Network layer
Network Layer
o transport segment from o
Part I
o
Computer Networks
o o
application transport network data link physical p y
sending to receiving host on sending d side d encapsulates segments into datagrams g m on receiving side, delivers segments to t transport t layer l network layer protocols in every host, router Router examines header fields in all IP datagrams passing i th through h it
network data link physical
o forwarding: move packets from router router’ss analogy: input link interface to o routing: process of appropriate pp p router planning l i trip t i from f output link interface source to destination o routing: determine o forwarding: process route (end-to-end of getting through path) taken by single i l interchange i h packets from source to destination o Routing Algorithms
Network Layer
network data link physical
network data link physical network data link physical
network network data link data link physical physical network data link physical
network data link physical
Network Layer
Two K Key y Network-Layer L y Functions F
network data link physical
network data link physical
network data link physical
application transport network data link physical
Network Layer
Interplay between routing and forwarding routing algorithm
local forwarding table header value output link 0100 0101 0111 1001
3 2 2 1
value in arriving packet’s header 0111
1 3 2
Network Layer
Connection setup
Network Service Models
o 3rd important function in some network architectures: o Asynchronous Transfer Mode (ATM), Frame Relay, X.25 o Backbone B kb networks t k in i Internet I t t are Switched S it h d WAN o Switched WAN : wide area network that cover large area and provide access at several point to users o before datagrams flow, two end hosts and intervening routers establish virtual connection o routers get involved
o defining characteristics of end-to-end
transport of packets between sending and receiving end systems o Some possible services for individual datagrams (packets) : o o
DTE : Data Terminating Equipment DCE : Data Circuit Equipment
UNI : User-to-Network Interface NNI : Network-to-Network Interface
Guaranteed delivery : packet will eventually arrive at destination Guaranteed delivery with bounded delay : not only guarantees t d delivery li of f pkt, kt b butt d delivery li within ithi specified host-to-host delay bound (ex. within 100 msec.))
Network Layer
Network Service Models (cont.s) ( )
Network Layer
Network layer y service models: m
o Some possible services for flow of
datagrams g (packets) (p ): o
In-order packet delivery : o packets arrive at destination in the order that they were sent
o
Guaranteed minimal bandwidth : o Emulating g behavior of transmission link of a specified p bit rate between sending and receiving hosts o As long as sending host transmits bits at a rate below specified p bit rate, then no p packet is lost and each packet arrives with in a prespecified host-to-host delay
o
Guaranteed maximum jitter o Amount of time between transmission of two successive pkts at sender is equal to amount of time between their receipt at destination Network Layer
Network Architecture Internet
Service Model
Guarantees ?
Congestion Bandwidth Loss Order Timing feedback
best effort none
no
no
no
yes
yes
yes
yes
no
ATM
CBR
constant Rate
ATM
ABR
guaranteed no minimum
no (inferred via loss) no Congestion g will Not occur Yes (congestion indication provided)
Network Layer
Network layer connection and connection-less ti l ss service s i
Virtual Circuits (VC) “source-to-destination path behaves much like telephone circuit”
o Network layer y Connection service o Virtual Circuit
o Connection setup o Forwarding o Routing
o o
o Network layer y Connection-less service o Datagram network o Forwarding o Routing
o Analogous to the transport-layer services, but: o service: host-to-host o no choice: h i network k provides id one or the h other h o implementation: in network core
Network Layer
VC implementation
performance-wise network actions along source source-to-destination to destination path
o call setup, teardown for each call before data can flow o each packet carries VC identifier (VCI) (not destination host address) o every router on source-destination path maintains “state” for each passing connection o link, router resources (bandwidth, buffers) may be allocated to VC (dedicated resources = predictable service) Network Layer
Forwarding table
VC number 22
12
1
o
a VC consists of: o Path from source to destination (Virtual Path: VP) o VC numbers, one number for each link along path o entries in forwarding tables in routers along path o packet belonging to VC carries VC number (rather than destination address) o VC number can be changed on each link. o New VC number comes from forwarding table Note that a virtual connection is defined by a pair of Network Layer numbers: VPI and VCI.
Forwarding table in n th st router: northwest t : Incoming interface 1 2 3 1 …
2
32
3
interface number
Incoming VC # 12 63 7 97 …
Outgoing interface 3 1 2 3 …
Outgoing VC # 22 18 17 87 …
R Routers maintain i i connection i state information! i f i ! Network Layer
Virtual circuits: signaling g g protocols p o used to setup, maintain teardown VC o used in ATM, Frame-Relay, X.25
o no call setup at network layer o routers: no state about end-to-end connections o no network-level concept of “connection”
o packets forwarded using destination host address
o not used in today’s Internet
application l transport 5. Data flow begins network 4. Call connected 1 Initiate call data link 1. physical
Datagram networks
o packets between same source-dest pair may take different paths 6. Receive data application 3. Accept call transport 2 incoming call network 2.
data link physical
application transport network data link 1. Send data physical
application transport p 2. Receive data network data link physical
Network Layer
Forwarding Forward ng table
4 billion possible entries
Network Layer
Longest prefix pref x matching match ng
Examples DA: 11001000 00010111 00010110 10100001
Which interface?
DA: 11001000 00010111 00011000 10101010
Which interface?
Router users the longest prefix matching rule Network Layer
Network Layer
What is inside the router? : Router Architecture Overview
Input nput Port ort Funct Functions ons
o Two key router functions: o run routing g algorithms/protocol g p o o o
o
Route Information Protocol (RIP), Open Shortest Path First (OSPF), Border Gateway Protocol (BGP))
forwarding datagrams from incoming to outgoing link
Physical layer: bit-level reception Data D t link li k llayer: e.g., Ethernet
Connecting router’s input ports to its output ports - Executing routing protocol - Maintaining routing information and forwarding tables -Performing network management functions Network Layer
Three types of switching fabrics
Network Layer
Switching Via Memory First generation routers: o traditional computers with switching under direct control of f CPU ((routing gp processor)) o input and output ports functioned as traditional I/O devices in OS o Packet is copied from input port into system’s memory o Then routing processor extracts destination address from header, header look up output port in forwarding table, and copy packet to output port’s buffer o speed limited by memory bandwidth o o
If memory bandwidth is B packets per second can be written into, or read from memory Overall forwarding throughput must be less than B/2
Input Port
Network Layer
o Decentralized switching: o given datagram dest., lookup output port using forwarding table in input port y memory o goal: complete input port processing at ‘line speed’ o q queuing: g if datagrams g arrive faster than forwarding rate into switch fabric
Memory y
Output Port
Ex. Cisco’s Catalyst y 8500 series switches
System Bus
Network Layer
Switching Via a Bus
Switching g Via An Interconnection Network
o Input ports transfer packet directly
o To overcome bandwidth limitation of
to output p port p over shared bus o Only one packet at a time can be transferred over bus
shared bus is to use more sophisticated interconnection network
Packet P k t is i queued d att input i t portt if bus b is i busy
o
o Crossbar switch is interconnection network consisting
o bus contention: switching g speed p
2n buses (n input ports and n output ports) o Cisco 12000 family switches use an interconnection network, providing up to 60 Gbps through switching fabric
limited by bus bandwidth o Cisco 5600 : switches packets over 32 Gbps bus
Network Layer
Output p Ports
o
Network Layer
Output p port p queueing q g
Buffering required when datagrams arrive from fabric
faster than the transmission rate o Scheduling discipline chooses among queued datagrams for transmission o o
First-Come-First-Served (FCFS) scheduling Weighted Fair Queuing (WFQ) : shares outgoing link fairly among g different ff end-to-end connections that have p packets queued for transmission Network Layer
o buffering when arrival rate via switch exceeds
output line speed
o
queueing (delay) and loss due to output port buffer overflow! Network Layer
Input Port Queuing
The Internet Network layer y
o Fabric slower than input ports combined -> queueing
may occur at input queues o Head-of-the-Line (HOL) blocking: queued datagram at front of queue prevents others in queue from moving forward
Host, router network layer functions: Transport layer: TCP, UDP
Network layer
IP p protocol •addressing conventions •datagram format •packet handling conventions
Routing protocols •path selection •RIP, OSPF, BGP
forwarding f di table
ICMP protocol •error reporting •router “signaling”
Link layer physical layer
Network Layer
IP datagram format IP protocol version number header length in 32 bits octets (bytes) Min value is 5 Min. “type” of data max number rema n ng hops remaining (decremented at each router) upper layer protocol to deliver payload to (TCP=6, UDP=17) o
o o o
how much overhead with TCP? 20 bytes of TCP 20 bytes of IP = 40 bytes + app layer overhead
4 bits
4 bits
32 bits
8 bits
16 bits type of ver head. len service Datagram length 3 bits fragment 16-bit identifier flgs 13 bits offset time to upper 16 bits header 8 bits 8 bits layer live checksum
MTU = Maximum Transmission Units
total datagram length (bytes) for fragmentation/ reassembly
32 bit source IP address 32 bit destination IP address Options (if any)
data (variable length, length typically a TCP or UDP segment)
Network Layer
E.g. timestamp, record route taken, specify l list of f routers to visit.
