Review, Mobile IP Principals, Cont…

Download Report

Transcript Review, Mobile IP Principals, Cont…

Review, Aloha
Aloha
—Stations starts sending when they have
something to send
—Pure Aloha, no contention resolution, relies
on timed-out acks, max throughput
approximately 18%
—Slotted Aloha, no contention resolution,
relies on timed-out acks, only can start
sending in the beginning of a slot, max
through put approximately 36%
EETS 8316/NTU TC 745, Fall 2003
SMU
ENGINEERING
#1
Southern Methodist University Fall 2003
EETS 8316/NTU CC745-N
Wireless Networks
Review Session
Instructor: Jila Seraj
email: [email protected]
http://www.engr.smu.edu/~jseraj/
tel: 214-505-6303
EETS 8316/NTU TC 745, Fall 2003
SMU
ENGINEERING
#2
Review, Pure ALOHA Throughput
— In equilibrium, throughput (rate of successfully
transmitted frames) = rate of new transmissions, S
S = GP0
where P0 = probability of successful transmission
(no collision)
— P0 depends on “vulnerable interval” for frame, 2T
- transmission attempt at time 0
frame A
- collision if starts in interval (-T,0)
frame B
frame C
-T
0
EETS 8316/NTU TC 745, Fall 2003
- collision if starts in interval (0,T)
time
T
SMU
ENGINEERING
#3
Review, Slotted ALOHA
Slotted ALOHA is a modification to increase
efficiency
— Time is divided into time slots = transmission time
of a frame, T
— All stations are synchronized (e.g., by periodic
synchronization pulse)
— Any station with data must wait until next time slot
to transmit
— Any time slot with two or more frames results in a
collision and loss of all frames – retransmitted after
a random time
EETS 8316/NTU TC 745, Fall 2003
SMU
ENGINEERING
#4
Review, Slotted ALOHA
“Vulnerable interval” is reduced by factor of
2 to just T
-T
frame A
- transmission attempt at time 0
frame B
- collision if frame B was ready in
interval (-T,0)
0
EETS 8316/NTU TC 745, Fall 2003
time
T
SMU
ENGINEERING
#5
Review, CSMA
Carrier Sense Multiple Access =
CSMA
Sense the presence of carrier, sense the
channel is free, send data, wait for Ack, resend if timed-out, if busy back off and try
again. Max throughput 60%
EETS 8316/NTU TC 745, Fall 2003
SMU
ENGINEERING
#6
Review, CSMA (Cont)
Carrier Sense Multiple Access-Collision
Detection (CSMA-CD)
— Send when carrier is free, listen to detect collision.
— CSMA-CA is the method of choice
Carrier Sense Multiple Access-Collision
Avoidance (CSMA-CA)
— Uses two messages before transmission, RequestTo-Send (RTS) and Clear-To-Send (CTS) .
— Method of choice for wireless LAN
EETS 8316/NTU TC 745, Fall 2003
SMU
ENGINEERING
#7
Review, Mobitex, Major features, Cont...
Major features
—Seamless roaming
—Store and forward of messages
—Dependability above 99.99%
—Interoperability and many connectivity
options
—Capacity to support millions of subscribers
—Security against eavesdropping
EETS 8316/NTU TC 745, Fall 2003
SMU
ENGINEERING
#8
Review, Mobitex, Major features, Cont...
Major features
—Packet switching occurs at lowest level of
system hierarchy - relieves backbone traffic
—Packet multicasting (to multiple recipients) is
handled by network
—Closed User Group (CUG) feature
—Frequency depends of the country, 900
MHZ in US and 450 in most others.
EETS 8316/NTU TC 745, Fall 2003
SMU
ENGINEERING
#9
Review, Mobitex - Architecture
NCC
NCC: network
Control center
Main
exchange
Regional
switch
Local
switch
Regional
switch
Local
switch
Base stations use 1-4
frequencies each 8 kb/s
FEP
EETS 8316/NTU TC 745, Fall 2003
Local switch covers a
service
area, each with 10-30
frequency pairs
SMU
ENGINEERING
#10
Review, Mobitex - Architecture , Cont...
