Download presentation
Presentation is loading. Please wait.
Published byKerrie Parks Modified over 9 years ago
1
1 Wireless and Mobile Networks EECS 489 Computer Networks http://www.eecs.umich.edu/courses/eecs489/w07 Z. Morley Mao Monday March 19, 2007 Acknowledgement: Some slides taken from Kurose&Ross
2
2 Mobile IP r RFC 3220 r has many features we’ve seen: m home agents, foreign agents, foreign-agent registration, care-of-addresses, encapsulation (packet-within-a-packet) r three components to standard: m indirect routing of datagrams m agent discovery m registration with home agent
3
3 Mobile IP: indirect routing Permanent address: 128.119.40.186 Care-of address: 79.129.13.2 dest: 128.119.40.186 packet sent by correspondent dest: 79.129.13.2 dest: 128.119.40.186 packet sent by home agent to foreign agent: a packet within a packet dest: 128.119.40.186 foreign-agent-to-mobile packet
4
4 Mobile IP: agent discovery r agent advertisement: foreign/home agents advertise service by broadcasting ICMP messages (typefield = 9) R bit: registration required H,F bits: home and/or foreign agent
5
5 Mobile IP: registration example
6
6 Components of cellular network architecture correspondent MSC wired public telephone network different cellular networks, operated by different providers recall:
7
7 Handling mobility in cellular networks r home network: network of cellular provider you subscribe to (e.g., Sprint PCS, Verizon) m home location register (HLR): database in home network containing permanent cell phone #, profile information (services, preferences, billing), information about current location (could be in another network) r visited network: network in which mobile currently resides m visitor location register (VLR): database with entry for each user currently in network m could be home network
8
8 Public switched telephone network mobile user home Mobile Switching Center HLR home network visited network correspondent Mobile Switching Center VLR GSM: indirect routing to mobile 1 call routed to home network 2 home MSC consults HLR, gets roaming number of mobile in visited network 3 home MSC sets up 2 nd leg of call to MSC in visited network 4 MSC in visited network completes call through base station to mobile
9
9 Mobile Switching Center VLR old BS new BS old routing new routing GSM: handoff with common MSC r Handoff goal: route call via new base station (without interruption) r reasons for handoff: m stronger signal to/from new BS (continuing connectivity, less battery drain) m load balance: free up channel in current BS m GSM doesn’t mandate why to perform handoff (policy), only how (mechanism) r handoff initiated by old BS
10
10 Mobile Switching Center VLR old BS 1 3 2 4 5 6 7 8 GSM: handoff with common MSC new BS 1. old BS informs MSC of impending handoff, provides list of 1 + new BSs 2. MSC sets up path (allocates resources) to new BS 3. new BS allocates radio channel for use by mobile 4. new BS signals MSC, old BS: ready 5. old BS tells mobile: perform handoff to new BS 6. mobile, new BS signal to activate new channel 7. mobile signals via new BS to MSC: handoff complete. MSC reroutes call 8 MSC-old-BS resources released
11
11 home network Home MSC PSTN correspondent MSC anchor MSC MSC (a) before handoff GSM: handoff between MSCs r anchor MSC: first MSC visited during call m call remains routed through anchor MSC r new MSCs add on to end of MSC chain as mobile moves to new MSC r IS-41 allows optional path minimization step to shorten multi-MSC chain
12
12 home network Home MSC PSTN correspondent MSC anchor MSC MSC (b) after handoff GSM: handoff between MSCs r anchor MSC: first MSC visited during cal m call remains routed through anchor MSC r new MSCs add on to end of MSC chain as mobile moves to new MSC r IS-41 allows optional path minimization step to shorten multi-MSC chain
