Mobile IP - ECSE - Rensselaer Polytechnic Institute
Download
Report
Transcript Mobile IP - ECSE - Rensselaer Polytechnic Institute
Mobility and Networking
Shivkumar Kalyanaraman
Rensselaer Polytechnic Institute
[email protected]
http://www.ecse.rpi.edu/Homepages/shivkuma
Based in part on slides of Hari Balakrishnan, Srini Seshan, Pravin Bhagwat
Shivkumar Kalyanaraman
Rensselaer Polytechnic Institute
1
Overview
Wireless: Introduction
802.11, Bluetooth, CDPD
Mobility: IP Addresses and location
Solutions: Mobile IP, TCP Migrate
Service discovery, Configuration: current work
iNAT, zero-conf
Shivkumar Kalyanaraman
Rensselaer Polytechnic Institute
2
Mobile vs Wireless
Mobile
Wireless
Mobile vs Stationary vs Nomadic
Wireless vs Wired
Wireless media sharing issues
Mobile routing, location, addressing issues
Nomadic => terminate existing communications
before leaving point-of-attachment. Later,
reconnect.
Shivkumar Kalyanaraman
Rensselaer
Polytechnic Institute
3
Wireless Challenges
Force us to rethink many assumptions
Need to share airwaves rather than wire
Don’t know what hosts are involved
Host may not be using same link technology
Other characteristics of wireless
Noisy lots of losses
Slow
Interaction of multiple transmitters at receiver
Collisions, capture, interference
Multipath interference
Shivkumar Kalyanaraman
Rensselaer Polytechnic Institute
4
10 W
Path Loss in dBm
= 40 dBm
P1
dBm = 10 log (-------)
1mW
101
+ 10,000 times
Power
10-3
1 mW
= 0 dBm
- 1,000 times
1 W = -30 dBm
10-6
source
d1
d2
Shivkumar Kalyanaraman
Rensselaer Polytechnic Institute
5
Radio propagation: path loss
near field
path loss in 2.4 Ghz band
Pr
r 8m
Pt
r > 8m
far field
near field
r
r3.3
r2
Pr
r 8m
path loss = 10 log (4r2/)
= 58.3 + 10 log (r3.3 /8)
r > 8m
Shivkumar Kalyanaraman
Rensselaer Polytechnic Institute
6
Fading and multipath
Fading: rapid fluctuation of the amplitude of a radio
signal over a short period of time or travel distance
Tx
Rx
Effects of multipath
• Fading
• Varying doppler shifts on different multipath signals
• Time dispersion (causing inter symbol interference)
Shivkumar Kalyanaraman
Rensselaer Polytechnic Institute
7
Bandwidth of digital data
Signal amplitude
Time domain
Fourier transform
Frequency domain
1 Mhz 1.5 Mhz
0.5 MKhz
baseband signal (1 Mbs)
• Baseband signal cannot directly be transmitted on
the wireless medium
• Need to translate the baseband signal to a new
frequency so that it can be transmitted easily and
accurately over a communication channel
Shivkumar Kalyanaraman
Rensselaer Polytechnic Institute
8
EM Spectrum
ISM band
902 – 928 Mhz
2.4 – 2.4835 Ghz
5.725 – 5.785 Ghz
LF
MF
VHF
HF
30kHz 300kHz
3MHz
30MHz
10km
100m
10m
1km
UHF
300MHz
1m
SHF
EHF
30GHz
3GHz
10cm
1cm
300GHz
100m
m
X rays
infrared visible UV
1 kHz
1 MHz
1 GHz
1 THz
1 PHz
Gamma rays
1 EHz
Propagation characteristics are different in each
frequency band
Shivkumar Kalyanaraman
Rensselaer Polytechnic Institute
9
Unlicensed Radio Spectrum
33cm
26 Mhz
902 Mhz
12cm
83.5 Mhz
2.4 Ghz
928 Mhz
cordless phones
baby monitors
Wireless LANs
5cm
125 Mhz
5.725 Ghz
2.4835 Ghz
802.11
Bluetooth
Microwave oven
5.785 Ghz
unused
Shivkumar Kalyanaraman
Rensselaer Polytechnic Institute
10
Bluetooth radio link
1Mhz
. . .
