ACN_BITS

Embed Size (px)

Citation preview

  • 8/16/2019 ACN_BITS

    1/51

    BITS PilaniPilani Campus

    Advanced ComputerNetworks (CS ZG525)

    Virendra S ShekhawatDepartment of Computer Science and Information Systems

  • 8/16/2019 ACN_BITS

    2/51

    BITS PilaniPilani Campus

    First Semester 2015-2016Lecture-17 [25 th Oct 2015]

  • 8/16/2019 ACN_BITS

    3/51

    BITS Pilani, Pilani CampusFirst Sem 2015-16

    Agenda

    • TCP Performance Over Wireless Links [CH-30] – Reading

    • A Comparison of Mechanisms for Improving TCP Performance overWireless Links by H Balakrishnan

    – Web Reference• http://daedalus.cs.berkeley.edu/publications/sigcomm96.pdf

    • IP Mobility Problem and Solutions [CH-31, Ch-32] – Reading

    3Advanced Computer Networks CS G525

  • 8/16/2019 ACN_BITS

    4/51

    BITS Pilani, Pilani CampusFirst Sem 2015-164

    TCP Problems Over Noisy Links

    • Wireless links are inherently error-prone – Fades, interference, attenuation – Errors often happen in bursts

    TCP cannot distinguish between corruption andcongestion – TCP unnecessarily reduces window, resulting in low

    throughput and high latency• Burst losses often result in timeouts• Sender retransmission is the only option

    – Inefficient use of bandwidth

    Advanced Computer Networks CS G525

  • 8/16/2019 ACN_BITS

    5/51

    BITS Pilani, Pilani CampusFirst Sem 2015-16

    Performance Degradation

    0.0E+00

    5.0E+05

    1.0E+06

    1.5E+06

    2.0E+06

    0 10 20 30 40 50 60

    Time (s)

    S e q u e n c e n u m b e r

    ( b y t e s

    )

    TCP Reno(280 Kbps)

    Best possibleTCP with no errors(1.30 Mbps)

    2 MB wide-area TCP transfer over 2 Mbps Lucent WaveLAN5

    Advanced Computer Networks CS G525

  • 8/16/2019 ACN_BITS

    6/51

    BITS Pilani, Pilani CampusFirst Sem 2015-166

    Proposed Solutions

    • End-to-End protocols – Selective ACKs, Explicit Loss Notification (ELN),

    Selective Acknowledgement•

    Split-connection protocols – Separate connections for wired path and wireless hop

    • Reliable link-layer protocols (Hide link relatedlosses from the TCP)

    – Error-correcting codes – Local retransmission – Snooping

    Advanced Computer Networks CS G525

  • 8/16/2019 ACN_BITS

    7/51BITS Pilani, Pilani CampusFirst Sem 2015-167

    Approach Styles (End-to-End)•

    Improve TCP implementations – Improve loss recovery (SACK, NewReno) i.e. Fast Retransmit – Help it to identify congestion (ELN, ECN)…. How to implement…?

    • ACKs include flag indicating wireless loss – Trick TCP into doing right thing e.g. send extra dupacks

    Wired link Wireless link

    Advanced Computer Networks CS G525

  • 8/16/2019 ACN_BITS

    8/51BITS Pilani, Pilani CampusFirst Sem 2015-168

    Approach Styles (Split Connection)

    Split connections (aka Indirect TCP) – Wireless connection need not be TCP (SRP over UDP) – Hard state at base station

    • TCP protocol processing at base station twice for each packet• Complicates mobility• Vulnerable to failures• Violates end-to-end semantics

    Wired link Wireless link

    Advanced Computer Networks CS G525

  • 8/16/2019 ACN_BITS

    9/51BITS Pilani, Pilani CampusFirst Sem 2015-16

    Split-Connection CongestionWindow

    • Wired connection does not shrink congestion window• But wireless connection times out often, causing sender to stall

    0

    10000

    20000

    30000

    40000

    50000

    60000

    0 20 40 60 80 100 120Time (sec)

    C o n g e s t

    i o n W

    i n d o w

    ( b y t e s

    )

    Wired connectionWireless connection

    9Advanced Computer Networks CS G525

  • 8/16/2019 ACN_BITS

    10/51BITS Pilani, Pilani CampusFirst Sem 2015-1610

    Approach Styles (Link Layer)• More aggressive local retransmit than TCP

    – Bandwidth not wasted on wired links• Adverse interactions with transport layer

    – Timer interactions – Interactions with fast retransmissions – Large end-to-end round-trip time variation