13
13 Mobility: GSM versus Mobile IP GSM elementComment on GSM elementMobile IP element Home systemNetwork to which the mobile user’s permanent phone number belongs Home network Gateway Mobile Switching Center, or “home MSC”. Home Location Register (HLR) Home MSC: point of contact to obtain routable address of mobile user. HLR: database in home system containing permanent phone number, profile information, current location of mobile user, subscription information Home agent Visited SystemNetwork other than home system where mobile user is currently residing Visited network Visited Mobile services Switching Center. Visitor Location Record (VLR) Visited MSC: responsible for setting up calls to/from mobile nodes in cells associated with MSC. VLR: temporary database entry in visited system, containing subscription information for each visiting mobile user Foreign agent Mobile Station Roaming Number (MSRN), or “roaming number” Routable address for telephone call segment between home MSC and visited MSC, visible to neither the mobile nor the correspondent. Care-of- address
14
14 Wireless, mobility: impact on higher layer protocols r logically, impact should be minimal … m best effort service model remains unchanged m TCP and UDP can (and do) run over wireless, mobile r … but performance-wise: m packet loss/delay due to bit-errors (discarded packets, delays for link-layer retransmissions), and handoff m TCP interprets loss as congestion, will decrease congestion window un-necessarily m delay impairments for real-time traffic m limited bandwidth of wireless links
15
15 Chapter 6 Summary Wireless r wireless links: m capacity, distance m channel impairments m CDMA r IEEE 802.11 (“wi-fi”) m CSMA/CA reflects wireless channel characteristics r cellular access m architecture m standards (e.g., GSM, CDMA-2000, UMTS) Mobility r principles: addressing, routing to mobile users m home, visited networks m direct, indirect routing m care-of-addresses r case studies m mobile IP m mobility in GSM r impact on higher-layer protocols
16
16 MPLS is used today! r % traceroute -q1 -w2 www.att.net r traceroute to www.att.net (204.127.135.135), 30 hops max, 46 byte packets r 1 eecscomp2-4 (141.213.4.1) 0.291 ms r 2 141.213.127.37 (141.213.127.37) 0.305 ms r 3 ge-caen-bin-seb.r-bin-seb.umnet.umich.edu (192.122.183.53) 0.515 ms r 4 pc-bin-arb-seb.r-bin-arb.umnet.umich.edu (192.122.183.193) 0.621 ms r 5 ge-1-1-0x984.aa1.mich.net (192.122.183.45) 0.660 ms r 6 65.77.89.177 (65.77.89.177) 2.002 ms r 7 brvwil1wcx2-pos14-1.wcg.net (64.200.240.33) 8.129 ms r 8 64.200.249.186 (64.200.249.186) 7.904 ms r 9 te-4-4.car2.Chicago1.Level3.net (4.68.110.37) 8.259 ms r 10 ae-14-53.car4.Chicago1.Level3.net (4.68.101.72) 215.627 ms r 11 ggr2-p3110.cgcil.ip.att.net (192.205.33.185) 9.075 ms r 12 tbr2-p033301.cgcil.ip.att.net (12.123.6.26) 32.783 ms r MPLS Label=32719 CoS=0 TTL=0 S=1 r 13 tbr2-cl3641.phlpa.ip.att.net (12.122.10.94) 33.031 ms r MPLS Label=31344 CoS=0 TTL=0 S=1 r 14 tbr1-cl9.wswdc.ip.att.net (12.122.2.85) 33.738 ms r MPLS Label=31295 CoS=0 TTL=0 S=1 r 15 gbr5-p10.wswdc.ip.att.net (12.122.11.170) 29.483 ms r MPLS Label=317 CoS=0 TTL=0 S=1 r 16 gbr1-s83.mdtva.ip.att.net (12.122.4.81) 32.068 ms r 17 12.122.247.254 (12.122.247.254) 32.438 ms r 18 * CoS: Class of Service S: Stacking bit
17
17 Boeing Connexion Mobility Service
18
18 Example problem 1 r If all the links in the Internet were to provide the reliable delivery service, would the TCP reliable delivery service be redundant? Why or why not?