Network Control Center (NCC), provides
network management functions
Main Exchange and Regional Switch have
basically the same function, but they reside
on different level of network hierarchy.
—Packet switching
—Protocol handling (X.25 and HDLC)
—Subscriber data for nodes below
—Multiple connection to other switches
—Alternate routing
EETS 8316/NTU TC 745, Fall 2003
SMU
ENGINEERING
#11
Review, Mobitex - Architecture , Cont...
Local Switches, similar to regional
switches. Also handles
—Communication with base stations
—Connection to host computers via FEP
(Front-End-Processor)
FEP provides
—Protocol conversion to hosts supporting
X.25, TCP/IP, and SNA
—Convert connectionless protocol to
connection oriented protocol.
EETS 8316/NTU TC 745, Fall 2003
SMU
ENGINEERING
#12
Review, Mobitex - common functions
Requires subscription
—individual
—groups of terminals
—host computer
—groups of host computers
Security
—Password based
—ESN
—CUG (Closed User Group)
EETS 8316/NTU TC 745, Fall 2003
SMU
ENGINEERING
#13
Review, Mobitex - Mobility
Mobiles monitor and evaluate signals from
other base stations
At power-up, mobile tries to register with
the last base station in its memory, if
possible
Base station provides necessary
information, such as acceptable signal
strength, neighbor list,etc periodically.
EETS 8316/NTU TC 745, Fall 2003
SMU
ENGINEERING
#14
Review, CDPD
Cellular digital packet data (CDPD):
connectionless packet-switched data
designed to work with an analog cellular
system (e.g., AMPS)
—Originated by IBM as packet-switching
overlay to analog cellular system, early
1990s developed by CDPD Forum, now
developed by Wireless Data Forum
—Overlay system uses unused bandwidth in
cellular system and existing AMPS functions
and capabilities
EETS 8316/NTU TC 745, Fall 2003
SMU
ENGINEERING
#15
Review, CDPD , Cont...
CDPD is a value added system. Other users
do not need to be aware of its presence in
the network. This has implications:
CDPD transmission must not interfere with
transmission of other services
No dedicated bandwidth, uses only idle
time between users, channel-hop
No dedicated Control channel, all Control is
in-band.
EETS 8316/NTU TC 745, Fall 2003
SMU
ENGINEERING
#16
Review, CDPD , Cont...
CDPD is transparent to voice system
—To avoid collisions with voice calls, CDPD
uses channel hopping when antenna
detects a power ramp-up (indicating
initiation of voice traffic)
—Base station closes current transmission
channel within 40 msec and new idle
channel is chosen to hop to
EETS 8316/NTU TC 745, Fall 2003
SMU
ENGINEERING
#17
Review, CDPD , Cont...
CDPD is transparent to voice system
—New channel may or may not be announced
before old channel closed
• If not announced, mobile terminal must
hunt around set of potential CDPD
channels to find new one
EETS 8316/NTU TC 745, Fall 2003
SMU
ENGINEERING
#18
Review, CDPD - Network Architecture
Internet or other
networks
IS
IS
MD-IS
Intermediate systems = generic
packet switches in backbone
network
IS
Mobile data intermediate
systems = packet switches
with mobility management
capabilities
MD-IS
Mobile data base station =
base station
EETS 8316/NTU TC 745, Fall 2003
SMU
ENGINEERING
#19
Review, CDPD - Network Architecture , Cont...
Mobile end system (MES): may be handheld
PDA or laptop or terminal
—Stationary or mobile, but treated as
potentially mobile
—Network Continually tracks location to
ensure that packets are delivered even if
physical location changes
—May sleep - messages are then queued in
network
EETS 8316/NTU TC 745, Fall 2003
SMU
ENGINEERING
#20
Review, CDPD - Network Architecture , Cont...
