Professional Documents
Culture Documents
ATM Basics
favored by the telecommunication industry for advanced high-performance networks, e.g., B-ISDN, as
transport mechanism
statistical (asynchronous, on demand) TDM (ATDM, STDM)
cell header determines the connection the user data belongs to
mixing of different cell-rates is possible
o different bit-rates, constant or variable, feasible
interesting for data sources with varying bit-rate:
o e.g., guaranteed minimum bit-rate
o additionally bursty traffic if allowed by the network
Cell-based transmission
asynchronous, cell-based transmission as basis for ATM
continuous cell-stream
additional cells necessary for operation and maintenance (OAM) of the network
OAM cells can be inserted after fixed intervals to create a logical frame structure
if a station has no data to send it automatically inserts idle cells that can be discarded at every intermediate
system without further notice
if no synchronous frame is available for the transport of cells (e.g., SDH or Sonet) cell boundaries have to
be detected separately (e.g., via the checksum in the cell header)
ATM layers
Physical layer, consisting of two sub-layers
o physical medium dependent sub-layer
coding
bit timing
transmission
o transmission convergence sub-layer
HEC (Header Error Correction)
sequence generation and
verification
transmission frame adaptation,
generation, and recovery
cell delineation, cell rate
decoupling
ATM layer
o cell multiplexing/demultiplexing
o VPI/VCI translation
o cell header generation and verification
o GFC (Generic Flow Control)
ATM adaptation layer (AAL)
o Provides different service classes on top of ATM based on:
o bit rate:
constant bit rate: e.g. traditional telephone line
variable bit rate: e.g. data communication, compressed video
o time constraints between sender and receiver:
with time constraints: e.g. real-time applications, interactive voice and video
without time constraints: e.g. mail, file transfer
o mode of connection:
connection oriented or connectionless
AAL consists of two sub-layers:
o Convergence Sublayer (CS): service dependent adaptation
Common Part Convergence Sublayer (CPCS)
Service Specific Convergence Sublayer (SSCS)
o Segmentation and Reassembly Sublayer (SAR)
o sub-layers can be empty
WATM services
WATM systems had to be designed for transferring voice, classical data, video (from low quality to professional
quality), multimedia data, short messages etc.
Service scenarios
Office environments
o office can be virtually expanded to the actual location of an employee
Universities, schools, training centres
o distance learning, wireless and mobile access to databases, internet access, teaching
Industry
o Database connection, information retrieval, surveillance, but also real-time data transmission and
factory management
Hospitals
o transfer of medical images, remote access to patient records, remote monitoring of patients, remote
diagnosis of patients at home or in an ambulance, as well as tele-medicine
Home
Networked vehicles
o high-quality access to the internet, company databases, multimedia conferencing etc
Handover
Procedure to hand over connection(s) from a mobile ATM terminal from one access point to another access
point
Support of an handover domain
o several access points cover a certain area
o common handover protocol and strategy
o all access points and switches belong to one administrative domain
Requirements
o multiple connection handover
o point-to-point and point-to-multipoint
o QoS support
o data integrity and security
o signaling and routing support
o high performance and low complexity
Types of handover
Hard handover
o only one connection to one access point possible
Terminal initiated
o WTM initiates HO based on, e.g., signal quality
Network initiated
o Network initiates HO based on, e.g., network load
Network initiated, terminal assisted
o WTM provides information about radio conditions
Network controlled
o HO decision always at network
Backward handover
o standard type, WMT initiates HO, everything is prepared for HO before HO takes place
Forward handover
o WMT suddenly arrives at a new AP, connection loss possible
BW handover - Intra-EMAS-E/Intra-
BW handover - Intra-EMAS-E/Inter-AP
AP
Location Management
Requirements
o transparent for users
o privacy of location and user information
o cell and network identification
o minimum of additional signaling required
o access control, accounting
o roaming
o scalability
standardized method for registration (i.e, a new user joins the network)
mobile terminals get temporary, routable addresses
common protocol for database/registry updates
location management must cooperate with unchanged ATM routing
Addressing
should support all formats of ATM end-system addresses (AESA)
uses a permanent, location independent address which has to correspond with a routable address from the
home network
supports the assignment of temporary, routable addresses during registration of the mobile terminal in a
foreign domain
MOBILE IP
Topics
Motivation for Mobile IP
Mobile IP example network
IP packet delivery
Agent discovery
Registration
Tunneling and encapsulation
Optimization of packet forwarding
Reverse tunneling
Mobile IP and IPv6
Mobile node (MN), Correspondent node (CN), Foreign agent (FA), Care-of address (COA), Foreign agent
COA:, Co-located COA, Home agent (HA),
IP packet delivery
Packet delivery to and from the mobile node
Use the previous picture
Network integration
Agent Advertisement
o HA and FA periodically send advertisement messages into their physical subnets
o MN listens to these messages and detects, if it is in the home or a foreign network
o MN reads a COA from the FA advertisement messages
Registration (always limited lifetime!)
