SlideShare ist ein Scribd-Unternehmen logo
1 von 51
1
MOBILE COMPUTING
Unit II
Dr Gnanasekaran Thangavel
2
UNIT II
MOBILE INTERNET PROTOCOL AND
TRANSPORT LAYER
Overview of Mobile IP – Features of Mobile IP – Key Mechanism in Mobile IP –
route Optimization. Overview of TCP/IP – Architecture of TCP/IP- Adaptation of
TCP Window – Improvement in TCP Performance.
3
Mobile IP
Mobile IP enables an IP node to retain the same IP address and maintain existing communications
while traveling from one link to another.
4
5
Mobile IP
Tunneling
Mobile IP Components
Mobile node (MN)
Home agent (HA)
Foreign agent (FA)
Correspondent Node (CN)
6
Mobile node (MN)
The Mobile Node is a device such as
-a cell phone,
-personal digital assistant,
-or laptop
whose software enables network roaming capabilities.
7
Home agent (HA)
Home Agent is a router on the home network serving as the anchor point
for communication with the Mobile Node;
it tunnels packets from a device on the Internet, called a Correspondent
Node, to the roaming Mobile Node.
(A tunnel is established between the Home Agent and a reachable point for
the Mobile Node in the foreign network.)
8
Foreign agent (FA)
The Foreign Agent is a router that may function as the point of
attachment for the Mobile Node when it roams to a foreign
network, delivering packets from the Home Agent to the Mobile
Node.
9
Correspondent Node (CN)
 End host to which MN is corresponding (eg. a web server)
10
How Mobile IP WorksThe Mobile IP process has three main phases
the following sections.
 Agent Discovery
A Mobile Node discovers its Foreign and Home Agents during agent discovery.
 Registration
The Mobile Node registers its current location with the Foreign Agent and Home
Agent during registration.
 Tunneling
A reciprocal tunnel is set up by the Home Agent to the care-of address (current
location of the Mobile Node on the foreign network) to route packets to the Mobile
Node as it roams.
11
Two IP addresses for mobile node
 Home address: static
 Care-of address: topologically significant address
The care-of address is the termination point of the tunnel toward the Mobile Node
when it is on a foreign network. The Home Agent maintains an association
between the home IP address of the Mobile Node and its care-of address, which is
the current location of the Mobile Node on the foreign or visited network
12
Features of Mobile IP
 Transparency : IP address should not be any effect of mobility on any ongoing
communication
 Compatibility: It should compatible with existing Internet protocols.
 Security: It should provide users with secure communication over internet.
 Efficiency : It should neither result in large number of message nor should it incur too
much computational overheads
 Scalability: It should also be scalable to support billions of moving hosts worldwide.
13
Key Mechanism in Mobile IP
Three basic mechanisms
1. Discovering the care-of address
2. Registering the care-of address
3. Tunneling to the care-of address
14
15
1.Discovery the care-of-address
Extension of ICMP Router Advertisement
• Home agents and foreign agents broadcast agent advertisements at
regular intervals
Allows for the detection of mobility agents
Lists one or more available care-of addresses
Informs the mobile node about special features
Mobile node selects its care-of address
Mobile node checks whether the agent is a home agent or foreign
agent
– Mobile node issues an ICMP router solicitation message
16
Mobile IP Agent Advertisement Message
17
2. Registration
Once a mobile node has a care-of address, its home agent must find out about it
18
19
3. Tunneling to the care-of address
20
Mobile IP Tunneling
Across Internet
Tunneling takes place to forward an IP datagram from home agent to a care-of-address.
 When a home agent receives a packet addressed to a mobile host , it forwards the
packet to the care-of-address using IP-within-IP(encapsulation)
 Using IP-within-IP, the home agent inserts a new IP header in front of the IP header
of any datagram.
 Destination address is set to the home agent’s address.
 Source address is set to the home agents address.
 After stripping out the first header, IP processes the packet again.
21
22
Two Tunneling Methods
IP-within-IP Encapsulation Minimal Encapsulation
Route Optimization
 All the data packets to the mobile node go through the home agent.
 There will be a heavy traffic between HA and CN causing latency to increase.
 To overcome this problem the following route optimization needs
• Enable direct notification of the corresponding host
• Direct tunneling from the corresponding host to the mobile host.
• Binding cache maintained at the corresponding host
The association of the home address with care-of-address is called binding
23
Overview of TCP/IP
TCP/IP protocol suite is a collection of a large number of protocols.
The four layer of protocols are
• Application layer
• Transport layer
• Internet layer
• Network layer
• TCP/IP allows any of the standard protocols to be used for network
interface
24
25
Architecture of TCP/IP
TCP/IP protocol consists of four layers. 1. Application layer, 2.Transport layer, 3.Internet layer and
4. Network access layer
26
1. Application layer:
 Establish communication with other applications which may be running on separate hosts.
 Example http,ftp and telnet.
2. Transport layer:
 The purpose of Transport layer is to permit devices on the source and destination hosts to carry on a
conversation. Provides reliable end-to-end data transfer services.
 Also referred as host-to-host protocol.