79
12 3
83.5 Mhz
Frequency hopping spread spectrum
2.402 GHz + k MHz, k=0, …, 78
1,600 hops per second
GFSK modulation
1 Mb/s symbol rate
transmit power
0 dbm (up to 20dbm with power control)
Shivkumar Kalyanaraman
Rensselaer Polytechnic Institute
11
Wireless link layers
Cellular Digital Packet Data (CDPD):
Send IP packets over unoccupied radio channels
within the analog cellular-telephone systems
Not circuit switched => no per-call/call-duration
charges
Usage-based billing (contract w/ CDPD providers
who have roaming agreements w/ other providers)
=> a wide area mobility solution (limited by
availablility)
Carrier provides IP address, but link layer
protocols are responsible for ensuring packets are
delivered
Max data rate of 11 kbps
Shivkumar Kalyanaraman
Rensselaer Polytechnic Institute
12
Wireless link layers (contd)
IEEE 802.11
Wireless LANs: 2 or 11 Mbps.
Defines a set of transceivers which interface
between wireless/wired
Link layer protocols make entire network of
transceivers appear as one link at network
layer => mobility within 802.11 invisible to IP
Changing router boundaries => interrupts
communications.
Shivkumar Kalyanaraman
Rensselaer Polytechnic Institute
13
Wireless link layers (contd)
Bluetooth:
A cable replacement technology
1 Mb/s symbol rate; Range 10+ meters
Single chip radio + baseband
Target: low power & low price point
Shivkumar Kalyanaraman
Rensselaer Polytechnic Institute
14
Ideas: Cellular Reuse
Transmissions decay over distance
Spectrum can be reused in different areas
Different “LANs” and “forwarding mechanisms”
Decay is 1/R2 in free space, 1/R4 in some
situations
Shivkumar Kalyanaraman
Rensselaer Polytechnic Institute
15
Multiple Access
TDMA, FDMA like wired networks
CDMA (code division multiple access)
Multiple senders at a time (like FDMA)
Senders cause interference to each other
Each sender has unique code known to receiver
Codes chosen to be distinguishable, even when
multiple sent at same time
Code “spreads” actual transmission
Codes can be applied in different ways
Direct sequence – controls transmitted bits
Frequency hopping – controls hopping
sequence
Shivkumar Kalyanaraman
Rensselaer Polytechnic Institute
16
CSMA/CD Does Not Work
Carrier sense problems
Relevant contention
at the receiver, not
sender
Hidden terminal
Exposed terminal
Collision detection
problems
Hard to build a radio
that can transmit and
receive at same time
Hidden
A
B
C
Exposed
A
B
C
D
Shivkumar Kalyanaraman
Rensselaer Polytechnic Institute
17
RTS/CTS Approach
Before sending data, send Ready-to-Send (RTS)
Target responds with Clear-to-Send (CTS)
Others who hear defer transmission
Packet length in RTS and CTS messages
If CTS is not heard, or RTS collides
Retransmit RTS after binary exponential
backoff
Shivkumar Kalyanaraman
Rensselaer Polytechnic Institute
18
Adding Reliability
Noise can corrupt packets
Add an ACK after DATA
transmission
If ACK not received,
sender restarts
RTS/CTS again
If ACK was lost,
receiver sends ACK
instead of CTS
A
B
C
Shivkumar Kalyanaraman
Rensselaer Polytechnic Institute
19
IEEE 802.11
Standard for wireless
communication
MAC-layer uses many of
the ideas discussed
RTS/CTS/ACK
Careful backoff
Allows two modes
Ad-hoc
Wired/wireless
Shivkumar Kalyanaraman
Rensselaer Polytechnic Institute
20
Bluetooth Protocols
Applications
IP
RFCOMM
SDP
Data
Audio
L2CAP
Our Focus
Link Manager
Baseband
RF
Shivkumar Kalyanaraman
Rensselaer Polytechnic Institute
21
Bluetooth Physical link
Point to point link
master - slave relationship
radios can function as
masters or slaves
m
s
m
Piconet
Master can connect to 7
slaves
Each piconet has max
capacity (1 Mbps)
hopping pattern is determined
by the
Rensselaer Polytechnic
Institutemaster
22
s
s
s
Shivkumar Kalyanaraman
