 Fall Mobile Computing What’s in an IPv6 Datagram 0 15 Vers Prior 31 Flow Level Payload Length Next Header Hop Limit Source Address (128) 10 X 32 bit = 40 octets Destination Address (128) Next Header Header Length Hop-by-hop option (variable) Next Header Header Length Other option headers … IP payload : TCP header (variable) Distributed Computing Lab. 45 2001 Fall Mobile Computing IPv6 Design (II) : Performance To meet performance requirement on the NGI reduce the number of fields in the datagram : options are placed in separate optional headers, and most of these optional header are not examined on in-between routers fix the length of header : IPv6 extension headers act as a separated extension headers with arbitrary length packet fragmentation is not performed by IPv6 routers, but by the source host only Distributed Computing Lab. 46 2001 Fall Mobile Computing IPv6 Header Extensions Currently defined extension headers (in sequence) hop-by-hop : hop by hop processing on the router routing : similar to the source record route for IPv4 fragment : fragmentation / reassembly authentication : packet integrity and authentication encapsulating : privacy destination : processed at the final destination only - jumbo payload option : 2**32 octets Distributed Computing Lab. 47 2001 Fall Mobile Computing IPv6 Design (III) : QoS Capabilities QoS is controlled by the flow label and the priority field Priority (4bit) congestion controlled traffic (0 ~ 7), such as back-off internet control traffic; snmp interactive traffic; on-line user-to-host attended bulk traffic; ftp, http unattended data transfer; email filler traffic; USENET uncharacterized : no priority non-congestion controlled traffic (8 ~ 15) : constant (at least smooth) data rate and delivery delay from most willing to discard(8) to least willing to discard(15) Distributed Computing Lab. 48 2001 Fall Mobile Computing IPv6 QoS Capabilities (Cont’) Flow is a sequence of packets sent from a source to a destination: a flow is uniquely identified by the combination of a source address and a 24-bit flow level Flow label is used by a source to label a flow for which it requests special handling by the intervening IPv6 routers, such as real-time service the nature of special handling might be conveyed to the routers by a control protocol, such as a resource reservation protocol, before the source start to send a router can decide how to route and process these packet by simply looking up the flow label in a table, without examining the rest of the header the flow level is chosen randomly and uniformly Distributed Computing Lab. 49 2001 Fall Mobile Computing IPv6 Design (IV) : Routing Almost identical to IPv4, but new routing functionality: provider selection (based on policy, performance, cost) host mobility (route to current location) auto-readdressing (route to new address) These functionalities are achieved by creating sequences of IPv6 addresses using ipng routing option, which is very similar to IPv4’s LSRR option (cf. home-based tunneling) P1 H1 P2 H2 P3 Distributed Computing Lab. 50 2001 Fall Mobile Computing IPv6 Design (V) : Security Application specific security mechanism on IPv4, such as privacy enhanced mail, secure http, what problems? An Overview of a security architecture, RFC 1825, Aug., 1995 Description of a packet authentication extension to IP, RFC 1826, Aug., 1995 IP level security could ensure the interoperability between the secured packet and unsecured packet it has two functional areas : authentication and privacy Support for security features could be implemented both, but mandatory for IPv6 and optional for IPv4 Distributed Computing Lab. 51 2001 Fall Mobile Computing IPv6 Transition ngtrans is an IETF WG which is responsible for the transition of the Internet from IPv4 to IPv6 http://www.ietf.org/html.charters/ngtrans-charter.html Aims to allow IPv6 and IPv4 hosts to interoperate incremental upgrade and deployment (one by one installation) minimal upgrade dependencies (DNS only for IPv6 address record) easy addressing (inter-use two types addresses) Distributed Computing Lab. 52 2001 Fall Mobile Computing IPv6 Transition (Cont’) Step 1 : IPv4 >> IPv6 (number of hosts) dual stack model Application TCP, UDP IPv6 IPv4 Ethernet, FDDI, etc. Step 2 : IPv4 ::~ IPv6 tunneling IPv6 packet within IPv4 header Step 3 : IPv4 << IPv6 header translation Distributed Computing Lab. 53 2001 Fall Mobile Computing 21 Century Applications Enabling applications: collaboration technologies digital libraries distributed computing privacy and security remote operation and simulation Disciplinary applications: basic science crisis management education the environment federal information services health care manufacturing Distributed Computing Lab. 54 2001 Fall Mobile Computing 21 Century Applications (Cont’) Network Uses Application Examples Rqmts Teleoperation Telemedicine, Distance Learning, Telescience Battlefield awareness, Virtual Aerospace environment, Engineering Chesapeake Bay virtual environment, Material collaboratory Intelligent Assistants, Optical Nets, Systems of systems Genome Database, Patient records, Earth and Space science Aerodynamics, astrophysics, Global Change, Stockpile Stewardship 1Gbps Virtual Reality, Visualization Collaboratories Network Research Distributed Data and Digital Libraries Computation Distributed Computing Lab. 55 2001 Fall 155Mbps1Gbps 155Mbps/l ink 10Gbps 1Gbps 2.4Gbps Mobile Computing Content Getting start distributed computing, what means for MC? Internet protocol, and its considerations for MC Next generation Internet Cellular technology overview Internet host mobility routing optimization Distributed Computing Lab. 56 2001 Fall Mobile Computing The Vision The Vision Revisited "It is dangerous to put limits on wireless." Guglielmo Marconi (1932) The Vision People and their machines should be able to access information and communicate with each other easily and securely, in any medium or combination of media-voice, data, image, video, or multimedia-any time, anywhere, in a timely, cost-effective way Dr. George H. Heilmeier IEEE Communication Mag. October 1992 Distributed Computing Lab. 57 2001 Fall Mobile Computing Wireless Overlays (borrowed from Kerz’s talk) Distributed Computing Lab. 58 2001 Fall Mobile Computing Overview of Cellular Systems The wireless communication of the future will utilize cellular techniques Why use cellular technology? limited