o MN signals COA to the HA via the FA, HA acknowledges via FA to MN
o these actions have to be secured by authentication
Advertisement
o HA advertises the IP address of the MN (as for fixed systems), i.e. standard routing information
o routers adjust their entries, these are stable for a longer time (HA responsible for a MN over a longer
period of time)
o packets to the MN are sent to the HA,
o independent of changes in COA/FA
Agent discovery
to find a foreign agent, how MN discover that it has moved
o two methods: agent advertisement, agent solicitation
router discovery methods plus extensions
Agent advertisement
agent advertisement messages, beacon broadcast into the subnet, Internet control message protocol (ICMP)
messages with some mobility extensions, R : Registration, B: Busy, H : Home Agent, F : FA, M &G : Method of
encapsulation, M : Minimal, G : Generic, T: reverse tunneling
Agent solicitation
If no agent advertisements are present or the inter-arrival time is too high, and an MN has not received a COA
by other means then the mobile node must send agent solicitations
Registration
mobility binding containing the mobile nodes home IP address and the current COA, UDP packets are used for
registration requests. registration reply, which is conveyed in a UDP packet, contains a type field set to 3 and a
code indicating the result of the registration request
Encapsulation
IP-in-IP encapsulation
IP encapsulation
Reverse tunneling
Router accept often only topological correct addresses (firewall!)
o a packet from the MN encapsulated by the FA is now topological correct
o furthermore multicast and TTL problems solved (TTL in the home network correct, but MN is to far
away from the receiver)
Reverse tunneling does not solve
o problems with firewalls, the reverse tunnel can be abused to circumvent security mechanisms (tunnel
hijacking)
o optimization of data paths, i.e. packets will be forwarded through the tunnel via the HA to a sender
(double triangular routing)
The new standard is backwards compatible
o the extensions can be implemented easily and cooperate with current implementations without these
extensions
DHCP
Application / Uses
o simplification of installation and maintenance of networked computers
o supplies systems with all necessary information, such as IP address, DNS server address, domain
name, subnet mask, default router etc.
o enables automatic integration of systems into an Intranet or the Internet, can be used to acquire a COA
for Mobile IP
Client/Server-Model
o the client sends via a MAC broadcast a request to the DHCP server (might be via a DHCP relay)
A DHCP relay might be needed to forward requests across inter-working units to a DHCP server
DHCP Characteristics
Server
o several servers can be configured for DHCP, coordination not yet standardized
Renewal of configurations
o IP addresses have to be requested periodically, simplified protocol
Options
o available for routers, subnet mask, NTP (network time protocol) timeserver, SLP (service location
protocol) directory, DNS (domain name system)
Big security problems!
o no authentication of DHCP information specified
Uses
Instant infrastructure
o Unplanned meetings
o spontaneous interpersonal Communications
Disaster relief
o Infrastructures typically break down in disaster areas.
o Emergency teams can only rely on an infrastructure they can set up themselves.
o No forward planning can be done, and the set-up must be extremely fast and reliable
o military activities
Remote areas
o Sometimes too expensive to set up an infrastructure in sparsely populated areas
Effectiveness
o Services provided by existing infrastructures might be too expensive for certain applications
o only connection oriented cellular networks exist, but an application sends only a small status
information every other minute
o a cheaper ad-hoc packet-oriented network might be a better solution
MANET
working group at the IETF that is focusing on mobile ad-hoc networking
responsible for developing protocols and components to enable ad-hoc networking between mobile devices
MANETs and mobile IP
Routing
no default router available
each node must be able to forward data for other nodes
Example ad-hoc network
Links do not necessarily have the same characteristics in both directions due to
o different antenna characteristics
o transmit power.
