Professional Documents
Culture Documents
Mobile Computing & Application: Tansen Patel
Mobile Computing & Application: Tansen Patel
Mobile Computing & Application: Tansen Patel
TANSEN PATEL
ASST. PROFESSOR
DEPARTMENT OF COMPUTER SCIENCE & ENGINEERING
SSIPMT, RAIPUR (CG)
UNIT- 4
MOBILE NETWORK & TRANSPORT LAYER
2
TANSEN PATEL
ASST. PROFESSOR
DEPARTMENT OF COMPUTER SCIENCE & ENGINEERING
SSIPMT, RAIPUR (CG)
• Agent discovery
• Registration
• Data transfer.
4
2
DHCPDISCOVER
server client
client relay
selection of configuration
DHCPREQUEST DHCPREQUEST
(reject) (options) confirmation of
configuration
DHCPACK
initialization completed
release
DHCPRELEASE delete context
Server
several servers can be configured for DHCP, coordination not
yet standardized (i.e., manual configuration)
Renewal of configurations
IP addresses have to be requested periodically, simplified
protocol
Options
available for routers, subnet mask, NTP (network time
protocol) timeserver, SLP (service location protocol) directory,
DNS (domain name system)
TANSEN PATEL@CSE@RAIPUR
Types of Wireless Networks
23
TANSEN PATEL@CSE@RAIPUR
Manet: Mobile Ad-hoc Networking
24
Mobile
Router
Manet
Mobile
Devices
Mobile IP,
DHCP
Fixed
Network
TANSEN PATEL@CSE@RAIPUR
Characteristics of an Ad-hoc network
25
TANSEN PATEL@CSE@RAIPUR
Why is Routing Different in Ad Hoc ???
26
Host mobility
Dynamic topology
Distributed Environment
Bandwidth constrained
Energy constrained
TANSEN PATEL@CSE@RAIPUR
Categorization of Ad-Hoc Routing Protocols
27
TANSEN PATEL@CSE@RAIPUR
Table Driven Routing Protocol
Destination-Sequenced Distance Vector Protocol
(DSDV)
29
TANSEN PATEL@CSE@RAIPUR
Example of DSDV
A’s Routing Table Before Change A’s Routing Table After Change
Destination Next Hop Distance Sequence Number Destination Next Hop Distance Sequence Number
A A 0 S205_A A A 0 S304_A
B B 1 S334_B B D 3 S424_B
C C 1 S198_C C C 1 S297_C
D D 1 S567_D D D 1 S687_D
E D 2 S767_E E D 2 S868_E
F D 2 S45_F F D 2 S164_F
Source Initiated On demand routing protocol
Ad hoc On-demand Distance Vector Routing
(AODV)
32
TANSEN PATEL@CSE@RAIPUR
Path maintenance
34
TANSEN PATEL@CSE@RAIPUR
AODV : Route discovery (1)
35
F K
H
Q A
S E G D P
J
B M
R
I
L
C
N
TANSEN PATEL@CSE@RAIPUR
AODV : Route discovery (2)
36
F K
H
Q A
S E G D P
J
B M
R
I
L
C
N
F K
H
Q A
S E G D P
J
B M
R
I
L
C
N
TANSEN:PATEL@CSE@RAIPUR
represents a link on the reverse path
AODV : Route discovery (4)
38
F K
H
Q A
S E G D P
J
B M
R
I
L
C
N
TANSEN PATEL@CSE@RAIPUR
AODV : Route discovery (5)
39
F K
H
Q A
S E G D P
J
B M
R
I
L
C
N
TANSEN PATEL@CSE@RAIPUR
AODV : Route discovery (6)
40
F K
H
Q A
S E G D P
J
B M
R
I
L
C
N
TANSEN PATEL@CSE@RAIPUR
AODV : Route discovery (7)
41
F K
H
Q A
S E G D P
J
B M
R
I
L
C
N
TANSEN PATEL@CSE@RAIPUR
AODV : Route reply and setup of the forward path
42
F K
H
Q A
S E G D P
J
B M
R
I
L
C
N
TANSEN PATEL@CSE@RAIPUR
AODV : Data delivery
44
F K
H
Q A
Data
S E G D P
J
B M
R
I
L
C
N
F K
H
Q A
Data
S E G D P
X J
B M
R
I
L
C
N
TANSEN PATEL@CSE@RAIPUR
AODV : Route maintenance (2)
46
F K
H
Q A
RERR(G-J)
S E G D P
X J
B M
R
I
L
C
N
on-demand
A node maintains route cache containing the
routes it knows
Two main phases
Route discovery
Route maintenance
Basic Operation is similar to AODV.
