Upload
ashwath-m
View
216
Download
1
Embed Size (px)
Citation preview
8/16/2019 ACN_BITS
1/51
BITS PilaniPilani Campus
Advanced ComputerNetworks (CS ZG525)
Virendra S ShekhawatDepartment of Computer Science and Information Systems
8/16/2019 ACN_BITS
2/51
BITS PilaniPilani Campus
First Semester 2015-2016Lecture-17 [25 th Oct 2015]
8/16/2019 ACN_BITS
3/51
BITS Pilani, Pilani CampusFirst Sem 2015-16
Agenda
• TCP Performance Over Wireless Links [CH-30] – Reading
• A Comparison of Mechanisms for Improving TCP Performance overWireless Links by H Balakrishnan
– Web Reference• http://daedalus.cs.berkeley.edu/publications/sigcomm96.pdf
• IP Mobility Problem and Solutions [CH-31, Ch-32] – Reading
3Advanced Computer Networks CS G525
8/16/2019 ACN_BITS
4/51
BITS Pilani, Pilani CampusFirst Sem 2015-164
TCP Problems Over Noisy Links
• Wireless links are inherently error-prone – Fades, interference, attenuation – Errors often happen in bursts
•
TCP cannot distinguish between corruption andcongestion – TCP unnecessarily reduces window, resulting in low
throughput and high latency• Burst losses often result in timeouts• Sender retransmission is the only option
– Inefficient use of bandwidth
Advanced Computer Networks CS G525
8/16/2019 ACN_BITS
5/51
BITS Pilani, Pilani CampusFirst Sem 2015-16
Performance Degradation
0.0E+00
5.0E+05
1.0E+06
1.5E+06
2.0E+06
0 10 20 30 40 50 60
Time (s)
S e q u e n c e n u m b e r
( b y t e s
)
TCP Reno(280 Kbps)
Best possibleTCP with no errors(1.30 Mbps)
2 MB wide-area TCP transfer over 2 Mbps Lucent WaveLAN5
Advanced Computer Networks CS G525
8/16/2019 ACN_BITS
6/51
BITS Pilani, Pilani CampusFirst Sem 2015-166
Proposed Solutions
• End-to-End protocols – Selective ACKs, Explicit Loss Notification (ELN),
Selective Acknowledgement•
Split-connection protocols – Separate connections for wired path and wireless hop
• Reliable link-layer protocols (Hide link relatedlosses from the TCP)
– Error-correcting codes – Local retransmission – Snooping
Advanced Computer Networks CS G525
8/16/2019 ACN_BITS
7/51BITS Pilani, Pilani CampusFirst Sem 2015-167
Approach Styles (End-to-End)•
Improve TCP implementations – Improve loss recovery (SACK, NewReno) i.e. Fast Retransmit – Help it to identify congestion (ELN, ECN)…. How to implement…?
• ACKs include flag indicating wireless loss – Trick TCP into doing right thing e.g. send extra dupacks
Wired link Wireless link
Advanced Computer Networks CS G525
8/16/2019 ACN_BITS
8/51BITS Pilani, Pilani CampusFirst Sem 2015-168
Approach Styles (Split Connection)
•
Split connections (aka Indirect TCP) – Wireless connection need not be TCP (SRP over UDP) – Hard state at base station
• TCP protocol processing at base station twice for each packet• Complicates mobility• Vulnerable to failures• Violates end-to-end semantics
Wired link Wireless link
Advanced Computer Networks CS G525
8/16/2019 ACN_BITS
9/51BITS Pilani, Pilani CampusFirst Sem 2015-16
Split-Connection CongestionWindow
• Wired connection does not shrink congestion window• But wireless connection times out often, causing sender to stall
0
10000
20000
30000
40000
50000
60000
0 20 40 60 80 100 120Time (sec)
C o n g e s t
i o n W
i n d o w
( b y t e s
)
Wired connectionWireless connection
9Advanced Computer Networks CS G525
8/16/2019 ACN_BITS
10/51BITS Pilani, Pilani CampusFirst Sem 2015-1610
Approach Styles (Link Layer)• More aggressive local retransmit than TCP
