© 2004 Jörg Ott · Dirk Kutscher Why Seamless? Towards Exploiting WLAN-based Intermittent Connectivity on the Road Jörg Ott Dirk Kutscher TNC 2004 · Rhodes.

Slides:



Advertisements
Similar presentations
Communication Topics Jason Hill –
Advertisements

TURKEY AWOS TRAINING 1.0 / ALANYA 2005 TRAINING COURSE ON AUTOMATED WEATHER OBSERVING SYSTEMS ( AWOS ) MODULE C.2: COMMUNICATION SONER KARATAŞ ELECTRONIC.
Dynamic Tunnel Management Protocol for IPv4 Traversal of IPv6 Mobile Network Jaehoon Jeong Protocol Engineering Center, ETRI
Data Communications System By Ajarn Preecha Pangsuban.
By: E. Susheel Chandar M. Guna Sekaran Intranet Mail Server.
Wireless vs. mobile S Wireless Personal, Local, Metropolitan, and Wide Area Networks1 Contents WLAN vs. 2G/3G Performance, roaming, mobility, security...
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.0 Communicating over the Network Network Fundamentals – Chapter 2.
Computers Are Your Future © 2008 Prentice-Hall, Inc.
K. Salah 1 Chapter 31 Security in the Internet. K. Salah 2 Figure 31.5 Position of TLS Transport Layer Security (TLS) was designed to provide security.
Layer 7- Application Layer
Networking Theory (part 2). Internet Architecture The Internet is a worldwide collection of smaller networks that share a common suite of communication.
Data Provisioning Services for mobile clients by Mustafa Ergen Authors: Mohit Agarwal and Anuj Puri Berkeley WOW Group University.
Introduction to Management Information Systems Chapter 5 Data Communications and Internet Technology HTM 304 Fall 07.
Data Networking Fundamentals Unit 7 7/2/ Modified by: Brierley.
Mobile IP.
1 Computer Networks Transport Layer Protocols. 2 Application-layer Protocols Application-layer protocols –one “piece” of an app –define messages exchanged.
POP3 Post Office Protocol v.3. Intro The Post Office Protocol (POP) is currently the most popular TCP/IP access and retrieval protocol. It implements.
 The Open Systems Interconnection model (OSI model) is a product of the Open Systems Interconnection effort at the International Organization for Standardization.
Introduction 1 Lecture 7 Application Layer (FTP, ) slides are modified from J. Kurose & K. Ross University of Nevada – Reno Computer Science & Engineering.
Cellular IP: Proxy Service Reference: “Incorporating proxy services into wide area cellular IP networks”; Zhimei Jiang; Li Fung Chang; Kim, B.J.J.; Leung,
Lecture slides prepared for “Business Data Communications”, 7/e, by William Stallings and Tom Case, Chapter 8 “TCP/IP”.
Introduction 1-1 Chapter 2 FTP & Computer Networking: A Top Down Approach 6 th edition Jim Kurose, Keith Ross Addison-Wesley March 2012 IC322 Fall.
Omniran OmniRAN Wi-Fi Hotspot Roaming Use Case Date: Authors: NameAffiliationPhone Max RiegelNSN
Process-to-Process Delivery:
Adapted from: Computer Networking, Kurose/Ross 1DT066 Distributed Information Systems Chapter 6 Wireless, WiFi and mobility.
Chapter 7: Using Windows Servers to Share Information.
IT 424 Networks2 IT 424 Networks2 Ack.: Slides are adapted from the slides of the book: “Computer Networking” – J. Kurose, K. Ross Chapter 2: Application.
Lesson 24. Protocols and the OSI Model. Objectives At the end of this Presentation, you will be able to:
Lecturer: Maxim Podlesny Sep CSE 473 File Transfer and Electronic in Internet.
Chapter 4. After completion of this chapter, you should be able to: Explain “what is the Internet? And how we connect to the Internet using an ISP. Explain.
Remote Access Chapter 4. Learning Objectives Understand implications of IEEE 802.1x and how it is used Understand VPN technology and its uses for securing.
Jaringan Komputer Dasar OSI Transport Layer Aurelio Rahmadian.
© 2008 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 Chapter 7: Transport Layer Introduction to Networking.
Copyright © 2002 Pearson Education, Inc. Slide 3-1 CHAPTER 3 Created by, David Zolzer, Northwestern State University—Louisiana The Internet and World Wide.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.0 Application Layer Functionality and Protocols.
Networks – Network Architecture Network architecture is specification of design principles (including data formats and procedures) for creating a network.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Application Layer Functionality and Protocols Network Fundamentals.
Department of Electronic Engineering City University of Hong Kong EE3900 Computer Networks Introduction Slide 1 A Communications Model Source: generates.
Spring 2006Computer Networks1 Chapter 2 Network Models.
Copyright © Curt Hill, Client – Server Computing An important paradigm.
Internet Protocol B Bhupendra Ratha, Lecturer School of Library and Information Science Devi Ahilya University, Indore
Computer Networks with Internet Technology William Stallings
Internetworking Internet: A network among networks, or a network of networks Allows accommodation of multiple network technologies Universal Service Routers.
Application Layer Khondaker Abdullah-Al-Mamun Lecturer, CSE Instructor, CNAP AUST.
ECEN “Internet Protocols and Modeling”, Spring 2012 Course Materials: Papers, Reference Texts: Bertsekas/Gallager, Stuber, Stallings, etc Class.
William Stallings Data and Computer Communications
Mobile IP Outline Intro to mobile IP Operation Problems with mobility.
INTERNET PROTOCOLS. Microsoft’s Internet Information Server Home Page Figure IT2031 UNIT-3.
Santhosh Rajathayalan ( ) Senthil Kumar Sevugan ( )
Computer Network Architecture Lecture 6: OSI Model Layers Examples 1 20/12/2012.
DHCP Vrushali sonar. Outline DHCP DHCPv6 Comparison Security issues Summary.
How Information Flows via the Internet By: Lee Farrell.
COMPUTER NETWORKS Hwajung Lee. Image Source:
Communication Networks NETW 501 Tutorial 2
Windows Vista Configuration MCTS : Advanced Networking.
UDP: User Datagram Protocol. What Can IP Do? Deliver datagrams to hosts – The IP address in a datagram header identify a host – treats a computer as an.
Mobile IP THE 12 TH MEETING. Mobile IP  Incorporation of mobile users in the network.  Cellular system (e.g., GSM) started with mobility in mind. 
IST 201 Chapter 11 Lecture 2. Ports Used by TCP & UDP Keep track of different types of transmissions crossing the network simultaneously. Combination.
Introduction to “Tap – Dance ”. Company Proprietary Presentation Topics  Introduction  Handover scenarios  Inter-Network Handover consequences  Common.
Instructor Materials Chapter 5 Providing Network Services
Data Networking Fundamentals
PPPoE Internet Point to Point Protocol over Ethernet
Process-to-Process Delivery:
Networking Theory (part 2)
EEC4113 Data Communication & Multimedia System Chapter 1: Introduction by Muhazam Mustapha, July 2010.
Mobile IP Outline Homework #4 Solutions Intro to mobile IP Operation
Mobile IP Outline Intro to mobile IP Operation Problems with mobility.
Mobile IP Outline Intro to mobile IP Operation Problems with mobility.
Networking Theory (part 2)
Presentation transcript:

