Exposing Link-Change Events to Applications

Slides:



Advertisements
Similar presentations
Communication Networks Recitation 3 Bridges & Spanning trees.
Advertisements

Distributed mobility management in the context of the MEDIEVAL project MEVICO Final Seminar, part 2 23 rd November 2012 Carlos J. Bernardos, UC3M
 Reference:  Vehicle has 2 MANET routers, interconnected via Ethernet  Vehicle has access to 3 wireless networks  Applications on MANET Routers use.
Umut Girit  One of the core members of the Internet Protocol Suite, the set of network protocols used for the Internet. With UDP, computer.
IPv6 Multihoming Support in the Mobile Internet Presented by Paul Swenson CMSC 681, Fall 2007 Article by M. Bagnulo et. al. and published in the October.
Network Certification Preparation. Module - 1 Communication methods OSI reference model and layered communication TCP/IP model TCP and UDP IP addressing.
Netext issues Julien Laganier, IETF-80. Logical Interface (I) #1: Replication of ND multicast messages across physical interfaces – What is in the source.
Improving TCP Performance over Mobile Ad Hoc Networks by Exploiting Cross- Layer Information Awareness Xin Yu Department Of Computer Science New York University,
Address Configuration in Adhoc Networks in IPv4. By Meenakshi Sundaram V.
IETF DMM WG Mobility Exposure and Selection WT Report Alper Yegin, on behalf of the WT IETF 92.
COM555: Mobile Technologies Location-Identifier Separation.
Introduction To Networking
Networks 1 CS502 Spring 2006 Network Input & Output CS-502 Operating Systems Spring 2006.
Understanding Networks. Objectives Compare client and network operating systems Learn about local area network technologies, including Ethernet, Token.
William Stallings Data and Computer Communications 7 th Edition Chapter 2 Protocols and Architecture.
COE 342: Data & Computer Communications (T042) Dr. Marwan Abu-Amara Chapter 2: Protocols and Architecture.
IP/ICMP Translation Algorithm (IIT) Xing Li, Congxiao Bao, Fred Baker
1.  A protocol is a set of rules that governs the communications between computers on a network.  Functions of protocols:  Addressing  Data Packet.
1 Chapter Overview Creating Sites and Subnets Configuring Intersite Replication Troubleshooting Active Directory Replication.
IETF DMM WG Mobility Exposure and Selection WT Call#2 Nov 6, 2014.
Chapter 1-3 The Ethernet LAN. Ethernet The networking protocol used in most modern computer networks is Ethernet. Ethernet is a CSMA/CD LAN protocol.
Protocols and the TCP/IP Suite
IEEE R lmap 23 Feb 2015.
Introduction network Protocol
William Stallings Data and Computer Communications 7 th Edition Data Communications and Networks Overview Protocols and Architecture.
© McLean HIGHER COMPUTER NETWORKING Lesson 1 – Protocols and OSI What is a network protocol Description of the OSI model.
CMPT 471 Networking II Address Resolution IPv4 ARP RARP 1© Janice Regan, 2012.
TCP/IP TCP/IP LAYERED PROTOCOL TCP/IP'S APPLICATION LAYER TRANSPORT LAYER NETWORK LAYER NETWORK ACCESS LAYER (DATA LINK LAYER)
Spring 2006Computer Networks1 Chapter 2 Network Models.
By: Aleksandr Movsesyan Advisor: Hugh Smith. OSI Model.
NFD Permanent Face Junxiao Shi, Outline what is a permanent face necessity and benefit of having permanent faces guarantees provided by.
Exposing Source IP Address Type Requirements with DHCPv6 D. Moses, A. Yegin draft-moses-dmm-dhcp-ondemand-mobility-00.
Routing integrity in a world of Bandwidth on Demand Dave Wilson DW238-RIPE
Wireless TCP. References r Hari Balakrishnan, Venkat Padmanabhan, Srinivasan Seshan and Randy H. Katz, " A Comparison of Mechanisms for Improving TCP.
Santhosh Rajathayalan ( ) Senthil Kumar Sevugan ( )
Ασύρματες και Κινητές Επικοινωνίες Ενότητα # 10: Mobile Network Layer: Mobile IP Διδάσκων: Βασίλειος Σύρης Τμήμα: Πληροφορικής.
1 Chapter 4. Protocols and the TCP/IP Suite Wen-Shyang Hwang KUAS EE.
1 Pertemuan 20 Network Testing. Discussion Topics Introduction to network testing Using a structured approach to troubleshooting Testing by OSI layers.
Exposing Source IP Address Type Requirements with DHCPv6 D. Moses, A. Yegin draft-moses-dmm-dhcp-ondemand-mobility-02.
COM594: Mobile Technologies Location-Identifier Separation.
Some Network Commands n Some useful network commands –ping –finger –nslookup –tracert –ipconfig.
V4 traversal for IPv6 mobility protocols - Scenarios Mip6trans Design Team MIP6 and NEMO WGs, IETF 63.
Media Access Methods MAC Functionality CSMA/CA with ACK
Introduction Wireless devices offering IP connectivity
Booting up on the Home Link
Seil Jeon, Sergio Figueiredo, Younghan Kim, John Kaippallimalil
Distributed Systems.
UNIT-V Transport Layer protocols for Ad Hoc Wireless Networks
Lec 2: Protocols.
Link Model Analysis for based Networks
Reliable Sockets: A Foundation for Mobile Communications
draft-jeyatharan-netext-pmip-partial-handoff-02
Ct1403 Lecture#2: DATA LINK LAYER
Data Networking Fundamentals
draft-corujo-ps-common-interfaces-lmm-00
(Read Forouzan Chapters 6 and 7)) IP Forwarding Procedure
Net 431 D: ADVANCED COMPUTER NETWORKS
Data and Computer Communications by William Stallings Eighth Edition
Topic 5: Communication and the Internet
Net 431: ADVANCED COMPUTER NETWORKS
Guide to TCP/IP Fourth Edition
Considerations for MPTCP Operation in 5G
Data Link Layer 2019/2/19.
Network Models CCNA Instructor Training Course October 12-17, 2009
IETF-100, MPTCP WG, November 2017
Distributed Systems CS
Implement Inter-VLAN Routing
Exceptions and networking
Distributed Systems CS
Presentation transcript:

Exposing Link-Change Events to Applications

Problem Description As a Mobile Node (MN) handoffs from one Point Of Attachment (POA) to another, the state of its network interface (in the MN) changes: From link-up to link-down – when disconnecting from one POA From link-down to link-up – when connecting to the new POA This may also be accompanied by a need to refresh its source IP address

Problem Description - continued The implications on running applications could be significant: Most Socket APIs are blocking – hence the invoking apps are blocked throughout the duration of the link-down state Sending TCP data while the link is down might cause time-outs that could be easily avoided if the app had knowledge of the link state and postponed its transmissions until the link is up again If the source IP address had changed, it is not clear what happens to the associated active sockets In some DMM use-cases, it is desirable that apps restart the socket to enjoy a better service (even when the current service is still available)

Problem Description - continued Actually, the desired behavior is also influenced by: The type of source IP address that was assigned to the MN (Nomadic or Sustained/Fixed) The location of the new POA compared to the origin – same or different address prefix The network level of support for make-without-break handoff

Relevant RFCs There are some RFCs that discuss link-change related topics: RFC4957 – Link-Layer Event Notification for Detecting Network Attachments Specifies how to generate a Link-up event to the TCP/IP stack RFC4135 – Goals of Detecting Network Attachment in IPv6 Discusses the benefit of detection. Mainly, triggering new IP configuration when required in minimum latency. RFC6059 – Simple Procedures for Detecting Network Attachment in IPv6 Discusses the benefit of retaining IP configuration attributes of old links to expedite re-connection when handing-off back to that old link