Piconet formation
Page - scan protocol
to establish links
with nodes in
proximity
Master
Active Slave
Parked Slave
Standby
Shivkumar Kalyanaraman
Rensselaer Polytechnic Institute
23
Addressing
Bluetooth device address (BD_ADDR)
48 bit IEEE MAC address
Active Member address (AM_ADDR)
3 bits active slave address
all zero broadcast address
Parked Member address (PM_ADDR)
8 bit parked slave address
Shivkumar Kalyanaraman
Rensselaer Polytechnic Institute
24
FH/TDD
f1
Piconet channel
f2
f4
f3
f5
f6
m
s1
s2
625 sec
1600 hops/sec
Shivkumar Kalyanaraman
Rensselaer Polytechnic Institute
25
Multi slot packets
FH/TDD
f1
f4
f5
f6
m
s1
s2
625 µsec
Data rate depends on type of packet
Shivkumar Kalyanaraman
Rensselaer Polytechnic Institute
26
Mobility at IP, Transport Layers
Mobile IP: independent of link layer technology
Mobility-aware routing: home/foreign agent
Transparent to end hosts (“seamless”)
Often inefficient packet routes
TCP Migrate: new MIT proposal
Locate hosts through existing DNS
Secure, dynamic DNS is currently deployed and
widely available (RFC 2137)
Maintains standard IP addressing model
Seamless connectivity thru connection migration
No home agent or foreign agents: “end-to-end”
Shivkumar Kalyanaraman
Rensselaer Polytechnic Institute
27
Mobile IP drivers
IP Address is used for two purposes:
To identify an endpoint
To help route the packet
Move from subnet ("link") => need to change
address to allow routing
Problem 1: How to route packets to this node at
its new link ?
Problem 2: Can we avoid changing the
addresses seen by higher layer protocols ?
Several protocols affected by address change:
DNS, TCP, UDP.
Shivkumar Kalyanaraman
Rensselaer Polytechnic Institute
28
How to Handle Mobile Nodes?
Dynamic Host Configuration (DHCP)
Host gets new IP address in new locations
Problems
Host does not have constant name/address
how do others contact host
What happens to active transport
connections?
Naming
Use DHCP and update name-address
mapping whenever host changes address
Fixes contact problem but not broken transport
connections
Shivkumar Kalyanaraman
Rensselaer Polytechnic Institute
29
Basic Solution to Mobile Routing
Add a level of indirection!
Keep some part of the network informed about
current location
Need technique to route packets through this
location (interception)
Need to forward packets from this location to
mobile host (delivery)
TCP connections not broken!
Remote hosts just use the home address in
their socket pair
Shivkumar Kalyanaraman
Rensselaer Polytechnic Institute
30
Interception
Somewhere along normal forwarding path
At source
Any router along path
Router to home network
Machine on home network (masquerading as
mobile host)
Clever tricks to force packet to particular destination
“Mobile subnet” – assign mobiles a special
address range and have special node advertise
route
Shivkumar Kalyanaraman
Rensselaer Polytechnic Institute
31
Delivery
Need to get packet to mobile’s current location
Tunnels
Tunnel endpoint = current location
Tunnel contents = original packets
Source routing
Loose source route through mobile current
location
Shivkumar Kalyanaraman
Rensselaer Polytechnic Institute
32
Mobile IP (RFC 2290)
Interception
Typically home agent – hosts on home
network
Delivery
Typically IP-in-IP tunneling
Endpoint – either temporary mobile address or
foreign agent
Terminology
Mobile host (MH), correspondent host (CH),
home agent (HA), foreign agent (FA)
Care-of-address (CoA), home address
Shivkumar Kalyanaraman
Rensselaer Polytechnic Institute
33
Mobile IP model
Two-level addressing:
Home address: fixed (permanent) address used by
other nodes to communicate with the mobile node.
Care-of-address: address on a (foreign) link to
which the mobile is currently attached.