 The main protocols included at Transport layer are
I. TCP (Transmission Control Protocol) and
II. UDP (User Datagram Protocol).
3. Internet layer
 Internet layer pack data into data packets known as IP datagrams,
 which contain source and destination address (logical address or IP address) information that is used to
forward the datagrams between hosts and across networks.
27
4. Network access layer
 The Network Access Layer of the TCP/IP model is associated with the Physical Layer (Layer 1) and the Data Link
layer (Layer 2) of the OSI model.
 The Network Access Layer's function is to move bits (0s and 1s) over the network medium such as coaxial cable,
optical fiber, or twisted pair copper wire.
 The OSI Physical layer is responsible for converting the frame into a stream of bits suitable for the transmission
medium and synchronizes signals for the actual transmission.
 On the destination device, the Physical layer reassembles these signals into a data frame.
 The OSI Data Link layer is again subdivided into the following two sub layers according to their function:
 Media Access Control (MAC) Sublayer :— MAC sublayer provides an interface with the network adapter.
 Logical Link Control (LLC) Sublayer :— LLC sublayer is responsible for error-checking functions for frames
delivered also responsible for managing links between communicating devices.
28
Comparison of TCP/IP and OSI network
models
29
Comparison of TCP/IP and OSI network
models
30
Adaptation of TCP Window
 TCP deploys a flow control technique to control congestion in a network.
 Traffic congestion occurs when the rate at which data is injected by a host into the
network exceeds the rate at which data can be delivered to the network.
I. Router buffer overflow.
II. Receiver buffer overflow
 A flow control technique by TCP helps adapt the rate at sending host end and to
prevent overrun at the slow receiver.
 The flow control mechanism by TCP called the sliding window protocol.
31
Improvements of TCP Performance
Traditional networks
 Transport protocols typically designed for
 Fixed end-systems
 Fixed, wired networks
 TCP congestion control
 Packet loss in fixed networks typically due to (temporary) overload situations
 Routers discard packets as soon as the buffers are full
 TCP recognizes congestion only indirectly via missing acknowledgements
 Retransmissions unwise, they would only contribute to the congestion and make it even
worse
 Slow-start algorithm as reaction
32
Classification of Schemes
33
TCP Slow Start
 Sender calculates a congestion window for a receiver
 Start with a congestion window size equal to one segment
 Exponential increase of the congestion window up to the congestion threshold, then
linear increase
 Missing acknowledgement causes the reduction of the congestion threshold to one
half of the current congestion window
 Congestion window starts again with one segment
2/12/2016 34
Congestion avoidance
 It starts where slow start stops.
 Once congestion window reaches the congestion threshold level, then after that if an
acknowledgement is received the window size is increased linearly ic the window size
doubling is avoided.
 The TCP increases its rate linearly by adding one additional picket to its window at
each transmission time. If congestion is detected at any point the TCP is reduces its
transmission rate to half the previous value. Makes to right transmission rate.
 The is scheme is less aggressive than slow start phase.
2/12/2016 35
Fast Retransmit/ Fast Recovery
 TCP sends an acknowledgement only after receiving a packet.
 If a sender receives several acknowledgements for the same packet, this is due to a
gap in received packets at the receiver.
 However, the receiver got all packets up to the gap and is actually receiving packets
 Therefore, packet loss is not due to congestion, continue with current congestion
window (do not use slow-start)
2/12/2016 36
TCP in mobile networks
TCP assumes congestion if packets are dropped
 typically wrong in wireless networks, here we often have packet loss due to transmission
errors
 furthermore, mobility itself can cause packet loss, if e.g. a mobile node roams from one
access point (e.g. foreign agent in Mobile IP) to another while there are still packets in
transit to the wrong access point and forwarding is not possible
The performance of an unchanged TCP degrades severely
 however, TCP cannot be changed fundamentally due to the large base of installation in the
fixed network, TCP for mobility has to remain compatible
 the basic TCP mechanisms keep the whole Internet together
2/12/2016 37
Indirect TCP (I -TCP)
 Indirect TCP or I-TCP segments the connection
 no changes to the TCP protocol for hosts connected to the wired Internet, millions of computers use
(variants of) this protocol
 optimized TCP protocol for mobile hosts
 splitting of the TCP connection at, e.g., the foreign agent into 2 TCP connections, no real end-to-end
connection any longer
 hosts in the fixed part of the net do not notice the characteristics of the wireless part
mobile host
access point
(foreign agent) wired Internet
“wireless” TCP standard TCP
2/12/2016 38
I-TCP socket and state migration
mobile host
access point2
Internet
access point1
socket migration
and state transfer
2/12/2016 39
Indirect TCP II
 Advantages
 no changes in the fixed network necessary, no changes for the hosts (TCP protocol) necessary,
all current optimizations to TCP still work
 transmission errors on the wireless link do not propagate into the fixed network
