C08 Network Protocols
-
Upload
abhishek-dargan -
Category
Documents
-
view
236 -
download
2
description
Transcript of C08 Network Protocols
-
Motivation for Mobile IPRoutingbased on IP destination address, network prefix (e.g. 129.13.42) determines physical subnetchange of physical subnet implies change of IP address to have a topological correct address (standard IP) or needs special entries in the routing tablesSpecific routes to end-systems?change of all routing table entries to forward packets to the right destinationdoes not scale with the number of mobile hosts and frequent changes in the location, security problemsChanging the IP-address?adjust the host IP address depending on the current locationalmost impossible to find a mobile system, DNS updates take to long timeTCP connections break, security problems
Prof. Dr.-Ing. Jochen H. Schillerwww.jochenschiller.deMC - 2008
-
Requirements for Mobile IPv4 (RFC 3344, was: 3220, was: 2002 , updated by: 4721)Transparencymobile end-systems keep their IP addresscontinuation of communication after interruption of link possiblepoint of connection to the fixed network can be changedCompatibilitysupport of the same layer 2 protocols as IPno changes to current end-systems and routers requiredmobile end-systems can communicate with fixed systemsSecurityauthentication of all registration messagesEfficiency and scalabilityonly little additional messages to the mobile system required (connection typically via a low bandwidth radio link)world-wide support of a large number of mobile systems in the whole Internet
Prof. Dr.-Ing. Jochen H. Schillerwww.jochenschiller.deMC - 2008
-
TerminologyMobile Node (MN)system (node) that can change the point of connection to the network without changing its IP addressHome Agent (HA)system in the home network of the MN, typically a routerregisters the location of the MN, tunnels IP datagrams to the COAForeign Agent (FA)system in the current foreign network of the MN, typically a routerforwards the tunneled datagrams to the MN, typically also the default router for the MNCare-of Address (COA)address of the current tunnel end-point for the MN (at FA or MN)actual location of the MN from an IP point of viewcan be chosen, e.g., via DHCPCorrespondent Node (CN)communication partner
Prof. Dr.-Ing. Jochen H. Schillerwww.jochenschiller.deMC - 2008
-
Example networkmobile end-systemInternetrouterrouterrouterend-systemFAHAMNhome networkforeign network(physical home networkfor the MN)(current physical network for the MN)CN
Prof. Dr.-Ing. Jochen H. Schillerwww.jochenschiller.deMC - 2008
-
Data transfer to the mobile systemInternetsenderFAHAMNhome networkforeignnetworkreceiver1231. Sender sends to the IP address of MN, HA intercepts packet (proxy ARP)2. HA tunnels packet to COA, here FA, by encapsulation3. FA forwards the packet to the MNCN
Prof. Dr.-Ing. Jochen H. Schillerwww.jochenschiller.deMC - 2008
-
Data transfer from the mobile systemInternetreceiverFAHAMNhome networkforeign networksender11. Sender sends to the IP address of the receiver as usual, FA works as default routerCN
Prof. Dr.-Ing. Jochen H. Schillerwww.jochenschiller.deMC - 2008
-
OverviewCNrouterHArouterFAInternetrouter1.2.3.homenetworkMNforeignnetwork4.CNrouterHArouterFAInternetrouterhomenetworkMNforeignnetworkCOA
Prof. Dr.-Ing. Jochen H. Schillerwww.jochenschiller.deMC - 2008
-
Network integrationAgent AdvertisementHA and FA periodically send advertisement messages into their physical subnetsMN listens to these messages and detects, if it is in the home or a foreign network (standard case for home network)MN reads a COA from the FA advertisement messagesRegistration (always limited lifetime!)MN signals COA to the HA via the FA, HA acknowledges via FA to MNthese actions have to be secured by authentication AdvertisementHA advertises the IP address of the MN (as for fixed systems), i.e. standard routing informationrouters adjust their entries, these are stable for a longer time (HA responsible for a MN over a longer period of time)packets to the MN are sent to the HA, independent of changes in COA/FA
