Mobile Computing Unit 3
Mobile Computing Unit 3
Compatibility
No changes to current hosts, OS, routers
• Mobile end-systems can communicate with fixed systems security
Authentication of all registration messages
Case 2:- CN is Mobile Node MNk is at Home Network with agent HAk and MN1 is
at home network with agent HAi .
Case 4:- CN is Mobile Node MNk is at Foreign Network with agent FAk and MN1 is
at home network with agent HAi
Case 5:- CN is Mobile Node MNk is at Foreign Network with agent FAk E and MN1
is at another foreign network with agent FAj
Case 6:- CN is Mobile Node MNk is at Home Network with HAk and MN1 is at
foreign network with agent FAj
11 Bharati Vidyapeeth's College Of Engineering , New Delhi
Location Management
MN often Visits Foreign Network.
Handover Management:- Managing the transfer of service availability to
the new Location Network
Preparing for services at new networks require proper Location
Management Protocol.
Agent Discovery is through agent advertisement and agent solicitation
Agent Discovery:-
• In FN , MN must discover FA . Step involve in agent discovery are
1) Listen to an advertisement ( ICMP message) from an agent
2) Proceed to step 3 if the advertisement is found , else solicit the agent from the
routers. If agent is found then proceed to step 3 else repeat the step
3) If COA is discovered from the message is found to the same as the previous
COA go back to step 1 or else proceed to step 4
4) If the discovered COA is same as HN, de=register at this network and go back
to step1 else if current COA is a new COA , then register with new COA
If an FA does not refuse the request it relays it to the HA. Relaying is different from
forwarding as the FA is required to process the packet and create new headers.
Some important fields of the request message are recorded for use later on: MN link
layer address, MN IP address, UDP source port, HA IP address, identification number
and requested lifetime.
Regarding a Registration reply message, the FA can refuse it and send a decline to the
MN is it finds the reply from the HA to be invalid. Otherwise it updates its list of visiting
MNs and begins acting on behalf of the MN.
A router on the home link, possibly the HA, advertises reachability to the
A HA intercepts the packets for the MN and tunnels a copy to each COA in the
binding table.
At the foreign link either the MN extracts the packet (collocated COA) or the
23
Bharati Vidyapeeth's College Of Engineering , New Delhi
Tunnelling and Encapsulation
Tunnel :- virtual pipe for date packet between tunnel entry and end point.
Tunneling :- sending packet through tunnel, achieved by encapsulation
Encapsulation :- Mechanism of taking a packet consisting packet header
and data packet and putting it into data part of new packet.
original
original data
header
GRE original
outer header original data
header header
ver. IHL TOS length
IP identification flags fragment offset
TTL GRE IP checksum
IP address of HA new header new data
Care-of address COA
C R K S s rec. rsv. ver. protocol
checksum (optional) offset (optional)
key (optional)
sequence number (optional)
routing (optional)
ver. IHL TOS length
IP identification flags fragment offset
TTL lay. 4 prot. IP checksum
IP address of CN
IP address of MN
How to ‘fool’ the routing table into handling tunneled packets at the HA?
A virtual interface is used to do the encapsulation.
A packet destined for the MN is handled by the routing routine as all
received IP packets are.
The routing table has a host specific entry for the MN. This host specific
entry is used to route the packet to a virtual interface that basically
consists of a process that does encapsulation.
Once encapsulation has been performed the packet is sent to be
processed by the routing routine again. This time the destination address
is the COA and it is routed normally.