Mobile data base station (MDBS): mobile
data link relay
—Supports CDPD MAC and data link
protocols across radio interface
—Handles radio channel allocation,
interoperation of channels between CDPD
and voice calls, tracks busy/idle status of
channels
—Often co-located with AMPS base stations
(shares AMPS antenna)
EETS 8316/NTU TC 745, Fall 2003
SMU
ENGINEERING
#21
Review, CDPD - Network Architecture , Cont...
Mobile data intermediate system (MD-IS)
—Mobility management: location tracking,
registration, authentication, encryption
• Exchange location information by CDPDspecific mobile network location protocol
(MNLP)
• “Mobile home function” (MHF) in home
network maintains current location info
for a mobile end system and forwards
packets
EETS 8316/NTU TC 745, Fall 2003
SMU
ENGINEERING
#22
Review, CDPD - Network Architecture , Cont...
Mobile data intermediate system (MD-IS)
• “Mobile serving function” (MSF) in visited
network maintains info for visiting mobile
end systems in its area (through
registration process)
—Accounting and billing (based on usage)
EETS 8316/NTU TC 745, Fall 2003
SMU
ENGINEERING
#23
Review, CDPD , Cont...
CDPD network layer
—Internet protocol (IP and mobile IP) and
connectionless network protocol (CLNP,
OSI’s equivalent of IP) are supported
—Backbone network of intermediate systems
(IS) provides connectionless packet routing
• IS can be off-the-shelf IP or CLNP
routers
EETS 8316/NTU TC 745, Fall 2003
SMU
ENGINEERING
#24
GPRS - Network Architecture
Internet or other
networks
HLR
SGSN
MSC/
VLR
GGSN
Gateway GSN = packet switch
interworks with other networks
SGSN
Serving GPRS support node
= packet switch with mobility
management capabilities
BSC/PCU
GPRS makes use of existing
GSM base stations
EETS 8316/NTU TC 745, Fall 2003
SMU
ENGINEERING
#25
GPRS , Cont...
SGSN = Serving GPRS Support Node
—Ciphering
—Authentication, IMEI check
—Mobility Management
—Logical Link Management towards mobile
station
—Packet routing and transfer
—Connection to HLR, MSC, BSC and SMSMC
EETS 8316/NTU TC 745, Fall 2003
SMU
ENGINEERING
#26
GPRS , Cont...
GGSN = Gateway GPRS Support Node
— External interfaces
— Routing
GPRS register maintains GPRS subscriber
data and routing information. Normally it is
integrated in GSM HLR
PCU (Packet Control Until) is collocated
with BSC.
EETS 8316/NTU TC 745, Fall 2003
SMU
ENGINEERING
#27
GPRS , Cont...
Three class of mobile terminals
—Class A: Operates GPRS and Circuit
switched service simultaneously
—Class B: Monitors the Control channels of
GPRS and GSM simultaneously but can
operate one set of services at a time
—Class C: Only CS or GPRS capable.
EETS 8316/NTU TC 745, Fall 2003
SMU
ENGINEERING
#28
GPRS , Cont...
For mobility management a new concept is
defined, Routing Area
RAI = MCC +MNC + LAC + RAC
EETS 8316/NTU TC 745, Fall 2003
SMU
ENGINEERING
#29
GPRS Features
Packet data can use up to 8 timeslots to
provide 115.2 kb/s
Suitable for bursty data such as web
browsing
EETS 8316/NTU TC 745, Fall 2003
SMU
ENGINEERING
#30
GPRS Interfaces
EETS 8316/NTU TC 745, Fall 2003
SMU
ENGINEERING
#31
GPRS – Data Connection phases
GPRS attach/detach
PDP context activation
Data Transmission
EETS 8316/NTU TC 745, Fall 2003
SMU
ENGINEERING
#32
Review, Wireless LAN Architecture
Ad Hoc
Laptop
Server
Laptop
DS
Access Point
Access Point
Pager
PDA
EETS 8316/NTU TC 745, Fall 2003
Laptop
Laptop
SMU
ENGINEERING
#33
Review, Wireless LAN Protocol
 LAN protocol consists of 3 layers
 LLC = Logical Link Control layer
 MAC = Medium Access Control layer
 PHY = Physical layer, which is divided into two
sub layers:
– PLCP= Physical Layer Convergence
Protocol sub-layer
– PMD = Physical Medium Dependent sublayer
EETS 8316/NTU TC 745, Fall 2003
SMU
ENGINEERING
#34
Review, Wireless LAN Protocol, Cont..