Network Layer
IP F Fragmentation gm & Reassembly m y o network links have MTU ((max.transfer size)) largest possible link-level frame. o different link types, different MTUs o large IP datagram divided ((“fragmented”) fragmented ) within net o one datagram becomes several datagrams o “reassembled” “ bl d” only l att final destination o IP header bits used to identify, order related fragments
fragmentation: in: one large datagram out: 3 smaller datagrams
reassembly
IP datagram Header
MTU
Token Ring (16 Mbps) – 17,914 bytes T k n Ring Token Rin (4 Mbps) - 4,464 4 464 bytes b t s Ethernet - 1,500 bytes Point-to-Point Protocol (PPP)–296 bytes Network Layer
Trailer
IP F Fragmentation gm and Reassembly m y Example o 4000 byte d datagram o MTU = 1500 bytes
o Communication at network layer is host-to-host
length ID fragflag offset =4000 =x =0 =0
o Computer mp somewhere m in the world need to
One large datagram becomes several smaller datagrams
1480 bytes in data field offset = 1480/8
Network Layer : Logical Addressing
length ID fragflag offset =1500 =x =1 =0 length ID fragflag offset =1500 =x =1 =185 length ID fragflag offset =1040 =x =0 =370
communicate with another computer somewhere else in the world through Internet o Packet P k transmitted i db by sending di computer may pass through several LANs or WANs before reaching destination computer o We need a global addressing scheme called logical
addressing
IP address to mean a logical address in network layer of TCP/IP protocol suite
o Today, we use the term
Network Layer
IP Addresses
Network Layer
IPv4 Addressing: g introduction
o The Internet address are 32 bits in length g o Address space is 232 or 4,294,967,296
o These addresses are referred to as IPv4 (IP version 4) addresses or simply IP address
o The need for more addresses motivated a new d design of f the h IP P layer l called ll d new generation of f IP P or IPv6 (IP version 6) o The Internet u uses 128-bit addresses that g give much mu greater flexibility in address location o These addresses are referred to as IPv6 (IP version 6) address Network Layer
o IPv4 address: 32-bit identifier for host, host router interface o interface: connection between host/router and physical link
223.1.1.1 gateway
223.1.1.2 223.1.1.4 223.1.1.3
223 1 2 1 223.1.2.1
223.1.2.9
223.1.3.27
223 1 2 2 223.1.2.2
o router’s router s typically have 223.1.3.2 223.1.3.1 multiple interfaces o host typically has one interface o IP addresses associated with each 223.1.1.1 = 11011111 00000001 00000001 00000001 interface 223
1
1
Network Layer
1
IP Addresses
“class“class -full” addressing:
given i notion ti of f ““network”, t k” let’s l t’ re-examine i IP addresses: dd
Classes of f IP Address
class A
0 network
B
10
C
110
D
1110
1.0.0.0 to 127 255 255 255 127.255.255.255
host
network
128.0.0.0 to 191.255.255.255
host
network t k multicast address
32 bits
h t host
192.0.0.0 to 223.255.255.255
Class
224.0.0.0 to 239.255.255.255
A
B
C Network Layer
Address for Private Networks
Network Octets (blanks in the IP dd are address used for octets identifying hosts) 0.__.__.__ to 127.__.__.__
Total Number of Possible Networks or Licenses 128
128.0. 8.0.__.__ . to 191.255.__.__
64x256 6 x 56
192.0.0.__ 192 0 0 to 223.255.255.__
32x256x256
16,384
2,097,152
Host Octets (blanks in IP address dd are used for octets identifying networks) __.0.0.1 to __.255.255.254
Total Number of Possible IP Add Addresses iin Each Networks
__.__.0. . .0.1 to __.__.255.254
65,534 65,53
__.__.__.1 1 to __.__.__.254
254
16,777,214
Network Layer
Subnets o IP address: o subnet part (high order bits) o host part (low order bits)
o What’s a subnet ?
o device interfaces with same subnet part of IP address o can physically reach each other without intervening router
223.1.1.1 223.1.1.2 223.1.1.4 223.1.1.3
223 1 2 1 223.1.2.1 223.1.2.9
223.1.3.27
223 1 2 2 223.1.2.2
subnet 223.1.3.2
223.1.3.1
network consisting of 3 subnets Class C
Network Layer
Network Layer
Subnets
223.1.1.0/24
223.1.2.0/24
Subnets
223.1.1.2
How many?
o Recipe
223.1.1.1
o To determine the
223.1.1.4 223.1.1.3
subnets, detach each interface from its host or router, creating islands of i l isolated d networks. k Each isolated network is called a subnet.
223.1.9.2
223.1.9.1 223.1.8.1 223.1.3.0/24
Subnet mask: /24
2 223.1.7.0 X
2 223.1.8.0 X
223 1 2 6 223.1.2.6 223.1.2.1
223 1 3 27 223.1.3.27 223.1.2.2
223.1.3.1
Network Layer
IP addressing: g CIDR
Internet’s address assignment strategy
CIDR: Classless InterDomain Routing o o
(RFC 4632)
(pronounced cider)
Subnet portion of address of arbitrary length Address format: a.b.c.d/x, where x is # bits in subnet portion of address
Subnet addressing
subnet b t part
host part
11001000 00010111 00010000 00000000 200.23.16.0/23
Organization is typically assigned a block of contiguous address ISP'ss block ISP
11001000 00010111 00010000 00000000
200 23 16 0/20 200.23.16.0/20
Organization 0 Organization 1 Organization 2 ...
11001000 00010111 00010000 00000000 11001000 00010111 00010010 00000000 11001000 00010111 00010100 00000000 ….. ….
200.23.16.0/23 200.23.18.0/23 200.23.20.0/23 ….
Organization 7
11001000 00010111 00011110 00000000
Network Layer 200.23.30.0/23
223.1.7.1
223.1.3.2
Network Layer
IP addresses: how to g get one? o Q: How does host get IP address? o hard-coded by system admin in a file o Windows: Wi d s: o control-panel->network connections->properties o ->Internet >Internet Protocol (TCP/IP) o UNIX: /etc/rc.config o DHCP: Dynamic y Host Configuration g Protocol: dynamically get address from as server o “plug-and-play” o allow ll host h to dynamically d ll obtain b its IP P address dd f from network server when it joins network Network Layer
DHCP client-server scenario A 223.1.1.1
B
223.1.1.2 223.1.1.4 223.1.1.3 223.1.3.1
223.1.2.1
DHCP server 223.1.2.9
223.1.3.27
223.1.2.2 223.1.3.2
E
arriving g DHCP client needs address in this network
Network Layer
DHCP client-server scenario DHCP server: 223.1.2.5
DHCP discover src : 0.0.0.0, 68 dest.: 255.255.255.255,67 yiaddr: 0.0.0.0 0000 transaction ID: 654
arriving client
DHCP offer src: 223.1.2.5, 67 d t 255.255.255.255, dest: 255 255 255 255 68 yiaddrr: 223.1.2.4 transaction ID: 654 Lifetime: 3600 secs DHCP request
time
src: 0.0.0.0, 68 dest:: 255.255.255.255, 67 yiaddrr: 223.1.2.4 transaction ID: 655 Lifetime: 3600 secs DHCP ACK src: 223.1.2.5, 67 dest: 255.255.255.255, 68 yiaddrr: 223.1.2.4 t transaction ti ID: ID 655 Lifetime: 3600 secs
Network Layer
Network Layer
IP addresses: how to g get one? Q: How does network get subnet part of IP addr? dd ? A: gets allocated portion of its provider ISP’s address space ISP's block
11001000 00010111 00010000 00000000
200.23.16.0/20
Organization 0 Organization 1 Organization g 2 ...
11001000 00010111 00010000 00000000 11001000 00010111 00010010 00000000 11001000 00010111 00010100 00000000 ….. ….
200.23.16.0/23 200.23.18.0/23 200.23.20.0/23 ….
Organization 7
11001000 00010111 00011110 00000000
200.23.30.0/23
Network Layer
Hierarchical addressing: g route aggregation gg g Hierarchical addressing allows efficient advertisement of routing information: Fly-By-Night-ISP Fl B Ni ht ISP advertises d ti tto outside t id world ld th thatt it should Be sent any datagrams whose first 20 address bits match 200.23.16.0/20
Organization 0
Hierarchical addressing: more specific routes t s ISPs-R-Us ISPs R Us has a more specific route to Organization 1 Organization 0
200.23.16.0/23
200 23 16 0/23 200.23.16.0/23 Organization 1
200.23.18.0/23
Organization 2
200.23.20.0/23
Organization 7
. . .
. . .
Fly-By-Night-ISP
“Send me anything with addresses beginning 200.23.16.0/20”
Organization 2
200 23 20 0/23 200.23.20.0/23
Internet
Organization 7
. . .
Fly-By-Night-ISP Fly By Night ISP
Internet
200.23.30.0/23
200.23.30.0/23 /
ISPs-R-Us
“Send me anything with addresses beginning 1 199.31.0.0/16” 1 0 0/16”
ISPs-R-Us
. . .