Prof. Dr.-Ing. Jochen H. Schillerwww.jochenschiller.deMC - 2008
-
type = 16length = 6 + 4 * #COAsR: registration requiredB: busy, no more registrationsH: home agentF: foreign agentM: minimal encapsulationG: GRE encapsulationr: =0, ignored (former Van Jacobson compression)T: FA supports reverse tunnelingreserved: =0, ignoredAgent advertisementpreference level 1router address 1#addressestypeaddr. sizelifetimechecksumCOA 1COA 2type = 16sequence numberlength0781516312423codepreference level 2router address 2. . . registration lifetime. . . RBHFMGr reservedT
Prof. Dr.-Ing. Jochen H. Schillerwww.jochenschiller.deMC - 2008
-
RegistrationtMNHAregistrationrequestregistrationreplytMNFAHAregistrationrequestregistrationrequestregistrationreplyregistrationreply
Prof. Dr.-Ing. Jochen H. Schillerwww.jochenschiller.deMC - 2008
-
Mobile IP registration requesthome agenthome addresstype = 1lifetime0781516312423T xidentificationCOAextensions . . . S: simultaneous bindingsB: broadcast datagramsD: decapsulation by MNM mininal encapsulationG: GRE encapsulationr: =0, ignoredT: reverse tunneling requestedx: =0, ignored
Prof. Dr.-Ing. Jochen H. Schillerwww.jochenschiller.deMC - 2008
-
Mobile IP registration replyhome agenthome addresstype = 3lifetime078151631codeidentificationextensions . . . Example codes:registration successful0 registration accepted1 registration accepted, but simultaneous mobility bindings unsupportedregistration denied by FA65 administratively prohibited66 insufficient resources67 mobile node failed authentication68 home agent failed authentication69 requested Lifetime too longregistration denied by HA129 administratively prohibited131 mobile node failed authentication133 registration Identification mismatch135 too many simultaneous mobility bindings
Prof. Dr.-Ing. Jochen H. Schillerwww.jochenschiller.deMC - 2008
-
Encapsulationoriginal IP headeroriginal datanew datanew IP headerouter headerinner headeroriginal data
Prof. Dr.-Ing. Jochen H. Schillerwww.jochenschiller.deMC - 2008
-
Encapsulation IEncapsulation of one packet into another as payloade.g. IPv6 in IPv4 (6Bone), Multicast in Unicast (Mbone)here: e.g. IP-in-IP-encapsulation, minimal encapsulation or GRE (Generic Record Encapsulation)IP-in-IP-encapsulation (mandatory, RFC 2003)tunnel between HA and COACare-of address COAIP address of HATTLIP identificationIP-in-IPIP checksumflagsfragment offsetlengthDS (TOS)ver.IHLIP address of MNIP address of CNTTLIP identificationlay. 4 prot.IP checksumflagsfragment offsetlengthDS (TOS)ver.IHLTCP/UDP/ ... payload
Prof. Dr.-Ing. Jochen H. Schillerwww.jochenschiller.deMC - 2008
-
Encapsulation IIMinimal encapsulation (optional)avoids repetition of identical fieldse.g. TTL, IHL, version, DS (RFC 2474, old: TOS)only applicable for non fragmented packets, no space left for fragment identificationcare-of address COAIP address of HATTLIP identificationmin. encap.IP checksumflagsfragment offsetlengthDS (TOS)ver.IHLIP address of MNoriginal sender IP address (if S=1)Slay. 4 protoc.IP checksumTCP/UDP/ ... payloadreserved
Prof. Dr.-Ing. Jochen H. Schillerwww.jochenschiller.deMC - 2008
-
Generic Routing EncapsulationCare-of address COAIP address of HATTLIP identificationGREIP checksumflagsfragment offsetlengthDS (TOS)ver.IHLIP address of MNIP address of CNTTLIP identificationlay. 4 prot.IP checksumflagsfragment offsetlengthDS (TOS)ver.IHLTCP/UDP/ ... payloadrouting (optional)sequence number (optional)key (optional)offset (optional)checksum (optional)protocolrec.rsv.ver.CRKSsRFC 1701RFC 2784 (updated by 2890)reserved1 (=0)checksum (optional)protocolreserved0ver.C