 simple to control, mobile TCP is used only for one hop between, e.g., a foreign agent and mobile
host
 therefore, a very fast retransmission of packets is possible, the short delay on the mobile hop is
known
 Disadvantages
 loss of end-to-end semantics, an acknowledgement to a sender does not any longer mean that a
receiver really got a packet, foreign agents might crash
 higher latency possible due to buffering of data within the foreign agent and forwarding to a new
foreign agent
2/12/2016 40
Snooping TCP (S-TCP)
 Transparent extension of TCP within the foreign agent
 buffering of packets sent to the mobile host
 lost packets on the wireless link (both directions!) will be retransmitted immediately by the mobile host or
foreign agent, respectively (so called “local” retransmission)
 the foreign agent therefore “snoops” the packet flow and recognizes acknowledgements in both directions, it
also filters ACKs
 changes of TCP only within the foreign agent (+min. MH change)
„wired“ Internet
buffering of data
end-to-end TCP connection
local retransmission correspondent
hostforeign
agent
mobile
host
snooping of ACKs
2/12/2016 41
Snooping TCP II
 Data transfer to the mobile host
 FA buffers data until it receives ACK of the MH, FA detects packet loss via duplicated ACKs or time-out
 fast retransmission possible, transparent for the fixed network
 Data transfer from the mobile host
 FA detects packet loss on the wireless link via sequence numbers, FA answers directly with a NACK to
the MH
 MH can now retransmit data with only a very short delay
 Advantages:
 Maintain end-to-end semantics
 No change to correspondent node
 No major state transfer during handover
 Problems
 Snooping TCP does not isolate the wireless link well
 May need change to MH to handle NACKs
 Snooping might be useless depending on encryption schemes
2/12/2016 42
Mobile TCP(M-TCP)
 Special handling of lengthy and/or frequent disconnections
 M-TCP splits as I-TCP does
 unmodified TCP fixed network to supervisory host (SH)
 optimized TCP SH to MH
 Supervisory host
 no caching, no retransmission
 monitors all packets, if disconnection detected
 set sender window size to 0
 sender automatically goes into persistent mode
 old or new SH reopen the window
 Advantages
 maintains semantics, supports disconnection, no buffer forwarding
 Disadvantages
 loss on wireless link propagated into fixed network
 adapted TCP on wireless link
2/12/2016 43
Mobile TCP(M-TCP)
44
Fast retransmit/fast recovery
 Change of foreign agent often results in packet loss
 TCP reacts with slow-start although there is no congestion
 Forced fast retransmit
 as soon as the mobile host has registered with a new foreign agent, the MH sends duplicated
acknowledgements on purpose
 this forces the fast retransmit mode at the communication partners
 additionally, the TCP on the MH is forced to continue sending with the actual window size and not to
go into slow-start after registration
 Advantage
 simple changes result in significant higher performance
 Disadvantage
 further mix of IP and TCP (to know when there is a new registration), no transparent approach
2/12/2016 45
Freeze-TCP
Mobile hosts can be disconnected for a longer time
 no packet exchange possible, e.g., in a tunnel, disconnection due to overloaded cells or mux.
with higher priority traffic
 TCP disconnects after time-out completely
TCP freezing
 MAC layer is often able to detect interruption in advance
 MAC can inform TCP layer of upcoming loss of connection
 TCP stops sending, but does not assume a congested link
 MAC layer signals again if reconnected
Advantage
 scheme is independent of data and TCP mechanisms (Ack,SN) => works even with IPsec
Disadvantage
 TCP on mobile host has to be changed, mechanism depends on MAC layer
2/12/2016 46
Selective retransmission
 TCP acknowledgements are often cumulative
 ACK n acknowledges correct and in-sequence receipt of packets up to n
 if single packets are missing quite often a whole packet sequence beginning at the gap has to be
retransmitted (go-back-n), thus wasting bandwidth
 Selective retransmission as one solution
 RFC2018 allows for acknowledgements of single packets, not only acknowledgements of in-
sequence packet streams without gaps
 sender can now retransmit only the missing packets
 Advantage: much higher efficiency
 Disadvantage
 more complex software in a receiver, more buffer needed at the receiver
2/12/2016 47
Transaction oriented TCP
TCP phases
 connection setup, data transmission, connection release
 using 3-way-handshake needs 3 packets for setup and release, respectively
 thus, even short messages need a minimum of 7 packets!
Transaction oriented TCP
 RFC1644, T-TCP, describes a TCP version to avoid this overhead
 connection setup, data transfer and connection release can be combined
 thus, only 2 or 3 packets are needed
Advantage
 efficiency
Disadvantage
 requires changed TCP
 mobility no longer transparent
2/12/2016 48
49
References
Book: Prasant Kumar Pattnaik, Rajib Mall, “Fundamentals of Mobile Computing”, PHI Learning
Pvt. Ltd, New Delhi – 2012.
http://www.omnisecu.com/tcpip/tcpip-model.php
http://www.computernetworkhomeworkhelp.com/comparison-models/
http://www.tcpipguide.com/free/t_InternetProtocolMobilitySupportMobileIP.htm
PPT:
https://cs.uccs.edu/~chow/pub/master/ycai/mobile_computing_mtu.ppt
http://www.slideshare.net/ayyakathir/it6601-mobile-computing-54556306
https:// cs.winona.edu/lin/cs313/CS313DataLink2.ppt
50
51
Thank You
Questions and Comments?