“Send me anything with addresses beginning 200.23.16.0/20”
Organization 1
200.23.18.0/23
“Send me anything with addresses beginning 199.31.0.0/16 or 200.23.18.0/23”
Network Layer
Network Layer
NAT: Network Address Translation
NAT: Network Address Translation
rest of Internet
local network (e.g., g home network) 10.0.0.0/24 10.0.0.4
10 0 0 1 10.0.0.1 10.0.0.2
138.76.29.7 10.0.0.3
All datagrams leaving local network have same single source NAT IP address: 138.76.29.7, 138 76 29 7 different source port numbers
Datagrams with source or destination in this network have 10.0.0.0/24 10 0 0 0/24 address for source, destination (as usual)
Network Layer
o Motivation: local network uses jjust one IP address as far as outside world is concerned: o range of f addresses dd nott needed d df from ISP ISP: just j t one IP address for all devices o can change addresses of devices in local network without notifying outside world o can change ISP without changing addresses of d i devices iin llocall network t k o devices inside local net not explicitly addressable, visible by outside world (a security plus). plus) Network Layer
NAT: Network Address Translation
NAT: Network Address Translation
Implementation: NAT router must: o
o
o
outgoing datagrams: replace (source IP address, port
#) of every outgoing datagram to (NAT IP address, new port #) o . . . remote clients/servers li / will ill respond d using i (NAT IP address, new port #) as destination address.
remember b (in (i NAT ttranslation l ti ttable) bl ) every (source (
IP address, port #) to (NAT IP address, new port #) translation pair
incoming datagrams: replace (NAT IP address, new port #) in dest fields of every incoming datagram with corresponding (source IP address, address port #) stored in NAT table
Network Layer
2: NAT router changes datagram source addr from 10.0.0.1, 3345 to 138 76 29 7 5001, 138.76.29.7, 5001 updates table 2
NAT translation table WAN side addr LAN side addr
1: host 10.0.0.1 s nds d sends datagram t m tto 128.119.40.186, 80
138.76.29.7, 5001 10.0.0.1, 3345 …… ……
S: 10.0.0.1, 3345 D: 128.119.40.186, 80
S: 138.76.29.7, 5001 D: 128.119.40.186, 80
138.76.29.7 S: 128.119.40.186, 128 119 40 186 80 D: 138.76.29.7, 5001
3: Reply arrives dest. address: 138 76 29 7 5001 138.76.29.7,
3
1
10.0.0.1
10 0 0 4 10.0.0.4 S: 128.119.40.186, 80 D: 10.0.0.1, 3345
10.0.0.2
4
10.0.0.3 4: NAT router changes datagram dest addr from 138.76.29.7, 5001 to 10.0.0.1, 3345 Network Layer
Address Mapping
N t Network k L Layer Part II Computer Networks
o The delivery of a packet to a host or a router
requires two levels of addressing: logical address and physical address o We need to be able to map a logical address to its corresponding physical address and vice versa. o Mapping Logical Address to Physical Address can be done by y Address Resolution Protocol (ARP) : RFC 826 Logical address
Physical address
Network Layer
Address Resolution Protocol (ARP)
Network Layer
ARP Packet Type of network - Ethernet = 1
IPv4 = 080016
Length g of physical p y address in bytes - For ethernet value is 6 Length of logical address in bytes - For IPv4 protocol value is 4 This field is all 0s because Sender does not know Physical address of target
ARP Operation
Network Layer
Network Layer
Example
Network Layer
Internet Control Message Protocol (ICMP) o IP provides unreliable and connectionless datagram delivery y o IP protocol is a best-effort delivery service that delivers datagram from original source to final destination o Two deficiencies o Lack of error control o No error error-reporting reporting or error error-correcting correcting mechanism o Lack of assistance mechanism for host and management queries o Host sometimes needs d to d determine if f router or another host is alive o Sometimes a network administrator needs information from another host or router Network Layer
Network Layer
ICMP : Type of Messages o RFC 792 o ICMP message are divided into two broad categories o Error-reporting p g message g o Report problems that a router or host (destination) may encounter when it processes an IP packet k o Query message o Help H l h hostt or network t k manager gett specific ifi information from router or another host o Ex. Nodes can discover their neighbors o Hosts can discover and learn about routers on their network Network Layer
ICMP : Error Reporting
ICMP : Message Format o ICMP message has 8-byte header and variable-size
data section
o ICMP always reports error messages to original
source.
First 4 bytes are common to all
specific for each h message type t
o In error messages carries information for finding original packet that had error o In query messages data section carries extra information based on type of query Network Layer
Redirection Concept
Type 3 3 3 3 3 3 4 11 12
Code 0 1 2 3 6 7 0 0 0
description dest. network unreachable dest host unreachable d t protocol dest t l unreachable h bl dest port unreachable dest network unknown dest host unknown source quench (congestion control - not used) TTL expired Network Layer bad IP header
ICMP : Error Reporting (continued) o All error messages contain data section that includes o IP header of the original datagram plus o the first 8 bytes of data in that datagram Segment g
o Host A wants to send a datagram to host B o Router R2 is obviously most efficient routing choice, choice but host A o o o o
did not choose router R2 Datagram goes to R1 instead Router R1, after consulting its table, finds that packet should have gone to R2 R1 sends p packet to R2 and,at , the same time,, sends a redirection message to host A Host A’s routing table can now be updated Network Layer
Protocol (upper layer) : ICMP = 1
Port No. (UDP, TCP) (16 + 16 bits) Sequence No (TCP) (32 bits)
o network-layer t k l “above” “ b ” IP IP: o ICMP messages carried in IP datagramsNetwork Layer
ICMP : Error Reporting (continued)
ICMP : Error Reporting (continued)
o Destination Unreachable Message
o Source Quench Message o gateway have no buffer space to queue datagram o datagrams arrive too fast to be processed. processed o source quench message is request to host to cut back rate at which it is sending traffic to destination until it no longer receives source quench messages from the gateway
o o
Type yp = 3 Code o 0 = network unreachable; o 1 = host unreachable; o 2 = protocol unreachable; o 3 = port unreachable; o 4 = fragmentation g needed;; o 5 = source route failed.
Internet Header + 64 bits of Data Datagram
Network Layer
Network Layer
ICMP : Error Reporting (continued)
ICMP : Error Reporting (continued)
o Time Exceeded Message (TTL expired)
o Parameter Problem Message
Type = 12 Internet Header + 64 bits of Data Datagram o Code o 0 = Pointer indicates error o
Internet Header + 64 bits of Data Datagram o o
o o
Type = 11 Code o 0 = time to live exceeded in transit; o 1 = fragment reassembly time exceeded;
Pointer identifies octet of original datagram’s header where error was detected d t t d o For example, o 1 indicates something is wrong with Type of Service o 20 indicates i di t something thi is i wrong with ith type t code d of f first fi t option ti o
Code 0 may y be received from a gateway. g y Code 1 may be received from a host. Network Layer
Network Layer
ICMP : Error Reporting (continued) o Redirect Message
address of gateway to which traffic for network specified in destination network field of original datagram’s data should be sent
ICMP : Query Type 0 8 9 10
Code 0 0 0 0
description echo reply (ping) q (p (ping) g) echo request route advertisement router discovery
o Query message is encapsulated in IP packet, which in Internet Header + 64 bits of Data Datagram
Type yp = 5 o Code o 0 = Redirect datagrams for Network o 1 = Redirect datagrams g for Host o 2 = Redirect datagrams for Type of Service and Network o 3 = Redirect datagrams for Type of Service and Host o
turn is encapsulated in data link layer frame o In this case, case no bytes of original IP are included in message
Network Layer
Echo-request q and echo-reply p y messages g
Network Layer
Route discovery and Route Advertisement o Route discovery
o Route advertisement
Ranking 0 – default 8000000016
Network Layer
Network Layer
Ping o Ping program is used to find whether a host 56+8 bytes of ICMP header + 20 bytes of IP header
56+8 bytes of ICMP hea ader
is alive or not
Network Layer
“Real” Internet delays y and routes o What do “real” Internet delay y & loss look like? o Traceroute program (tracert for windows) : provides delay measurement from source to router along end end-end end Internet path towards destination. For all i: o sends three packets that will reach router i on path towardss destination towar st nat on o router i will return packets to sender o sender times interval between transmission and reply. 3 probes
3 probes 3 probes TTL=1
TTL=2
TTL=3
TTL 4 TTL=4
TTL=5 Network Layer
Traceroute o Source sends series of UDP segments to dest o First has TTL =1 o Second has TTL=2, etc. o Unlikely port number o When nth datagram arrives to nth router: o Router discards datagram o And sends to source an ICMP message (type 11, code 0) : TTL expired o Message includes name of router& IP address
o When ICMP message
o o o o
o
arrives, source calculates RTT Traceroute does d this h 3 times Stopping criterion UDP segment eventually arrives at destination host Destination returns ICMP “host unreachable” packet ((type yp 3, code 3 : Destination Port Unreachable) When source gets this ICMP, stops. Network Layer
“Real” Internet delays y and routes traceroute: gaia.cs.umass.edu to www.eurecom.fr Three delay measurements from gaia.cs.umass.edu to cs-gw.cs.umass.edu 1 cs-gw (128.119.240.254) 1 ms 1 ms 2 ms 2 border1-rt-fa5-1-0.gw.umass.edu (128.119.3.145) 1 ms 1 ms 2 ms 3 cht-vbns.gw.umass.edu g ((128.119.3.130)) 6 ms 5 ms 5 ms 4 jn1-at1-0-0-19.wor.vbns.net (204.147.132.129) 16 ms 11 ms 13 ms 5 jn1-so7-0-0-0.wae.vbns.net (204.147.136.136) 21 ms 18 ms 18 ms 6 abilene-vbns.abilene.ucaid.edu (198.32.11.9) 22 ms 18 ms 22 ms 7 nycm-wash.abilene.ucaid.edu (198.32.8.46) 22 ms 22 ms 22 ms trans-oceanic 8 62.40.103.253 ((62.40.103.253)) 104 ms 109 ms 106 ms link 9 de2-1.de1.de.geant.net (62.40.96.129) 109 ms 102 ms 104 ms 10 de.fr1.fr.geant.net (62.40.96.50) 113 ms 121 ms 114 ms 11 renater-gw.fr1.fr.geant.net (62.40.103.54) 112 ms 114 ms 112 ms 12 nio-n2.cssi.renater.fr (193.51.206.13) 111 ms 114 ms 116 ms 13 nice.cssi.renater.fr ((195.220.98.102)) 123 ms 125 ms 124 ms 14 r3t2-nice.cssi.renater.fr (195.220.98.110) 126 ms 126 ms 124 ms 15 eurecom-valbonne.r3t2.ft.net (193.48.50.54) 135 ms 128 ms 133 ms 16 194.214.211.25 (194.214.211.25) 126 ms 128 ms 126 ms 17 * * * * means no response p (probe (p lost, router not replying) p y g) 18 * * * 19 fantasia.eurecom.fr (193.55.113.142) 132 ms 128 ms 136 ms Network Layer
IPv6
Internet Protocol, version 5 (IPv5) o IPv5 was assigned to an experimental protocol
o Initial motivation: 32-bit address space soon
to be b completely l l allocated. ll d o Additional motivation: o o o o o
o
header format helps l speed processing/forwarding / header changes to facilitate QoS IPv6 datagram format: fixed-length 40 byte header no fragmentation allowed
o
o o
called Internet Stream Protocol (ST) Internet Stream Protocol (ST) was created for experimental transmission of voice, voice and video Two decades later, ST protocol was revised to get implemented p become ST2 and started to g into commercial projects by groups like IBM, NeXT, Apple, and Sun ST and ST+ offered connections, instead of its connection-less IPv4 counterpart ST also l guaranteed d QoS Q S
Network Layer
Network Layer
IPv4 & IPv6 Header Comparison
IPv6 Header (Cont) -Used for packet labelling, End-to-end QoS. RFC 6437. - QoS management - Originally O i i ll created d for f giving i i realtime l i applicatins li i - special service, but currently unused (concept of “flow” not well defined)
Used for QoS. Like Type yp of Service (TOS) field in IPv4. RFC 2474
Length of payload following header in bytes. Limits packet size to 64 KB. IPv6 source address
IPv6 destination address
Version
Traffic Class
Flow Label
(4 bits)
(8 bits)
(20 bits)
Payload Length (16 bits)
Next Header
IHL
(8 bits)
Source Address ((128 bits))
Code C d for f following f ll i extension t i header or Upper Layer protocol. Like protocol type field in IPv4. (TCP=6, UDP=17)
IPv6 Header
Type of Service
Total Length Version
Identification
Hop Limit
(8 bits)
Version
Time to Live
Protocol
Flags
Traffic Class
Flow Label
Fragment Offset
Header Checksum
Payload Length
Next Header
Hop Limit
Source Address D ti ti Address Destination Add
Number of hops until the packet gets discarded. TTL in IPv4.