Relevant RFCs There are some RFCs that discuss link-change related topics: RFC4957 – Link-Layer Event Notification for Detecting Network Attachments Specifies how to generate a Link-up event to the TCP/IP stack RFC4135 – Goals of Detecting Network Attachment in IPv6 Discusses the benefit of detection. Mainly, triggering new IP configuration when required in minimum latency. RFC6059 – Simple Procedures for Detecting Network Attachment in IPv6 Discusses the benefit of retaining IP configuration attributes of old links to expedite re-connection when handing-off back to that old link TCP/IP Stack App 1 App 2 App 3 Ethernet driver WiFi driver LTE driver Ethernet device WiFi device LTE device Sockets RFCs

Use-cases Following are some use-cases to examine: Handoff – Nomadic address – no LAN change (same NW prefix) Handoff – Nomadic address – new LAN Handoff – Sustained address – new LAN Handoff – Sustained address – new LAN – better service available Link-down due to error Handoff – Nomadic address – CSIPTO support

Handoff – Nomadic address – no LAN change

Handoff – Nomadic address – no LAN change Since the LAN did not change, there is no change in the source IP address. Preferred behavior: If the handoff is quick – no event should be triggered If the handoff is slow – better trigger a link-down and link-up events: Upon link-down –apps should not attempt to transmit data Upon link-up - apps should resume normal operation

Handoff – Nomadic address – new LAN

Handoff – Nomadic address – new LAN New LAN means a different network prefix – so a new nomadic IP address should be obtained. Preferred behavior: Upon link-down – apps should not attempt to transmit data Upon link-up – apps should close the socket associated with the obsolete IP address and create a new socket prior to resuming to normal operation

Handoff – Sustained address – new LAN

Handoff – Sustained address – new LAN

Handoff – Sustained address – new LAN Sustained address means that the network guarantees IP session continuity. Preferred behavior: Upon link-down – apps should not attempt to transmit data Upon link-up – Apps may resume normal operation (the source IP address and socket are still valid)

Handoff – Sustained address – new LAN – better service available

Handoff – Sustained address – new LAN – better service available

Handoff – Sustained address – new LAN – better service available Sustained address means that the network guarantees IP session continuity. Better route through a different Mobility Anchor Preferred behavior: Upon link-down – apps should not attempt to transmit data Upon link-up – Apps may resume normal operation (the source IP address and socket are still valid) Apps may choose the best time to close the socket and open a new one using a new Sustained IP address with the better route But how can apps know that a better route is available?

Link-down due to error The link is down. It is unknown when it will be up again… Preferred behavior: Stop performing networking operation Update the user (if possible) But how can the Socket layer identify the cause of the link-down event as an error rather than a handoff?

Handoff – Nomadic address – CSIPTO support Mobile access networks with CSIPTO, enable mobile nodes to handoff to a new point-of-access without experiencing a link-down/link-up event. The main motivation is to provide make-before-brake user experience But after the handoff, sub-optimal routes may exists and using a new IP source address is preferable *CSIPTO – Coordinated Selected IP Traffic Offload

Handoff – Nomadic address – CSIPTO support

Handoff – Nomadic address – CSIPTO support

Handoff – Nomadic address – CSIPTO support II Assuming an indication of a handoff event can be generated – Preferred behavior: Upon handoff event – Apps may continue normal operation , but – It is preferable to find a good opportunity to close and re-open the socket This is true even for Nomadic IP addresses since CSIPTO may guarantee session continuity even for them

Summary There are benefits from enabling apps to be aware and act upon link state changes due to: Distributed MAs leading to sub-optimal routes The different source IP address types New and advanced mobile access network services Proposing to add support in the Socket interface for these events

Next steps Is this interesting to DMM? Write a requirements document for Socket interface support