Weitere ähnliche Inhalte

Was ist angesagt?

Was ist angesagt? (20)

Security In LTE Access Network
Security In LTE Access NetworkSecurity In LTE Access Network
Security In LTE Access Network
 
5 g ran architcture
5 g ran architcture5 g ran architcture
5 g ran architcture
 
TELECOMMUNICATIONS SYSTEMS
TELECOMMUNICATIONS SYSTEMSTELECOMMUNICATIONS SYSTEMS
TELECOMMUNICATIONS SYSTEMS
 
IT8602 - Mobile Communication Unit IV
IT8602 - Mobile Communication   Unit IV IT8602 - Mobile Communication   Unit IV
IT8602 - Mobile Communication Unit IV
 
IT6601 MOBILE COMPUTING UNIT1
IT6601 MOBILE COMPUTING UNIT1IT6601 MOBILE COMPUTING UNIT1
IT6601 MOBILE COMPUTING UNIT1
 
Routing in Mobile Ad hoc Networks
Routing in Mobile Ad hoc NetworksRouting in Mobile Ad hoc Networks
Routing in Mobile Ad hoc Networks
 
UMTS, Introduction.
UMTS, Introduction.UMTS, Introduction.
UMTS, Introduction.
 
Mobile computing
Mobile computing Mobile computing
Mobile computing
 
MOBILE COMMUNICATION
MOBILE COMMUNICATIONMOBILE COMMUNICATION
MOBILE COMMUNICATION
 
Mobile transportlayer
Mobile transportlayerMobile transportlayer
Mobile transportlayer
 
Features of mobile ip
Features of mobile ipFeatures of mobile ip
Features of mobile ip
 
ENCAPSULATION AND TUNNELING
ENCAPSULATION AND TUNNELINGENCAPSULATION AND TUNNELING
ENCAPSULATION AND TUNNELING
 
Handover in Mobile Computing
Handover in Mobile ComputingHandover in Mobile Computing
Handover in Mobile Computing
 
LTE Architecture Overview
LTE Architecture OverviewLTE Architecture Overview
LTE Architecture Overview
 
3 g call flow
3 g call flow3 g call flow
3 g call flow
 
IT8602 Mobile Communication Unit II
IT8602 Mobile Communication   Unit II IT8602 Mobile Communication   Unit II
IT8602 Mobile Communication Unit II
 
IT6601 MOBILE COMPUTING
IT6601 MOBILE COMPUTINGIT6601 MOBILE COMPUTING
IT6601 MOBILE COMPUTING
 
5 g core overview
5 g core overview5 g core overview
5 g core overview
 
IEEE 802.11 Architecture and Services
IEEE 802.11 Architecture and ServicesIEEE 802.11 Architecture and Services
IEEE 802.11 Architecture and Services
 
mobile ad-hoc network (MANET) and its applications
mobile ad-hoc network (MANET) and its applicationsmobile ad-hoc network (MANET) and its applications
mobile ad-hoc network (MANET) and its applications
 

Ähnlich wie It6601 mobile computing unit2

Mobile internet protocol
Mobile internet protocolMobile internet protocol
Mobile internet protocolSaranyaK68
 
Unit 4 MC QA.pdf
Unit 4 MC  QA.pdfUnit 4 MC  QA.pdf
Unit 4 MC QA.pdfCSEHOD11
 
MOBILE COMPUTING Unit 2.pptx
MOBILE COMPUTING Unit 2.pptxMOBILE COMPUTING Unit 2.pptx
MOBILE COMPUTING Unit 2.pptxkarthiksmart21
 
Computer Networking Tasks.docx
Computer Networking Tasks.docxComputer Networking Tasks.docx
Computer Networking Tasks.docxUsamaAliLone3
 
presentation on TCP/IP protocols data comunications
presentation on TCP/IP protocols data comunicationspresentation on TCP/IP protocols data comunications
presentation on TCP/IP protocols data comunicationsAnyapuPranav
 
MC0087 Internal Assignment (SMU)
MC0087 Internal Assignment (SMU)MC0087 Internal Assignment (SMU)
MC0087 Internal Assignment (SMU)Krishan Pareek
 
Mobile transport layer .
Mobile transport layer .Mobile transport layer .
Mobile transport layer .junnubabu
 
mobile ip, Mobile COmmunication Internet Protocol
mobile ip, Mobile COmmunication Internet Protocolmobile ip, Mobile COmmunication Internet Protocol
mobile ip, Mobile COmmunication Internet ProtocolGaurav Dwivedi
 
MOBILE IP,DHCP,ADHOC ROUTING PROTOCOLS
MOBILE IP,DHCP,ADHOC ROUTING PROTOCOLSMOBILE IP,DHCP,ADHOC ROUTING PROTOCOLS
MOBILE IP,DHCP,ADHOC ROUTING PROTOCOLSManju La
 
Chapter Five - Transport Layer.pptx
Chapter Five - Transport Layer.pptxChapter Five - Transport Layer.pptx
Chapter Five - Transport Layer.pptxGirT2
 

Ähnlich wie It6601 mobile computing unit2 (20)

unit-2 mc.pdf
unit-2 mc.pdfunit-2 mc.pdf
unit-2 mc.pdf
 
Mobile internet protocol
Mobile internet protocolMobile internet protocol
Mobile internet protocol
 
Unit 4 MC QA.pdf
Unit 4 MC  QA.pdfUnit 4 MC  QA.pdf
Unit 4 MC QA.pdf
 
MOBILE COMPUTING Unit 2.pptx
MOBILE COMPUTING Unit 2.pptxMOBILE COMPUTING Unit 2.pptx
MOBILE COMPUTING Unit 2.pptx
 
Computer Networking Tasks.docx
Computer Networking Tasks.docxComputer Networking Tasks.docx
Computer Networking Tasks.docx
 
Basics of Computer Networks
Basics of Computer NetworksBasics of Computer Networks
Basics of Computer Networks
 
presentation on TCP/IP protocols data comunications
presentation on TCP/IP protocols data comunicationspresentation on TCP/IP protocols data comunications
presentation on TCP/IP protocols data comunications
 
MC0087 Internal Assignment (SMU)
MC0087 Internal Assignment (SMU)MC0087 Internal Assignment (SMU)
MC0087 Internal Assignment (SMU)
 
Mobile transport layer .
Mobile transport layer .Mobile transport layer .
Mobile transport layer .
 
