advanced antenna technologies to increase sensitivity and 'link budget' ..... 4G:
LTE/LTE-Advanced for Mobile Broadband by Erik Dahlman, Stefan Parvall, ...
192620010 Mobile & Wireless Networking Lecture 10: Mobile Transport Layer & Ad Hoc Networks [Schiller, Section 8.3 & Section 9] [Reader, Part 8] Geert Heijenk
Mobile and Wireless Networking 2013 / 2014
Outline of Lecture 10 Mobile transport layer
Motivation Approaches for improvement
Indirect TCP Snooping TCP Mobile TCP Selective retransmission
Recommended TCP improvements
Ad hoc networks
Concept Addressing and forwarding in ad-hoc networks Routing in ad-hoc networks
Problem description DSDV (Destination Sequenced Distance Vector) Ad-hoc On-demand Distance Vector (AODV) DSR (Dynamic Source Routing) Further alternatives
2 Mobile and Wireless Networking 2013 / 2014
Motivation I Transport protocols typically designed for
Fixed end-systems Fixed, wired networks
TCP congestion control
packet loss in fixed networks typically due to (temporary) overload situations router have to discard packets as soon as the buffers are full TCP recognizes congestion only indirect via missing acknowledgements, retransmissions unwise, they would only contribute to the congestion and make it even worse slow-start algorithm as reaction
3 Mobile and Wireless Networking 2013 / 2014
Motivation II TCP slow-start algorithm
sender calculates a congestion window for a receiver start with a congestion window size equal to one segment exponential increase of the congestion window up to the congestion threshold, then linear increase missing acknowledgement causes the reduction of the congestion threshold to one half of the current congestion window congestion window starts again with one segment
TCP fast retransmit/fast recovery
TCP sends an acknowledgement only after receiving a packet if a sender receives several acknowledgements for the same packet, this is due to a gap in received packets at the receiver however, the receiver got all packets up to the gap and is actually receiving packets therefore, packet loss is not due to severe congestion, continue with (half of) current congestion window (do not use slow-start)
4 Mobile and Wireless Networking 2013 / 2014
Influences of mobility on TCP-mechanisms TCP assumes congestion if packets are dropped
typically wrong in wireless networks, here we often have packet loss due to transmission errors furthermore, mobility itself can cause packet loss, if e.g. a mobile node moves from one access point (e.g. foreign agent in Mobile IP) to another while there are still packets in transit and forwarding is not possible
Additional problem:
it takes a long time to increase the congestion window if the latency of the wireless link is high
The performance of an unchanged TCP degrades severely
but TCP cannot be changed due to the large base of installation in the fixed network (end-to-end protocol) therefore TCP for mobility has to remain compatible
5 Mobile and Wireless Networking 2013 / 2014
Solutions: Indirect TCP / Performance Enhancing Proxy (RFC 3135) Indirect TCP or I-TCP segments the connection
no changes to the TCP protocol for hosts connected to the wired Internet, millions of computers use (variants of) this protocol optimized TCP protocol for mobile hosts splitting of the TCP connection at, e.g., the foreign agent into 2 TCP connections, no real end-to-end connection any longer hosts in the fixed part of the net do not notice the characteristics of the wireless part
mobile host
performance enhancing proxy: access point / foreign agent
„wireless“ TCP
„wired“ Internet
standard TCP
6 Mobile and Wireless Networking 2013 / 2014
I-TCP socket and state migration
Socket contains current TCP connection information (seq.num, ports) During handover, current AP buffers packets Since these packets have been acknowledged, they must be forwarded to new AP after handover is executed Fixed-side connection must be maintained (socket)
access point1
socket migration and state transfer
Internet
access point2 mobile host 7 Mobile and Wireless Networking 2013 / 2014
Indirect TCP III Advantages
no changes in the fixed network necessary, no changes for the hosts (TCP protocol) necessary, all current optimizations to TCP still work transmission errors on the wireless link do not propagate into the fixed network simple to control, mobile TCP is used only for one hop between, e.g., a foreign agent and mobile host therefore, a very fast retransmission of packets is possible, the delay on the mobile hop is known
Disadvantages