– Bandwidth not wasted on wired links• Adverse interactions with transport layer
– Timer interactions – Interactions with fast retransmissions – Large end-to-end round-trip time variation
• FEC does not work well with burst losses
Wired link Wireless link
ARQ/FEC
Advanced Computer Networks CS G525
8/16/2019 ACN_BITS
11/51BITS Pilani, Pilani CampusFirst Sem 2015-1611
Hybrid Approach: SnoopProtocol
• Shield TCP sender from wireless losses – Eliminate adverse interactions between protocol layers – Congestion control only when congestion occurs
• Modify base station – To cache un-acked TCP packets – … and perform local retransmissions
• Key ideas – No transport level code in base station – When node moves to different base station, state
eventually recreated there• Preserve TCP/IP service model: end-to-end
semantics
Advanced Computer Networks CS G525
8/16/2019 ACN_BITS
12/51BITS Pilani, Pilani CampusFirst Sem 2015-16
Snoop Protocol: CH to MH
CorrespondentHost
Mobile HostBase Station
5 1
12346
• Snoop agent: active interposition agent – Snoops on TCP segments and ACKs – Detects losses by duplicate ACKs and timers – Suppresses duplicate ACKs from MH
Snoop Agent
12Advanced Computer Networks CS G525
8/16/2019 ACN_BITS
13/51BITS Pilani, Pilani CampusFirst Sem 2015-16
Snoop Protocol: CH to MH
CorrespondentHost
Mobile HostBase Station
• Transfer of file from CH to MH• Current window = 6 packets
Snoop Agent65
43
2 1
13Advanced Computer Networks CS G525
8/16/2019 ACN_BITS
14/51BITS Pilani, Pilani CampusFirst Sem 2015-16
Snoop Protocol: CH to MH
CorrespondentHost
Mobile HostBase Station
• Transfer begins
Snoop Agent6 54 3 2 1
14Advanced Computer Networks CS G525
8/16/2019 ACN_BITS
15/51BITS Pilani, Pilani CampusFirst Sem 2015-16
Snoop Protocol: CH to MH
CorrespondentHost
Mobile HostBase Station
5 1
12346
• Snoop agent caches segments that pass by
Snoop Agent
15Advanced Computer Networks CS G525
8/16/2019 ACN_BITS
16/51BITS Pilani, Pilani CampusFirst Sem 2015-16
Snoop Protocol: CH to MH
CorrespondentHost
Mobile HostBase Station
51234
6
• Packet 1 is Lost
Snoop Agent23 1
Lost Packets1
16Advanced Computer Networks CS G525
8/16/2019 ACN_BITS
17/51BITS Pilani, Pilani CampusFirst Sem 2015-16
Snoop Protocol: CH to MH
CorrespondentHost
Mobile HostBase Station
5 12346
• Packet 1 is Lost – Duplicate ACKs generated
Snoop Agent
23
Lost Packets1
4
ack 0
17Advanced Computer Networks CS G525
8/16/2019 ACN_BITS
18/51BITS Pilani, Pilani CampusFirst Sem 2015-16
Snoop Protocol: CH to MH
CorrespondentHost
Mobile HostBase Station
5 12346
• Packet 1 is Lost – Duplicate ACKs generated
• Packet 1 retransmitted from cache at higher priority
Snoop Agent
23
Lost Packets1
4
ack 0
56 1
ack 0
18Advanced Computer Networks CS G525
8/16/2019 ACN_BITS
19/51BITS Pilani, Pilani CampusFirst Sem 2015-16
Snoop Protocol: CH to MH
CorrespondentHost
Mobile HostBase Station
5 12346
• Duplicate ACKs suppressed
Snoop Agent
234
ack 4
56
1
ack 0X
19Advanced Computer Networks CS G525
8/16/2019 ACN_BITS
20/51BITS Pilani, Pilani CampusFirst Sem 2015-16
Snoop Protocol: CH to MH
CorrespondentHost
Mobile HostBase Station
56
• Clean cache on new ACK
Snoop Agent
234
ack 5
6
15
ack 4
20Advanced Computer Networks CS G525
8/16/2019 ACN_BITS
21/51BITS Pilani, Pilani CampusFirst Sem 2015-16
Snoop Protocol: CH to MH
CorrespondentHost
Mobile HostBase Station
6