© 2004 Jörg Ott · Dirk Kutscher Why Seamless? Towards Exploiting WLAN-based Intermittent Connectivity on the Road Jörg Ott Dirk Kutscher TNC 2004 · Rhodes · 9 June 2004

© 2004 Jörg Ott · Dirk Kutscher Approaches to Seamless Connectivity  Link Layer Mobility Cellular Networks (GSM, GPRS): Intended for ubiquitous coverage Fundamental Service: low-bandwidth bit-pipe with transparent mobility Cell range rather large Disruptions are a every-day phenomenon  IP Layer Mobility Maintain communication relationships despite network layer mobility Handover delays  Dependent on many factors (RTT to HA etc)  Vertical handovers likely to cause disruptions  Hybrid Networks Always-Best-Connected approach Utilise multiple network interfaces concurrently, select most appropriate dynamically Still no guarantee for non-disrupted service

© 2004 Jörg Ott · Dirk Kutscher Seamless Connectivity  100% coverage not achievable Service disruptions, battery life, occasional obstacles, network saturation Economics of service provisioning (mountains, tunnels, valleys, deserts, …)  Where available, not necessarily suitable (particularly cellular) Limited data rate Cost structure  Does not address all use cases Nomadic users: Switching locations with computer turned off Legal enforcement: e.g. on aircrafts  Finally: not needed for many applications!