loss of end-to-end semantics, an acknowledgement to a sender does now not any longer mean that a receiver really got a packet, foreign agents might crash higher latency possible due to buffering of data within the foreign agent and forwarding to a new foreign agent
8 Mobile and Wireless Networking 2013 / 2014
Solutions: Snooping TCP I „Transparent“ extension of TCP within the foreign agent
buffering of packets sent to the mobile host lost packets on the wireless link (both directions!) will be retransmitted immediately by the mobile host or foreign agent, respectively (so called “local” retransmission) the foreign agent therefore “snoops” the packet flow and recognizes acknowledgements in both directions, it also filters ACKs changes of TCP only within the foreign agent local retransmission
correspondent host
foreign agent „wired“ Internet
mobile host
snooping of ACKs
buffering of data
end-to-end TCP connection 9 Mobile and Wireless Networking 2013 / 2014
Snooping TCP II Data transfer to the mobile host
FA buffers data until it receives ACK of the MH, FA detects packet loss via duplicated ACKs or time-out fast retransmission possible, transparent for the fixed network
Data transfer from the mobile host
FA detects packet loss on the wireless link via sequence numbers, FA answers directly with a NACK to the MH MH can now retransmit data with only a very short delay
Integration of the MAC layer
MAC layer often has similar mechanisms to those of TCP thus, the MAC layer can already detect duplicated packets due to retransmissions and discard them
Problems
snooping TCP does not isolate the wireless link as good as I-TCP snooping might be useless depending on encryption schemes 10 Mobile and Wireless Networking 2013 / 2014
Solutions: Mobile TCP Special handling of lengthy and/or frequent disconnections M-TCP splits as I-TCP does
unmodified TCP fixed network to supervisory host (SH) optimized TCP SH to MH
Supervisory host
no caching, no retransmission monitors all packets, if disconnection detected
set sender window size to 0 sender automatically goes into persistent mode
old or new SH reopen the window
Advantages
maintains semantics, supports disconnection, no buffer forwarding
Disadvantages
loss on wireless link propagated into fixed network adapted TCP on wireless link
11 Mobile and Wireless Networking 2013 / 2014
Selective retransmission TCP acknowledgements are often cumulative
ACK n acknowledges correct and in-sequence receipt of packets up to n if single packets are missing quite often a whole packet sequence beginning at the gap has to be retransmitted (go-back-n), thus wasting bandwidth
Selective retransmission as one solution
RFC2018 allows for acknowledgements of single packets, not only acknowledgements of in-sequence packet streams without gaps sender can now retransmit only the missing packets
Advantage
much higher efficiency
Disadvantage
more complex software in a receiver, more buffer needed at the receiver 12 Mobile and Wireless Networking 2013 / 2014
Recommended TCP Improvements (RFC 3481) • • • • • • • • •
Appropriate Window Size (Sender & Receiver) Increased Initial Window (Sender) Limited Transmit (Sender) IP MTU Larger than Default Path MTU Discovery (Sender & Intermediate Routers) Selective Acknowledgments (Sender & Receiver) Explicit Congestion Notification (Sender, Receiver & Intermediate Routers) TCP Timestamps Option (Sender & Receiver) Disabling RFC 1144 TCP/IP Header Compression (Wireless Host) (RObust Header Compression, ROHC, RFC3095, is OK)
13 Mobile and Wireless Networking 2013 / 2014
Outline of Lecture 10 Mobile transport layer
Motivation Approaches for improvement
Indirect TCP Snooping TCP Mobile TCP Selective retransmission
Recommended TCP improvements
Ad hoc networks
Concept Addressing and forwarding in ad-hoc networks Routing in ad-hoc networks
Problem description DSDV (Destination Sequenced Distance Vector) Ad-hoc On-demand Distance Vector (AODV) DSR (Dynamic Source Routing) Further alternatives
14 Mobile and Wireless Networking 2013 / 2014
Ad hoc network concept
Networks of wireless terminals that do not necessarily rely on existing infrastructure
Although interworking with infrastructure is possible
Direct communication between terminals when needed Multi-hop communication Extended concept of mobility: network mobility (moving routers)
15 Mobile and Wireless Networking 2013 / 2014
Mobile ad hoc networks Standard Mobile IP needs an infrastructure
Home Agent/Foreign Agent in the fixed network DNS, routing etc. are not designed for mobility
Sometimes there is no infrastructure!
remote areas, ad-hoc meetings, disaster areas cost can also be an argument against an infrastructure!