    • FEC does not work well with burst losses

    Wired link Wireless link

    ARQ/FEC

    Advanced Computer Networks CS G525

  • 8/16/2019 ACN_BITS

    11/51BITS Pilani, Pilani CampusFirst Sem 2015-1611

    Hybrid Approach: SnoopProtocol

    • Shield TCP sender from wireless losses – Eliminate adverse interactions between protocol layers – Congestion control only when congestion occurs

    • Modify base station – To cache un-acked TCP packets – … and perform local retransmissions

    • Key ideas – No transport level code in base station – When node moves to different base station, state

    eventually recreated there• Preserve TCP/IP service model: end-to-end

    semantics

    Advanced Computer Networks CS G525

  • 8/16/2019 ACN_BITS

    12/51BITS Pilani, Pilani CampusFirst Sem 2015-16

    Snoop Protocol: CH to MH

    CorrespondentHost

    Mobile HostBase Station

    5 1

    12346

    • Snoop agent: active interposition agent – Snoops on TCP segments and ACKs – Detects losses by duplicate ACKs and timers – Suppresses duplicate ACKs from MH

    Snoop Agent

    12Advanced Computer Networks CS G525

  • 8/16/2019 ACN_BITS

    13/51BITS Pilani, Pilani CampusFirst Sem 2015-16

    Snoop Protocol: CH to MH

    CorrespondentHost

    Mobile HostBase Station

    • Transfer of file from CH to MH• Current window = 6 packets

    Snoop Agent65

    43

    2 1

    13Advanced Computer Networks CS G525

  • 8/16/2019 ACN_BITS

    14/51BITS Pilani, Pilani CampusFirst Sem 2015-16

    Snoop Protocol: CH to MH

    CorrespondentHost

    Mobile HostBase Station

    • Transfer begins

    Snoop Agent6 54 3 2 1

    14Advanced Computer Networks CS G525

  • 8/16/2019 ACN_BITS

    15/51BITS Pilani, Pilani CampusFirst Sem 2015-16

    Snoop Protocol: CH to MH

    CorrespondentHost

    Mobile HostBase Station

    5 1

    12346

    • Snoop agent caches segments that pass by

    Snoop Agent

    15Advanced Computer Networks CS G525

  • 8/16/2019 ACN_BITS

    16/51BITS Pilani, Pilani CampusFirst Sem 2015-16

    Snoop Protocol: CH to MH

    CorrespondentHost

    Mobile HostBase Station

    51234

    6

    • Packet 1 is Lost

    Snoop Agent23 1

    Lost Packets1

    16Advanced Computer Networks CS G525

  • 8/16/2019 ACN_BITS

    17/51BITS Pilani, Pilani CampusFirst Sem 2015-16

    Snoop Protocol: CH to MH

    CorrespondentHost

    Mobile HostBase Station

    5 12346

    • Packet 1 is Lost – Duplicate ACKs generated

    Snoop Agent

    23

    Lost Packets1

    4

    ack 0

    17Advanced Computer Networks CS G525

  • 8/16/2019 ACN_BITS

    18/51BITS Pilani, Pilani CampusFirst Sem 2015-16

    Snoop Protocol: CH to MH

    CorrespondentHost

    Mobile HostBase Station

    5 12346

    • Packet 1 is Lost – Duplicate ACKs generated

    • Packet 1 retransmitted from cache at higher priority

    Snoop Agent

    23

    Lost Packets1

    4

    ack 0

    56 1

    ack 0

    18Advanced Computer Networks CS G525

  • 8/16/2019 ACN_BITS

    19/51BITS Pilani, Pilani CampusFirst Sem 2015-16

    Snoop Protocol: CH to MH

    CorrespondentHost

    Mobile HostBase Station

    5 12346

    • Duplicate ACKs suppressed

    Snoop Agent

    234

    ack 4

    56

    1

    ack 0X

    19Advanced Computer Networks CS G525

  • 8/16/2019 ACN_BITS

    20/51BITS Pilani, Pilani CampusFirst Sem 2015-16

    Snoop Protocol: CH to MH

    CorrespondentHost

    Mobile HostBase Station

    56

    • Clean cache on new ACK

    Snoop Agent

    234

    ack 5

    6

    15

    ack 4

    20Advanced Computer Networks CS G525

  • 8/16/2019 ACN_BITS

    21/51BITS Pilani, Pilani CampusFirst Sem 2015-16

    Snoop Protocol: CH to MH

    CorrespondentHost

    Mobile HostBase Station

    6

    • Clean cache on new ACK

    Snoop Agent

    234

    ack 6

    156

    ack 5

    ack 4

    21Advanced Computer Networks CS G525

  • 8/16/2019 ACN_BITS

    22/51BITS Pilani, Pilani CampusFirst Sem 2015-16

    Snoop Protocol: CH to MH

    CorrespondentHost

    Mobile HostBase Station

    • Active soft state agent at base station• Transport-aware reliable link protocol• Preserves end-to-end semantics