spectrum available demand-assigned channel allows frequency reuse Three basic methods by which cellular carriers could make use of the bandwidth that they are allowed FDMA (Frequency Division Multiple Access) TDMA (Time Division Multiple Access) CDMA (Code Division Multiple Access) Distributed Computing Lab. 59 2001 Fall Mobile Computing Three Multiple Access Methods Amplitude FDMA Time 1 2 1 2 F1 F2 F’1 F’2 Amplitude Frequency Amplitude TDMA CDMA Time 1 F1 2 3 1 1 F2 2 3 Time 1 1 2 3 F’1 Distributed Computing Lab. 1 1 F’2 2 3 1 1 Frequency 60 2 1 3 4 F1 2001 Fall 2 3 4 F’1 Frequency Mobile Computing Cellular Principle The cellular technology increases the network capacity. It relies on the concept of concurrency Concurrency is created by reusing channels in different cells; i.e., channel/reuse. This is allows increase in total capacity of the system (i.e., the number of supported users) The total coverage area is divided into cells. In each cell, only a subset of all the channels is available All the channels are partitioned into sets, which are assigned to cells. The same set if assigned to two cells that are geographically distant “enough,” so that the interference between the co-channel cells is very small. Distributed Computing Lab. 61 2001 Fall Mobile Computing Cellular Principle (Cont’) Distributed Computing Lab. 62 2001 Fall Mobile Computing Cellular Principle (Cont’) Distributed Computing Lab. 63 2001 Fall Mobile Computing Cellular Network Structure System Database Mobile Terminal Base Station MTSO Radio Link Distributed Computing Lab. Switching& Control 64 Network Intelligence 2001 Fall PSTN Local Exchange Mobile Computing Cellular Architecture Distributed Computing Lab. 65 2001 Fall Mobile Computing FDMA : AMPS (Advanced Mobile Phone System) AMPS provides the basement of cellular technology The total spectrum is divided into channels; channels are assigned to users for the duration of a call Cellular phones use a full-duplex channel Forward (downlink) channel from BS to MT: 869 to 894 MHz FCC (Forward Control Channel) : broadcast channel, used for subscriber paging and voice channel assignment FVC (Forward Voice Channel) : dedicated channel for a single call Reverse (Uplink) channel from MT to BS: 824 to 849 MHz RCC (Reverse Control Channel) : random access with sensing provided by FCC RVC (Reverse Voice Channel) : dedicated channel for a single call and paired with the FVC Distributed Computing Lab. 66 2001 Fall Mobile Computing Frequency Allocation ( in Korea) AM Radio 526.5kHz 851 FM 88MHz 108 Cellular 869MHz TV 894 Distributed Computing Lab. 470MHz CT-2 910MHz 914 PCS Cellular 752 824MHz TRS 849 851 866 PCS 1750MHz 1840MHz 1780 1870 67 2001 Fall Mobile Computing AMPS (Cont.) 25 MHz is split into channels that are 30 kHz wide (24 kHz of which is used exclusively for voice) channels 800-900 are not used 832 total number of full-duplex channels includes 21 control channels and 395 voice channels 824 - 849 MHz 991 ... 1023 1 2 869 - 894 MHz ... 799 991 ... Reverse channels 1023 1 2 ... 799 Forward channels 416 channels each between RCC (Radio Common Carrier) and WCC (Wireless Common Carrier) Distributed Computing Lab. 68 2001 Fall Mobile Computing AMPS (Cont.) 824 825 835 991-1023 1-333 A’’ A 845 846.5 849 334-666 667-716 717-799 B A’ B’ Reverse channels 869 870 880 991-1023 1-333 A’’ A 890 891.5 894 334-666 667-716 717-799 A’ B B’ Forward channels 416 channels are divided among a number of cells that are designed so that adjoining cells overlap slightly (59 or 60 channels for each cell) The number of cells among which all of the channels are assigned, but none is repeated, is called a group The configuration would be repeated, reusing the frequencies, how? Distributed Computing Lab. 69 2001 Fall Mobile Computing Reuse Pattern of 7 {f5} {f7} {f6} {f4} {f2} Maximum number of simultaneous calls = total number of channels (e.g., 416) {f6} {f3} {f4} {f2} {f1} {f5} {f5} {f7} {f7} {f6} {f3} {f3} {f4} {f2} 3 x 7 x (416 % 7) = 3 x 416 Distributed Computing Lab. 70 2001 Fall Mobile Computing Propagation Characteristics Two different antennas RSA (Rural Service Area) uses omnidirectional antennas to cover the maximum amount of area per cell MSA (Metropolitan Service Area) face with meeting the demands imposed by a concentrated customer base (120 degrees of a circle) Capacity : the number of subscribers that may be used the number of calls placed by the system’s subscribers the way the calls placed are distributed in time the average time per call the amount of frequency reuse utilized the size of cells Distributed Computing Lab. 71 2001 Fall Mobile Computing Cell Splitting More capacity vs. more handoff (infrastructure) Wireless characteristics partial loss, fading, doppler effect {f2} {f2} {f1} {f1} {f3} {f7} {f6} {f7} {f7} {f2} {f6} {f4} {f5} {f2} {f1} {f6} {f3} {f2} {f4} {f5} {f5} {f6} {f3} {f4} {f6} Example: Cell Radius = 1 mile number of cells = 32 (48 ch. / cell) => 1536 concurrent calls Distributed Computing Lab. 72 Cell Radius = 0.5 mile number of cells = 128 (48 ch. /cell) => 6144 concurrent calls 2001 Fall Mobile Computing Cellular Technology has Advantages more capacity less transmission power more predictable propagation environment more robust system Disadvantages need more infrastructure (more base-stations) need network (to interconnect the base-stations) residual interference handoffs “hot sport” in user concentration Distributed Computing Lab. 73 2001 Fall Mobile Computing Handoff Handoff (U.S. cellular standards) is a procedure of changing the MT to BS binding from one BS to another BS, according to the MT’s move cf) handover(CCITT/CCIR), ALT(Automatic Link Transfer, ANSI) It procedure provides means for improving the quality (e.g., RF signal strength) of the received signal, while the MT moves or when reception conditions change The trigger for handoff is the RF signal strength falling below some threshold, and when there is another BS that can serve the MT with a stronger signal Soft handoff is a handoff in which the new binding is completed before the old binding is torn down Distributed Computing Lab. 74 2001 Fall Mobile Computing Handoff (Cont.) A cell has three distinct regions with different hand-off circumstances central region (1) : the area in which a need for hand-off would be caused by a deep fade twofold region (2) : two cell overlap threefold region (3) Cell 2 Cell 7 When handoffs are not possible? 