Destination Address
Options
Lege end
IP version. version Always 6 6.
IPv4 Header
(128 bits) Network Layer
Padding
- field’s name kept from IPv4 to IPv6 - fields not kept p in IPv6
Source Address
Destination Address
- Name & position changed in IPv6 - New field in IPv6
Network Layer
Summary of Header Changes between IPv4 & IPv6 o Streamlined o Fragmentation fields moved out of base header o IP options moved out of base header
IP 6 header IPv6 h d
o Options allowed, but outside of header, indicated by “Next Header” field
o o o
Extension Headers
Header Checksum eliminated Header Length field eliminated Length field excludes IPv6 header
o Revised o Time to Live Hop Limit o Protocol Next Header o Precedence P d & Type of f Service(TOS) ( ) Traffic ff Class l o Addresses increased 32 bits 128 bits o Extended o Flow Label field added
TCP header h d + data d t
next header = TCP
IPv6 header
Routing header
nnext xt header h d = Routing
n xt header next h d = TCP
TCP header + data
IPv6 header
Routing header
Fragment header
next header = Routing ut ng
next header = Fragment Fragm nt
next header = TCP
fragment of TCP header + data
Network Layer
Transition Trans t on From IPv4 To IPv6 o Not all routers can be upgraded simultaneous o no “flag days” o How will the network operate p with mixed IPv4 and IPv6 routers? o
Network Layer
Tunneling g Logical view:
Physical view:
E
F
IPv6
IPv6
IPv6
A
B
E
F
IPv6
IPv6
IPv6 P 6
IPv6
A
B
IPv6
tunnel
IPv4
IPv4
Tunneling: IPv6 carried as payload in IPv4 d datagram among IP IPv4 4 routers
Network Layer
Network Layer
Tunneling g Logical view:
Physical view:
A
B
IPv6
IPv6
A
B
C
IPv6
IPv6
IPv4
Flow: X Src: A Dest: F data
A-to-B: IPv6
E
F
IPv6
IPv6
D
E
F
IPv4
IPv6 P 6
IPv6
tunnel
Src:B Dest: E
Src:B Dest: E
Flow: X Src: A Dest: F
Flow: X Src: A Dest: F
data
data
B t C: B-to-C: IPv6 inside IPv4
B-to-C: B t C IPv6 inside IPv4
Flow: X Src: A Dest: F data
IPv6 address formats o IPv6 address size is 128 bits
(8 x 16 bits).
xxxx :xxxx:xxxx:xxxx:xxxx:xxxx:xxxx:xxxx xxxx xxxx xxxx xxxx xxxx xxxx xxxx Where each x is a hexadecimal digit representing 4 bits
o IPv6 addresses range 0000:0000:0000:0000:0000:0000:0000:0000
E to F E-to-F: IPv6
ffff:ffff:ffff:ffff:ffff:ffff:ffff:ffff
Network Layer
Network Layer
IPv6 address formats
IPv6 address formats
o IPv6 addresses may be specified in two other
o An alternative format for IPv6 addresses
shortened formats: o Omit leading zeros
1050:0000:0000:0000:0005:0600:300c:326b 1050:0:0:0:5:600:300c:326b
o D Double bl colon l (::) o using double colons (::) in place of a series of zeros. ff06 0 0 0 0 0 0 3 ff06:0:0:0:0:0:0:c3 ff06::c3 o
Double colons may be used only once in an IP Network Layer address.
combines the colon and dotted notation o IPv4 address may be embedded in IPv6 address
o Hexadecimal values are specified p for left-most 96
bits, and decimal values are specified for rightmost 32 bits indicating the embedded IPv4 address. address IPv4
96 bits
32 bits
o This format ensures compatibility between IPv6
nodes and IPv4 nodes when y you are working g in mixed network environment.
Network Layer
IPv6 address formats o Two types of IPv6 addresses use this alternative format: o IPv4–mapped IPv6 address o o o
Used to represent IPv4 nodes as IPv6 addresses. allowing IPv6 applications to communicate directly with IPv4 applications Example, 0:0:0:0:0:ffff:192.1.56.10 and ::ffff:192.1.56.10/96 (shortened format)
o IPv4–compatible IPv6 address o used for tunneling. o allowing IPv6 nodes to communicate across IPv4 infrastructure o Example, 0:0:0:0:0:0:192 1 56 10 and ::192.1.56.10/96 0:0:0:0:0:0:192.1.56.10 ::192 1 56 10/96 (shortened format)
Routing Rout ng Algor Algorithms thms o Link state o Ex. Open Shortest Path First (OSPF)
routing algorithm
local forwarding table header value output link
o Distance Vector value in arriving o Ex. Routing packet’s header Information Protocol (RIP)
0100 0101 0111 1001
3 2 2 1
1
0111
3 2
Network Layer
Graph abstract abstraction on
Network Layer
Graph abstraction: abstract on costs
5 2
u
2 1
Graph: G = (N,E)
v
x
5 3
w 3
1
5
z
1
y
2
u
2 1
2
N = set off routers = { u, v, w, x, y, z } E = set of links ={ (u,v), (u,x), (v,x), (v,w), (x,w), (x,y), (w,y), (w,z), (y,z) } Remark: Graph abstraction is useful in other network contexts Example: P2P, P2P where N is set of peers and E is set of TCP connections Network Layer
v
x
• c(x,x c(x,x’)) = cost of link l nk (x,x’) (x,x )
3
w 3
1
5
z
1
y
- e.g., c(w,z) = 5
2
• cost c st c could uld always l s be 1, 1 orr inversely related to bandwidth, or inversely related to g congestion
Cost of path (x1, x2, x3,…, xp) = c(x1,x2) + c(x2,x3) + … + c(xp-1,xp) Question: What’s the least-cost path between u and z ?