19
19 Example problem 1 r If all the links in the Internet were to provide the reliable delivery service, would the TCP reliable delivery service be redundant? Why or why not? r Ans: TCP is still needed to ensure end-to- end reliability. Packets may be lost due to routing loops or equipment failures. TCP also provide in-order delivery.
20
20 Example problem 2 r Suppose two nodes start to transmit at the same time a packet of length L over a broadcast channel of rate R. Denote the propagation delay between the two nodes as t prop. Will there be collision if t prop < L/R? Why or why not?
21
21 Example problem 2 r Suppose two nodes start to transmit at the same time a packet of length L over a broadcast channel of rate R. Denote the propagation delay between the two nodes as t prop. Will there be collision if t prop < L/R? Why or why not? r Ans: Yes, there will be collision, because while a node is transmitting it will start to receive a packet from the other node.
22
22 Review: Ethernet CSMA/CD algorithm 1. Adaptor receives datagram from net layer & creates frame 2. If adapter senses channel idle (for 96 bit times), it starts to transmit frame. If it senses channel busy, waits until channel idle (for 96 bit times), and then transmits 3. If adapter transmits entire frame without detecting another transmission, the adapter is done with frame! 4. If adapter detects another transmission while transmitting, aborts and sends jam signal 5. After aborting, adapter enters exponential backoff: after the mth collision, adapter chooses a K at random from {0,1,2,…,2 m -1}. Adapter waits K·512 bit times and returns to Step 2
23
23 Review: Ethernet’s CSMA/CD (more) Jam Signal: make sure all other transmitters are aware of collision; 48 bits Bit time:.1 microsec for 10 Mbps Ethernet ; for K=1023, wait time is about 50 msec Exponential Backoff: r Goal: adapt retransmission attempts to estimated current load m heavy load: random wait will be longer r first collision: choose K from {0,1}; delay is K· 512 bit transmission times r after second collision: choose K from {0,1,2,3}… r after ten collisions, choose K from {0,1,2,3,4,…,1023}
24
24 Example problem 3 r In CSMA/CD, after the fifth collision, what is the probability that a node chooses K=4? The result K=4 corresponds to a delay of how many seconds on a 10 Mbps Ethernet?
25
25 Example problem 3 r In CSMA/CD, after the fifth collision, what is the probability that a node chooses K=4? The result K=4 corresponds to a delay of how many seconds on a 10 Mbps Ethernet? r Ans: After the fifth collision, the adapter chooses from {0,1,2,…., 2^5-1}. The probability that it chooses 4 is 1/32. r It waits K· 512 bit transmission times m 4x512bit/(10Mbps) = 204.8 microseconds.
26
26 Example problem 4 r Suppose nodes A and B are on the same 10Mbps Ethernet segment and the propagation delay between the two nodes is 225 bit times. Suppose A and B send frames at the same time, the frames collide, and then A and B choose different values of K in the CSMA/CD algorithm. Assuming no other nodes are active, can the retransmissions from A and B collide?
27
27 r Suppose nodes A and B are on the same 10Mbps Ethernet segment and the propagation delay between the two nodes is 225 bit times. Suppose A and B send frames at the same time, the frames collide, and then A and B choose different values of K in the CSMA/CD algorithm. Assuming no other nodes are active, can the retransmissions from A and B collide? r Ans: Assuming A chooses K=0, B chooses K=1, basically we need to find out whether A’s retransmission will reach B before B’s scheduled retransmission time. (It’s unlikely that A can finish retransmission before B retransmits.)
28
28 r Suppose nodes A and B are on the same 10Mbps Ethernet segment and the propagation delay btw. the two nodes is 225 bit times. Suppose A and B send frames at the same time, the frames collide, and then A and B choose different values of K in the CSMA/CD algorithm. Assuming no other nodes are active, can the retransmissions from A and B collide? r Draw a time line: m t=0A and B begin transmission m t=225A and B detect collision m t=225+48=273A and B finish sending Jam signal m 273+225=498B’s last bit arrives at A; A detects an idle channel m 498+96=594A starts transmitting m 273+512=785B returns to step2, B must sense idle channel for 96 bit times: 785+96=881 m 594+225=819A’s transmission reaches B m 819<881: A’s retransmission reaches B before B can send.