3 2 3 3 Cell 6 1 Cell 3 3 2 Cell 5 75 2 Cell 1 2 3 Distributed Computing Lab. 2 2001 Fall 3 2 Cell 4 Mobile Computing AMPS Hand-off Routine MR Cell A (old) Cell B (new) MTSO Talking Talking Degradation of corner level (V-Ch, M-wire) Carrier level check order To another cell sites Carrier level Check order Carrier level Carrier level Check with RLR Check with RLR Level response Level response Hand-off message V-Ch Audio mute Carrier off change to new V-Ch Carrier on at new V-Ch Hand-off message 10 Kb/s (v-Ch) Select the best Cell and an idle Ch.in the selected cell TX-on SAT-on Audio mute ST on (old V-Ch) ST off TX off TX-on (Ch skip) Old Ch on Hosk (V-Ch Ch. Completion E-wire) TX off Talking Distributed Computing Lab. Change to new V-Ch Talking 76 2001 Fall Mobile Computing Complexity and Cost of Cellular System The cost that the consumer sees first The cost of the network components is an important consideration for the system operator : the cost of the system must be justified by increase in capacity the user likes the idea of getting something for nothing the provider will more than recoup its expenditure in its service charges if the antennas are designed to handle only a sector of a cell, the cost of the switching equipment becomes higher The quality of service for cellular system is usually the percentage of blocked and dropped calls Distributed Computing Lab. 77 2001 Fall Mobile Computing TDMA Techniques With the proliferation of computers, digital communication technologies (i.e., DSP) have advanced rapidly Allows multiple users to share bandwidth by giving a slice of time to each user for transmitting and receiving data One of the inherent complexities is synchronization accurate distance and time delay measurements are required in order to compute the correct transmission time or time advance But several advantages of using TDMA burst mode transmission results in lower battery power consumption increased number of concurrent users quality of the voice channel Distributed Computing Lab. 78 2001 Fall Mobile Computing NADC (North American Digital Cellular ) VSELP (Vector Sum Excited Linear Predictive) CODEC Dividing channels of the AMPS system into time slots 8kbps the same 30 kHz channels of AMPS are used, but each channel is divided into three time slots Handoff could occur between time slots within the same channel, in addition to the handoff between channels Both the transmitters and receivers become more complex, as timing circuits are needed to ensure that a transmitter does not infringe upon another time slot within the channel As a result, adding capacity becomes more expensive for both the cellular carrier and for the user Distributed Computing Lab. 79 2001 Fall Mobile Computing GSM (Group Special Mobile) Aims to unify the EC by offering a single standard so that users can use one phone throughout Europe Designed with the OSI model in mind 125 full-duplex channels for eight users on each channel the channel bandwidth is 200 kHz the data throughput is 270.833 kbps per a channel in each time slot, 33 kbps are allocated (13 for speech coding (RELP), and 20 for overhead signaling) TDMA employs advanced measurement techniques for determining the link quality and the best cell for handoff more expensive equipment and computers for processing Distributed Computing Lab. 80 2001 Fall Mobile Computing CDMA CDMA allows multiple users to share the same frequency by multiplexing their transmissions in the code space It was envisioned by Qualcomm as a cellular system to replace the current AMPS, using the same frequency Spectrum is divided into a number of 1.25 MHz channels for each channel, there are 64 orthogonal codes CELP (Code Excited Linear Predictive) for speech coding with variable rate, 8.55 kbps max, 3.9 kbps avrage Each channel is potentially shared by a number of users that all use a different code to modulate data in a spread spectrum transmission Distributed Computing Lab. 81 2001 Fall Mobile Computing CDMA (Cont.) CDMA paradigm shift multiple users on one frequency channel is defined by code capacity limit is soft Three primary techniques vocoder (voice compression / decompression) interleaving (variable data rate) spectrum spread Distributed Computing Lab. 82 2001 Fall Mobile Computing Comparison of FDMA, TDMA and CDMA AMPS is by far the cheapest system to construct, build, operate and use, but it is limited by the number of users CDMA is the most complex and costly, but advances in computer technology will make it more attractive in the future for the increased capacity and service quality Intermediated shifting : CDMA is inserted into a portion of the spectrum and used side-by-side with the AMPS For 15MHz spectrum allocation Parameter Channel BW (MHz) No. of CHs Effective CHs Distributed Computing Lab. Voice calls/CH 83 AMPS GSM CDMA 0.03 0.20 1.25 500 75 11 500/7 75/3 11/1 1 2001 Fall 7.25 25~40+ Mobile Computing PCS (Personal Communications Systems) In the narrow sense “a mobile telephone service that is associated with a person instead of a place or a vehicle” Basic requirements users must be allowed to make calls wherever they are the service must be reliable and of good quality it must offer a range of service that the users need, such as voice, data, fax, paging and even video In the operational sense “ the type of wireless communication that implements new digital microcellular and provides personal services” Distributed Computing Lab. 84 2001 Fall Mobile Computing PCS (Personal Communications Systems) The principal idea behind PCS each individual user have a unique identification number using the number, a person can be reached at any time and at any place, even if a caller does not know the location of the called one PCS essentially replicates that of a cellular network with one major difference, that is, microcellular architecture smaller size of cells and large number of base stations numerous handoffs between cells for moving callers large investment to setting up a PCS service Distributed Computing Lab. 85 2001 Fall Mobile Computing Wireless Roaming Environment Heterogeneous (different technology) Unified by Internet Protocol Satellite Wireless WAN (GPRS, CDMA 1x, IMT2000…) Wired or Wireless LAN Internet Picocell MAN (Cellular + LAN) (Bluetooth, IEEE802.11…) Distributed Computing Lab. 86 2001 Fall Mobile Computing Wireless Roaming Dimension (IMT2000, IMT2000) (WLAN, WLAN) (LAN, IMT2000) Internet