Prof. Dr.-Ing. Jochen H. Schillerwww.jochenschiller.deMC - 2008
-
Optimization of packet forwardingProblem: Triangular Routingsender sends all packets via HA to MNhigher latency and network loadSolutionssender learns the current location of MNdirect tunneling to this locationHA informs a sender about the location of MNbig security problems!Change of FApackets on-the-fly during the change can be lostnew FA informs old FA to avoid packet loss, old FA now forwards remaining packets to new FAthis information also enables the old FA to release resources for the MN
Prof. Dr.-Ing. Jochen H. Schillerwww.jochenschiller.deMC - 2008
-
Change of foreign agent CNHAFAoldFAnewMNMN changes locationtDataDataDataUpdateACKDataDataRegistrationUpdateACKDataDataDataWarningRequestUpdateACKDataData
Prof. Dr.-Ing. Jochen H. Schillerwww.jochenschiller.deMC - 2008
-
Reverse tunneling (RFC 3024, was: 2344)InternetreceiverFAHAMNhome networkforeign networksender3211. MN sends to FA2. FA tunnels packets to HA by encapsulation3. HA forwards the packet to the receiver (standard case)CN
Prof. Dr.-Ing. Jochen H. Schillerwww.jochenschiller.deMC - 2008
-
Mobile IP with reverse tunnelingRouter accept often only topological correct addresses (firewall!)a packet from the MN encapsulated by the FA is now topological correctfurthermore multicast and TTL problems solved (TTL in the home network correct, but MN is to far away from the receiver)Reverse tunneling does not solveproblems with firewalls, the reverse tunnel can be abused to circumvent security mechanisms (tunnel hijacking)optimization of data paths, i.e. packets will be forwarded through the tunnel via the HA to a sender (double triangular routing)The standard is backwards compatiblethe extensions can be implemented easily and cooperate with current implementations without these extensions Agent Advertisements can carry requests for reverse tunneling
Prof. Dr.-Ing. Jochen H. Schillerwww.jochenschiller.deMC - 2008
-
Mobile IP and IPv6 (RFC 3775)Mobile IP was developed for IPv4, but IPv6 simplifies the protocolssecurity is integrated and not an add-on, authentication of registration is includedCOA can be assigned via auto-configuration (DHCPv6 is one candidate), every node has address auto-configurationno need for a separate FA, all routers perform router advertisement which can be used instead of the special agent advertisement; addresses are always co-locatedMN can signal a sender directly the COA, sending via HA not needed in this case (automatic path optimization)soft hand-over, i.e. without packet loss, between two subnets is supportedMN sends the new COA to its old routerthe old router encapsulates all incoming packets for the MN and forwards them to the new COAauthentication is always granted
Prof. Dr.-Ing. Jochen H. Schillerwww.jochenschiller.deMC - 2008
-
Problems with mobile IPSecurityauthentication with FA problematic, for the FA typically belongs to another organization no protocol for key management and key distribution has been standardized in the Internetpatent and export restrictionsFirewallstypically mobile IP cannot be used together with firewalls, special set-ups are needed (such as reverse tunneling)QoSmany new reservations in case of RSVPtunneling makes it hard to give a flow of packets a special treatment needed for the QoSSecurity, firewalls, QoS etc. are topics of research and discussions
Prof. Dr.-Ing. Jochen H. Schillerwww.jochenschiller.deMC - 2008
-
Security in Mobile IPSecurity requirements (Security Architecture for the Internet Protocol, RFC 4301, was: 1825, 2401)Integrity any changes to data between sender and receiver can be detected by the receiverAuthentication sender address is really the address of the sender and all data received is really data sent by this senderConfidentiality only sender and receiver can read the dataNon-Repudiation sender cannot deny sending of dataTraffic Analysis creation of traffic and user profiles should not be possibleReplay Protection receivers can detect replay of messages