Overlay networks
Overlay networksOverlay networks
Overlay networks
 
Unit 2
Unit 2Unit 2
Unit 2
 
ch5-network.ppt
ch5-network.pptch5-network.ppt
ch5-network.ppt
 
Unit 3
Unit 3Unit 3
Unit 3
 
Mobile IP
Mobile IPMobile IP
Mobile IP
 
mobile ip, Mobile COmmunication Internet Protocol
mobile ip, Mobile COmmunication Internet Protocolmobile ip, Mobile COmmunication Internet Protocol
mobile ip, Mobile COmmunication Internet Protocol
 
IT6601 MOBILE COMPUTING
IT6601 MOBILE COMPUTINGIT6601 MOBILE COMPUTING
IT6601 MOBILE COMPUTING
 
It2402 mobile communication unit 4
It2402 mobile communication unit 4It2402 mobile communication unit 4
It2402 mobile communication unit 4
 
MOBILE IP,DHCP,ADHOC ROUTING PROTOCOLS
MOBILE IP,DHCP,ADHOC ROUTING PROTOCOLSMOBILE IP,DHCP,ADHOC ROUTING PROTOCOLS
MOBILE IP,DHCP,ADHOC ROUTING PROTOCOLS
 
Transport layer
Transport layer Transport layer
Transport layer
 
Chapter Five - Transport Layer.pptx
Chapter Five - Transport Layer.pptxChapter Five - Transport Layer.pptx
Chapter Five - Transport Layer.pptx
 

Mehr von RMK ENGINEERING COLLEGE, CHENNAI

Big picture of electronics and instrumentation engineering
Big picture of electronics and instrumentation engineeringBig picture of electronics and instrumentation engineering
Big picture of electronics and instrumentation engineeringRMK ENGINEERING COLLEGE, CHENNAI
 

Mehr von RMK ENGINEERING COLLEGE, CHENNAI (20)

EC8353 ELECTRONIC DEVICES AND CIRCUITS Unit 3
EC8353 ELECTRONIC DEVICES AND CIRCUITS Unit 3EC8353 ELECTRONIC DEVICES AND CIRCUITS Unit 3
EC8353 ELECTRONIC DEVICES AND CIRCUITS Unit 3
 
EC8353 ELECTRONIC DEVICES AND CIRCUITS Unit 2
EC8353 ELECTRONIC DEVICES AND CIRCUITS Unit 2EC8353 ELECTRONIC DEVICES AND CIRCUITS Unit 2
EC8353 ELECTRONIC DEVICES AND CIRCUITS Unit 2
 
EC8353 ELECTRONIC DEVICES AND CIRCUITS Unit 1
EC8353 ELECTRONIC DEVICES AND CIRCUITS Unit 1EC8353 ELECTRONIC DEVICES AND CIRCUITS Unit 1
EC8353 ELECTRONIC DEVICES AND CIRCUITS Unit 1
 
EC6651 COMMUNICATION ENGINEERING UNIT 5
EC6651 COMMUNICATION ENGINEERING UNIT 5EC6651 COMMUNICATION ENGINEERING UNIT 5
EC6651 COMMUNICATION ENGINEERING UNIT 5
 
EC6651 COMMUNICATION ENGINEERING UNIT 4
EC6651 COMMUNICATION ENGINEERING UNIT 4EC6651 COMMUNICATION ENGINEERING UNIT 4
EC6651 COMMUNICATION ENGINEERING UNIT 4
 
EC6651 COMMUNICATION ENGINEERING UNIT 2
EC6651 COMMUNICATION ENGINEERING UNIT 2EC6651 COMMUNICATION ENGINEERING UNIT 2
EC6651 COMMUNICATION ENGINEERING UNIT 2
 
EC6651 COMMUNICATION ENGINEERING UNIT 1
EC6651 COMMUNICATION ENGINEERING UNIT 1EC6651 COMMUNICATION ENGINEERING UNIT 1
EC6651 COMMUNICATION ENGINEERING UNIT 1
 
EC6202 ELECTRONIC DEVICES AND CIRCUITS Unit 2
EC6202 ELECTRONIC DEVICES AND CIRCUITS Unit 2EC6202 ELECTRONIC DEVICES AND CIRCUITS Unit 2
EC6202 ELECTRONIC DEVICES AND CIRCUITS Unit 2
 
EC6202 ELECTRONIC DEVICES AND CIRCUITS Unit 1
EC6202 ELECTRONIC DEVICES AND CIRCUITS Unit 1EC6202 ELECTRONIC DEVICES AND CIRCUITS Unit 1
EC6202 ELECTRONIC DEVICES AND CIRCUITS Unit 1
 
EC6202 ELECTRONIC DEVICES AND CIRCUITS NOTES
EC6202 ELECTRONIC DEVICES AND CIRCUITS NOTESEC6202 ELECTRONIC DEVICES AND CIRCUITS NOTES
EC6202 ELECTRONIC DEVICES AND CIRCUITS NOTES
 
Big picture of electronics and instrumentation engineering
Big picture of electronics and instrumentation engineeringBig picture of electronics and instrumentation engineering
Big picture of electronics and instrumentation engineering
 
GE6075 PROFESSIONAL ETHICS IN ENGINEERING Unit 5
GE6075 PROFESSIONAL ETHICS IN ENGINEERING Unit 5GE6075 PROFESSIONAL ETHICS IN ENGINEERING Unit 5
GE6075 PROFESSIONAL ETHICS IN ENGINEERING Unit 5
 
GE6075 PROFESSIONAL ETHICS IN ENGINEERING Unit 4
GE6075 PROFESSIONAL ETHICS IN ENGINEERINGUnit 4GE6075 PROFESSIONAL ETHICS IN ENGINEERINGUnit 4
GE6075 PROFESSIONAL ETHICS IN ENGINEERING Unit 4
 
GE6075 PROFESSIONAL ETHICS IN ENGINEERING Unit 3
GE6075 PROFESSIONAL ETHICS IN ENGINEERING Unit 3GE6075 PROFESSIONAL ETHICS IN ENGINEERING Unit 3
GE6075 PROFESSIONAL ETHICS IN ENGINEERING Unit 3
 