IMT2000 (WLAN, IMT2000) LAN WLAN (LAN, WLAN) Distributed Computing Lab. 87 2001 Fall Mobile Computing Content Getting start distributed computing, what means for MC? Internet protocol, and its considerations for MC Next generation Internet Cellular technology overview Internet host mobility routing optimization Distributed Computing Lab. 88 2001 Fall Mobile Computing Internet Host Mobility Support Five major proposals Mobile*IP (Columbia University) Virtual Internet Protocol (Sony) Multiple Address Approach (Matsushita) IP Option Approach (IBM, CMU) IP Mobility Support (IETF) Main points of view in this lecture addressing conventions location details routing effectiveness Distributed Computing Lab. 89 2001 Fall Mobile Computing Proposal 1: Mobile*IP Designed and implemented by John Ioannidis (Columbia Univ.) Aims The setup allows mobile hosts to keep their address even if it moves decouples mobile host’s routing scheme from the normal IP routing mobile Hosts (MHs) mobile Support Routers (MSRs) campus : defined by fully-connected MSRs IP protocols defined IPIP (IP inside IP) MICP (Mobile Internetworking Control Protocol) Distributed Computing Lab. 90 2001 Fall Mobile Computing Model System model Embedded Network (Campus) subnet a Host A subnet s subnet k MSR a MSR k MH a MH k Distributed Computing Lab. 91 MSR p MSR s MH s 2001 Fall Mobile Computing Addressing (I) Based on the embedded network concept logical ID : embedded address (home address) physical locator : IP address of the MSR which currently serves a MH Embedded network consists of its own hosts and gateways, and has its own addressing and network protocol, but uses parts of another existing networks as its infrastructure (it is called as “local network”) An embedded address is a two-level construct (m,h), where m is the network’s identifier and h is the host’s identifier Virtual network : a set of subnets which consists of MSRs and their MHs under an admin. control, and which therefore share the same m Distributed Computing Lab. 92 2001 Fall Mobile Computing Addressing (II) For the MHs controlled by a virtual network, only the home addresses are used - the addresses are immutable even if the MH moves around Each MSR maintains the home addresses of MHs under its control and the IP addresses of MSRs within the virtual network, and is responsible for lasthop delivery to MHs within its service area How the home address can be mapped into the current MSR? Distributed Computing Lab. 93 2001 Fall Mobile Computing Location Uses a proxy-ARP between MSRs A source host sends a datagram to its current MSR If the current MSR does not know which MSR is currently responsible for a destination, it broadcasts location search queries, using control message MICP_WHOHAS (with the destination’s home address), to all other MSRs of the virtual network The current MSR of the destination responds a control message MICP_IHAVE, including its IP address The current MSR of the source uses the IP address to tunnel the datagram to the destination Imagine the location cost, and scalability as well! Distributed Computing Lab. 94 2001 Fall Mobile Computing Encapsulation IPIP encapsulation New IP Header IP Header IP Payload Distributed Computing Lab. Source Add := Source’s Current MSR Dest. Add := Dest.’s Current MSR Old IP Header IP Payload 95 2001 Fall Mobile Computing Routing MHs in the same cell : direct routing using ARP MHs in different cells : tunneling using proxy-ARP MH to fixed host : routed through MSR Fixed host (or host outside of the virtual network) to MH : datagrams routed to one of MSR the MSR locate the destination MH the MSR tunnels the datagrams to the current MSR the current MSR delivers them locally, using ARP Always pass through an optimal route at the expense of heavy network traffic also, with taking much time delay Distributed Computing Lab. 96 2001 Fall Mobile Computing Routing : Example In order to deliver a datagram from MH s to MH k Data from outside of the virtual network Virtual Network MICP_WHOHAS MICP_IHAVE subnet a Host a subnet k MSR a MSR k subnet s MSR p MH k MSR s MH s Control Data Data tunneling Distributed Computing Lab. 97 2001 Fall Mobile Computing Popup Operation How it will manage in the cases of inter-campus mobility? MH gets an embedded address from the current campus when it newly connect to the current campus MH notifies the embedded address to an MSR in its campus the MSR is called a designated MSR for the MH the designated MSR acts as a member of the current campus, and it treats the MH as if it serves locally datagrams for the MH firstly arrive its campus, and the receiving MSR tunnels to the designated MSR, after identifying the designated MSR the designated MSR again tunnels the datagrams to the current MSR, after identifying the current MSR, using a proxy ARP at the current campus Distributed Computing Lab. 98 2001 Fall Mobile Computing Proposal 2 : Virtual Internet Protocol (VIP) Designed and implemented by Fumio Teraoka (Sony) Main subject in the WIDE project Key Ideas virtual internet protocol TCP TCP UDP VIP IP IP UDP propagating cache method The setup migrating host gateways Distributed Computing Lab. 99 2001 Fall Mobile Computing Addressing (I) Based on the virtual network concept logical ID : virtual network address (immutable) - usually its own add. physical locator : physical network address (which is a temporary one assigned by the subnetwork which a host is currently visiting) Virtual networks are logically constructed above the physical network by assigning two different IP address to each host The IP layer then is split into two sublayer virtual IP sublayer : address mapping between the two addresses physical IP sublayer : conventional IP layer Distributed Computing Lab. 100 2001 Fall Mobile Computing Addressing (II) The transport layer specifies the target host by its virtual IP address A packet sent by a mobile host that is away from its home subnetwork carries both addresses The Physical IP source and destination addresses are conveyed in the conventional IP header, whilst the virtual ones are carried either as an encapsulated format or as an IP option Distributed Computing Lab. 101 2001 Fall Mobile Computing Datagram Header Format When VIP is implemented as an IP option 0 16 Vers Len Service Type IP Identification Time to Live 31 Total Length Flags Fragment Offset Header Checksum Protocol Num. Source IP Address Destination IP