Prof. Dr.-Ing. Jochen H. Schillerwww.jochenschiller.deMC - 2008
-
IP security architecture ITwo or more partners have to negotiate security mechanisms to setup a security associationtypically, all partners choose the same parameters and mechanismsTwo headers have been defined for securing IP packets:Authentication-Headerguarantees integrity and authenticity of IP packetsif asymmetric encryption schemes are used, non-repudiation can also be guaranteed
Encapsulation Security Payloadprotects confidentiality between communication partnersESP headerIP headerencrypted data
Prof. Dr.-Ing. Jochen H. Schillerwww.jochenschiller.deMC - 2008
-
Mobile Security Association for registrations parameters for the mobile host (MH), home agent (HA), and foreign agent (FA)Extensions of the IP security architectureextended authentication of registration
prevention of replays of registrationstime stamps: 32 bit time stamps + 32 bit random numbernonces: 32 bit random number (MH) + 32 bit random number (HA)
registration replyregistration requestregistration requestIP security architecture IIMHFAHAregistration replyMH-HA authenticationMH-FA authenticationFA-HA authentication
Prof. Dr.-Ing. Jochen H. Schillerwww.jochenschiller.deMC - 2008
-
Key distributionHome agent distributes session keys
foreign agent has a security association with the home agentmobile host registers a new binding at the home agenthome agent answers with a new session key for foreign agent and mobile nodeFAMHHAresponse:EHA-FA {session key}EHA-MH {session key}
Prof. Dr.-Ing. Jochen H. Schillerwww.jochenschiller.deMC - 2008
-
IP Micro-mobility supportMicro-mobility support:Efficient local handover inside a foreign domain without involving a home agentReduces control traffic on backboneEspecially needed in case of route optimization
Example approaches (research, not products):Cellular IPHAWAIIHierarchical Mobile IP (HMIP)
Important criteria: Security Efficiency, Scalability, Transparency, Manageability
Prof. Dr.-Ing. Jochen H. Schillerwww.jochenschiller.deMC - 2008
-
Cellular IPOperation:CIP Nodes maintain routing entries (soft state) for MNsMultiple entries possibleRouting entries updated based on packets sent by MNCIP Gateway:Mobile IP tunnel endpointInitial registration processingSecurity provisions:all CIP Nodes share network keyMN key: MD5(net key, IP addr)MN gets key upon registration
Prof. Dr.-Ing. Jochen H. Schillerwww.jochenschiller.deMC - 2008
-
Cellular IP: SecurityAdvantages:Initial registration involves authentication of MNs and is processed centrally by CIP GatewayAll control messages by MNs are authenticatedReplay-protection (using timestamps)
Potential problems:MNs can directly influence routing entriesNetwork key known to many entities (increases risk of compromise)No re-keying mechanisms for network keyNo choice of algorithm (always MD5, prefix+suffix mode)Proprietary mechanisms (not, e.g., IPSec AH)
Prof. Dr.-Ing. Jochen H. Schillerwww.jochenschiller.deMC - 2008
-
Cellular IP: Other issuesAdvantages:Simple and elegant architectureMostly self-configuring (little management needed)Integration with firewalls / private address support possible
Potential problems:Not transparent to MNs (additional control messages)Public-key encryption of MN keys may be a problem for resource-constrained MNsMultiple-path forwarding may cause inefficient use of available bandwidth
Prof. Dr.-Ing. Jochen H. Schillerwww.jochenschiller.deMC - 2008
-
HAWAIIOperation:MN obtains co-located COA and registers with HAHandover: MN keeps COA, new BS answers Reg. Request and updates routersMN views BS as foreign agent