Routing algorithm: algorithm that finds least-cost least cost path Network Layer
A Link-State Routing Algorithm
Routing g Algorithm g m classification f o Global or decentralized
information? o Global: o all routers have complete topology, link cost information o “link state” algorithms o Decentralized: o router knows physicallyconnected neighbors, link costs t tto neighbors i hb o iterative process of computation, exchange of info f with h neighbors h o “distance vector” algorithms
5
o Static or dynamic? o Static: o routes change slowly over time
o Dynamic:
Dijsktra’s D j Algorithm g m
o routes change more quickly o periodic update o in response to link costt changes h
o Dijkstra’s algorithm o net topology, link costs known to all nodes o accomplished via “link state broadcast” o all nodes have same info o computes least cost paths from one node (‘source”) to all other nodes o gives forwarding table for that node o iterative: after k it iterations, ti s k know lleast st cost st path to k dest.’s
u 1
2
v
3
w
u 2 1 1 Initialization: 3 1 2 N N' = {u} x y 3 for all nodes v 1 4 if v adjacent to u Cost U Node 5 then D(v) = c(u,v) c(u v) 6 else D(v) = 7 node cost 8 Loop p 9 find w not in N' such that D(w) is a minimum 10 add w to N' 11 update D(v) for all v adjacent to w and not in N' : 12 D(v) = min( D(v), D(w) + c(w,v) ) 13 /* new cost to v is either old cost to v or known 14 shortest path cost to w plus cost from w to v */ 15 until til all ll nodes d in i N'
v 2
3
w
x to y; = neighbors
5
1
3
x 1 y o Notation: o c(x,y): c(x y): link li k costt f from node d
z
2
if not direct
o D(v): D( ) current value of cost of path from source to dest. v
o p(v): predecessor node
along path from source to v
o N N':: set of nodes whose
least cost path definitively known Network Layer
Network Layer
5
2
Dijkstra’s D j algorithm: g m example mp
5
z 2
Network Layer
N’
Step 0 1 2 3 4 5
N' u ux uxy uxyv uxyvw uxyvwz
D(v),p(v) D(w),p(w) 2 2,u 5 5,u 2,u 4,x 2,u 3,y 3y 3,y
D(x),p(x) 1 1,u
D(y),p(y)
D(z),p(z)
2,x
5 2
u
v
3
2 1
x
Shortest Path
w 3
1
5
z
1
y
2
Node u
Node
Network Layer
4,y 4y 4,y 4,y
Dijkstra’s D j algorithm: g m example mp (2) ( ) Resulting shortest-path tree from u:
v
Bellman Ford Equation (dynamic programming) Bellman-Ford Define dx(y) := cost of least least-cost cost path from x to y
w
u
z x
y
Then
R Resulting l i f forwarding di table bl iin u: destination
link
v x
(u,v) (u v) (u,x)
y
(u,x)
w
(u x) (u,x)
z
(u,x)
dx(y) = min {c(x {c(x,v) v) + dv(y) } v where h min i is i ttaken k over all ll neighbors i hb v of fx Network Layer
Bellman-Ford Bellman Ford example 5 2
u
v 2
1
x
3
w 3
1
Distance D stance Vector Algor Algorithm thm
z
1
y
2
Distance Vector Algorithm g
Clearly dv(z) = 5, Clearly, 5 dx(z) = 3, 3 dw(z) = 3
5
Network Layer
B-F equation says: du(z) = min { c(u,v) + dv(z), c(u,x) + dx(z), c(u w) + dw(z) } c(u,w) = min {2 + 5, 1 + 3, 5 + 3} = 4
Node that achieves minimum is next h p in hop i shortest sh t st path p th f forwarding di ttable bl Network Layer
o Iterative, asynchronous: Each node: each local iteration caused by: wait for (change in local link o local link cost change g cost or msg from neighbor) o DV update message from neighbor recompute estimates o Distributed: o each node notifies if DV to anyy dest has neighbors only when its changed, notify neighbors DV changes o neighbors g then notify fy their neighbors if Network Layer necessary
0
7
z
x y 2 0 1 z node z table cost to x y z
time
Network Layer
x y z 71
0
from
from m
cost to x y z x 0 2 7 y 2 0 1 z 7 1 0 cost to x y z x 0 2 7 y 2 0 1 z 3 1 0
= min{2+1 , 7+0} = 3
x 0 2 3 y 2 0 1 z 3 1 0 costt to t x y z
from
1
frrom
frrom
from
x
2
y
x 0 2 3 y 2 0 1 z 7 1 0
Dx(z) = min{c(x,y) + Dy(z), c(x,z) + Dz(z)}
cost to x y z
x 0 2 3 y 2 0 1 z 3 1 0
x
2
y
1
7
cost to x y z from f
x y 2 0 1 z node z table cost to x y z x y z 71
x 0 2 7 y z node y table cost to x y z
cost to x y z
fro om
x 0 2 3 y 2 0 1 z 7 1 0
node x table cost to x y z from m
from m
from m
x 0 2 7 y z node y table cost to x y z
= min{2+1 , 7+0} = 3
cost to x y z
Dx(y) = min{c(x,y) + Dy(y), c(x,z) + Dz(y)} = min{2+0 , 7+1} = 2
from f
node x table cost to x y z
Dx(z) = min{c(x,y) + Dy(z), c(x,z) + Dz(z)}
from
Dx(y) = min{c(x,y) + Dy(y), c(x,z) + Dz(y)} = min{2+0 , 7+1} = 2
x 0 2 3 y 2 0 1 z 3 1 0 time
Network Layer
z
Chapter p 6 Wireless and Mobile Networks
Chapter hapt r 6 6: W Wireless r ss an and Mobile Mo Networks N twor s Background: o # wireless (mobile) phone subscribers now exceeds
# wired phone subscribers!
Part art I
o computer networks: laptops, palmtops, PDAs, smart
A note on the use of these ppt slides: We’re making g these slides freely y available to all ((faculty, y students, readers). ) They’re in PowerPoint form so you can add, modify, and delete slides (including this one) and slide content to suit your needs. They obviously represent a lot of work on our part. In return for use, we only ask the following: If you use these slides (e.g., in a class) in substantially unaltered form, th t you mention that ti th their i source ((after ft all, ll we’d ’d lik like people l to t use our book!) b k!) If you post any slides in substantially unaltered form on a www site, that you note that they are adapted from (or perhaps identical to) our slides, and note our copyright of this material.
Computer Networking: A Top Down Approach
5th edition. Jim Kurose Kurose, Keith Ross Addison-Wesley, April 2009.
Thanks and enjoy! JFK/KWR All material copyright 1996-2009 J.F Kurose and K.W. Ross, All Rights Reserved
6: Wireless and Mobile Networks
Wireless o 6.2 6 2 Wireless Wi l ss li links, ks characteristics o
CDMA
o 6.3 IEEE 802.11
wireless LANs (“wi-fi”) o 6.4 Cellular Internet Access o o
architecture standards (e.g., (e g GSM)
o t two important im t t (b (butt diff different) t) challenges h ll s o wireless: communication over wireless link o mobility: y handling the mobile user who changes p point of attachment to network 6: Wireless and Mobile Networks
6-1
Chapter 6 outl outline ne 6.1 Introduction
phone, Internet-enabled phone promise anytime untethered Internet access
6-2
Elements of a wireless network
Mobility y o 6.5 Principles: addressing and routing to mobile users o 6.6 Mobile IP o 6.7 Handling mobility in cellular ll l networks t k o 6.8 Mobility and higherlayer y protocols p
network infrastructure
Wireless Hosts o laptop, PDA, IP phone o run applications o may be stationary ( (non-mobile) b l ) or mobile bl o wireless does not always mean mobility
6.9 Summary 6: Wireless and Mobile Networks
6-3
6: Wireless and Mobile Networks
6-4
Elements of a wireless network
Elements of a wireless network
Base Station
Wireless Link
o typ typically cally connected to
wired network o relay - responsible for sending packets b between wired i d network and wireless host(s) in its “area” o e.g., e g cell towers towers, 802.11 access points
network infrastructure
6: Wireless and Mobile Networks
o typ typically cally used to
network infrastructure
6: Wireless and Mobile Networks
6-5
Characteristics of selected wireless link standards
connect mobile(s) to base station o also used as backbone li k link o multiple access protocol coordinates link access o various data rates, transmission distance
6-6
Elements of a wireless network Infrastructure Mode
o base stat station on connects
Data rate (Mbps)
200 54 5-11
802.11n 802.11a,g
4 1
802.11a,g point-to-point
802.11b
data
802.16 (WiMAX) UMTS/WCDMA-HSPDA, CDMA2000-1xEVDO
3G cellular enhanced
network infrastructure
mobiles into wired network o handoff: mobile changes h base b station i providing connection into wired network
802.15
.384
3G
UMTS/WCDMA, CDMA2000
.056
2G
IS-95, CDMA, GSM
Indoor
Outdoor
10-30m 10 30m
50-200m 50 200m
Mid-range outdoor
Long-range outdoor
200m – 4 Km
5Km – 20 Km
6: Wireless and Mobile Networks
6-7
6: Wireless and Mobile Networks
6-8
Wireless network taxonomy
Elements of a wireless network Ad Hoc Mode o no base stat stations ons o nodes can only transmit to other nodes within link coverage o nodes organize themselves into a network: route among themselves
Multiple Hops
Single Hop Infrastructure (e.g., APs) Access Points
N No Infrastructure
h host connects to base station (WiFi, WiMAX, cellular) which connects to larger Internet no base b station, t ti no connection to larger Internet (Bluetooth, Ad hoc networks))
h st may host m have h ve to t relay through several wireless nodes to g connect to larger Internet: mesh net no base station, no connection to larger Internet. May have to relay to reach other a given wireless node MANET VANET MANET,
Mobile Ad hoc Networks
Wireless Link Characteristics (1)
o
o
o SNR: Signal-to-Noise Ratio
Decreased Signal Strength: radio signal attenuates as it propagates through matter (path loss)
o
Interference from other sources: standardized wireless network f frequencies ((e.g., 2.4 GHz) G ) shared h d by b other h devices d (e.g., ( phone); h ) devices (motors) interfere as well Multipath Propagation: radio signal reflects off objects ground, ground arriving ad destination at slightly different times
…. make communication across (even a p point to point) p wireless link much more “difficult” “d ff l ”
6: Wireless and Mobile Networks
6-10
Wireless Link W L Characteristics (2) ( )
Differences from wired link …. o
6: Wireless and Mobile Networks
6-9
6-11
o
larger SNR – easier to extract signal from noise (a “good thing”)
SNR versus BER tradeoffs o given physical layer:
o