Address Option Type Option length Type Hold Time Source VIP Address Destination VIP Address Source Address Timestamp Destination Address Timestamp Option Type = 140 Timestamps := acts as a version number Distributed Computing Lab. 102 2001 Fall Mobile Computing Location Uses a propagating cache method each host and gateway has a cache for address resolution the cache is called the AMT(Address Mapping Table) AMT entries are updated/created by two control packets, connection/disconnection notification AMT entries propagate across the network as data communication progresses, i.e. with precisely finding out the VIP header VIP packet types VipData : normal data packet VipConn : connection notification VipConnAck : ack. of VipConn VipDisc : disconnection notification VipDelAmt : AMT entry deletion request VipErrObs : error notification Distributed Computing Lab. 103 2001 Fall Mobile Computing Connection / Disconnection Connection to a subnetwork a temporary address is assigned to connecting host the MH sends a VipConn packet to its home gateway intermediate gateway create an AMT entry for the MH the home gateway broadcasts the VipConn packet in the home network and returns a VipConnAck to the MH Disconnection from a subnetwork the MH sends a VipDisc packet to its home gateway the home gateway broadcasts a VipDelAmt packet if a gateway, which received the VipDelAmt, has an AMT entry for the MH, it deletes the corresponding entry and broadcasts the packet the migrating host releases the IP address Distributed Computing Lab. 104 2001 Fall Mobile Computing Model / Location Connection to a subnetwork Net-E Gw-EF Net-G Net-F Host-X Net-A Gw-CG Gw-BF Host-X Gw-AB Gw-CD Gw-BC Net-B Net-D Net-C Gw-AH Host-Y Net-H Host-Z Connection Notification Packet Ack Distributed Computing Lab. 105 2001 Fall Mobile Computing Disconnection Disconnection from a subnetwork Net-E Gw-EF Net-G Net-F Host-X Net-A Gw-CG Gw-BF Host-X Gw-AB Gw-CD Gw-BC Net-B Net-D Net-C Gw-AH Host-Y Net-H Host-Z Disconnection Notification Packet AMT Deletion Request Packet Distributed Computing Lab. 106 2001 Fall Mobile Computing Routing (I) When a host communicates with a migrating host, each host or gateway acts as: upon reception create/update the AMT entry for the source if necessary before transmission if destination’s ATM entry exists, destination’s IP address is resolved else assume the IP = VIP Distributed Computing Lab. 107 2001 Fall Mobile Computing Routing (II) Packet forwarding Net-E Gw-EF Net-G Net-F Host-X Net-A Gw-CG Gw-BF Host-X Gw-AB Gw-CD Gw-BC Net-B Net-D Net-C Gw-AH Net-H Newly build a cache entry for Host-X Host-Z Host-Y Packet with incorrect PN-address Packet with correct PN-address Response packet from Host-X Distributed Computing Lab. 108 2001 Fall Mobile Computing Proposal 3 : Multiple Addresses Scheme Designed and implemented by Hiromi Wada et al. (Matsushita) Key Ideas Addressing Packet Forwarding Server (PFS) autonomous forwarding mode logical ID : home IP address (immutable) physical locator : temporary IP address (which is assigned by the subnetwork which a host is currently visiting) Location each subnetwork has at least one special router, PFS the PFS is responsible for tracking the temporary IP address the new temporary address for a mobile host should be notified from the host itself to its home PFS and the previous PFSs which have been just left by the host Distributed Computing Lab. 109 2001 Fall Mobile Computing Model / Location MH k’s move from subnet m to subnet k, then to subnet a To Previous PFS To Home PFS subnet a Internet PFS a PFS k PFS m SH m MH k Get a temp. address from subnet a subnet s subnet m subnet k host moving PFS s SH s host moving Location notification Distributed Computing Lab. 110 2001 Fall Mobile Computing Datagram Header Format) IPTP (Internet Packet Transmission Protocol) encapsulation 0 16 31 Vers Len Service Type IP Identification Time to Live Total Length Flags Protocol Num. Fragment Offset Header Checksum Source IP Address Destination IP Address Type Autonomous Counter Aim Sequence Status (not used) Home Address of MH Temporary Address of MH Address of PFS Distributed Computing Lab. Type 0 : Packet transmission message 1 : MH Location information message 2 : Ping autonomous supporter message 3 : MH visiting message 4 : Echo message 2001 Fall Mobile Computing 111 Routing (I) Forwarding (tunneling) based on the mobile host’s home PFS the PFS is promiscuously listening on the subnetwork it intercepts any packets for the host, encapsulates them It then forwards them using the host’s current temporary address that it maintains This forwarding scheme is very inefficient in a large network like the Internet due to long chains of forwarding routes Autonomous mode whenever a PFS forwards packets to the other subnetwork, the PFS returns a location notification packet to the source host the source host caches the mobile host’s current temporary address packet encapsulation then is done by the sender itself Distributed Computing Lab. 112 2001 Fall Mobile Computing Routing (II) Forwarding mode Internet subnet a subnet s subnet m subnet k PFS a PFS k PFS m SH m MH k host moving PFS s SH s host moving Data Data tunneling Distributed Computing Lab. 113 2001 Fall Mobile Computing Autonomous mode Autonomous mode Internet subnet a subnet s subnet m subnet k PFS a PFS k PFS m SH m MH k PFS s SH s host moving Location notification Data Data tunneling Distributed Computing Lab. 114 2001 Fall Mobile Computing Proposal 4 : IP Option Scheme Designed and implemented by Charles Perkins (IBM), also by David Johnson (CMU) Key Ideas The setup IP’s LSRR (loose Source and Record Route) option Mobile Hosts (MHs) Mobile Access Stations (MASs) Mobility Routers (MRs) Addressing home IP address (immutable) Distributed Computing Lab. 115 2001 Fall Mobile Computing IP Option Scheme (LSRR) LSRR concept Src: Host-x Dst: Host-a LSRR: GW-n Src: Host-x Dst: Host-a LSRR: GW-k LSRR: GW-n Host-a GW-k Src: Host-x Dst: Host-a GW-n Host-x Src: Host-a Dst: GW-k Src: Host-a Dst: GW-n Src: Host-a Dst: Host-x LSRR: GW-n LSRR: GW-k LSRR: GW-k LSRR: Host-x LSRR: Host-x LSRR: GW-n Distributed Computing Lab. 116 2001 Fall Mobile Computing LSRR Optioned Datagram Header Format Source route options 0 16 Vers Len Service Type IP Identification Time to Live 31 Total Length Flags Fragment Offset Header Checksum Protocol Num. Source IP Address Destination IP Address Option Type Option