Home agent:
Tracks care-of-address of mobile
Re-addresses packets destined to home address
and tunnels them to the care-of-address
Foreign agent:
Gives mobile node its care-of-address. Optimizes IP
address use.Terminates tunnel from home agent
Default router for packets from mobile node
Shivkumar Kalyanaraman
Rensselaer Polytechnic Institute
34
Encapsulation/Tunneling
Home agent intercepts mobile node's
datagrams (using proxy ARP) and forwards
them to care-of-address through a tunneling
mechanism
Decapsulation: Extracted datagram sent to
mobile node
Home Intermediate Foreign Mobile
Correspondent
Routers
Agent
Agent
Host
IP Header
To: COA
IP Header
To: Mobile
Info
Shivkumar Kalyanaraman
Rensselaer Polytechnic Institute
35
Mobile IP (MH at Home)
Packet
Correspondent Host (CH)
Internet
Visiting
Location
Home
Mobile Host (MH)
Shivkumar Kalyanaraman
Rensselaer Polytechnic Institute
36
Mobile IP (MH Moving)
Packet
Correspondent Host (CH)
Internet
Visiting
Location
Home
Home Agent (HA)
Mobile Host (MH)
I am here
Shivkumar Kalyanaraman
Rensselaer Polytechnic Institute
37
Mobile IP (MH Away – Foreign Agent)
Packet
Correspondent Host (CH)
Mobile Host (MH)
Internet
Visiting
Location
Home
Encapsulated
Home Agent (HA)
Foreign Agent (FA)
Shivkumar Kalyanaraman
Rensselaer Polytechnic Institute
38
Mobile IP (MH Away - Collocated)
Packet
Correspondent Host (CH)
Internet
Visiting
Location
Home
Encapsulated
Home Agent (HA)
Mobile Host (MH)
Shivkumar Kalyanaraman
Rensselaer Polytechnic Institute
39
Other Mobile IP Issues
Route optimality
Resulting paths can be sub-optimal
Can be improved with route optimization
Unsolicited binding cache update to sender
Authentication
Registration messages
Binding cache updates
Must send updates across network
Handoffs can be slow
Problems with basic solution
Triangle routing
Reverse path check for security
Shivkumar Kalyanaraman
Rensselaer Polytechnic Institute
40
TCP Migrate Approach
Locate hosts through existing DNS
Secure, dynamic DNS is currently deployed and
widely available (RFC 2137)
Maintains standard IP addressing model
IP address are topological addresses, not Ids
Fundamental to Internet scaling properties
Ensure seamless connectivity through connection
migration
Notify only the current set of correspondent hosts
Follows from the end-to-end argument
Shivkumar Kalyanaraman
Rensselaer Polytechnic Institute
41
Migrate Architecture
Location Query
(DNS Lookup)
Location Update
(Dynamic DNS Update)
DNS Server
Connection Initiation
Connection Migration
Correspondent
Host
Mobile Host
foo.bar.edu
xxx.xxx.xxx.xxx
Shivkumar
Kalyanaraman
Rensselaer Polytechnic Institute
42
Location-dependent wireless
services
Spontaneous networking
Automatically obtain map of
region & discover devices,
services and people there
Access, control services,
communicate with them
Handle mobility & group
communication
Where?
Rensselaer Polytechnic Institute
Locate other useful services (e.g.,
nearest café)
App should be able to conveniently
Shivkumar
Kalyanaraman
specify a resource and
access
it
43
Resource discovery
Why is this hard?
Dynamic environment (mobility,
performance changes, etc.)
No pre-configured support, no centralized
servers
Must be easy to deploy (“ZERO” manual
configuration)
Heterogeneous services & devices
Approach: a new naming system & resolution
architecture
Shivkumar Kalyanaraman
Rensselaer Polytechnic Institute
44
iNAT: Design goals
Expressiveness
Names must be descriptive,
signifying application intent
Responsiveness
Name resolvers must track
rapid changes
Robustness
System must overcome
resolver and service failure
Easy configuration
Name resolvers must
self-configure
Shivkumar Kalyanaraman
Rensselaer Polytechnic Institute
45
Intentional Naming System (INS)
principles
Names are intentional, based on attributes
Apps know WHAT they want, not WHERE
INS integrates resolution and forwarding
Late binding of names to nodes
INS resolvers replicate and cooperate
Soft-state name exchange protocol with periodic
refreshes
INS resolvers self-configure
Form an application-level overlay network
Shivkumar Kalyanaraman
Rensselaer Polytechnic Institute
46
Summary
Wireless: Introduction
802.11, Bluetooth, CDPD
Mobility: IP Addresses and location
Solutions: Mobile IP, TCP Migrate
Open areas: new directions...
iNAT, zero-conf
Shivkumar Kalyanaraman
Rensselaer Polytechnic Institute
47