Sei sulla pagina 1di 50

Mobile IP

Why needed?
Compatibility
Transparency
Scalability and efficiency

Mobil IP

Care of Address
Current location of MN from an IP
point of View
FA Care of Address
FA is tunnel end point of conversion

Co-located Care of Address


MN is tunnel end point of conversion

IP packet Delivery

Mobile IP
Agent Discovery
Agent Advertisement
Agent Solicitation

Registration with HA
Data Transfer with tunneling

Agent Advertisement packet


R:Registration
B: Busy
H:offered service
as a HA
F:Offered service
as a FA
M: Minimal
G: Generic
T:Reverse
Tunneling

Registration Request

Registration Request
Directly

Registration Request Format


MN HA
S: Retain Prior
Binding
B: wants to receive
Broadcasted
message
D:Decapsulation
Behavior
M:
G:
T:

Registration Reply Format


HA

IP-in-IP Encapsulation

IP-in-IP Encapsulation

IP-in-IP EncapsulationMinimal

IP-in-IP EncapsulationGeneric

IP-in-IP EncapsulationGeneric

Mobile Ad-hoc Network


Advantages
Instant Infrastructure
Disaster Relief
Remote Area
Effectiveness

MANET and Mobile IP

Routing

Differences between Wired and Wireless


Network

Asymmetric Links
Redundant Links
Interference
Dynamic Topology
Frequent Change in Topology
Routing Updates Intervals
Routing Tables Algorithm

Optimum Knowledge for Every node


Connectivity between all nodes
Expected traffic flows
Capacities of each link
Delay of each link
Computing and battery power

Characteristics of Adhoc Routing


Alog
Algorithms should support highly
dynamic topology, asymmetric links,
interference
Routing cannot be based of network
layer alone
Centralized Approach will not work
Many node should have routing
Capabilities
Last alternative is flooding
Hierarchical Clustering

DSDV
Destination Sequence Distance
Vector
Adds two thing to the DVA
Sequence Number
Damping

DSR
Dynamic Source Routing
Divides the task of routing into two
Route Discovery
Route Maintenance

It broadcasts a route request with a unique


identifier and the destination address parameter
If the node has already received requestDrops
request
If the node recognizes its own address as
destinationReplies
The node appends its own address to a list of
traversed hops in to hpacket and rebroadcasts.

Routing

DSV Optimization
Every request could contain Counter
A node can cache path fragments
from recent request
Node can also use it for shortenning
routs

Least Interference Routing

Other Routing Protocols


Flat Routing
Proactive
Drawback: updating should be frequent OR tries to
minimize network load
Fisheye state routing , Fuzzy sighted link State
Routing: Update Period depends on Distance

Reactive

Hierarchical Ah-hoc Routing


Cluster is Formed

Geographic Position assisted Adhoc Routing

Hierarchical Ah-hoc Routing

Mobile Transport Layer


Congestion Control
Slow Start
Implication on Mobility
It Drastically decreases the efficiency of
TCP if used together with mobile
receiver or sender
Mobility can causes packet loss
Error Control mechanism Is misused as
congestion control mechanism

Classical TCP Improvements

Indirect TCP
Snooping TCP
Mobile TCP
Fast Retransmit
Transmission/time-out Freezing
Selective Retransmission
Transaction-oriented TCP

Indirect TCP

Mobility in I TCP

I-TCP
Advantages
I TCP does not require any changes in the TCP
protocol used by CH
Transmission errors on Wireless link i.e. lost
packets, cannot propagate into the fixed
network
System suffers from short delay between
Mobile node and Foreign Host
Partitioning into two connections allows the
use of different protocols in two separate
connections

I-TCP
Disadvantages
The loss of end-to-end semantics in case
of foreign host loss
Increased handover latency may be
much problematic.
Foreign agent must be trusted entity

Snooping TCP

Snooping TCP
Advantages
The end-to-end semantic is preserved
The CH does not need to be changed.
FH need to be changed
It does not need a handover of state as
soon as the mobile host moves to
another foreign agent
It does not matter if the next foreign
agent uses the enhancement or not

Snooping TCP
Disadvantages
Quality of snooping TCP strongly
depends Quality of Wireless Link, timeout values and traffic characteristics
Using negative ack, it requires additional
mechanism on mobile host
It is useless if end-to-end encryption is
used

Mobile TCP
In Case of Frequent disconnection on wireless
link, it frequently iterate for retrensmission
Goal: To prevent the sender window from
shrinking if disconnection is a problem
M-TCP splits communication into two parts
Unmodified TCP: CH and Supervisory(SH) Host
Optmized TCp: SH-MH

SH overs ACK from MH


If ACK is not received then it chocks the sender
by setting the senders window size to 0

Mobile TCP
Advantages
It maintains end-to-end semantics
If MH is disconnected it avoids useless
retransmissions, slow start
It doesnt buffers data in the SH, it Is not necessary to
forward buffers to a new SH

Disadvantages
Packet loss due to wireless link might be propagated
into wired link
It requires extra network element like bandwidth
manager

Fast Retransmit & Recovery


When TCP Founds Congestion, it goes into slow start
although there is no convestion
Specially used for Mobile IP: When it changes foreign
agent
Advantages
Simplicity. Minor change into Mobile Host is required

Disadvantages
Insufficient isolation of packet losses. Forcing fast
retransmission increases the efficiency but retransmission
requires that packet have to cross the whole network
It requires strong co-operation between the mobile IP and
TCP layer making it harder to change one without
influencing the other

Transmission/Time-out
Freezing
MAC Layer can inform the TCP layer of an
upcoming loss of connection
Advantages
It resume TCP connections even after longer
interruptions of the connection

Disadvantage
Not only does the software on the mobile
host have to be changed.
All mechanism reply on capability of MAC
layer to detect interruption

Selective Retransmission
Advantages
Sender retransmits only the lost
packets. This lowers the bandwidth
requirements and extremely helpful in
slow wireless link

Disadvantages
More buffer is necessary to resequence
data and to wait for gaps to be filled.

Transaction Oriented TCP

Transaction Oriented TCP


Adv
Reduction in Overhead

Disadvantage
Changes into Mobile Host and
Correspondent host

TCP over 2.5/3 G


Characteristics to be considered when deploying
application
Data Rate
Latency
Jitter
Packet Loss

Configuration Parameter for TCP


Large Window
Selective ACK
Explicit Congestion Notification
Time Stamps
No Header Compression

End of Topic

Potrebbero piacerti anche