Security provisions:MN-FA authentication mandatoryChallenge/Response Extensions mandatory BS12334
Prof. Dr.-Ing. Jochen H. Schillerwww.jochenschiller.deMC - 2008
-
HAWAII: SecurityAdvantages:Mutual authentication and C/R extensions mandatoryOnly infrastructure components can influence routing entries
Potential problems:Co-located COA raises DHCP security issues (DHCP has no strong authentication)Decentralized security-critical functionality (Mobile IP registration processing during handover) in base stationsAuthentication of HAWAII protocol messages unspecified (potential attackers: stationary nodes in foreign network)MN authentication requires PKI or AAA infrastructure
Prof. Dr.-Ing. Jochen H. Schillerwww.jochenschiller.deMC - 2008
-
HAWAII: Other issuesAdvantages:Mostly transparent to MNs (MN sends/receives standard Mobile IP messages)Explicit support for dynamically assigned home addresses
Potential problems:Mixture of co-located COA and FA concepts may not be supported by some MN implementationsNo private address support possible because of co-located COA
Prof. Dr.-Ing. Jochen H. Schillerwww.jochenschiller.deMC - 2008
-
Hierarchical Mobile IPv6 (RFC 4140)Operation:Network contains mobility anchor point (MAP)mapping of regional COA (RCOA) to link COA (LCOA)Upon handover, MN informs MAP onlygets new LCOA, keeps RCOAHA is only contacted if MAP changes
Security provisions:no HMIP-specific security provisionsbinding updates should be authenticatedMAPARMNARMNHAbindingupdateRCOALCOAoldLCOAnew
Prof. Dr.-Ing. Jochen H. Schillerwww.jochenschiller.deMC - 2008
-
Hierarchical Mobile IP: SecurityAdvantages:Local COAs can be hidden, which provides at least some location privacyDirect routing between CNs sharing the same link is possible (but might be dangerous)
Potential problems:Decentralized security-critical functionality (handover processing) in mobility anchor pointsMNs can (must!) directly influence routing entries via binding updates (authentication necessary)
Prof. Dr.-Ing. Jochen H. Schillerwww.jochenschiller.deMC - 2008
-
Hierarchical Mobile IP: Other issuesAdvantages:Handover requires minimum number of overall changes to routing tablesIntegration with firewalls / private address support possible
Potential problems:Not transparent to MNsHandover efficiency in wireless mobile scenarios:Complex MN operationsAll routing reconfiguration messages sent over wireless link
Prof. Dr.-Ing. Jochen H. Schillerwww.jochenschiller.deMC - 2008
-
DHCP: Dynamic Host Configuration ProtocolApplicationsimplification of installation and maintenance of networked computerssupplies systems with all necessary information, such as IP address, DNS server address, domain name, subnet mask, default router etc.enables automatic integration of systems into an Intranet or the Internet, can be used to acquire a COA for Mobile IPClient/Server-Modelthe client sends via a MAC broadcast a request to the DHCP server (might be via a DHCP relay)clientrelayclientserverDHCPDISCOVERDHCPDISCOVER
Prof. Dr.-Ing. Jochen H. Schillerwww.jochenschiller.deMC - 2008
-
DHCP - protocol mechanismstimeserver(not selected)clientserver(selected)initializationcollection of repliesselection of configurationinitialization completedreleaseconfirmation ofconfigurationdelete contextdetermine theconfigurationDHCPDISCOVERDHCPOFFERDHCPREQUEST (reject)DHCPACKDHCPRELEASEDHCPDISCOVERDHCPOFFERDHCPREQUEST (options)determine theconfiguration
Prof. Dr.-Ing. Jochen H. Schillerwww.jochenschiller.deMC - 2008
-
DHCP characteristicsServerseveral servers can be configured for DHCP, coordination not yet standardized (i.e., manual configuration)Renewal of configurationsIP addresses have to be requested periodically, simplified protocolOptionsavailable for routers, subnet mask, NTP (network time protocol) timeserver, SLP (service location protocol) directory, DNS (domain name system)