    Snoop Agent

    234

    ack 6

    156978

    ack 5

    22Advanced Computer Networks CS G525

  • 8/16/2019 ACN_BITS

    23/51BITS Pilani, Pilani CampusFirst Sem 2015-16

    23

    Performance: FH to MH

    0

    0.2

    0.4

    0.6

    0.8

    1

    1.2

    1.4

    1.6

    0 500 1000 1500 2000 2500

    1/Bit-error Rate (1 error every x Kbits)

    T h r o u g h p u

    t ( M

    b p s )

    2 MB local-area TCP transfer over 2 Mbps Lucent WaveLAN

    • Snoop+SACKand Snoopperform best

    • TCP SACKperformancedisappointing

    TCP Reno

    SPLIT

    TCP SACK

    SPLIT-SACK

    Snoop

    Snoop+SACK

    Advanced Computer Networks CS G525

  • 8/16/2019 ACN_BITS

    24/51

    BITS Pilani, Pilani CampusFirst Sem 2015-16

    Summary

    • End-to-end schemes, while not as effective as localtechniques in handling wireless losses

    – But no extra support is required• The split-connection approach, with standard TCP used

    for the wireless hop, shields the sender from wirelesslosses

    – However the throughput is still slightly less than that for awell-tuned link-layer scheme that does not split the

    connection• The TCP-aware link-layer protocol (snoop) with

    Selective Acknowledgment performs the best

    24Advanced Computer Networks CS G525

  • 8/16/2019 ACN_BITS

    25/51

    BITS Pilani, Pilani CampusFirst Sem 2015-1625

    Next…

    • What is Mobility…? • Why we need Mobility…?

    • IP Mobility Solutions (Routing Solutions) – Ethernet – IP Routing – Mobile IP

    Advanced Computer Networks CS G525

  • 8/16/2019 ACN_BITS

    26/51

    BITS Pilani, Pilani CampusFirst Sem 2015-16

    Introduction

    • Mobility in wireless networks refers to a node, Mobile Node(MN), changing its point of attachment to the network whileits communication to the network remains uninterrupted

    Host Mobility – Movement of a node

    • Network Mobility – Movement of a network

    Personal Mobility – Movement of users rather than devices

    • Session Mobility – Mobility between two terminals

    Advanced Computer Networks CS G52526

  • 8/16/2019 ACN_BITS

    27/51

    BITS Pilani, Pilani CampusFirst Sem 2015-16

    Why Things Move…?

    • Physical Mobility – Devices (Host) move to new attachment point

    • Multi-homing – Devices starts using different attachment point – e.g. 3G, WiFi

    • Migration – VM migration

    • Fail-over – Backup -Primary

    Advanced Computer Networks CS G52527

  • 8/16/2019 ACN_BITS

    28/51

    BITS Pilani, Pilani CampusFirst Sem 2015-16

    Mobility and Internet

    • Since the standard Internet combines the uniquehost identifier with the topology location usingIP addresses, it cannot provide support for

    mobility

    • IETF Support for Mobility – Mobile IP supports mobility by decoupling the

    binding between the host identifier and topologylocation using a fixed indirection point

    Advanced Computer Networks CS G52528

  • 8/16/2019 ACN_BITS

    29/51

    BITS Pilani, Pilani CampusFirst Sem 2015-16

    Requirements of Mobility

    • Efficient Handoff• Location management

    – If a mobile host offers services to other nodes, it must be able to be located by these nodes as itmoves as well as keeping the privacy of its topological location.

    • Security• Efficient Routing

    – Packets should be routed with the latency as low as possible, optimally close to the shortest pathprovided by IP routing.