length Pointer Not Used IP Address of First Hop IP Address of Second Hop ... IP Address of Seventh Hop Option Type = 03 Distributed Computing Lab. 117 2001 Fall Mobile Computing Model / Location MH k’s move from subnet k to subnet a To home MR subnet a MAS a Internet subnet m subnet k MR a MR k MAS k subnet s MR m MAS m SH s MH k host moving Location notification Distributed Computing Lab. 118 2001 Fall Mobile Computing Location & Routing Location each subnetwork has at least one special router, MR the MR is responsible for keeping track of the current location of each MH that has been assigned an address on that subnet. the IP address of the current MAS for an MH should be notified from the host itself to its home MR Routing when an MH is away from its home subnetwork, a datagram sent to the host initially ends up at its home MR the MR tries to forward them to the host’s current MAS, and it then adds an LSRR option to the datagram when the MH replies to the source, it also inserts a LSRR option in the outgoing datagram that specifies the address of its current MAS as transit router the source reverses the recorded route on the datagram and inserts it as a LSRR option in future datagrams sent to the MH Distributed Computing Lab. 119 2001 Fall Mobile Computing Routing (II) Packet transmission from an SH to an MH Internet subnet a subnet m subnet k MR a MAS a MR k MAS k subnet s MR m MAS m SH s MH k host moving Src: SH s Dst: MH k LSRR: MAS a Distributed Computing Lab. Src: SH s Dst: MAS a Src: SH s Dst: MH k LSRR: MH k 120 2001 Fall Mobile Computing Routing (III) Packet transmission from an MH to an SH Internet subnet a subnet m subnet k MR a MAS a MR k MAS k subnet s MR m MAS m SH s MH k host moving Src: MH k Dst: MAS a Src: MH k Dst: SH s LSRR: SH s Distributed Computing Lab. Caches the source route of MH m I.e. {MH k MAS a} LSRR: MAS a 121 2001 Fall Mobile Computing IETF mobileip Group http://www.ietf.org/html.charters/mobileip-charter.html Mailing lists Aims general discussion : [email protected] to subscribe : [email protected] develop or adopt architecture and protocols to support mobility within the Internet in the future, will develop protocols for supporting transparent host roaming among different subnetworks and different media consist of new and/or revised protocols at the network layer Requirement the proposed solutions allow mobile hosts to interoperate with existing Internet systems Distributed Computing Lab. 122 2001 Fall Mobile Computing IETF mobileip Group (Cont.) Internet drafts route optimization in mobile IP mobility support in IPv6 firewall traversal for mobile IP: goals and requirements reverse tunneling for mobile IP firewall traversal for mobile IP: guidelines for firewalls and mobile IP entities Request for Comments IP in IP tunneling (rfc 1853) applicability statement for IP mobility support (rfc 2005) minimal encapsulation within IP (rfc 2004) IP encapsulation within IP (rfc 2003) IP mobility support (rfc 2002) Distributed Computing Lab. 123 2001 Fall Mobile Computing IP Mobility Support History Aims start the work from 1993 has mainly referenced with Mobile*IP registered by C. Perkins as a RFC 2002 at Oct. 1996 provides a recommendation with minimal functionalities works as an input of IPv6’s mobility support part Implementations CMU FTP Software IBM Motorola Nokia SUN Telxon Distributed Computing Lab. Dave Johnson Frank Kastenholz Charlie Perkins Jim Solomon Gunyho Gabor Gabriel Montenegro Frank Ciotti 124 2001 Fall Mobile Computing Introduction To begin with, Two possible mechanisms can be considered as: IPv4 assumes that a host’s IP address uniquely identifies the host’s point of attachment a host MUST be located on the network indicated by its IP address in order to receive datagrams destined to it how can a host change its point of attachment without losing its ability to communicate? the host must change its IP address whenever it moves, but it brings the backward compatibility problem host-specific routes must be propagated throughout the Internet, but it suffers severe scaling problem It has been defining a new scalable mechanism, which enables nodes to change their point of attachment to the Internet without changing their IP address Distributed Computing Lab. 125 2001 Fall Mobile Computing Set UP Protocol requirements a mobile host MUST be able to communicate with other hosts - that do not implement these mobility functions - without changing its IP address the number (size) of administrative messages sent over the wireless link by which a mobile host should be minimized An MH is given a permanent IP add. on a home network When away from its home, it is associated with a care-of add. which reflects the MH’s current point of attachment Two types of the care-of address foreign agent care-of address: an address of a foreign agent with which the mobile host is currently registered co-located care-of address: an externally obtained local address which the mobile host has associated with what are differences on these? Distributed Computing Lab. 126 2001 Fall Mobile Computing Protocol Overview Three steps with the protocol 1. agent discovery: mobility agents may advertise their availability for they provide service, or a newly arrived mobile host may send a solicitation to learn if any prospective agents are present - ICMP router discovery (rfc 1256) 2. registration: when a mobile host is away from home, it registers its care-of address with its home agent - UDP control messages 3. tunneling: when a mobile host is away from home, datagrams sent to it must be tunneled to hide its home address from intervening routers - encapsulation protocol (rfc 2003, 2004, 1701) Distributed Computing Lab. 127 2001 Fall Mobile Computing Message Type Control message format 0 7 Type Length Data ... ICMP discovery message 0 16 19 15 one-byte padding mobility agent advertisement prefix-lengths Registration control message (UDP, port number 434) 1 3 32 33 34 registration request registration reply mobile-home authentication mobile-foreign authentication foreign-home authentication Distributed Computing Lab. 128 2001 Fall Mobile Computing Agent Discovery Agent discovery provides the method by which a mobile host: determines whether it is currently connected to its home network or to a foreign network can detect when it has moved from one network to another determine the care-of address if it is connected to a foreign