There are many type of LAN protocols:
—LBT
—Integrated CSMA-CA and TDMA
—Polling
EETS 8316/NTU TC 745, Fall 2003
SMU
ENGINEERING
#35
Review, Power Management
Strong need to minimize power usage for
wireless modem
Wireless stations have three states
—Sleep
—Awake
—Transmit
EETS 8316/NTU TC 745, Fall 2003
SMU
ENGINEERING
#36
Review, Power Management, Cont…
AP buffers packets to the sleeping nodes
AP send Traffic Delivery Information Message
(TDIM) that contains the list of nodes that will
receive data in that frame, how much data and
when.
The node is awake only when it is sending
data, receiving data or listening to TDIM.
EETS 8316/NTU TC 745, Fall 2003
SMU
ENGINEERING
#37
Review, Access Point Functions
Access point has three components
—Wireless LAN interface to communicate with
nodes in its service area
—Wireline interface card to connect to the
backbone network
—MAC layer bridge to filter traffic between
sub-networks. This function is essential to
use the radio links efficiently
EETS 8316/NTU TC 745, Fall 2003
SMU
ENGINEERING
#38
Review, Bridge Functions
Speed conversion between different devices,
results in buffering.
Frame format adaptation between different
incompatible LANs
Adding or deleting fields in the frame to convert
between different LAN standards
Creating and maintaining the routing table
EETS 8316/NTU TC 745, Fall 2003
SMU
ENGINEERING
#39
Review, Mobility Management, Cont..
A node can associate when it enters the
coverage area of an AP
A node can disassociate when power down or
leaving the service area
It shall re-associate when it handoffs to another
AP.
AP bridge function keeps track of all nodes
associated with it.
EETS 8316/NTU TC 745, Fall 2003
SMU
ENGINEERING
#40
Review, WLAN Addressing
In wireline LAN, each node has an IP
address that is associated with its physical
location
When a device can move from one location
to another, the association between the
physical location and IP address no longer
holds
The solution is presented in mobile IP
EETS 8316/NTU TC 745, Fall 2003
SMU
ENGINEERING
#41
Review, Authentication
Three levels of authentication
—Open: AP does not challenge the identity of
the node.
—Password: upon association, the AP
demands a password from the node.
—Public Key: Each node has a public key.
Upon association, the AP sends an
encrypted message using the nodes public
key. The node needs to respond correctly
using it private key.
EETS 8316/NTU TC 745, Fall 2003
SMU
ENGINEERING
#42
Review, Mobility Management in WLAN
Mobile IP principles are used to take care of
mobility in the wireless LAN.
Every wireless device has an address in its
Home LAN, and gets a c/o address in the
Visiting LAN.
EETS 8316/NTU TC 745, Fall 2003
SMU
ENGINEERING
#43
Review, Frame type and subtypes
Three type of frames
— Management
— Control
— Asynchronous data
Each type has subtypes
Control
— RTS
— CTS
— ACK
EETS 8316/NTU TC 745, Fall 2003
SMU
ENGINEERING
#44
Review, Frame type and subtypes, Cont..
Management
—Association request/ response
—Re-association request/ response
—Probe request/ response
—privacy request/ response
—Beacon (Time stamp, beacon interval, TDIM
period, TDIM count, channels sync info,
ESS ID, TIM broadcast indicator)
EETS 8316/NTU TC 745, Fall 2003
SMU
ENGINEERING
#45
Review, Frame type and subtypes, Cont..