increase power -> increase SNR >decrease BER SNR->decrease given SNR: choose physical layer that meets BER requirement giving highest requirement, throughput o SNR may change with mobility: dynamically adapt physical layer (modulation technique, rate)
10-1 10-2
Bit Error Ratte (BER)
6: Wireless and Mobile Networks
Vehicular Ad hoc Networks
10-3 10-4 10-5 10-66 10-7
10
20
30
40
SNR(dB) QAM256 (8 Mbps) QAM16 (4 Mbps) BPSK (1 Mbps) 6: Wireless and Mobile Networks
6-12
Wireless network characteristics Multiple M lti l wireless i l senders d and d receivers i create t additional dditi l problems (beyond multiple access): B
A
B
A
o unique “code” assigned to each user; i.e., code set
C
partitioning
C’s signal strength
A’s signal strength
Hidden terminal problem o B,, A hear each other o B, C hear each other o A, C can not hear each other means A, C unaware of their interference at B
space
Signal attenuation:
o B, B A hear h each h other h o B, C hear each other
o A, C can not hear each other
i t f i att B interfering
6: Wireless and Mobile Networks
code
d0 = 1
1 1 1
1 1 1 -1 -1 -1
slot 1
1 1 1 1 1 1 -1
-1 -1 -1
slot 0
M
Di = received input code
receiver M
Chips M=8
1 1 1 1 1 1
1 -1 -1 -1 1 1 1
1 1 1
1 -1
-1 -1 -1
-1 -1 -1
slot 1
1 -1
Z m=1 i,m
-1 -1 -1
slot 0 channel output
Sender 2
.c
m
M
1 -1
-1
6-14
Sender 1
1 -1
slot 1 channel output t t
1 -1
6: Wireless and Mobile Networks
CDMA: two-sender interference
1 -1 -1 -1
1 -1
own “chipping” sequence (i.e., code) to encode data o Encoded signal g = (original g data) X (chipping pp g sequence)) o Decoding: inner-product of encoded signal and chipping sequence o allows multiple users to “coexist” and transmit simultaneously with minimal interference (if codes are “orthogonal”)
channel output Zi,m
Zi,m= di.cm
d1 = -1
o all users share same frequency, but each user has
6-13
CDMA Encode/Decode sender
o used in several wireless broadcast channels
( ll l (cellular, satellite, t llit etc) t ) standards t d d
C
data bits
Code Division Multiple Access (CDMA)
-1 -1 -1
slot 0
d0 = 1 d1 = -1
slot 1 channel output
slot 0 channel output
Chipping Sequence 6: Wireless and Mobile Networks
6-15
6: Wireless and Mobile Networks
6-16
Chapter 6 outl outline ne 6.1 Introduction
Wireless and Mobile Networks
Wireless o 6.2 6 2 Wireless Wi l ss li links, ks characteristics o
o 6.3 IEEE 802.11
Part II
wireless LANs (“wi-fi”) o 6.4 cellular Internet access
September 6, 2013
o o 6: Wireless and Mobile Networks
IEEE 802.11 Wireless LAN o
802 11b 802.11b o o o
2.4 GHz unlicensed spectrum up to 11 Mbps Physical layer : direct sequence spread spectrum (DSSS) o all hosts use same chipping code
CDMA
o 802.11a o o
6-18
Orthogonal Frequency Division Multiplexing (OFDM) Regular FDM single carrier
5 GHz range up to 54 Mbps Physical Layer : OFDM
6.9 Summary 6: Wireless and Mobile Networks
6-17
Federal Communications Commission (FCC) Industrial, Scientific and Medical (ISM) radio bands • 902 to 928 MHz • 2.400 to 2.4835 GHz • 5.725 to 5.875 GHz
o
architecture standards (e.g., (e g GSM)
Mobility y o 6.5 Principles: addressing and routing to mobile users o 6.6 Mobile IP o 6.7 Handling mobility in cellular ll l networks t k o 6.8 Mobility and higherlayer y protocols p
OFDM
o 802.11g o o o
2.4 GHz range up to 54 Mbps Physical Layer : OFDM
o 802.11n: multiple antennae o o o
o o
2.4 / 5 GHz range up p to 200 Mbps p Physical Layer : OFDM
all use CSMA/CA for Multiple Access all have base-station and ad-hoc network versions
6: Wireless and Mobile Networks
6-19
6: Wireless and Mobile Networks
6-20
802.11: Channels, Association
802.11 LAN architecture o wireless host communicates
Internet
hub, switch or router
AP BSS 1
AP
BSS 2
with base station o Base Station = Access Point (AP) o Basic Service Set (BSS) (aka “cell”) in infrastructure mode contains: o wireless hosts o access point (AP): base station o Ad hoc mode: hosts only
6: Wireless and Mobile Networks
6-21
AP 1
BBS 2
1
1 2
AP 2
BBS 1
AP 1
1
3
2 3
AP 2 4
H1
H1
Passive Scanning:
Active Scanning:
(1) beacon frames sent from APs (2) association Request frame sent: H1 to selected AP (3) association Response frame sent: H1 to selected AP
(1) Probe Request frame broadcast from H1 (2) Probes response frame sent from APs (3) Association Request frame sent: H1 to selected AP (4) Association Response frame sent: H1 to selected AP 6: Wireless and Mobile Networks
different frequencies o AP admin chooses frequency q y for AP o interference possible: channel can be same as that chosen by neighboring AP!
o Host: m must associate with an AP o scans channels, listening for beacon frames containing AP’s name (SSID) and MAC address o selects AP to associate with o may perform authentication [Chapter 8] o will typically run DHCP to get IP address in AP’s subnet 6: Wireless and Mobile Networks 6-22
o Avoid collisions: 2+ nodes transmitting at same time
BBS 2
2
o 802.11b: 2.4GHz-2.485GHz spectrum divided into 11 channels at
IEEE 802.11: Multiple Access
802.11: 80 . Pass Passive/Active ve/Act ve scann scanning ng BBS 1
Note: Channel 14 is only allowed in Japan, Channels 12 & 13 are allowed in most parts of the world, except the USA, where only Channels 1 to 11 are legal to use.
6-23
o 802.11: CSMA - sense before f transmitting g o don’t collide with ongoing transmission by other node
o 802.11: no collision detection! o difficult diffi l to receive i ((sense collisions) lli i ) when h transmitting i i d due to weak received signals (fading) o can’t sense all collisions in any case: hidden terminal, fading o goal: avoid collisions: CSMA/C(ollision)A(voidance)
A
B
A
C B
C C’s signal strength
A’s signal strength space
6: Wireless and Mobile Networks
6-24
Timing in CSMA/CA
CSMA/CA procedure
o In wireless network, much of sent energy is lost in
transmission : not useful for effective collision detection o We need to avoid collisions on wireless network because they cannot be detected o CDMA/CA has three strategies o o o
InterFrame Space (IFS) Contention window Acknowledgement
Short Inter Frame space (SIFS) - 28 microseconds Point Coordination IFS (PIFS) - 78 microseconds Distributed IFS (DIFS) – 128 microseconds
25
Avoiding collisions (more)
IEEE 802.11 MAC Protocol: CSMA/CA
idea: allow sender to “reserve” reserve channel rather than random access of
802.11 sender Distributed Inter Frame Space e.g.128 microseconds 1 if sense channel h l idle idl for f DIFS then th sender receiver transmit entire frame (no CD) 2 if sense channel busy y then start random backoff time timer counts down while channel idle transmit when timer expires if no ACK, increase random backoff interval, repeat 2
DIFS
data
data frames: avoid collisions of long data frames small Request-to-Send (RTS) packets to BS using CSMA o RTSs may still collide with each other (but they’re short) o BS broadcasts Clear-to-Send CTS in response to RTS o CTS heard h d by all ll nodes d o sender transmits data frame o other stations defer transmissions o sender first transmits
SIFS
ACK
802.11 802 11 receiver i - if frame received OK return ACK after SIFS (ACK needed due to hidden terminal problem) Short Inter Frame Space e.g. 28 microseconds
26
6: Wireless and Mobile Networks
avoid data frame collisions completely using small reservation packets! 6-27
6: Wireless and Mobile Networks
6-28
Collision Avoidance: RTS-CTS exchange A
802.11 80 . frame frame: addressing address ng
B
AP
2
2
6
6
6
reservation collision
defer
time
6: Wireless and Mobile Networks
seq address 4 control
R1 router
6: Wireless and Mobile Networks
Internet
2
2
6
6
6
R1 MAC addr H1 MAC addr
2 Protocol version
source address
802.3 frame
2 Type
0 for 802.11 standard
AP MAC addr H1 MAC addr R1 MAC addr address 2
6-30
frame seq # (for RDT)
data, management, control t l
address 3
802.11 frame 6: Wireless and Mobile Networks
6-31
4
1
Subtype
To AP
6
2
frame address address address duration control 1 2 3 Set when frame is followed by other fragment
address 1
CRC
802.11 80 . frame frame: more
AP
dest. address
payload
Address 2: MAC address of wireless host or AP transmitting this frame
duration of reserved transmission time (RTS/CTS) H1
4
Address 3: MAC address of router interface to which AP is attached
6-29
802.11 80 . frame frame: addressing address ng
bytes
0 - 2312
Address 4: used only in ad hoc mode
Address 1: MAC address of wireless host or AP to receive this frame DATA (A)
6
2
frame address address address duration control 1 2 3
1
payload p y
Set in case of retransmission frame
1
From More AP frag
bit set when station go Power Save mode
1
4 bytes
0 - 2312
seq address 4 control t l
1
CRC
Wired Equivalent Privacy
1
Power More Retry mgt data
1
1
WEP
Rsvd
When set means that AP have more buffered data for a station in Power Save mode
Encryption and
frame type authentication 6: Wireless and Mobile are Networks used? 6-32 (RTS, CTS, ACK, data, Beacon, Association (request/response)
Frame type and sub type
Frame type and sub type
6: Wireless and Mobile Networks
Transmission between station’s in the same BSS
6: Wireless and Mobile Networks
6-33
Frame transmission coming from Distribution System
6-34
802.11: mobility within same subnet o H1 remains in same IP
subnet: IP address can remain same o switch: which AP is associated with H1? Frame transmission designated for Distribution System y
Transmission designated to STA in other BSS, transmitted between AP trough Wireless Distribution System
6: Wireless and Mobile Networks
6-35
o
self-learning : switch will see frame from H1 and “remember” which switch port can be used to reach H1
router hub or switch BBS 1 AP P1 AP 2 H1
BBS 2