© 2004 Jörg Ott · Dirk Kutscher Seamless Connectivity  100% coverage not achievable Service disruptions, battery life, occasional obstacles, network saturation Economics of service provisioning (mountains, tunnels, valleys, deserts, …)  Where available, not necessarily suitable (particularly cellular) Limited data rate Cost structure  Does not address all use cases Nomadic users: Switching locations with computer turned off Legal enforcement: e.g. on aircrafts  Finally: not needed for many applications! Little point in striving for ubiquitous connectivity – service disruptions may occur anyway...  Disconnection Tolerant Networking

© 2004 Jörg Ott · Dirk Kutscher Disconnection Tolerant Networking  Successive periods with and without connectivity Well known: moving between office, home, hotels, Internet cafés, etc. Controlled long periods of connectivity, manually managed by user  Rather cumbersome to handle  Extreme case Drive-thru Internet: network access from vehicles Initially: rare and short connectivity periods, long periods without network  Ultimately: may potentially transition to approximate permanent connectivity Limited influence by the mobile user, manual control not possible  Goal: conceal intermittent nature of connectivity from users Automate connectivity establishment, support applications In vehicles, on trains, …  but also for commuting between home and office

© 2004 Jörg Ott · Dirk Kutscher Extreme Networking Scenario: Autobahn 1 km 6 km 4 km 2 min3 min 0,5 min

© 2004 Jörg Ott · Dirk Kutscher System Architecture ISP B ISP A Internet Connectivity Islands Server

© 2004 Jörg Ott · Dirk Kutscher Data Rate (TCP, b, plain AP) Entry phase Production phase Exit phase

© 2004 Jörg Ott · Dirk Kutscher b vs g (High Gain Antenna) TCP transmission, 120 km/h, fixed  mobile

© 2004 Jörg Ott · Dirk Kutscher g Data Volume (120km/h) 25 – 30 MB over ~1000m in about 30 seconds

© 2004 Jörg Ott · Dirk Kutscher Architectural Implications  Concentrate data exchange on the production phase Minimize activities during entry and exit phases: Lower transmission rates and packet loss hurt overall performance  Perform autoconfiguration + authentication during the entry phase Workable with minimal effort Allows to make most of the production phase  Make short-lived connectivity useful for applications E.g. persistent transport across connectivity islands To exchange larger data volumes independent of the application  Application-specific support where necessary

© 2004 Jörg Ott · Dirk Kutscher Types of Applications  Asynchronous Applications Examples: Mail (SMTP, POP3), NetNews Bidirectional push and pull, usually initiated by mobile node Session-oriented communications, identifiable transactions Individual transactions may complete within one cloud Transactions can only be recovered as a whole  Access to information resources (WWW)  Audio/Video Communication  Distributed Object Synchronisation  New Applications

© 2004 Jörg Ott · Dirk Kutscher System Architecture ISP B ISP A Internet Server Drive-thru-Proxies Drive-thru Client

© 2004 Jörg Ott · Dirk Kutscher Different Levels of Support No Support Sessions must complete within connectivity windows No Support Sessions must complete within connectivity windows Persistent Connections Concealing intermittent nature of connectivity Persistent Connections Concealing intermittent nature of connectivity ALG services Drive-thru clients proxy and manage application transactions ALG services Drive-thru clients proxy and manage application transactions Advanced ALG services ALG performs message prefetching and provides local message store Advanced ALG services ALG performs message prefetching and provides local message store

© 2004 Jörg Ott · Dirk Kutscher Application Example:  well suited to Drive-thru environment  Sending straightforward Drive-thru client as local SMTP relay server  Retrieving requires more thought Offline mode preferable  Allows for short session and automated message retrieval Online mode more difficult  Requires persistent connections  Using POP3 as protocol Commonly supported by servers