Fundamental differences between wired networks and ad-hoc wireless networks related to routing
Asymmetric links
o Routing information collected for one direction is of almost no use for the other direction.
o However, many routing algorithms for wired networks rely on a symmetric scenario
Redundant links
o nobody controls redundancy
o high redundancy can cause a large computational overhead for routing table updates
Interference
o one transmission might interfere with another
o nodes might overhear the transmissions of other nodes
o might also help routing
Dynamic topology
o mobile nodes might move or medium characteristics might change
o snapshots are valid only for a very short period of time
Concerns specific to ad-hoc routing
Traditional routing algorithms known from wired networks will not work Efficiently or fail completely
cannot rely on layer three knowledge alone
Centralized approaches will not really work due to dynamic topology
Many nodes need routing capabilities
The notion of a connection with certain characteristics cannot work properly
Flooding approach is very inefficient with high load
Route Discovery
A node only tries to discover a route to a destination if it has to send something to this destination and there
is currently no known route.
Method
broadcast a packet with destination address and unique ID
if a station receives a broadcast packet
o if the station is the receiver (i.e., has the correct destination address) then return the packet to the
sender (path was collected in the packet)
o if the packet has already been received earlier (identified via ID) then discard the packet
o otherwise, append own address and broadcast packet
sender receives packet with the current path (address list)
Optimizations
Each route request could contain a counter to avoid too many broadcasts
A node can cache path fragments from recent requests
A node can also update this cache from packet headers while forwarding other packets.
If a node overhears transmissions from other nodes, it can also use this information for shortening routes
Route Maintenance
If a node is continuously sending packets via a route, it has to make sure that the route is held upright.
As soon as a node detects problems with the current route, it has to find an alternative
Depending on layer two mechanisms, different approaches can be taken
If the link layer uses an acknowledgement the node can interpret this acknowledgement as an intact route.
If possible, the node could also listen to the next node forwarding the packet, so getting a passive
acknowledgement.
A node could request an explicit acknowledgement
Alternative Metrics
Least Interference Routing (LIR)
takes possible interference into account
To calculate the possible interference of a path each node calculates its possible interference
interference is defined as the number of neighbors that can overhear a transmission
Every node only needs local information to compute its interference
Routing can take several metrics into account at the same time and weigh them.
Metrics could be
o the number of hops h,
o interference i,
o reliability r,
o error rate e etc.
Flat Routing
All nodes in this approach play an equal role in routing.
The addressing scheme is flat
Two subcategories:
o Proactive protocols
o Reactive protocols.
Proactive Protocols
set up tables required for routing regardless of any traffic that would require routing functionality
based on a link-state algorithm
o Fisheye State Routing (FSR)
o Fuzzy Sighted Link-State (FSLS)
Other link-state protocols that try to reduce the traffic caused by link-state information dissemination are
o Topology Broadcast based on Reverse Path Forwarding (TBRPF)
o Optimized Link State Routing (OLSR)
Advantages
o can give QoS guarantees related to connection set-up, latency or other realtime requirements
o routing tables with a certain precision.
o Known propagation characteristics (delay, bandwidth etc.)
Disadvantage
o overheads in lightly loaded networks
o the algorithm continuously updates the routing tables
o This generates a lot of unnecessary traffic and drains the batteries of mobile devices.
Reactive Protocols
setting up a path between sender and receiver only if a communication is waiting.
dynamic source routing (DSR)
ad-hoc on-demand distance vector (AODV)
o on-demand version of DSDV
Advantage
o Scalability, longer low-power periods
Disadvantages
o initial search latency may degrade the performance
o quality of a path is not known a priori
Geographic-position-assisted routing
If mobile nodes know their geographical position this can be used for routing purposes
improves the overall performance of routing algorithms
acquire position information is via the global positioning system (GPS)
GeoCast
o allows messages to be sent to all nodes in a specific region.
Location Aided Routing protocol (LAR)
o similar to DSR, but limits route discovery to certain geographical regions
Greedy Perimeter Stateless Routing (GPSR)
o uses only the location information of
o Packets are always forwarded to the neighbor that is geographically closest to the destination
o Additional mechanisms are applied if a dead end is reached
Comments & Feedback
Thanks to my family members who supported me while I spent hours and hours to prepare this.
Your feedback is welcome at GHCRajan@gmail.com