Prof. Dr.-Ing. Jochen H. Schillerwww.jochenschiller.deMC - 2008
-
Mobile ad hoc networksStandard Mobile IP needs an infrastructureHome Agent/Foreign Agent in the fixed networkDNS, routing etc. are not designed for mobilitySometimes there is no infrastructure!remote areas, ad-hoc meetings, disaster areascost can also be an argument against an infrastructure!Main topic: routingno default router availableevery node should be able to forwardABC
Prof. Dr.-Ing. Jochen H. Schillerwww.jochenschiller.deMC - 2008
-
Solution: Wireless ad-hoc networksNetwork without infrastructureUse components of participants for networking
ExamplesSingle-hop: All partners max. one hop apartBluetooth piconet, PDAs in a room, gaming devices
Multi-hop: Cover larger distances, circumvent obstaclesBluetooth scatternet, TETRA police network, car-to-car networks
Internet: MANET (Mobile Ad-hoc Networking) group
Prof. Dr.-Ing. Jochen H. Schillerwww.jochenschiller.deMC - 2008
-
Manet: Mobile Ad-hoc Networking
Prof. Dr.-Ing. Jochen H. Schillerwww.jochenschiller.deMC - 2008
-
Problem No. 1: RoutingHighly dynamic network topologyDevice mobility plus varying channel qualitySeparation and merging of networks possibleAsymmetric connections possiblegood linkweak linktime = t1time = t2N1N4N2N5N3N1N4N2N5N3N6N7N6N7
Prof. Dr.-Ing. Jochen H. Schillerwww.jochenschiller.deMC - 2008
-
Traditional routing algorithmsDistance Vectorperiodic exchange of messages with all physical neighbors that contain information about who can be reached at what distanceselection of the shortest path if several paths availableLink Stateperiodic notification of all routers about the current state of all physical links router get a complete picture of the networkExampleARPA packet radio network (1973), DV-Routingevery 7.5s exchange of routing tables including link qualityupdating of tables also by reception of packetsrouting problems solved with limited flooding
Prof. Dr.-Ing. Jochen H. Schillerwww.jochenschiller.deMC - 2008
-
Routing in ad-hoc networksTHE big topic in many research projectsFar more than 50 different proposals existThe most simplest one: Flooding!
ReasonsClassical approaches from fixed networks failVery slow convergence, large overheadHigh dynamicity, low bandwidth, low computing power
Metrics for routingMinimalNumber of nodes, loss rate, delay, congestion, interference MaximalStability of the logical network, battery run-time, time of connectivity
Prof. Dr.-Ing. Jochen H. Schillerwww.jochenschiller.deMC - 2008
-
Problems of traditional routing algorithmsDynamic of the topologyfrequent changes of connections, connection quality, participants
Limited performance of mobile systemsperiodic updates of routing tables need energy without contributing to the transmission of user data, sleep modes difficult to realizelimited bandwidth of the system is reduced even more due to the exchange of routing informationlinks can be asymmetric, i.e., they can have a direction dependent transmission quality
Prof. Dr.-Ing. Jochen H. Schillerwww.jochenschiller.deMC - 2008
-
DSDV (Destination Sequenced Distance Vector, historical)Early workon demand version: AODV
Expansion of distance vector routing
Sequence numbers for all routing updatesassures in-order execution of all updatesavoids loops and inconsistencies
Decrease of update frequencystore time between first and best announcement of a path inhibit update if it seems to be unstable (based on the stored time values)
Prof. Dr.-Ing. Jochen H. Schillerwww.jochenschiller.deMC - 2008
-
Dynamic source routing (DSR)Reactive routing protocol2 phases, operating both on demand:Route discoveryUsed only when source S attempts to to send a packet to destination DBased on flooding of Route Requests (RREQ)Route maintenancemakes S able to detect, while using a source route to D, if it can no longer use its route (because a link along that route no longer works)