29
29 Example problem 5 r Why are link layer acknowledgements used in 802.11 but not in wired Ethernet?
30
30 Example problem 5 r Why are link layer acknowledgements used in 802.11 but not in wired Ethernet? r Ans: Two reasons why 802.11 uses ACKs: (1) wireless channel’s bit error rate is much higher. (2) in wired Ethernet, a transmitting station can detect when there has and hasn’t been a collision, but in 802.11 a station cannot detect a collision due to hidden terminal problem.
31
31 Example problem 6 r Suppose the IEEE 802.11 RTS and CTS frames were as long as the standard DATA frames. Would there be any advantage to using the CTS and RTS frames? Why and why not?
32
32 Example problem 6 r Suppose the IEEE 802.11 RTS and CTS frames were as long as the standard DATA frames. Would there be any advantage to using the CTS and RTS frames? Why and why not? r Ans: No, there wouldn’t be any advantage. Suppose there are two stations that want to transmit at the same time, and they both use RTS/CTS. If the RTS frame is as long as a DATA frame, the channel would be wasted for as long as it would have been wasted for colliding DATA frames. Thus, the RTS/CTS exchange is only useful when they are significantly smaller than DATA frames.
33
33 Example problem 7 r Consider three LANs interconnected by two routers r Assign IPs to all the interfaces. Subnet 1 uses addresses of the form 111.111.111.xxx, subnet 2 uses addresses of the form 122.222.222.xxx, and subnet 3 uses addresses of the form 133.333.333.xxx r Assign MAC addresses (arbitrarily). r Consider sending an IP datagram from Host A to Host F, suppose all the ARP tables are up-to-date. Enumerate all the steps. Subnet 1 A B Subnet 3 E F C D Subnet 2
34
34 Example problem 7 Subnet 1 A B Subnet 3 E F C D Subnet 2 111.111.111.001 00-00-00-00-00-00 111.111.111.002 22-22-22-22-22-22 122.222.222.004 66-66-66-66-66-66 111.111.111.003 11-11-11-11-11-11 133.333.333.002 88-88-88-88-88-88 133.333.333.003 99-99-99-99-99-99 133.333.333.001 77-77-77-77-77-77 122.222.222.003 55-55-55-55-55-55 122.222.222.002 33-33-33-33-33-33 122.222.222.001 44-44-44-44-44-44
35
35 111.111.111.001 00-00-00-00-00-00 Subnet 1 A B Subnet 3 E F C D Subnet 2 111.111.111.002 22-22-22-22-22-22 122.222.222.004 66-66-66-66-66-66 111.111.111.003 11-11-11-11-11-11 133.333.333.002 88-88-88-88-88-88 133.333.333.003 99-99-99-99-99-99 133.333.333.001 77-77-77-77-77-77 122.222.222.003 55-55-55-55-55-55 122.222.222.002 33-33-33-33-33-33 122.222.222.001 44-44-44-44-44-44 1.Forwarding table in A determines that the datagram should be routed to interface 111.111.111.002 2.Host A uses ARP to determine the LAN address for 111.111.111.002, namely 22-22- 22-22-22-22. 3.The adapter in A creates an Ethernet packet with destination address of 22-22-22- 22-22-22 4.The first router receives the packet and extracts the datagram. The forwarding table in this router indicates that the datagram is to be routed to 122.222.222.003. 5.The first router then uses ARP to obtain the associated Ethernet address: 55-55- 55-55-55-55. 6.The process continues until the packet has reached host F.
Similar presentations
© 2024 SlidePlayer.com. Inc.
All rights reserved.