6: Wireless and Mobile Networks
6-36
802.15: Personal Area Network (Bluetooth)
802.11: advanced capabilities Rate Adaptation
10-1
o base b station, t ti mobile bil
QAM256 (8 Mbps) QAM16 (4 Mbps) BPSK (1 Mbps) operating point
(mouse, keyboard, headphones) o ad dh hoc: no infrastructure i f t t o master/slaves:
10-4 10-5 10-6 10-7
10
20
30
SNR(dB) ( )
40
o
1. SNR decreases, BER increase as node moves away from base station
o
Bluetooth specification o o
o
o
o WiMAX is short for
6: Wireless and Mobile Networks
Worldwide Interoperability for Microwave Access o like 802.11 & cellular: base station model o transmissions t nsmissi ns tto/from /f m base station by hosts with omnidirectional antenna o base station-to-base station to base station backhaul with point-to-point antenna o unlike 802.11: 802 11: o range ~ 6 miles (9.654 km) (“city rather than coffee shop�)) shop o ~14 Mbps 6-40
P
S P
radius of coverage
M S
P
S
P
M Master device S Slave device P Parked device (inactive) 6: Wireless and Mobile Networks
IEEE 802.16: WiMAX
o Whenever there is a
o
2.4-2.5 GHz radio band up to 721 kbps
6-37
Bluetooth
o
slaves request permission to send (to master) master grants requests
o 802.15: 802 15: evolved from
2. When BER becomes too high, switch to lower transmission transm ss on rate but w with th lower BER 6: Wireless and Mobile Networks
connection between two Bluetooth devices, a piconet is formed Always 1 master and up to 7 active slaves Any Bluetooth device can be either a master or a slave Can be a master of one piconet and a slave of another piconet at the same time (scatternet) All devices have the same timing and frequency hopping sequence
Limited to 7 Active slaves for each master
o replacement p m for f cables
10-2 10-3
BER
dynamically change transmission rate (physical layer modulation technique) as mobile moves moves, SNR varies
o less than 10 m diameter
1
= 1.609344
6-39
point-to-point
point-to-multipoint
6: Wireless and Mobile Networks
6-41
Components of cellular network architecture
Chapter 6 outl outline ne 6.1 Introduction Wireless o 6.2 6 2 Wireless Wi l ss li links, ks characteristics o
CDMA
o 6.3 IEEE 802.11
wireless LANs (“wi-fi”) o 6.4 Cellular Internet Access o o
architecture standards (e.g., (e g GSM)
MSC
Mobility y o 6.5 Principles: addressing and routing to mobile users o 6.6 Mobile IP o 6.7 Handling mobility in cellular ll l networks t k o 6.8 Mobility and higherlayer y protocols p
connects cells to wide area net manages call setup (more later!) handles mobility (more later!)
cell
covers geographical region base station (BS) analogous to 802.11 AP mobile users attach t n to network t k th through h BS
Mobile Switching Center
air-interface:
physical and link layer protocol between p mobile and BS
Mobile Switching Center
6.9 Summary 6: Wireless and Mobile Networks
Public telephone network and network, Internet
wired network 6: Wireless and Mobile Networks
6-43
Cellular networks: networks the first f rst hop
Cellular standards: standards brief br ef survey
Two techniques for sharing mobile-to-BS bil t BS radio di spectrum o combined FDMA/TDMA FDMA/TDMA: divide spectrum in frequency channels, divide each channel into time slots frequency bands o CDMA: code division multiple access
2G systems: voice channels
6-44
o IS-136 TDMA: combined FDMA/TDMA (north
america) o GSM (global system for mobile communications): combined FDMA/TDMA
time slots
o
most widely deployed
o IS-95 CDMA: code division multiple access
GSM
6: Wireless and Mobile Networks
6-45
Don’t drown in a bowl of alphabet soup: use this f reference for f only l 6: Wireless and Mobile Networks
6-46
Cellular standards: standards brief br ef survey
Cellular standards: standards brief br ef survey
2.5 G systems: voice and data channels
o 3G systems: voice/data o Universal Mobile Telecommunications Service (UMTS) ( )
o for those who can’t wait for 3G service: 2G extensions o g general packet p radio service ((GPRS)) o evolved from GSM o data sent on multiple channels (if available) o Data rates 56-114 kbps o enhanced data rates for global evolution (EDGE) o also evolved from GSM, using enhanced modulation o data rates up to 384K
o o o
o CDMA-2000 (phase 1) o data rates up to 144K o evolved from IS-95
o 6: Wireless and Mobile Networks
144 kbps 384 kbps p 2 Mbps
‌.. more (and more interesting) cellular topics due to mobility (stay tuned for details)
6-47
RTT= Radio Telephone Technology 1xRTT = 1.25 MHz 3xRTT R = 3.75 5 MHz H
CDMA2000
data service: High Speed Uplink/Downlink packet Access (HSDPA/HSUPA): 3 Mbps o CDMA CDMA-2000: 2000 CDMA in TDMA slots o data service: 1xEvlution Data Optimized (1xEVDO) up to 14 Mbps o o
6: Wireless and Mobile Networks
6-48
6: Wireless and Mobile Networks
6-50
3G
WCDMA
6: Wireless and Mobile Networks
Time-Division Synchronous CDMA (TD-SCDMA)
6-49
Chapter 6 outl outline ne
What iss mobility? mob l ty?
6.1 Introduction
o spectrum p of f mobility, y, from f the
Wireless o 6.2 6 2 Wireless Wi l ss li links, ks characteristics o
CDMA
o 6.3 IEEE 802.11
wireless LANs (“wi-fi”) o 6.4 Cellular Internet Access o o
architecture standards (e.g., (e g GSM)
Mobility y o 6.5 Principles: addressing and routing to mobile users o 6.6 Mobile IP o 6.7 Handling mobility in cellular ll l networks t k o 6.8 Mobility and higherlayer y protocols p
no mobility y
“home” of f mobile
(e.g., 128.119.40/24)
mobile user, passing through multiple access point while maintaining ongoing connections (like cell phone)
6: Wireless and Mobile Networks
6-51
6-52
Mobility: Mob l ty more vocabulary
Mobility: Mob l ty Vocabulary home network: permanent
high h gh mobility mob l ty
mobile wireless user, mobile user, using same access connecting/ point disconnecting from network using DHCP.
6.9 Summary 6: Wireless and Mobile Networks
network p perspective: p
home agent: entity that will perform mobility functions on behalf of mobile, when mobile is remote
Permanent address: remains constant (e.g., 128.119.40.186)
visited network: network
in which mobile currently y resides (e.g., 79.129.13/24)
Care-of-address: Care of address address in visited network. (e.g., 79,129.13.2)
Permanent address:
address in home network, can always be used to reach mobile e.g., 128.119.40.186
wide area network
wide area network
correspondent
6: Wireless and Mobile Networks
6-53
correspondent: wants to communicate with mobile
fforeign i n agent: nt: entity ntit in visited network that performs mobility functions on behalf of mobile. 6: Wireless and Mobile Networks
6-54
Mobility: Mob l ty approaches
How do y you contact a mobile friend: Consider friend frequently changing addresses, how do you find her?
I wonder won r wh where r Alice moved to?
o
o search all p phone
books? o call her parents? o expect her h to let l you know where he/she is?
o
Let routing g handle it: routers advertise p permanent
address of mobile-nodes-in-residence via usual routing table exchange. o routing tables indicate where each mobile located o no changes to end-systems
Let end end-systems systems handle it: o indirect routing: communication from
o
6: Wireless and Mobile Networks
o
visited network
home network
not address of mobile-nodes-in-residence via usual scalable routing table exchange. to millions of o routing tables indicate mobiles where each mobile located o no changes to end-systems
let end end-systems systems handle it: o indirect routing: communication from
1
2
wide id area network
foreign forei n agent a ent contacts home agent home: “this mobile is resident in my network�
correspondent to mobile goes through home agent, then h forwarded f d d to remote direct routing: correspondent gets foreign address of mobile mobile, sends directly to mobile 6: Wireless and Mobile Networks
6-56
Mobility: y registration g
Let routing g handle it: routers advertise p permanent
o
6: Wireless and Mobile Networks
6-55
Mobility: Mob l ty approaches o
correspondent to mobile goes through home agent, then h forwarded f d d to remote direct routing: correspondent gets foreign address of mobile mobile, sends directly to mobile
mobile contacts foreign agent on entering visited network
End result: o Foreign g agent g knows about mobile o Home agent knows location of mobile 6-57
6: Wireless and Mobile Networks
6-58
Mobility y via Indirect Routing g
Indirect Routing: g comments mm
foreign agent packets,, receives p forwards to mobile
home agent intercepts packets, forwards to foreign agent
home network
o Mobile uses two addresses: visited network
3 wide area network
p correspondent addresses packets using home address of mobile
1
2
4 mobile replies directly to correspondent p 6: Wireless and Mobile Networks
permanent m t address: dd ss: used s d by b correspondent s d t (hence (h mobile location is transparent to correspondent) o care-of-address: f used by u y home m agent g to forward f w datagrams to mobile o foreign agent functions may be done by mobile itself o triangle routing: correspondent-home-networkmobile o inefficient when o correspondent, mobile o are in same network o
6: Wireless and Mobile Networks
6-59
Indirect Routing: g moving g between networks
Mobility y via Direct D Routing g
o suppose mobile user moves to another
network t k o o o o
correspondent forwards to foreign agent
registers with new foreign agent new foreign agent registers with home agent home agent update care-of-address for mobile packets continue to be forwarded to mobile (but with new care-of-address)
p correspondent requests, receives foreign address of mobile
maintained!