Prof. Dr.-Ing. Jochen H. Schillerwww.jochenschiller.deMC - 2008
-
DSR: Route discovery (1)EGMHRFABCIDSKNLPJQ
Prof. Dr.-Ing. Jochen H. Schillerwww.jochenschiller.deMC - 2008
-
DSR: Route discovery (2)EGMHRFABCIDSKNLPJQ(S)
Prof. Dr.-Ing. Jochen H. Schillerwww.jochenschiller.deMC - 2008
-
DSR: Route discovery (3)EGMHRFABCIDSKNLPJQ(S,A)(S,E)
Prof. Dr.-Ing. Jochen H. Schillerwww.jochenschiller.deMC - 2008
-
DSR: Route discovery (4)EGMHRFABCIDSKNLPJQ(S,E,G)(S,B,C)
Prof. Dr.-Ing. Jochen H. Schillerwww.jochenschiller.deMC - 2008
-
DSR: Route discovery (5)EGMHRFABCIDSKNLPJQ(S,E,G,J)(S,A,F,H)
Prof. Dr.-Ing. Jochen H. Schillerwww.jochenschiller.deMC - 2008
-
DSR: Route discovery (6)EGMHRFABCIDSKNLPJQ(S,A,F,H,K)
Prof. Dr.-Ing. Jochen H. Schillerwww.jochenschiller.deMC - 2008
-
DSR: Route discovery (7)EGMHRFABCIDSKNLPJQ(S,A,F,H,K,P)
Prof. Dr.-Ing. Jochen H. Schillerwww.jochenschiller.deMC - 2008
-
DSR: Route discovery (8)EGMHRFABCIDSKNLPJQRREP(S,E,G,J,D)
Prof. Dr.-Ing. Jochen H. Schillerwww.jochenschiller.deMC - 2008
-
DSR: Route Discovery (9)Route reply by reversing the route (as illustrated) works only if all the links along the route are bidirectionalIf unidirectional links are allowed, then RREP may need a route discovery from D to SNote: IEEE 802.11 assumes that links are bidirectional
Prof. Dr.-Ing. Jochen H. Schillerwww.jochenschiller.deMC - 2008
-
DSR: Data deliveryEGMHRFABCIDSKNLPJQDATA(S,E,G,J,D)
Prof. Dr.-Ing. Jochen H. Schillerwww.jochenschiller.deMC - 2008
-
DSR: Route maintenance (1)EGMHRFABCIDSKNLPJQDATA(S,E,G,J,D)X
Prof. Dr.-Ing. Jochen H. Schillerwww.jochenschiller.deMC - 2008
-
DSR: Route maintenance (2)EGMHRFABCIDSKNLPJQXRERR(G-J)When receiving the Route Error message (RERR), S removes the broken link from its cache.It then tries another route stored in its cache; if none, it initializes a new route discovery
Prof. Dr.-Ing. Jochen H. Schillerwww.jochenschiller.deMC - 2008
-
DSR: Optimization of route discovery: route caching
Principle: each node caches a new route it learns by any meansExamplesWhen node S finds route (S, E, G, J, D) to D, it also learns route (S, E, G) to node GIn the same way, node E learns the route to DSame phenomenon when transmitting route repliesMoreover, routes can be overheard by nodes in the neighbourhoodHowever, route caching has its downside: stale caches can severely hamper the performance of the network
Prof. Dr.-Ing. Jochen H. Schillerwww.jochenschiller.deMC - 2008
-
DSR: StrengthsRoutes are set up and maintained only between nodes who need to communicateRoute caching can further reduce the effort of route discoveryA single route discovery may provide several routes to the destination
Prof. Dr.-Ing. Jochen H. Schillerwww.jochenschiller.deMC - 2008
-
DSR: WeaknessesRoute requests tend to flood the network and generally reach all the nodes of the networkBecause of source routing, the packet header size grows with the route lenghRisk of many collisions between route requests by neighboring nodes need for random delays before forwarding RREQSimilar problem for the RREP (Route Reply storm problem), in case links are not bidirectional
Note: Location-aided routing may help reducing the number of useless control messages
Prof. Dr.-Ing. Jochen H. Schillerwww.jochenschiller.deMC - 2008
-
Ad Hoc On-Demand Distance Vector Routing (AODV)
As it is based on source routing, DSR includes source routes in data packet headersLarge packet headers in DSR risk of poor performance if the number of hops is highAODV uses a route discovery mechanism similar to DSR, but it maintains routing tables at the nodesAODV ages the routes and maintains a hop count AODV assumes that all links are bi-directional