Main difference
To use routing cache for link failure.
When route discovery phase, node send route request message
with its own address.
TANSEN PATEL@CSE@RAIPUR
DSR: Route discovery (1)
48
F K
H
Q A
S E G D P
J
B M
R
I
L
C
N
TANSEN PATEL@CSE@RAIPUR
DSR: Route discovery (2)
49
F K
H
Q A
S E G D P
(S)
J
B M
R
I
L
C
N
TANSEN PATEL@CSE@RAIPUR
DSR: Route discovery (3)
50
(S,A) K
F H
Q A
(S,E)
S E G D P
J
B M
R
I
L
C
N
TANSEN PATEL@CSE@RAIPUR
DSR: Route discovery (4)
51
F K
H
Q A
S E G (S,E,G) D P
J
B M
R
I
L
C
(S,B,C) N
TANSEN PATEL@CSE@RAIPUR
DSR: Route discovery (5)
52
(S,A,F,H)
F K
H
Q A
S E G (S,E,G,J) D P
J
B M
R
I
L
C
N
TANSEN PATEL@CSE@RAIPUR
DSR: Route discovery (6)
53
F K
H (S,A,F,H,K)
Q A
S E G D P
J
B M
R
I
L
C
N
TANSEN PATEL@CSE@RAIPUR
DSR: Route discovery (7)
54
F K
H
Q A
S E G D P
J (S,A,F,H,K,P)
B M
R
I
L
C
N
TANSEN PATEL@CSE@RAIPUR
DSR: Route discovery (8)
55
F K
H
Q A
S E G D P
J RREP(S,E,G,J,D)
B M
R
I
L
C
N
TANSEN PATEL@CSE@RAIPUR
DSR: Route Discovery (9)
56
TANSEN PATEL@CSE@RAIPUR
DSR: Data delivery
57
F K
H
Q A
DATA(S,E,G,J,D)
S E G D P
J
B M
R
I
L
C
N
TANSEN PATEL@CSE@RAIPUR
DSR: Route maintenance (1)
58
F K
H
Q A
DATA(S,E,G,J,D)
S E G D P
X J
B M
R
I
L
C
N
TANSEN PATEL@CSE@RAIPUR
DSR: Route maintenance (2)
59
F K
H
Q A
RERR(G-J)
S E G D P
X J
B M
R
I
L
C
N When receiving the Route Error message (RERR),
S removes the broken link from its cache.