Management…
—TIM (Traffic Indication Map) indicates traffic
to a dozing node
—dissociation
—Authentication
EETS 8316/NTU TC 745, Fall 2003
SMU
ENGINEERING
#46
Review, Mobile IP Principals
Constraints of mobile IP are
—Mobility should be at network layer
—No impact on higher levels
—No impact on the nodes not directly involved
in the mobile IP function
—Uninterrupted operation for mobile devices
EETS 8316/NTU TC 745, Fall 2003
SMU
ENGINEERING
#47
Review, Mobile IP Principals, Cont…
The principle is very simple, use c/o
addressing
For each mobile device, we associate a
Home IP address associated with a Home
Network.
The new LAN is called the Visiting Network
The software that takes care of mobility in
each server (router) is called agent.
EETS 8316/NTU TC 745, Fall 2003
SMU
ENGINEERING
#48
Review, Mobile IP Principals, Cont…
Two types of agents, Home Agent and
Visiting Agent.
Whenever the mobile device connects to a
new network, a c/o address is given to it by
the Visiting Agent.
This c/o address is reported to the Home
Agent.
All packets addressed to the mobile device
are addressed to its Home Address, and
thus sent to its Home Network.
EETS 8316/NTU TC 745, Fall 2003
SMU
ENGINEERING
#49
Review, Mobile IP Principals, Cont…
Upon reception of the packet, the Home
Agent recognized the address belonging to
a mobile device.
Home Agents looks up the c/o address in
its table.
The packet is then wrapped in a new packet
with the c/o address on it, called
encapsulation
C/o address causes the packet to be
forwarded to the Visiting Agent.
EETS 8316/NTU TC 745, Fall 2003
SMU
ENGINEERING
#50
Review, Mobile IP Principals, Cont…
Visiting Agent recognizes the received
address as the c/o address, unwrap the
packet; called de-capsulation; and send it
to its intended receiver.
This activity is called tunneling, referring to
the idea creating a tunnel between the
Home Network and Visiting Network and
sending all data to that mobile device on
that tunnel.
Several tunnels can be created between two
networks
EETS 8316/NTU TC 745, Fall 2003
SMU
ENGINEERING
#51
Mobile IP Registration
FA
HA
Home
Addres
s
FA
EETS 8316/NTU TC 745, Fall 2003
SMU
ENGINEERING
C/o
Addres
s
#52
Mobile IP Registration, Cont…
A Mobile Host registers with the foreign
agent. Send Home Address
Foreign agent forwards the registration
request to the Home Agent.
If the home agent accepts registration, then
it updates its table associating the home
address of the mobile with its c/o address.
It then informs the foreign agent that the
registration is accepted.
EETS 8316/NTU TC 745, Fall 2003
SMU
ENGINEERING
#53
Mobile IP Registration, Cont…
Foreign agent informs the mobile host that
the registration is accepted.
A tunnel is now created between foreign
agent and home agent.
What if mobile is home? Registration
happens between home agent and the
mobile.
EETS 8316/NTU TC 745, Fall 2003
SMU
ENGINEERING
#54
Mobile IP Registration, Cont…
What if the visiting network does not have a
foreign agent? The registration happened
directly to the home agent, using the
address provided by the visiting network
and the C/O address. This means that the
mobile software should be capable of some
foreign agent functionality
EETS 8316/NTU TC 745, Fall 2003
SMU
ENGINEERING
#55
When to Register?
When entering the new network
When the timer for registration is close to
expire
EETS 8316/NTU TC 745, Fall 2003
SMU
ENGINEERING
#56
Mobile IP Home Agent Options
Home network could be a virtual network
with home agent in the router, a real
network with the home agent in the router
or it can also be a real network with a home
agent as a server connected to the home
network.
EETS 8316/NTU TC 745, Fall 2003
SMU
ENGINEERING
#57
Mobile IP Mobility Management
When moving from one network to another,
a new registration process occurs.
Home agent uses the new C/O address to
forward the packets to the mobile terminal
Packets sent to the old foreign agent has to
be re-transmitted to the new address.
If the mobile moves fast, handling of
mobility becomes difficult.