GE6075 PROFESSIONAL ETHICS IN ENGINEERING Unit 2
GE6075 PROFESSIONAL ETHICS IN ENGINEERING Unit 2GE6075 PROFESSIONAL ETHICS IN ENGINEERING Unit 2
GE6075 PROFESSIONAL ETHICS IN ENGINEERING Unit 2
 
Cs6703 grid and cloud computing unit 5 questions
Cs6703 grid and cloud computing  unit 5 questionsCs6703 grid and cloud computing  unit 5 questions
Cs6703 grid and cloud computing unit 5 questions
 
GE6075 PROFESSIONAL ETHICS IN ENGINEERING Unit 1
GE6075 PROFESSIONAL ETHICS IN ENGINEERING Unit 1GE6075 PROFESSIONAL ETHICS IN ENGINEERING Unit 1
GE6075 PROFESSIONAL ETHICS IN ENGINEERING Unit 1
 
Cs6703 grid and cloud computing unit 5
Cs6703 grid and cloud computing unit 5Cs6703 grid and cloud computing unit 5
Cs6703 grid and cloud computing unit 5
 
Cs6703 grid and cloud computing unit 4 questions
Cs6703 grid and cloud computing  unit 4 questionsCs6703 grid and cloud computing  unit 4 questions
Cs6703 grid and cloud computing unit 4 questions
 
Cs6703 grid and cloud computing unit 4
Cs6703 grid and cloud computing unit 4Cs6703 grid and cloud computing unit 4
Cs6703 grid and cloud computing unit 4
 