It then tries another route stored in its cache; if none,
TANSEN PATEL@CSE@RAIPUR it initializes a new route discovery
DSR: Optimization of route discovery: route caching
60
TANSEN PATEL@CSE@RAIPUR
Comparison
61
Coping with mobility Use localized route Inform other nodes to achie
discovery ve a consistent routing
table
TANSEN PATEL@CSE@RAIPUR
Mobile Transport Layer
MOTIVATION Additional optimizations
TCP- Fast retransmit/recovery
MECHANISMS
Transmission freezing
CLASSICAL
APPROACHES Selective retransmission
Indirect TCP Transaction oriented TCP
Snooping TCP
Mobile TCP
Transport Layer
E.g. HTTP (used by web services)
typically uses TCP
Client Server
Reliable transport between client and TCP SYN
server required
TCP TCP SYN/ACK Connection
Steam oriented, not transaction
oriented
setup
TCP ACK
Network friendly: time-out
congestion HTTP request
slow down transmission
Data
Well known – TCP guesses quite often HTTP response
wrong in wireless and mobile networks
transmission
Packet loss due to transmission errors >15 s
Packet loss due to change of network
no data
Result
GPRS: 500ms! Connection
Severe performance degradation
release
Research activities
Performance
Congestion control
Efficient retransmissions
splitting of the TCP connection at, e.g., the foreign agent into 2 TCP
connections, no real end-to-end connection any longer
hosts in the fixed part of the net do not notice the characteristics of the
wireless
mobile hostpart
access point
(foreign agent) „wired“ Internet
access point1
socket migration
and state transfer Internet
access point2
mobile host
Disadvantages
loss of end-to-end semantics, an acknowledgement to a sender does now
not any longer mean that a receiver really got a packet, foreign agents
might crash
higher latency possible due to buffering of data within the foreign agent
and forwarding to a new foreign agent
Problems
snooping TCP does not isolate the wireless link as good as PATEL@
TANSEN I-TCP CSE @SSIPMT
@ RAIPUR
Early approach: Mobile TCP
Special handling of lengthy and/or frequent
disconnections
M-TCP splits as I-TCP does
unmodified TCP fixed network to supervisory host (SH)
optimized TCP SH to MH
Supervisory host
no caching, no retransmission
monitors all packets, if disconnection detected
set sender window size to 0
sender automatically goes into persistent mode
old or new SH reopen the window
Advantages
maintains semantics, supports disconnection, no buffer forwarding
Disadvantages
TANSEN PATEL@ CSE @SSIPMT
loss on wireless link propagated into fixed network
@ RAIPUR
Fast retransmit/fast recovery
Advantage
simple changes result in significant higher performance
Disadvantage
further mix of IP and TCP, no transparent approach
TCP freezing
MAC layer is often able to detect interruption in advance
MAC can inform TCP layer of upcoming loss of connection
TCP stops sending, but does now not assume a congested link
MAC layer signals again if reconnected
Advantage
scheme is independent of data
Disadvantage
TCP on mobile host has to be changed, mechanism depends on MAC layer
TANSEN PATEL@ CSE @SSIPMT
@ RAIPUR
Selective retransmission
Advantage
much higher efficiency
Disadvantage
more complex software in a receiver, more buffer needed at the receiver
TCP phases
connection setup, data transmission, connection release
using 3-way-handshake needs 3 packets for setup and release, respectively
thus, even short messages need a minimum of 7 packets!
Advantage
efficiency
Disadvantage
requires changed TCP
mobility not longer transparent
TANSEN PATEL@ CSE @SSIPMT
@ RAIPUR
Comparison of different approaches for a “mobile” TCP
Approach Mechanism Advantages Disadvantages
Indirect TCP splits TCP connection isolation of wireless loss of TCP semantics,
into two connections link, simple higher latency at
handover
Snooping TCP “snoops” data and transparent for end-to- problematic with
acknowledgements, local end connection, MAC encryption, bad isolation
retransmission integration possible of wireless link
M-TCP splits TCP connection, Maintains end-to-end Bad isolation of wireless
chokes sender via semantics, handles link, processing
window size long term and frequent overhead due to
disconnections bandwidth management
Fast retransmit/ avoids slow-start after simple and efficient mixed layers, not
fast recovery roaming transparent
Transmission/ freezes TCP state at independent of content changes in TCP
time-out freezing disconnect, resumes or encryption, works for required, MAC
after reconnection longer interrupts dependant
Selective retransmit only lost data very efficient slightly more complex
retransmission receiver software, more
buffer needed
Transaction combine connection Efficient for certain changes in TCP
oriented TCP setup/release and data applications required, not transparent
transmission