• Clean cache on new ACK
Snoop Agent
234
ack 6
156
ack 5
ack 4
21Advanced Computer Networks CS G525
8/16/2019 ACN_BITS
22/51BITS Pilani, Pilani CampusFirst Sem 2015-16
Snoop Protocol: CH to MH
CorrespondentHost
Mobile HostBase Station
• Active soft state agent at base station• Transport-aware reliable link protocol• Preserves end-to-end semantics
Snoop Agent
234
ack 6
156978
ack 5
22Advanced Computer Networks CS G525
8/16/2019 ACN_BITS
23/51BITS Pilani, Pilani CampusFirst Sem 2015-16
23
Performance: FH to MH
0
0.2
0.4
0.6
0.8
1
1.2
1.4
1.6
0 500 1000 1500 2000 2500
1/Bit-error Rate (1 error every x Kbits)
T h r o u g h p u
t ( M
b p s )
2 MB local-area TCP transfer over 2 Mbps Lucent WaveLAN
• Snoop+SACKand Snoopperform best
• TCP SACKperformancedisappointing
TCP Reno
SPLIT
TCP SACK
SPLIT-SACK
Snoop
Snoop+SACK
Advanced Computer Networks CS G525
8/16/2019 ACN_BITS
24/51
BITS Pilani, Pilani CampusFirst Sem 2015-16
Summary
• End-to-end schemes, while not as effective as localtechniques in handling wireless losses
– But no extra support is required• The split-connection approach, with standard TCP used
for the wireless hop, shields the sender from wirelesslosses
– However the throughput is still slightly less than that for awell-tuned link-layer scheme that does not split the
connection• The TCP-aware link-layer protocol (snoop) with
Selective Acknowledgment performs the best
24Advanced Computer Networks CS G525
8/16/2019 ACN_BITS
25/51
BITS Pilani, Pilani CampusFirst Sem 2015-1625
Next…
• What is Mobility…? • Why we need Mobility…?
• IP Mobility Solutions (Routing Solutions) – Ethernet – IP Routing – Mobile IP
Advanced Computer Networks CS G525
8/16/2019 ACN_BITS
26/51
BITS Pilani, Pilani CampusFirst Sem 2015-16
Introduction
• Mobility in wireless networks refers to a node, Mobile Node(MN), changing its point of attachment to the network whileits communication to the network remains uninterrupted
•
Host Mobility – Movement of a node
• Network Mobility – Movement of a network
•
Personal Mobility – Movement of users rather than devices
• Session Mobility – Mobility between two terminals
Advanced Computer Networks CS G52526
8/16/2019 ACN_BITS
27/51
BITS Pilani, Pilani CampusFirst Sem 2015-16
Why Things Move…?
• Physical Mobility – Devices (Host) move to new attachment point
• Multi-homing – Devices starts using different attachment point – e.g. 3G, WiFi
• Migration – VM migration
• Fail-over – Backup -Primary
Advanced Computer Networks CS G52527
8/16/2019 ACN_BITS
28/51
BITS Pilani, Pilani CampusFirst Sem 2015-16
Mobility and Internet
• Since the standard Internet combines the uniquehost identifier with the topology location usingIP addresses, it cannot provide support for
mobility
• IETF Support for Mobility – Mobile IP supports mobility by decoupling the
binding between the host identifier and topologylocation using a fixed indirection point
Advanced Computer Networks CS G52528
8/16/2019 ACN_BITS
29/51
BITS Pilani, Pilani CampusFirst Sem 2015-16
Requirements of Mobility
• Efficient Handoff• Location management
– If a mobile host offers services to other nodes, it must be able to be located by these nodes as itmoves as well as keeping the privacy of its topological location.
• Security• Efficient Routing
– Packets should be routed with the latency as low as possible, optimally close to the shortest pathprovided by IP routing.