It6601 mobile computing unit2

  • 1. 1 MOBILE COMPUTING Unit II Dr Gnanasekaran Thangavel
  • 2. 2 UNIT II MOBILE INTERNET PROTOCOL AND TRANSPORT LAYER Overview of Mobile IP – Features of Mobile IP – Key Mechanism in Mobile IP – route Optimization. Overview of TCP/IP – Architecture of TCP/IP- Adaptation of TCP Window – Improvement in TCP Performance.
  • 3. 3
  • 4. Mobile IP Mobile IP enables an IP node to retain the same IP address and maintain existing communications while traveling from one link to another. 4
  • 6. Mobile IP Components Mobile node (MN) Home agent (HA) Foreign agent (FA) Correspondent Node (CN) 6
  • 7. Mobile node (MN) The Mobile Node is a device such as -a cell phone, -personal digital assistant, -or laptop whose software enables network roaming capabilities. 7
  • 8. Home agent (HA) Home Agent is a router on the home network serving as the anchor point for communication with the Mobile Node; it tunnels packets from a device on the Internet, called a Correspondent Node, to the roaming Mobile Node. (A tunnel is established between the Home Agent and a reachable point for the Mobile Node in the foreign network.) 8
  • 9. Foreign agent (FA) The Foreign Agent is a router that may function as the point of attachment for the Mobile Node when it roams to a foreign network, delivering packets from the Home Agent to the Mobile Node. 9
  • 10. Correspondent Node (CN)  End host to which MN is corresponding (eg. a web server) 10
  • 11. How Mobile IP WorksThe Mobile IP process has three main phases the following sections.  Agent Discovery A Mobile Node discovers its Foreign and Home Agents during agent discovery.  Registration The Mobile Node registers its current location with the Foreign Agent and Home Agent during registration.  Tunneling A reciprocal tunnel is set up by the Home Agent to the care-of address (current location of the Mobile Node on the foreign network) to route packets to the Mobile Node as it roams. 11
  • 12. Two IP addresses for mobile node  Home address: static  Care-of address: topologically significant address The care-of address is the termination point of the tunnel toward the Mobile Node when it is on a foreign network. The Home Agent maintains an association between the home IP address of the Mobile Node and its care-of address, which is the current location of the Mobile Node on the foreign or visited network 12
  • 13. Features of Mobile IP  Transparency : IP address should not be any effect of mobility on any ongoing communication  Compatibility: It should compatible with existing Internet protocols.  Security: It should provide users with secure communication over internet.  Efficiency : It should neither result in large number of message nor should it incur too much computational overheads  Scalability: It should also be scalable to support billions of moving hosts worldwide. 13
  • 14. Key Mechanism in Mobile IP Three basic mechanisms 1. Discovering the care-of address 2. Registering the care-of address 3. Tunneling to the care-of address 14
  • 15. 15 1.Discovery the care-of-address Extension of ICMP Router Advertisement • Home agents and foreign agents broadcast agent advertisements at regular intervals Allows for the detection of mobility agents Lists one or more available care-of addresses Informs the mobile node about special features Mobile node selects its care-of address Mobile node checks whether the agent is a home agent or foreign agent – Mobile node issues an ICMP router solicitation message
  • 16. 16 Mobile IP Agent Advertisement Message
  • 17. 17 2. Registration Once a mobile node has a care-of address, its home agent must find out about it
  • 18. 18
  • 19. 19 3. Tunneling to the care-of address
  • 21. Tunneling takes place to forward an IP datagram from home agent to a care-of-address.  When a home agent receives a packet addressed to a mobile host , it forwards the packet to the care-of-address using IP-within-IP(encapsulation)  Using IP-within-IP, the home agent inserts a new IP header in front of the IP header of any datagram.  Destination address is set to the home agent’s address.  Source address is set to the home agents address.  After stripping out the first header, IP processes the packet again. 21
  • 22. 22 Two Tunneling Methods IP-within-IP Encapsulation Minimal Encapsulation
  • 23. Route Optimization  All the data packets to the mobile node go through the home agent.  There will be a heavy traffic between HA and CN causing latency to increase.  To overcome this problem the following route optimization needs • Enable direct notification of the corresponding host • Direct tunneling from the corresponding host to the mobile host. • Binding cache maintained at the corresponding host The association of the home address with care-of-address is called binding 23
  • 24. Overview of TCP/IP TCP/IP protocol suite is a collection of a large number of protocols. The four layer of protocols are • Application layer • Transport layer • Internet layer • Network layer • TCP/IP allows any of the standard protocols to be used for network interface 24
  • 25. 25
  • 26. Architecture of TCP/IP TCP/IP protocol consists of four layers. 1. Application layer, 2.Transport layer, 3.Internet layer and 4. Network access layer 26
  • 27. 1. Application layer:  Establish communication with other applications which may be running on separate hosts.  Example http,ftp and telnet. 2. Transport layer:  The purpose of Transport layer is to permit devices on the source and destination hosts to carry on a conversation. Provides reliable end-to-end data transfer services.  Also referred as host-to-host protocol.  The main protocols included at Transport layer are I. TCP (Transmission Control Protocol) and II. UDP (User Datagram Protocol). 3. Internet layer  Internet layer pack data into data packets known as IP datagrams,  which contain source and destination address (logical address or IP address) information that is used to forward the datagrams between hosts and across networks. 27
  • 28. 4. Network access layer  The Network Access Layer of the TCP/IP model is associated with the Physical Layer (Layer 1) and the Data Link layer (Layer 2) of the OSI model.  The Network Access Layer's function is to move bits (0s and 1s) over the network medium such as coaxial cable, optical fiber, or twisted pair copper wire.  The OSI Physical layer is responsible for converting the frame into a stream of bits suitable for the transmission medium and synchronizes signals for the actual transmission.  On the destination device, the Physical layer reassembles these signals into a data frame.  The OSI Data Link layer is again subdivided into the following two sub layers according to their function:  Media Access Control (MAC) Sublayer :— MAC sublayer provides an interface with the network adapter.  Logical Link Control (LLC) Sublayer :— LLC sublayer is responsible for error-checking functions for frames delivered also responsible for managing links between communicating devices. 28
  • 29. Comparison of TCP/IP and OSI network models 29
  • 30. Comparison of TCP/IP and OSI network models 30
  • 31. Adaptation of TCP Window  TCP deploys a flow control technique to control congestion in a network.  Traffic congestion occurs when the rate at which data is injected by a host into the network exceeds the rate at which data can be delivered to the network. I. Router buffer overflow. II. Receiver buffer overflow  A flow control technique by TCP helps adapt the rate at sending host end and to prevent overrun at the slow receiver.  The flow control mechanism by TCP called the sliding window protocol. 31
  • 32. Improvements of TCP Performance Traditional networks  Transport protocols typically designed for  Fixed end-systems  Fixed, wired networks  TCP congestion control  Packet loss in fixed networks typically due to (temporary) overload situations  Routers discard packets as soon as the buffers are full  TCP recognizes congestion only indirectly via missing acknowledgements  Retransmissions unwise, they would only contribute to the congestion and make it even worse  Slow-start algorithm as reaction 32
  • 34. TCP Slow Start  Sender calculates a congestion window for a receiver  Start with a congestion window size equal to one segment  Exponential increase of the congestion window up to the congestion threshold, then linear increase  Missing acknowledgement causes the reduction of the congestion threshold to one half of the current congestion window  Congestion window starts again with one segment 2/12/2016 34