    • Scalability – A mobility scheme is said to be scalable if its performance does not drop as the number of nodes

    (MNs and CNs) increases.• Fault Tolerance• Simultaneous Mobility• Compatibility with IP Routing• Link layer Independence• Transparency

    – Transparent to the applications

    • QoSAdvanced Computer Networks CS G525

    29

  • 8/16/2019 ACN_BITS

    30/51

    BITS Pilani, Pilani CampusFirst Sem 2015-16

    Handling Mobility

    • Change Address of Mobile Node – Change the mapping of name to address

    • Mobility is a directory problem

    • Keeping the Address same – Change the routes to reach the new location

    • Mobility is a routing problem

    Advanced Computer Networks CS G52530

  • 8/16/2019 ACN_BITS

    31/51

    BITS Pilani, Pilani CampusFirst Sem 2015-16

    Internet Design Decisions

    • Socket abstraction – Connection between a pair of fixed IP addresses

    and port numbers – Leads to more emphasis on routing solutions

    • Interface addresses – Addresses refer to interfaces (adaptors) – Not the host, or the service

    Advanced Computer Networks CS G52531

  • 8/16/2019 ACN_BITS

    32/51

    BITS Pilani, Pilani CampusFirst Sem 2015-16

    IP Mobility

    • IP address changes as the mobile device movesand changes its point of attachment

    • Problem: – Active TCP connections break – Can DNS solve it?

    • Too slow: new IP address might be unknown to clients thatwant to access the mobile node

    Advanced Computer Networks CS G52532

  • 8/16/2019 ACN_BITS

    33/51

    BITS Pilani, Pilani CampusFirst Sem 2015-16

    Routing Solutions

    • Ethernet – MAC learning of the new location

    IP routing – Inject IP address(es) at new location

    • Mobile IP – Stationary home agent directs traffic to new

    location

    Advanced Computer Networks CS G52533

  • 8/16/2019 ACN_BITS

    34/51

    BITS Pilani, Pilani CampusFirst Sem 2015-16

    Ethernet

    • Ethernet handles mobility – IP address and MAC address stay the same – Switches learn to route to the new location

    • But, larger networks have multiple segments – Cannot retain your IP address as you move

    Solution: virtual local area networks (VLAN) – Logical Ethernet segment spanning a campus – e.g., interconnecting the WiFi access points

    Advanced Computer Networks CS G52534

  • 8/16/2019 ACN_BITS

    35/51

    BITS Pilani, Pilani CampusFirst Sem 2015-16

    Pros and Cons

    • Advantages – Seamless mobility, no changes to hosts or apps – No changes to MAC or IP addresses

    • Disadvantages – Ethernet does not scale –

    Long paths, state per MAC address, flooding, …

    • Widely used approach in campus networks

    35Advanced Computer Networks CS G525

  • 8/16/2019 ACN_BITS

    36/51

    BITS Pilani, Pilani CampusFirst Sem 2015-16

    IP Routing

    • Node has a persistent address (e.g., 15.30.40.7)• Injected into routing protocol (e.g., OSPF)

    Advanced Computer Networks CS G52536

    15.30.40.0/24 15.30.40.7

  • 8/16/2019 ACN_BITS

    37/51

    BITS Pilani, Pilani CampusFirst Sem 2015-16

    Pros and Cons

    • Advantages – Seamless mobility, no MAC or IP address changes – Traffic follows an efficient path to new location

    • Disadvantages – Does not scale to large number of mobile hosts –

    More routing-protocol messages – Larger routing tables to store smaller address

    blocks

    37 37Advanced Computer Networks CS G525

  • 8/16/2019 ACN_BITS

    38/51

    BITS Pilani, Pilani CampusFirst Sem 2015-16

    Mobile IP[1]

    Advanced Computer Networks CS G52538

    HA

    FA

    MN

    MN

    Home Subnet

    Foreign Subnet

    CN

    b l [ ]

  • 8/16/2019 ACN_BITS

    39/51

    BITS Pilani, Pilani CampusFirst Sem 2015-16

    Mobile IP[2]: MN to CNCommunication

    Advanced Computer Networks CS G52539

    HA

    FA

    MN

    MN

    Home Subnet

    Foreign Subnet

    CN

  • 8/16/2019 ACN_BITS

    40/51

  • 8/16/2019 ACN_BITS

    41/51

    BITS Pilani, Pilani CampusFirst Sem 2015-16 Advanced Computer Networks CS G525 41

    Mobile IP: Registration example

    visited network: 79.129.13/24home agentHA: 128.119.40.7

    foreign agentCOA: 79.129.13.2

    COA: 79.129.13.2….