• Scalability – A mobility scheme is said to be scalable if its performance does not drop as the number of nodes
(MNs and CNs) increases.• Fault Tolerance• Simultaneous Mobility• Compatibility with IP Routing• Link layer Independence• Transparency
– Transparent to the applications
• QoSAdvanced Computer Networks CS G525
29
8/16/2019 ACN_BITS
30/51
BITS Pilani, Pilani CampusFirst Sem 2015-16
Handling Mobility
• Change Address of Mobile Node – Change the mapping of name to address
• Mobility is a directory problem
• Keeping the Address same – Change the routes to reach the new location
• Mobility is a routing problem
Advanced Computer Networks CS G52530
8/16/2019 ACN_BITS
31/51
BITS Pilani, Pilani CampusFirst Sem 2015-16
Internet Design Decisions
• Socket abstraction – Connection between a pair of fixed IP addresses
and port numbers – Leads to more emphasis on routing solutions
• Interface addresses – Addresses refer to interfaces (adaptors) – Not the host, or the service
Advanced Computer Networks CS G52531
8/16/2019 ACN_BITS
32/51
BITS Pilani, Pilani CampusFirst Sem 2015-16
IP Mobility
• IP address changes as the mobile device movesand changes its point of attachment
• Problem: – Active TCP connections break – Can DNS solve it?
• Too slow: new IP address might be unknown to clients thatwant to access the mobile node
Advanced Computer Networks CS G52532
8/16/2019 ACN_BITS
33/51
BITS Pilani, Pilani CampusFirst Sem 2015-16
Routing Solutions
• Ethernet – MAC learning of the new location
•
IP routing – Inject IP address(es) at new location
• Mobile IP – Stationary home agent directs traffic to new
location
Advanced Computer Networks CS G52533
8/16/2019 ACN_BITS
34/51
BITS Pilani, Pilani CampusFirst Sem 2015-16
Ethernet
• Ethernet handles mobility – IP address and MAC address stay the same – Switches learn to route to the new location
• But, larger networks have multiple segments – Cannot retain your IP address as you move
•
Solution: virtual local area networks (VLAN) – Logical Ethernet segment spanning a campus – e.g., interconnecting the WiFi access points
Advanced Computer Networks CS G52534
8/16/2019 ACN_BITS
35/51
BITS Pilani, Pilani CampusFirst Sem 2015-16
Pros and Cons
• Advantages – Seamless mobility, no changes to hosts or apps – No changes to MAC or IP addresses
• Disadvantages – Ethernet does not scale –
Long paths, state per MAC address, flooding, …
• Widely used approach in campus networks
35Advanced Computer Networks CS G525
8/16/2019 ACN_BITS
36/51
BITS Pilani, Pilani CampusFirst Sem 2015-16
IP Routing
• Node has a persistent address (e.g., 15.30.40.7)• Injected into routing protocol (e.g., OSPF)
Advanced Computer Networks CS G52536
15.30.40.0/24 15.30.40.7
8/16/2019 ACN_BITS
37/51
BITS Pilani, Pilani CampusFirst Sem 2015-16
Pros and Cons
• Advantages – Seamless mobility, no MAC or IP address changes – Traffic follows an efficient path to new location
• Disadvantages – Does not scale to large number of mobile hosts –
More routing-protocol messages – Larger routing tables to store smaller address
blocks
37 37Advanced Computer Networks CS G525
8/16/2019 ACN_BITS
38/51
BITS Pilani, Pilani CampusFirst Sem 2015-16
Mobile IP[1]
Advanced Computer Networks CS G52538
HA
FA
MN
MN
Home Subnet
Foreign Subnet
CN
b l [ ]
8/16/2019 ACN_BITS
39/51
BITS Pilani, Pilani CampusFirst Sem 2015-16
Mobile IP[2]: MN to CNCommunication
Advanced Computer Networks CS G52539
HA
FA
MN
MN
Home Subnet
Foreign Subnet
CN
8/16/2019 ACN_BITS
40/51
8/16/2019 ACN_BITS
41/51
BITS Pilani, Pilani CampusFirst Sem 2015-16 Advanced Computer Networks CS G525 41
Mobile IP: Registration example
visited network: 79.129.13/24home agentHA: 128.119.40.7
foreign agentCOA: 79.129.13.2
COA: 79.129.13.2….