agent Agent advertisement an agent advertisement is formed by including a mobility agent advertisement extension in an ICMP router advertisement message the normal interval at which agent advertisement are sent should be 1/3 of the advertisement lifetime given in ICMP header, a recommended maximum rate is once per second Distributed Computing Lab. 129 2001 Fall Mobile Computing ICMP Router Discovery Messages (rfc1256) (I) When a host sends IP datagram beyond its directlyattached subnet, it must discover the address of at least one operational router by: reading the address from a configuration file at startup time, but it could bring a significant burden to track dynamic router’s changes listening to routing protocol traffic, but router discovery would be dependent of any specific routing protocol Two ICMP messages with use on multicast links router advertisements : each router periodically multicasts to announce its IP address of that interface, hosts then find it by listening them router solicitations : when a host attached to a multicast link, it multicasts to ask for immediate advertisement Distributed Computing Lab. 130 2001 Fall Mobile Computing ICMP Router Discovery Messages (rfc1256) (II) The message only enable hosts to discover the prospected router, but not which router is best (this is constituted with the ICMP redirection) the default advertising rate is once every 7 to 10 minutes, and the default lifetime is 30 minutes Distributed Computing Lab. 131 2001 Fall Mobile Computing Mobility Agent Advertisement Extension 0 15 Vers Len Service Type IP Identification TTL(1) 31 Total Length Flags Protocol # (1) Fragment Offset Header Checksum IP Source IP Address Dest. Add, (224.0.0.1 or 255.255.255.255) Type (9) Code (0 or 16) Checksum Num Addrs Addr Entry Size Lifetime ICMP router discovery message Router Address [1] Preference Level [1] Router Address [2] ... Type Length Registration Lifetime Sequence Number RBHFMGV reserved Zero or more Care-of Addresses R: registration required, B: busy, H: home agent, F: Foreign agent M: minimal encap. G: GRE encap. V: Van Jacobson header comp. Distributed Computing Lab. 2001 Fall 132 Mobility Agent Advertisement Extension Mobile Computing Mobility Router Solicitation An agent solicitation message is identical to an ICMP router solicitation, except that its IP TTL must be set to 1 a mobile node may solicit more often than once every three seconds 0 15 Vers Len Service Type IP Identification 1 31 Total Length Flags Fragment Offset Header Checksum Protocol # (1) IP Source IP Address 224.0.0.1 or 255.255.255.255 10 Checksum 0 Reserved Distributed Computing Lab. 133 2001 Fall ICMP router solicitation message Mobile Computing Move Detection (I) Prefix-lengths extension : used to indicate the number of bits of network prefix that applies to each router address listed in the ICMP router advertisement portion of the agent advertisement 0 7 Type (19) 15 Length 23 Prefix Lth ... One-byte padding extension, with type field (0) only Distributed Computing Lab. 134 2001 Fall Mobile Computing Move Detection (II) Move detection based on the lifetime field within the ICMP router advertisement portion of the agent advertisement, if a mobile host fails to receive another advertisement from the same agent within the previously received lifetime, it should assume that it has lost contact with that agent based on the prefix lengths extension, a mobile node may determine whether or not a newly received agent advertisement was received on the same subnet as the mobile mode’s current care-of address, if the prefixes differ, the mobile node may assume that it has moved Distributed Computing Lab. 135 2001 Fall Mobile Computing Registration (I) Mobile IP registration provides a mechanism for mobile nodes to communicate their current reachability information to their home agent request forwarding services when visiting a foreign network inform their home agent of their current care-of address renew a registration which is due to expire, and/or deregister when they return home Mobile IP defines two different registrations, one via a foreign agent, and one directly with the mobile node’s home agent Distributed Computing Lab. 136 2001 Fall Mobile Computing Registration (II) When registering via a foreign agent, the registration procedure is: the mobile node sends a registration request to the prospective foreign agent to begin the registration process the foreign agent processes the registration request and then relays it to the home agent the home agent sends a registration reply to the foreign agent to grant or deny the request the foreign agent processes the registration reply and then replays it to the mobile node to inform it of the disposition of its request Distributed Computing Lab. 137 2001 Fall Mobile Computing Registration Request S: simultaneous bindings B: broadcast datagrams D: decapsulation by mobile node M: Minimal encapsulation G: GRE encapsulation V: Van Jacobson header comp. 0 15 31 434 UDP Source Port UDP Message Length Type (1) S B D M G V rev UDP Checksum UDP Lifetime Home Address UDP Registration Request Message Home Agent Care-of Address Identification Authentication Extension Authentication Distributed Computing Lab. 138 2001 Fall Mobile Computing Registration Reply Code field registration successful: 0, 1 registration denied by the foreign agent: 64 ~ 88 registration denied by the home agent: 128 ~ 136 0 15 31 434 UDP Source Port UDP Message Length Type (3) Code UDP Checksum UDP Lifetime Home Address UDP Registration Reply Message Home Agent Identification Authentication Extension Authentication Distributed Computing Lab. 139 2001 Fall Mobile Computing Location / Routing Location Routing HA is responsible for keeping track of the current location of each MH that has been assigned an address on that subnet when an MH away from the HA, the IP address of the current MA should be notified from the host itself to its home MA HA takes charge of intercepting datagrams addressed to the host’s home address and forwarding them to the associated care-of address Three tunneling types IP encapsulation within IP (rfc 2003) Minimal encapsulation within IP (rfc 2004) IP in IP tunneling (rfc 1853) Generic Routing Encapsulation (rfc 1701) Distributed Computing Lab. 140 2001 Fall Mobile Computing Location (Suppl.) MH a’s move from subnet a to subnet k Internet subnet a subnet s subnet k MA a Caches the current MA’s