© 2004 Jörg Ott · Dirk Kutscher Sample POP3 Operation ClientServer +OK USER foo PASS bar +OK UIDL +OK … RETR 1 +OK 400 octets QUIT

© 2004 Jörg Ott · Dirk Kutscher Application Example ISP B ISP A Internet Drive-thru Proxy Server

© 2004 Jörg Ott · Dirk Kutscher Drive-thru POP3 Operation with ALG Support ClientServerDrive-thru-ClientDrive-thru-Proxy Origin POP3 server Message store (optional)

© 2004 Jörg Ott · Dirk Kutscher Application Example ISP B ISP A Internet Drive-thru Proxy Server  Network Attachement IEEE association IP auto-configuration Authentication  Must be automatic  Dependent on hot-spot architecture  Network Attachement IEEE association IP auto-configuration Authentication  Must be automatic  Dependent on hot-spot architecture

© 2004 Jörg Ott · Dirk Kutscher Application Example ISP B ISP A Internet Drive-thru Proxy Server  Application interaction Initiate sessions through local Drive- thru client  Access to with POP3 Drive-thru client provides application layer support for POP3  Careful transaction completion  Monitors current connectivity status  Forwards requests to actual POP3 server via Drive-thru proxy  Application interaction Initiate sessions through local Drive- thru client  Access to with POP3 Drive-thru client provides application layer support for POP3  Careful transaction completion  Monitors current connectivity status  Forwards requests to actual POP3 server via Drive-thru proxy

© 2004 Jörg Ott · Dirk Kutscher POP3 Operation: Client Initiates Retrieval ClientServerDrive-thru-ClientDrive-thru-Proxy +OK +OK

© 2004 Jörg Ott · Dirk Kutscher Application Example ISP B ISP A Internet Drive-thru Proxy Server

© 2004 Jörg Ott · Dirk Kutscher Application Example ISP B ISP A Internet Drive-thru Proxy Server

© 2004 Jörg Ott · Dirk Kutscher Drive-thru POP3 Operation ClientServerDrive-thru-ClientDrive-thru-Proxy +OK UIDL +OK … RETR 1 UIDL +OK … RETR 2

© 2004 Jörg Ott · Dirk Kutscher Application Example ISP B ISP A Internet Drive-thru Proxy Server

© 2004 Jörg Ott · Dirk Kutscher Application Example ISP B ISP A Internet Drive-thru Proxy Server  Resuming interrupted sessions Repeating outstanding and interrupted POP3 requests Answering local POP3 requests  Resuming interrupted sessions Repeating outstanding and interrupted POP3 requests Answering local POP3 requests

© 2004 Jörg Ott · Dirk Kutscher Drive-thru POP3 Operation ClientServerDrive-thru-ClientDrive-thru-Proxy RETR 1 +OK … UIDL +OK … RETR 1 +OK … RETR 2 +OK …

© 2004 Jörg Ott · Dirk Kutscher Application Example ISP B ISP A Internet Drive-thru Proxy Server

© 2004 Jörg Ott · Dirk Kutscher Application Example ISP B ISP A Internet Drive-thru Proxy Server

© 2004 Jörg Ott · Dirk Kutscher Application Example ISP B ISP A Internet Drive-thru Proxy Server

© 2004 Jörg Ott · Dirk Kutscher Application Example ISP B ISP A Internet Drive-thru Proxy Server  Terminating application sessions  Removing ALG state  Terminate Drive-thru session  Terminating application sessions  Removing ALG state  Terminate Drive-thru session

© 2004 Jörg Ott · Dirk Kutscher Application Example ISP B ISP A Internet Drive-thru Proxy Server

© 2004 Jörg Ott · Dirk Kutscher Conclusion  Questioning seamless connectivity Rarely available, not always required  Disconnection Tolerant Networking Take intermittent connectivity into account Viable for many, but not for all application classes Approach: Provide different levels of infrastructure support  Drive-thru Internet approach Testbed for Disconnection Tolerant Networking with extreme characteristics Drive-thru entities maintain persistent connections during disruptions Application-specific functions as optional enhancements

© 2004 Jörg Ott · Dirk Kutscher