FA foreign
network
1. MN sends to FA
3 2. FA tunnels packets to HA
CN by encapsulation
3. HA forwards the packet to the
receiver (standard case)
receiver
Application
simplification of installation and maintenance of networked computers
supplies systems with all necessary information, such as IP address, DNS
server address, domain name, subnet mask, default router etc.
enables automatic integration of systems into an Intranet or the Internet,
can be used to acquire a COA for Mobile IP
Client/Server-Model
the client sends via a MAC broadcast a request to the DHCP server (might
be via a DHCP relay)
DHCPDISCOVER
DHCPDISCOVER
server client
client relay
selection of configuration
DHCPREQUEST DHCPREQUEST
(reject) (options) confirmation of
configuration
DHCPACK
initialization completed
release
DHCPRELEASE delete context
Renewal of configurations
IP addresses have to be requested periodically, simplified protocol
Options
available for routers, subnet mask, NTP (network time protocol)
timeserver, SLP (service location protocol) directory,
DNS (domain name system)
Distance Table : This table contains the distance of a node from all the nodes in
network.
Topology Table : This table contains the information of Link state data along with
the sequence number which can be used to determine when the information is
updated last.
Next Hop Table : Next hop table will contain the information about the immediate
These tables are updated on every step and ensures that each node receives correct
Disadvantages :
Large bandwidth consumption.
Internet
cluster
super cluster
R1
S1 N3
N4
N5 N6 R2
S2
N8 N9
N7
neighbors
(i.e. within radio range)
Transport Mode: End systems are the initiator and recipient of protected traffic
Tunnel Mode: Gateways act on behalf of hosts to protect traffic
Security Association :
•A collection of parameters required to establish a secure session
•Uniquely identified by three parameters consisting of Security Parameter
Index (SPI) , IP destination address & Security protocol (AH or ESP)
identifier
•An SA is unidirectional
•Two SAs required for a bidirectional communication
• A single SA can be used for AH or ESP, but not both
•Must create two (or more) SAs for each direction if using both AH and ESP
Traditional TCP/IP
Transport Layer Protocols-
Indirect
Snooping
Mobile TCP
66
Traditional TCP/IP
Two Transport layer protocol :-
UDP (User Data Gram)
TCP ( Transmission Control Protocol)
UDP (User Data Gram Protocol)
Connection less Protocol
Doesn't require session establishment, data flow, congestion control, session
termination
UDP header used for encapsulation at L4 during transmission of port data.
UDP Header - 4 octet or Two word
First Word :-Consist 16 bit source and 16 bit destination address
Second word:- 16 bit length of datagram and 16 bit header check sum
67
Traditional TCP/IP Contd.
TCP:-
Connection oriented protocol
Feature:-
Transmission as data stream
Buffering and retransmission
Session start , data transmission and session termination fully acknowledged from end to end
In order delivery
Congestion control and avoidance
TCP Header
68
Traditional TCP/IP Contd.
TCP Data Stream :-
Data Steam consist byte delivered using virtual connection between
sockets
Each socket having port ID and IP address
No of byte in stream depend Transport PDU
TCP Data Delivery
TCP specify number of acknowledgement sequence from one end to other
Checksum field for detecting the error. Takes in account the header as well data
field
TCP Data Flow Control
Window Size adjustment
Cumulative acknowledgement
Reverse Packet acknowledgement
Duplicate acknowledgement
Delayed Acknowledgment
69
Traditional TCP/IP Contd.
Congestion Control
Method Employed for Congestion control
Slow Start and Congestion avoidance
Fast recovery after packet loss
Fast retransmit and fast recovery
Selective acknowledgement
Explicit congestion notification
70
Traditional TCP/IP Contd.