  • 35. Congestion avoidance  It starts where slow start stops.  Once congestion window reaches the congestion threshold level, then after that if an acknowledgement is received the window size is increased linearly ic the window size doubling is avoided.  The TCP increases its rate linearly by adding one additional picket to its window at each transmission time. If congestion is detected at any point the TCP is reduces its transmission rate to half the previous value. Makes to right transmission rate.  The is scheme is less aggressive than slow start phase. 2/12/2016 35
  • 36. Fast Retransmit/ Fast Recovery  TCP sends an acknowledgement only after receiving a packet.  If a sender receives several acknowledgements for the same packet, this is due to a gap in received packets at the receiver.  However, the receiver got all packets up to the gap and is actually receiving packets  Therefore, packet loss is not due to congestion, continue with current congestion window (do not use slow-start) 2/12/2016 36
  • 37. TCP in mobile networks TCP assumes congestion if packets are dropped  typically wrong in wireless networks, here we often have packet loss due to transmission errors  furthermore, mobility itself can cause packet loss, if e.g. a mobile node roams from one access point (e.g. foreign agent in Mobile IP) to another while there are still packets in transit to the wrong access point and forwarding is not possible The performance of an unchanged TCP degrades severely  however, TCP cannot be changed fundamentally due to the large base of installation in the fixed network, TCP for mobility has to remain compatible  the basic TCP mechanisms keep the whole Internet together 2/12/2016 37
  • 38. Indirect TCP (I -TCP)  Indirect TCP or I-TCP segments the connection  no changes to the TCP protocol for hosts connected to the wired Internet, millions of computers use (variants of) this protocol  optimized TCP protocol for mobile hosts  splitting of the TCP connection at, e.g., the foreign agent into 2 TCP connections, no real end-to-end connection any longer  hosts in the fixed part of the net do not notice the characteristics of the wireless part mobile host access point (foreign agent) wired Internet “wireless” TCP standard TCP 2/12/2016 38
  • 39. I-TCP socket and state migration mobile host access point2 Internet access point1 socket migration and state transfer 2/12/2016 39
  • 40. Indirect TCP II  Advantages  no changes in the fixed network necessary, no changes for the hosts (TCP protocol) necessary, all current optimizations to TCP still work  transmission errors on the wireless link do not propagate into the fixed network  simple to control, mobile TCP is used only for one hop between, e.g., a foreign agent and mobile host  therefore, a very fast retransmission of packets is possible, the short delay on the mobile hop is known  Disadvantages  loss of end-to-end semantics, an acknowledgement to a sender does not any longer mean that a receiver really got a packet, foreign agents might crash  higher latency possible due to buffering of data within the foreign agent and forwarding to a new foreign agent 2/12/2016 40
  • 41. Snooping TCP (S-TCP)  Transparent extension of TCP within the foreign agent  buffering of packets sent to the mobile host  lost packets on the wireless link (both directions!) will be retransmitted immediately by the mobile host or foreign agent, respectively (so called “local” retransmission)  the foreign agent therefore “snoops” the packet flow and recognizes acknowledgements in both directions, it also filters ACKs  changes of TCP only within the foreign agent (+min. MH change) „wired“ Internet buffering of data end-to-end TCP connection local retransmission correspondent hostforeign agent mobile host snooping of ACKs 2/12/2016 41
  • 42. Snooping TCP II  Data transfer to the mobile host  FA buffers data until it receives ACK of the MH, FA detects packet loss via duplicated ACKs or time-out  fast retransmission possible, transparent for the fixed network  Data transfer from the mobile host  FA detects packet loss on the wireless link via sequence numbers, FA answers directly with a NACK to the MH  MH can now retransmit data with only a very short delay  Advantages:  Maintain end-to-end semantics  No change to correspondent node  No major state transfer during handover  Problems  Snooping TCP does not isolate the wireless link well  May need change to MH to handle NACKs  Snooping might be useless depending on encryption schemes 2/12/2016 42
  • 43. Mobile TCP(M-TCP)  Special handling of lengthy and/or frequent disconnections  M-TCP splits as I-TCP does  unmodified TCP fixed network to supervisory host (SH)  optimized TCP SH to MH  Supervisory host  no caching, no retransmission  monitors all packets, if disconnection detected  set sender window size to 0  sender automatically goes into persistent mode  old or new SH reopen the window  Advantages  maintains semantics, supports disconnection, no buffer forwarding  Disadvantages  loss on wireless link propagated into fixed network  adapted TCP on wireless link 2/12/2016 43
  • 45. Fast retransmit/fast recovery  Change of foreign agent often results in packet loss  TCP reacts with slow-start although there is no congestion  Forced fast retransmit  as soon as the mobile host has registered with a new foreign agent, the MH sends duplicated acknowledgements on purpose  this forces the fast retransmit mode at the communication partners  additionally, the TCP on the MH is forced to continue sending with the actual window size and not to go into slow-start after registration  Advantage  simple changes result in significant higher performance  Disadvantage  further mix of IP and TCP (to know when there is a new registration), no transparent approach 2/12/2016 45
  • 46. Freeze-TCP Mobile hosts can be disconnected for a longer time  no packet exchange possible, e.g., in a tunnel, disconnection due to overloaded cells or mux. with higher priority traffic  TCP disconnects after time-out completely TCP freezing  MAC layer is often able to detect interruption in advance  MAC can inform TCP layer of upcoming loss of connection  TCP stops sending, but does not assume a congested link  MAC layer signals again if reconnected Advantage  scheme is independent of data and TCP mechanisms (Ack,SN) => works even with IPsec Disadvantage  TCP on mobile host has to be changed, mechanism depends on MAC layer 2/12/2016 46
  • 47. Selective retransmission  TCP acknowledgements are often cumulative  ACK n acknowledges correct and in-sequence receipt of packets up to n  if single packets are missing quite often a whole packet sequence beginning at the gap has to be retransmitted (go-back-n), thus wasting bandwidth  Selective retransmission as one solution  RFC2018 allows for acknowledgements of single packets, not only acknowledgements of in- sequence packet streams without gaps  sender can now retransmit only the missing packets  Advantage: much higher efficiency  Disadvantage  more complex software in a receiver, more buffer needed at the receiver 2/12/2016 47
  • 48. Transaction oriented TCP TCP phases  connection setup, data transmission, connection release  using 3-way-handshake needs 3 packets for setup and release, respectively  thus, even short messages need a minimum of 7 packets! Transaction oriented TCP  RFC1644, T-TCP, describes a TCP version to avoid this overhead  connection setup, data transfer and connection release can be combined  thus, only 2 or 3 packets are needed Advantage  efficiency Disadvantage  requires changed TCP  mobility no longer transparent 2/12/2016 48
  • 49. 49
  • 50. References Book: Prasant Kumar Pattnaik, Rajib Mall, “Fundamentals of Mobile Computing”, PHI Learning Pvt. Ltd, New Delhi – 2012. http://www.omnisecu.com/tcpip/tcpip-model.php http://www.computernetworkhomeworkhelp.com/comparison-models/ http://www.tcpipguide.com/free/t_InternetProtocolMobilitySupportMobileIP.htm PPT: https://cs.uccs.edu/~chow/pub/master/ycai/mobile_computing_mtu.ppt http://www.slideshare.net/ayyakathir/it6601-mobile-computing-54556306 https:// cs.winona.edu/lin/cs313/CS313DataLink2.ppt 50