ICMP agent adv. Mobile agentMA: 128.119.40.186
registration req.COA: 79.129.13.2HA: 128.119.40.7MA: 128.119.40.186Lifetime: 9999identification:714….
registration req.COA: 79.129.13.2HA: 128.119.40.7MA: 128.119.40.186Lifetime: 9999identification: 714encapsulation format….
registration replyHA: 128.119.40.7MA: 128.119.40.186Lifetime: 4999Identification: 714encapsulation format….
registration reply
HA: 128.119.40.7MA: 128.119.40.186Lifetime: 4999Identification: 714….
time
P bl MN CN
8/16/2019 ACN_BITS
42/51
BITS Pilani, Pilani CampusFirst Sem 2015-16
Problem: MN to CNCommunication
• The IP address of the MN is topologically incorrectinside the foreign network (remember MN keepsfixed IP)
• Firewall in foreign network may prevent packetsfrom being transmitted with topologically incorrectsource address
• Solution: Reverse tunneling –
Establish a topologically correct reverse tunnel from CoAto HA – Outgoing packets tunneled to the HN and then routed to
the CN
Advanced Computer Networks CS G52542
8/16/2019 ACN_BITS
43/51
BITS Pilani, Pilani CampusFirst Sem 2015-16
Mobile IP[3]: Reverse Routing
Advanced Computer Networks CS G52543
HA
FA
MN
MN
Home Subnet
Foreign Subnet
CN
8/16/2019 ACN_BITS
44/51
8/16/2019 ACN_BITS
45/51
BITS Pilani, Pilani CampusFirst Sem 2015-16
Enhancements-Efficient Routing
• Problem: Triangular Routing in Mobile IPv4
• Solution: – HA informs the CN about the location of MN – CN caches the current COA of the MN for some time – CN directly tunnels packets to COA, instead of using HA – Problem : Security issues
Advanced Computer Networks CS G52545
8/16/2019 ACN_BITS
46/51
BITS Pilani, Pilani CampusFirst Sem 2015-16
Smooth Handover
• Problem: MN moves from one FA to anotherCached COA (at CN or HA) is outdated
•
Solution: – The new FA sends a binding update to the old FA – The old FA forwards remaining packets to new FA and releases
resources for the MN – If the old FA receives packets for an MN, but it is not its
current FA, it can send a binding warning to the sender of thepacket
Advanced Computer Networks CS G525
46
8/16/2019 ACN_BITS
47/51
BITS Pilani, Pilani CampusFirst Sem 2015-16
Mobile IPv4 and NAT Traversal
•
Mobile IP uses IP-in-IP tunneling between HA and FA• Not enough information to allow packets to traverse
NAT (no port information)• Solution:
– Extending the registration and tunnel procedure – Registration message sent using UDP – HA detects presence of NAT by comparing source IP with
COA –
MN indicates UDP tunneling capability by including theUDP tunneling extension in the registration request(includes the NAT tunnel port number)
– HA sets up UDP tunnel using the NAT tunnel port: packetscorrectly forwarded to MN
Advanced Computer Networks CS G525
47
8/16/2019 ACN_BITS
48/51
BITS Pilani, Pilani CampusFirst Sem 2015-16
Mobile IPv6
• No FA needed• IPv6 has auto configuration (a node can assign itself
a topologically valid IPv6 address composed fromthe network address and its MAC address)
• Use auto configuration to get a topologically correctCOA
• Packets are sent with COA as source address•
COA is the current source address of the MN in theforeign network• No firewall problems
Advanced Computer Networks CS G525
48
8/16/2019 ACN_BITS
49/51
BITS Pilani, Pilani CampusFirst Sem 2015-16
Need of Mobility
• Increasing demand for seamless IP mobility – E.g., continue a VoIP call while on the train – E.g., virtual machine migration within and between
data centers
• Increasing integration of WiFi and cellular – E.g., multi-homed cell phones that can use both
networks (announced for Samsung Galaxy S5) – E.g., servers with multiple interface cards
• Need better mobility & multi-homing solutions!49
Advanced Computer Networks CS G525
8/16/2019 ACN_BITS
50/51
BITS Pilani, Pilani CampusFirst Sem 2015-16
Mobile IP in practice
•
First RFC 1996• Mobile IPv6, 2011• Proxy Mobile IPv6• Similar to Mobile IP, but implemented entirely inside the network• 3G and UMTS have Mobile IP (conceptually) implemented
Internally• Mobility support for 802.11, WiMAX• As a mechanism to perform IP handover across different wireless
Technologies – LTE->UMTS, WiMAX, 802.11
Advanced Computer Networks CS G525
50
8/16/2019 ACN_BITS
51/51
Thank You!
51