address of MH a I.e. {MH a MA k} MA k host moving MA n MH a MA s MH s Location notification Distributed Computing Lab. 141 2001 Fall Mobile Computing Encapsulation Methords Outer IP Header IP Header IP Payload Delivery Header Tunnel Header GRE Header Inner IP Header Payload Packet IP Payload GRE Outer IP Header Modified IP Header IP Header Minimal IP Header IP Packet IP Packet IP encap. within IP Distributed Computing Lab. IP in IP tunneling 142 Minimal encap. for IP 2001 Fall Mobile Computing Routing (Suppl.) Packet transmission from MH s to MH a Internet subnet a subnet s subnet k HA FA HA MH a host moving MH s Data Data tunneling HA : Home Agent FA : Foreign Agent Distributed Computing Lab. FA 143 2001 Fall Mobile Computing Internet Host Mobility Support (Summary) Addressing, Location and Routing Mobile*IP VIP Multiple Address Addressing Embedded Temporary Temporary (Physical Locator) Current MA Add. Temp. Add. Temp. Add. Location Broadcast Location Cache Forwarding Pointer (Somewhere) Current MA Gateways Home Server Tunneling Mobile Host Intermediate Gateways Criteria Distributed Computing Lab. 144 IP Option Permanent IP Mobility Support Permanent Home Add. Current MA Add. IP Option Forwarding Pointer Home Server Home MA Forwarding Server Mobility Router Home MA (Mobile Host) (Mobile Host) 2001 Fall Mobile Computing Tip 1 (Smooth Hand-offs) MH simply asks the new FA to relay its mobility binding update to the CA that the host wants to let them know its new location. The FA tries to do this and needs to pass the result, which indicates success or not, to the host Internet subnet a subnet s subnet k MA a MA k MA n host moving Distributed Computing Lab. 145 MH a 2001 Fall MA s MH s Mobile Computing Tip 2 (Orphan Packets) After the destination mobile host disconnected with the previous agent, packets bound for the host would be delivered to the previous agent until the sender stops forwarding to this agent Possible time zone to occur orphan packets Start tunneling to new location MA j Leave Connection hand-off Address propagation MA k Detect Check authorization Buffering vs. Special tunneling Distributed Computing Lab. 146 2001 Fall Mobile Computing Location and Routing Optimization The key service for providing seamless connectivity to MH is the creation and maintenance of a packet forwarding tunnel between a known location and the host's current agent Clearly, packet routing paths going with host mobility depend critically on where and/or how much location information is preserved on the network as a whole In considering the current IP address's role, the most common (simple) placing method is to hold the current location for moving hosts on the host's HA In this case, an IP packet must be sent to the mobile host's home agent where it is tunneled to the mobile host's current location, resulting in triangle routing Distributed Computing Lab. 147 2001 Fall Mobile Computing Triangle Routing A triangular round-trip route Internet Host Home-based Location Home Agent Reply Path Tunneling Foreign Agent MH k Host Moving Triangle routing is undesirable : increased network utilization (sensitivity to network partition) irregularity of performance variance Distributed Computing Lab. 148 2001 Fall Mobile Computing Location and Routing Optimization Schemes (I) In the host mobility environment, there is a tradeoff between the two key issues, locating hosts' physical locale and routing datagrams to and from them If the system initially puts effort into location, routing overheads caused by host mobility should be reduced However, in practice, it is very important to try to optimize this situation in order to reduce the total network cost; that is, providing higher performance to the system as a whole, so eventually the mobile user's satisfaction. How this condition can be resolved? Distributed Computing Lab. 149 2001 Fall Mobile Computing Location and Routing Optimization Schemes (II) Two seemingly conflicting aims : limiting costly location distribution as far as possible achieving optimal routing for most communication traffic How much of the location overhead should be incorporated to achieve the prospective routing efficiency? Object function location overhead << routing effect Distributed Computing Lab. 150 2001 Fall Mobile Computing IMHP Approach Based on the lazy location notification If a network entity receives a packet that it must tunnel to a MH it is likely that the source node of the packet has an incorrect binding (so the packet has been tunneled to this node) no binding for the destination host (in the case of a normal packet) In either case, if this entity determines that a new binding might improve packet routing, that is, the tunneling on this entity makes for an unnecessarily long route for the packet, it then may send a binding notification to the source node of the packet the notification is issued not only by the HA, FA, and its correspondent host acts as a cache agent Distributed Computing Lab. 151 2001 Fall Mobile Computing IMHP (Location Notification) Packet transmission from MH s to MH a Internet subnet a subnet s subnet k HA FA host moving HA MH a MH s Location Notification Data Data tunneling Distributed Computing Lab. 152 FA 2001 Fall Caches the current MA’s address of MH a I.e. {MH a MA k} Mobile Computing IMHP (Routing) Packet transmission from MH s to MH a (thereafter) Internet subnet a subnet s subnet k HA FA host moving Distributed Computing Lab. HA MH a 153 FA MH s 2001 Fall Mobile Computing IMHP Approach (Cont.) Because an MH continues to move around, cache agents easily end up with out-of-date cache entries for the host Each notification message indicates the maximum lifetime for any location cache entry created from it An old cache entry, especially on the previous agent(s), is eventually deleted after the expiration of the lifetime period established A mobility entity wanting to provide continued service with a particular location cache entry may attempt to reconfirm that mobility binding before the expiration of this lifetime period Distributed Computing Lab. 154 2001 Fall Mobile Computing IMHP (Operational Example) {MH 212, MA 21} {MH 211, MA 21} {MH 212, MA 18} MA 18 MA 11 {MH 211, -} {MH 212, -} MA 28 MA 24 MA 21 {MH 212, MA 18} {MH 212, MA 24} {MH 212, MA 21} {MH 212, MA 24} {MH 211, MA 28} MH 211 MH 212 Location notification Data tunneling Distributed Computing Lab. 155 2001 Fall Mobile Computing