6-61
visited network
4 wide area network
2
transparent: on going connections can be
6: Wireless and Mobile Networks
foreign agent receives p packets,, forwards to mobile
home network
o mobility, changing foreign networks
6-60
1
3
4 mobile replies directly to correspondent p
6: Wireless and Mobile Networks
6-62
Mobility y via Direct Routing: g comments
Accommodating g mobility y with direct routing g o anchor foreign agent: FA in first visited network
o overcome triangle routing problem
o data always y routed first to anchor FA
o non-transparent to correspondent:
o when mobile moves: new FA arranges to have data
correspondent must get care-of-address from home agent o
forwarded from old FA (chaining)
what if mobile changes visited network?
foreign net visited at session start
wide area network
anchor foreign agent
1
2 4 5
correspondent 6: Wireless and Mobile Networks
correspondent agent
3 new foreign agent
new foreign networkk
6: Wireless and Mobile Networks
6-63
Chapter 6 outl outline ne
Mobile Mob le IP
6.1 Introduction
o RFC 3344 : IP Mobility Support for IPv4
Wireless o 6.2 6 2 Wireless Wi l ss li links, ks characteristics o
CDMA
o 6.3 IEEE 802.11
wireless LANs (“wi-fi�) o 6.4 Cellular Internet Access o o
architecture standards (e.g., (e g GSM)
Mobility y o 6.5 Principles: addressing and routing to mobile users o 6.6 Mobile IP o 6.7 Handling mobility in cellular ll l networks t k o 6.8 Mobility and higherlayer y protocols p
o has many features we’ve seen: o home agents, foreign agents, foreign foreign-agent agent registration, care-of-addresses, encapsulation (packet-within-a-packet) o three h components to standard: d d o indirect routing of datagrams o agent t discovery di o registration with home agent
6.9 Summary 6: Wireless and Mobile Networks
6-64
6-65
6: Wireless and Mobile Networks
6-66
Mobile Mob le IP: IP Agent discovery d scovery
Mobile IP: indirect routing g foreign-agent-to-mobile packet packet sent by home agent to foreign agent: a packet within a packet d t 79.129.13.2 dest: 79 129 13 2
dest: 128.119.40.186
o Agent advertisement: foreign/home agents advertise service i b by b broadcasting d ti ICMP messages (typefield ( f ld = 9) Route advertisement
d t 128.119.40.186 dest: 128 119 40 186
0 t type =9
R bit: registration required
Care-of address: 79.129.13.2
dest: 128.119.40.186
packet sent by correspondent d t 6: Wireless and Mobile Networks
6-67
Mobile Mob le IP: IP registration reg strat on example home agent HA: 128.119.40.7
foreign agent COA: 79.129.13.2
ICMP agent adv. adv ….
COA: 79.129.13.2 HA: 128.119.40.7 MA: 128.119.40.186 Lifetime: 9999 identification: 714 encapsulation format ….
standard ICMP fields
length
registration lifetime
sequence # RBHFMGV bits
reserved
0 or more care-ofaddresses
mobility agent advertisement extension
6: Wireless and Mobile Networks
6-68
Components of cellular network architecture
visited network: 79.129.13/24
COA: 79.129.13.2
registration req.
checksum h k
router address
type = 16
B – Foreign Agent busy M – Min. Encapsulation p G – GRE Encapsulation V– Van Jacobson
24
code = 0
H,F bits: home and/or foreign agent Permanent address: 128.119.40.186
16
8
Mobile agent MA: 128.119.40.186
recall:
correspondent wired public telephone network
registration req. COA: 79.129.13.2 HA: 128.119.40.7 MA: 128.119.40.186 Lifetime: 9999 identification:714 ….
MSC
MSC MSC MSC
MSC
registration ist ti reply l time
HA: 128.119.40.7 MA: 128.119.40.186 Lifetime: 4999 Identification: 714 encapsulation l ti fformatt ….
registration reply HA: 128.119.40.7 MA: 128.119.40.186 Lifetime: 4999 Identification: 714 ….
6: Wireless and Mobile Networks
different cellular networks, operated db by different diff providers id 6-69
6: Wireless and Mobile Networks
6-70
GSM: indirect routing g to mobile
Handling g mobility y in cellular networks o
Home network: network of cellular p provider you y
home network
HLR
2
subscribe to (e.g., Sprint PCS, Verizon) o Home Location Register (HLR): database in home network containing permanent cell phone #, profile information (services, preferences, billing), information about current location (could be in another network) o Visited network: network in which mobile currently resides o Visitor Vi it L Location ti R Register i t (VLR) (VLR): database d t b with ith entry for each user currently in network o could be home network
home MSC consults HLR, gets roaming number of mobile in visited network
1 VLR
3 Mobile Switching Center
4 mobile user
new base station (without interruption) o reasons for handoff:
Switching Center old routing old BSS
o
new routing
o
new BSS
o
stronger signal to/from new BSS (continuing connectivity, less battery drain) l db load balance: l free f up channel h l in current BSS GSM doesn’t mandate why to perform handoff (policy), (policy) only how (mechanism)
o handoff initiated by old BSS
6: Wireless and Mobile Networks
6-72
GSM: handoff with common MSC GSM
o Handoff goal: route call via
VLR Mobile
MSC in visited network completes call through base station to mobile 6: Wireless and Mobile Networks
6-71
GSM: handoff with common MSC GSM
Public switched telephone network
call routed to home network
home MSC sets up 2nd leg of call to MSC in visited network visited network
6: Wireless and Mobile Networks
correspondent p
home Mobile Switching Center
6-73
VLR Mobile Switching Center 2
4
1 8 old BSS
5
7 3 6
new BSS
1. old BSS informs MSC of impending handoff, a do , p provides o des list st o of 1+ new e BSSs SSs 2. MSC sets up path (allocates resources) to new BSS 3 new BSS allocates radio channel for 3. use by mobile 4. new BSS signals MSC, old BSS: ready 5 old BSS tells mobile: perform handoff to 5. new BSS 6. mobile, new BSS signal to activate new channel 7. mobile signals via new BSS to MSC: handoff complete. MSC reroutes call 8 MSC-old-BSS MSC ld BSS resources released l d 6: Wireless and Mobile Networks
6-74
GSM: handoff between MSCs GSM o home network correspondent
Home MSC
GSM: handoff between MSCs GSM
anchor MSC: ffirst MSC visited during cal o
home network
call remains routed through anchor MSC
o new MSCs add on to end
anchor MSC
PSTN
MSC
MSC
MSC
(a) before handoff
of MSC chain as mobile moves to new M MSC C o IS-41 allows optional path minimization step to shorten multi-MSC chain 6: Wireless and Mobile Networks
Comment on GSM element
anchor MSC
anchor MSC: ffirst MSC visited during cal o
call remains routed through anchor MSC
o new MSCs add on to end PSTN
MSC
MSC
(b) after handoff
of MSC chain as mobile moves to new M MSC C o IS-41 allows optional path minimization step to shorten multi-MSC chain 6: Wireless and Mobile Networks
6-75
6-76
Wireless,, mobility: y impact p on higher g layer y protocols p
Mobile IP element
Home system
Network to which mobile user’s permanent phone h number b b belongs l
Home network t k
Gateway Mobile Switching Center, or “home MSC”. Home Location Register (HLR)
Home MSC: point of contact to obtain routable address of mobile user. HLR: database in home system y containing g p permanent p phone number, profile information, current location of mobile user, subscription information
Home agent
Visited System
Network other than home system where mobile user is currently residing
Visited network
Visited Mobile services Switching Center. Visitor Location Record (VLR)
Visited MSC: responsible for setting up calls to/from mobile nodes in cells associated with MSC. VLR: temporary database entry in visited system, containing subscription information for each visiting mobile user
Foreign agent
Mobile Station Roaming g Number (MSRN), or “roaming number”
Routable address for telephone call segment between home MSC and visited MSC,, visible to neither the mobile nor the correspondent.
Care-ofaddress
6: Wireless and Mobile Networks
correspondent
Home MSC
MSC
Mobility: Mob l ty GSM versus Mob Mobile le IP GSM element
o
6-77
o logically, impact
should be minimal …
best effort service modell remains unchanged o TCP and UDP can (and do) run over wireless, mobile o … but performance-wise: performance wise: o packet loss/delay due to bit-errors (discarded packets,, delays p y for link-layer y retransmissions), ), and handoff o TCP interprets loss as congestion, will decrease con estion window un-necessarily congestion un necessarily o delay impairments for real-time traffic o limited bandwidth of wireless links o
6: Wireless and Mobile Networks
6-78