Main topic: routing
no default router available every node should be able to forward
A
B
C 16
Mobile and Wireless Networking 2013 / 2014
Addressing & forwarding in ad-hoc networks • • • • •
Broadcast (single hop) Beaconing Broadcast (multihop) Geocast Unicast
17 Mobile and Wireless Networking 2013 / 2014
Beaconing Beaconing: • periodic single-hop broadcast Problems: • •
risk of overload no feedback from medium because of broadcast
Solutions:
adapt load to number of users, e.g., inter-beacon time / power control
18 Mobile and Wireless Networking 2013 / 2014
Broadcast (multihop) Broadcast (multihop) Forwarding approach:
flooding: all nodes forward all newly received messages
Problems:
broadcast storm:
redundant transmissions synchronization of transmissions no acks, no feedback from medium
Solutions:
(random) delay before rebroadcasting, not all nodes rebroadcast e.g., distance-based forwarding 19 Mobile and Wireless Networking 2013 / 2014
Geocast Geocast:
like broadcast, 1. Illustration of geocast flooding algorithm. but packet is only forwarded toFigure certain geographic region
Forwarding approach
flooding to and in region routing to region + flooding in region
Problems:
trade-off between accuracy and efficiency
Figure 2. Geocast region and geocast group. 20
Mobile and Wireless Networking 2013 / 2014
geocast region at that time, forming the geocast group at time
ah me geo inc ins
Unicast Unicast: single destination with known address Forwarding approach
based on routing information
21 Mobile and Wireless Networking 2013 / 2014
Outline of Lecture 10 Mobile transport layer
Motivation Approaches for improvement
Indirect TCP Snooping TCP Mobile TCP Selective retransmission
Recommended TCP improvements
Ad hoc networks
Concept Addressing and forwarding in ad-hoc networks Routing in ad-hoc networks
Problem description DSDV (Destination Sequenced Distance Vector) Ad-hoc On-demand Distance Vector (AODV) DSR (Dynamic Source Routing) Further alternatives
22 Mobile and Wireless Networking 2013 / 2014
Routing examples Routing is a major topic in principle, every node should be able to forward dynamic topology asymmetric links redundant links: too many links when terminals are close
N1
N1
N2 N3 N4 time = t1
N3
N2 N4
N5 good link weak link
N5 time = t2
23 Mobile and Wireless Networking 2013 / 2014
Traditional routing algorithms
Distance Vector
periodic exchange of messages with all physical neighbors that contain information about who can be reached at what distance (monodirectional) selection of the shortest path if several paths available
Link State
periodic notification of all routers about the current state of all physical links (bidirectional) router get a complete picture of the network
24 Mobile and Wireless Networking 2013 / 2014
Problems of traditional routing algorithms
Dynamic of the topology
Limited performance of mobile systems
frequent changes of connections, connection quality, participants
periodic updates of routing tables need energy without contributing to the transmission of user data, sleep modes difficult to realize limited bandwidth of the system is reduced even more due to the exchange of routing information links can be asymmetric, i.e., they can have a direction dependent transmission quality
Problem
protocols have been designed for fixed networks with infrequent changes and typically assume symmetric links
25 Mobile and Wireless Networking 2013 / 2014
Ad hoc routing algorithms
Pro-active Example: Destination Sequenced Distance Vector (DSDV)
Re-active Example: Ad-hoc On-demand Distance Vector (AODV) Dynamic Source Routing (DSR)
26 Mobile and Wireless Networking 2013 / 2014
DSDV (Destination Sequenced Distance Vector)
Extension of distance vector routing Sequence numbers for all routing updates
assures in-order execution of all updates avoids loops and inconsistencies
Decrease of update frequency
store time between first and best announcement of a path inhibit update if it seems to be unstable (based on the stored time values)
See [Schiller] for details
27 Mobile and Wireless Networking 2013 / 2014
Ad-hoc On-demand Distance Vector (AODV) •
Specified in IETF: RFC 3561
•
Forms the basis for DYMO (Dynamic On-demand MANET routing protocol) which is a planned IETF reactive routing protocol.