TCP fast retransmit/fast recovery
TCP sends an ACK only after receiving a packet
If sender receives duplicate ACKs, this is due to gap in received packets at
the receiver
Receiver got all packets up to the gap and is actually receiving packets
Conclusion: packet loss not due to congestion, retransmit, continue with
current congestion window (do not use slow-start)
71
Methods For Wireless/Mobile Networks
HTTP (used by web services) typically uses TCP
Reliable transport between client and server required
TCP
Steam oriented, not transaction oriented
Network friendly: time-out
Congestion
slow down transmission
72
Methods For Wireless/Mobile Networks
73
Methods For Wireless/Mobile Networks
Problem Faced By Mobile network
Convention TCP presumes that packet loss is due to congestion only
Problem associated with Mobile network for packet loss
Data linking transmission quality problem
High BER, leads to high retransmission rate
Duplicate acknowledge leads to reduced window size
Methods Used By Transport layer
Split TCP
Split TCP in two layers
Upper layer for the requirement of Mobile network and send data stream to conventional TCP
Four Method :- Indirect, Selective repeat, mobile end TCP, and Mobile TCP
74
Indirect TCP
Indirect TCP or I-TCP segments the connection
No changes to the TCP protocol for hosts connected to the wired Internet,
millions of computers use (variants of) this protocol
Optimized TCP protocol for mobile hosts
Splitting of the TCP connection at, e.g., the foreign agent into 2 TCP connections,
no real end-to-end connection any longer
hosts in the fixed part of the net do not notice the characteristics of the wireless
part
Indirect TCP Function as mentioned below
75
Indirect TCP
76
Indirect TCP
Advantages
No changes in the fixed network necessary, no changes for the hosts
(TCP protocol) necessary, all current optimizations to TCP still work
Wireless link transmission errors isolated from those in fixed network
Simple to control, mobile TCP is used only for one hop between, e.g., a
foreign agent and mobile host
Very fast retransmission of packets is possible, the short delay on the
mobile hop is known
Disadvantages
loss of end-to-end semantics, an acknowledgement to a sender does
now not any longer mean that a receiver really got a packet, foreign
agents might crash
higher latency possible due to buffering of data within the foreign agent and
forwarding to a new foreign agent
77
Indirect TCP
Selective repeat protocol :-
Modification of Indirect TCP
Uses UDP between BTS and MN
Doesn't guarantee in order delivery between MN and BTS , unlike TCP
Mobile End Transmission Protocol:-
Another Modification of Indirect TCP
Guarantee in order delivery between MN and BTS , like TCP
Uses Mobile end transmission protocol between MN and BTS
Rest Similar to Indirect TCP
78
Snooping TCP
Transparent“ extension of TCP within the foreign agent
Buffering of packets sent to the mobile host
Lost packets on the wireless link (both directions!) will be retransmitted
immediately by the mobile host or foreign agent, respectively (so called “local”
retransmission)
The foreign agent therefore “snoops” the packet flow and recognizes
acknowledgements in both directions, it also filters ACKs
Changes of TCP only within the foreign agent
79
Snooping TCP
80
Snooping TCP
Data transfer to the mobile host
FA buffers data until it receives ACK of the MH, FA detects packet loss via
duplicated ACKs or time-out
fast retransmission possible, transparent for the fixed network
Data transfer from the mobile host
FA detects packet loss on the wireless link via sequence numbers, FA answers
directly with a NACK to the MH
MH can now retransmit data with only a very short delay
Integration with MAC layer
MAC layer often has similar mechanisms to those of TCP
thus, the MAC layer can already detect duplicated packets due to
retransmissions and discard them
81
Snooping TCP
Advantage
Transparent End to End Connection
No Change in existing TCP network, only snooping sub layer is added
Disadvantage
snooping TCP does not isolate the wireless link as good as I-TCP
snooping might be tough if packets are encrypted
Wireless TCP
Modified Form of snooping TCP
Modifies Time stamp on packet while returning ACK to compensate
increased RTT
Cannot be used with shared LAN
82
Mobile TCP
Special handling of lengthy and/or frequent disconnections
M-TCP splits as I-TCP does
unmodified TCP fixed network to supervisory host (SH)
optimized TCP SH to MH
Supervisory host
no caching, no retransmission
monitors all packets, if disconnection detected
set sender window size to 0
sender automatically goes into persistent mode
old or new SH reopen the window
Advantages
maintains semantics, supports disconnection, no buffer forwarding
Disadvantages
loss on wireless link propagated into fixed network
adapted TCP on wireless link
83
Mobile TCP
84
Comparison Between Different Approach
85
Thank you
86