EETS 8316/NTU TC 745, Fall 2003
SMU
ENGINEERING
#58
Mobile IP, Authentication
Three new authentication is required
—Mobile <-> Home Agent authentication
—Mobile <-> Foreign Agent authentication
—Home Agent <-> Foreign Agent
authentication
EETS 8316/NTU TC 745, Fall 2003
SMU
ENGINEERING
#59
UMTS Architecture
CN
CN : Enhanced GSM/GPRS CN
Iu
UTRAN
RN: UTRAN
Uu
UE
UTRAN
CN
UE
UMTS Terrestrial Radio Access Network
Core Network
User Equipment
EETS 8316/NTU TC 745, Fall 2003
SMU
ENGINEERING
#60
UMTS reference model
Application
services
2G network
Roaming
GW
HLR
IP
CSCF
RAN
Iu
3G
SGSN
3G
GGSN
3G MSC
EETS 8316/NTU TC 745, Fall 2003
SMU
ENGINEERING
PSTN
GW
PSTN
#61
UMTS reference model
CSCF = Call State Control Function
responsible for call state control functions,
service switching function, address translation,
vocoder negotiation to support VoIP
Call state is a set of states identified in the
process of completing a call. Obvious
examples of call state are: Call attempt, Called
number reception, Called number translation,
Feature Activation, Called party Alert, through
connection, Calling Party Release, etc…
EETS 8316/NTU TC 745, Fall 2003
SMU
ENGINEERING
#62
UTRAN Architecture
Core Network
Iu
Iu
RNS
Iur
RNS
RNC
RNC
Iub
Node B
EETS 8316/NTU TC 745, Fall 2003
Iub
Iub
Node B
Node B
SMU
ENGINEERING
Iub
Node B
#63
Functions of UTRAN Components
RNC
— Uplink/downlink signal transfer, mobility,
soft handoff
—Upper outer loop/ downlink power control,
—Common control channels
—Very similar to BSC functions
EETS 8316/NTU TC 745, Fall 2003
SMU
ENGINEERING
#64
Functions of UTRAN Components
Node B:
— Logical node, maintains link with UE
— Responsible for radio transmission for one
or more cells, adds/removes radio links on
demand,
— Mapping logical resources to physical
resources,
— Upper inner loop power control,
— Interconnecting UE from different
manufacturers.
—Similar to BTS function
EETS 8316/NTU TC 745, Fall 2003
SMU
ENGINEERING
#65
UTRAN Interfaces
Uu: Between Node B and UE (WCDMA)
Iub: Between Node B and RNC (ATM)
Iur: Between various RNCs (ATM)
Iu: Between the Core Network and the
RNC (IP over ATM)
EETS 8316/NTU TC 745, Fall 2003
SMU
ENGINEERING
#66
Protocol Model for UTRAN Interfaces
UTRAN consists of
—Radio Network Layer (specific to UTRAN
itself)
—Transport Network Layer (standard
technology: ATM)
EETS 8316/NTU TC 745, Fall 2003
SMU
ENGINEERING
#67
Protocol Model for UTRAN Interfaces
The UTRAN specific protocols include
—Radio Access Network Application Part:
Radio Network Signaling over the Iu.
—Radio Network Subsystem Application Part:
Radio Network Signaling over the Iur.
—Iub interface uses node B application
protocol (NBAP).
EETS 8316/NTU TC 745, Fall 2003
SMU
ENGINEERING
#68
UTRAN Interfaces
Iur Interface (RNC <-> RNC)
—point-to-point open interface,
—macro-diversity support,
—transport signaling for mobility and radio
resource allocation.
Node
B
Iub
RNC
Node
B
Node
B
EETS 8316/NTU TC 745, Fall 2003
SMU
ENGINEERING
Iu
Iur
RNC
#69
UTRAN Interfaces
Iub Interface (RNC <-> Node B)
— interconnection of equipment from different
manufacturers,
— allows Abis (GSM/GPRS transmission
sharing),
— transports DCH, RACH, FACH and DSCH
data,
— enables negotiation of radio resources
between node B and RNC
EETS 8316/NTU TC 745, Fall 2003
SMU
ENGINEERING
#70