•
Uses destination sequence numbers to avoid loops, and ensure proper updating of routes Storage of routes in Route Table Uses only symmetric links
• •
28 Mobile and Wireless Networking 2013 / 2014
urce broadcasts
(RREQ)
Route Discovery EQ contains: •
Source broadcasts Route Request (RREQ):
>
node can reply tocan thereply RREQ if if • A node to the RREQ • It is the destination It is the destination • It has a “fresh enough” route
to the destination It has a “fresh enough” route to • Otherwise it rebroadcasts the RREQ the destination • Nodes keep track of
herwise it
Source
rebroadcasts the RREQ and discard redundant broadcasts
des keep track of
Destination
> d discard redundant broadcasts
Route Request Propagation Source: Perkins & Royer
29 Mobile and Wireless Networking 2013 / 2014
Reverse Path Setup
Reverse Path Setup
Nodes update their Route Table with source node information before forwarding RREQ Nodes update their Route Table with Reverse path entry used to forward source• node information before Route Reply (RREP) back to source forwarding if oneRREQ is received • Expiration time is long enough for Reverseapath used toand forward RREPentry to be received forwarded •
Source
(RREP) back to source if one is received Expiration time is long enough for a RREP to be received and forwarded
Destination
Reverse Path Formation 30
Mobile and Wireless Networking 2013 / 2014
destination, unicasts
(RREP) back to source
Forward Path Setup RREP contains: < • Destination, or intermediate node with current route to
>
destination, unicasts Route Reply (RREP) back to source:
Nodes along path record in Route Table, use to forward RREP Nodes along path record forward route Source can begin sending data in Route Table, use reverse route to forward RREP when it receives first RREP • Source can begin sending data when it receives first RREP If it later receives a RREP • If it later receives a RREP withmetric, better metric, with better it updates its route entry •
it updates its route entry
Perkins, Royer
Source
Destination
Forward Path Formation 31 Mobile and Wireless Networking 2013 / 2014
Sun, UCSB
Route Table
Fields: estination• IP Address • Destination IP Address estination Sequence • Destination Number Sequence Number Next Hop • HopCount A op Count • Next Hop IP Address Destination • Active Neighbors ext Hop IP Address • Expiration time Source ctive Neighbors Source Active Upstream Neighbors xpiration time
Each time a route entry is used to transmit data, the expiration time is updated to current time + active_route_timeout me a route entry is used to transmit data, the expiration • Route entries may be updated if a route with greater sequence updated tonumber or smaller hopcount is discovered •
ntries may be updated if a route with greater sequence 32 r or smaller hopcount is discovered Mobile and Wireless Networking 2013 / 2014
Path Maintenance • • •
Movement of nodes not along active path does not trigger protocol action If source node moves, it can reinitiate route discovery When destination or intermediate node moves, node upstream of break sends unsolicited RREP to all active upstream neighbors • •
• • •
∞ metric, incremented Seq# Used to flush stale routes
RREP is propagated to their active neighbors, and so on back to source Source can reinitiate route discovery if route is still needed RREQs for reinitiated route discovery contain destination sequence number of one greater than last known number
33 Mobile and Wireless Networking 2013 / 2014
Maintenance (cont.) PathPath Maintenance (cont.) Maintenance (example) 3’ 3’
3’ 3’
33 11
11
22
22
Destination Destination Source Source
44
The The Initial Initial Route Route • • • •
Destination Destination Source Source
44
After After Route Route Reconstruction Reconstruction
Node 3 moves to new location 3’ Node 33 moves Node moves to to new new location location 3’ 3’
Node 2 notices loss of link, sends link failure to Node 1 Node1 forwards link failure to Source Node 22 notices Node notices loss loss of of link, link, sends sends link link failure failure to to Node Node 11 Source reinitiates route discovery, finds new route through Node 4
Node Node 11 forwards forwards link link failure failure to to Source Source
34 Source throu Source reinitiates reinitiates route route discovery, discovery, finds finds new new route route thro Node Node 44 Mobile and Wireless Networking 2013 / 2014
Local Connectivity Management • • • •
Node must periodically hear from active neighbors to know they are still within range Eavesdrop on neighbor transmissions If no other transmissions within hello_interval, broadcast Hello packet Failure to hear from a neighbor for (1+ allowed_hello_loss) * hello_interval
indicates loss of link
35 Mobile and Wireless Networking 2013 / 2014
Optimizations •
Expanding Ring Search •
•
RREP generated by intermediate node •
• •
by limiting TTL at first attempt, and increasing it at successive attempts. only if Seq# for route to destination ≥ Dest_Seq# of RREQ
Maintaining Local Connectivity by means of layer 2 info. Local Repair •
node upstream of link failure tries to find a new route to destination by sending a RREQ (with reduced TTL, and incremented Dest_Seq#)
36 Mobile and Wireless Networking 2013 / 2014
DSR (Dynamic Source Routing) •
Similar to AODV
•
Big difference: DSR uses Source Routing • AODV relies on storing routing table entries in intermediate nodes RREQ and RREP carry addresses of all intermediate nodes •
See [Schiller] for details
37 Mobile and Wireless Networking 2013 / 2014
A plethora of ad hoc routing protocols Flat
proactive DSDV – Destination Sequenced Distance Vector FSLS – Fuzzy Sighted Link State FSR – Fisheye State Routing OLSR – Optimised Link State Routing Protocol TBRPF – Topology Broadcast Based on Reverse Path Forwarding
reactive
DSR – Dynamic Source Routing AODV – Ad hoc On demand Distance Vector
Hierarchical
CGSR – Clusterhead-Gateway Switch Routing HSR – Hierarchical State Routing LANMAR – Landmark Ad Hoc Routing ZRP – Zone Routing Protocol
Geographic position assisted
DREAM – Distance Routing Effect Algorithm for Mobility GeoCast – Geographic Addressing and Routing GPSR – Greedy Perimeter Stateless Routing LAR – Location-Aided Routing 38 Mobile and Wireless Networking 2013 / 2014