    ICMP agent adv. Mobile agentMA: 128.119.40.186

    registration req.COA: 79.129.13.2HA: 128.119.40.7MA: 128.119.40.186Lifetime: 9999identification:714….

    registration req.COA: 79.129.13.2HA: 128.119.40.7MA: 128.119.40.186Lifetime: 9999identification: 714encapsulation format….

    registration replyHA: 128.119.40.7MA: 128.119.40.186Lifetime: 4999Identification: 714encapsulation format….

    registration reply

    HA: 128.119.40.7MA: 128.119.40.186Lifetime: 4999Identification: 714….

    time

    P bl MN CN

  • 8/16/2019 ACN_BITS

    42/51

    BITS Pilani, Pilani CampusFirst Sem 2015-16

    Problem: MN to CNCommunication

    • The IP address of the MN is topologically incorrectinside the foreign network (remember MN keepsfixed IP)

    • Firewall in foreign network may prevent packetsfrom being transmitted with topologically incorrectsource address

    • Solution: Reverse tunneling –

    Establish a topologically correct reverse tunnel from CoAto HA – Outgoing packets tunneled to the HN and then routed to

    the CN

    Advanced Computer Networks CS G52542

  • 8/16/2019 ACN_BITS

    43/51

    BITS Pilani, Pilani CampusFirst Sem 2015-16

    Mobile IP[3]: Reverse Routing

    Advanced Computer Networks CS G52543

    HA

    FA

    MN

    MN

    Home Subnet

    Foreign Subnet

    CN

  • 8/16/2019 ACN_BITS

    44/51

  • 8/16/2019 ACN_BITS

    45/51

    BITS Pilani, Pilani CampusFirst Sem 2015-16

    Enhancements-Efficient Routing

    • Problem: Triangular Routing in Mobile IPv4

    • Solution: – HA informs the CN about the location of MN – CN caches the current COA of the MN for some time – CN directly tunnels packets to COA, instead of using HA – Problem : Security issues

    Advanced Computer Networks CS G52545

  • 8/16/2019 ACN_BITS

    46/51

    BITS Pilani, Pilani CampusFirst Sem 2015-16

    Smooth Handover

    • Problem: MN moves from one FA to anotherCached COA (at CN or HA) is outdated

    Solution: – The new FA sends a binding update to the old FA – The old FA forwards remaining packets to new FA and releases

    resources for the MN – If the old FA receives packets for an MN, but it is not its

    current FA, it can send a binding warning to the sender of thepacket

    Advanced Computer Networks CS G525

    46

  • 8/16/2019 ACN_BITS

    47/51

    BITS Pilani, Pilani CampusFirst Sem 2015-16

    Mobile IPv4 and NAT Traversal

    Mobile IP uses IP-in-IP tunneling between HA and FA• Not enough information to allow packets to traverse

    NAT (no port information)• Solution:

    – Extending the registration and tunnel procedure – Registration message sent using UDP – HA detects presence of NAT by comparing source IP with

    COA –

    MN indicates UDP tunneling capability by including theUDP tunneling extension in the registration request(includes the NAT tunnel port number)

    – HA sets up UDP tunnel using the NAT tunnel port: packetscorrectly forwarded to MN

    Advanced Computer Networks CS G525

    47

  • 8/16/2019 ACN_BITS

    48/51

    BITS Pilani, Pilani CampusFirst Sem 2015-16

    Mobile IPv6

    • No FA needed• IPv6 has auto configuration (a node can assign itself

    a topologically valid IPv6 address composed fromthe network address and its MAC address)

    • Use auto configuration to get a topologically correctCOA

    • Packets are sent with COA as source address•

    COA is the current source address of the MN in theforeign network• No firewall problems

    Advanced Computer Networks CS G525

    48

  • 8/16/2019 ACN_BITS

    49/51

    BITS Pilani, Pilani CampusFirst Sem 2015-16

    Need of Mobility

    • Increasing demand for seamless IP mobility – E.g., continue a VoIP call while on the train – E.g., virtual machine migration within and between

    data centers

    • Increasing integration of WiFi and cellular – E.g., multi-homed cell phones that can use both

    networks (announced for Samsung Galaxy S5) – E.g., servers with multiple interface cards

    • Need better mobility & multi-homing solutions!49

    Advanced Computer Networks CS G525

  • 8/16/2019 ACN_BITS

    50/51

    BITS Pilani, Pilani CampusFirst Sem 2015-16

    Mobile IP in practice

    First RFC 1996• Mobile IPv6, 2011• Proxy Mobile IPv6• Similar to Mobile IP, but implemented entirely inside the network• 3G and UMTS have Mobile IP (conceptually) implemented

    Internally• Mobility support for 802.11, WiMAX• As a mechanism to perform IP handover across different wireless

    Technologies – LTE->UMTS, WiMAX, 802.11

    Advanced Computer Networks CS G525

    50

  • 8/16/2019 ACN_BITS

    51/51

    Thank You!

    51