Prof. Dr.-Ing. Jochen H. Schillerwww.jochenschiller.deMC - 2008
-
AODV : Route discovery (1)EGMHRFABCIDSKNLPJQ
Prof. Dr.-Ing. Jochen H. Schillerwww.jochenschiller.deMC - 2008
-
AODV : Route discovery (2)EGMHRFABCIDSKNLPJQNote: if one of the intermediate nodes (e.g., A) knows a route to D, it responds immediately to S: Route Request (RREQ)
Prof. Dr.-Ing. Jochen H. Schillerwww.jochenschiller.deMC - 2008
-
AODV : Route discovery (3)EGMHRFABCIDSKNLPJQ: represents a link on the reverse path
Prof. Dr.-Ing. Jochen H. Schillerwww.jochenschiller.deMC - 2008
-
AODV : Route discovery (4)EGMHRFABCIDSKNLPJQ
Prof. Dr.-Ing. Jochen H. Schillerwww.jochenschiller.deMC - 2008
-
AODV : Route discovery (5)EGMHRFABCIDSKNLPJQ
Prof. Dr.-Ing. Jochen H. Schillerwww.jochenschiller.deMC - 2008
-
AODV : Route discovery (6)MDKLPJEGHRFABCISNQ
Prof. Dr.-Ing. Jochen H. Schillerwww.jochenschiller.deMC - 2008
-
AODV : Route discovery (7)MDKLPJEGHRFABCISNQ
Prof. Dr.-Ing. Jochen H. Schillerwww.jochenschiller.deMC - 2008
-
AODV : Route reply and setup of the forward pathMDKLPJEGHRFABCISNQ: Link over which the RREP is transmitted: Forward path
Prof. Dr.-Ing. Jochen H. Schillerwww.jochenschiller.deMC - 2008
-
Route reply in AODVIn case it knows a path more recent than the one previously known to sender S, an intermediate node may also send a route reply (RREP)The freshness of a path is assessed by means of destination sequence numbersBoth reverse and forward paths are purged at the expiration of appropriately chosen timeout intervals
Prof. Dr.-Ing. Jochen H. Schillerwww.jochenschiller.deMC - 2008
-
AODV : Data deliveryMDKLPJEGHRFABCISNQDataThe route is not included in the packet header
Prof. Dr.-Ing. Jochen H. Schillerwww.jochenschiller.deMC - 2008
-
AODV : Route maintenance (1)MDKLPJEGHRFABCISNQDataX
Prof. Dr.-Ing. Jochen H. Schillerwww.jochenschiller.deMC - 2008
-
AODV : Route maintenance (2)MDKLPJEGHRFABCISNQXRERR(G-J)When receiving the Route Error message (RERR), S removes the broken link from its cache.It then initializes a new route discovery.
Prof. Dr.-Ing. Jochen H. Schillerwww.jochenschiller.deMC - 2008
-
AODV: Destination sequence numbers
If the destination responds to RREP, it places its current sequence number in the packetIf an intermediate node responds, it places its record of the destinations sequence number in the packetPurpose of sequence numbers:Avoid using stale information about routesAvoid loops (no source routing!)
Prof. Dr.-Ing. Jochen H. Schillerwww.jochenschiller.deMC - 2008
-
AODV : Avoiding the usage of stale routing tables SDABDSN(D) = 5: Forward pathSDABDSN(D) = 5DSN(D) = 81.2.SDABDSN(D) = 5DSN(D) = 83.RREQSDABDSN(D) = 5DSN(D) = 8RREP4.
Prof. Dr.-Ing. Jochen H. Schillerwww.jochenschiller.deMC - 2008
-
AODV : Avoiding loopsABSDC: Forward path Assume there is a route between A and D; link S-D breaks; assume A is not aware of this, e.g. because RERR sent by S is lost Assume now S wants to send to D. It performs a RREQ, which can be received by A via path S-C-A Node A will reply since it knows a route to D via node B This would result in a loop (S-C-A-B-S) The presence of sequence numbers will let S discover that the routing information from A is outdated Principle: when S discovers that link S-D is broken, it increments its local value of DSN(D). In this way, the new local value will be greater than the one stored by A.X
Prof. Dr.-Ing. Jochen H. Schillerwww.jochenschiller.deMC - 2008
-
AODV (unicast) : ConclusionNodes maintain routing information only for routes that are in active useUnused routes expire even when the topology does not changeEach node maintains at most one next-hop per destinationMany comparisons with DSR (via simulation) have been performed no clear conclusion so far
Prof. Dr.-Ing. Jochen H. Schillerwww.jochenschiller.deMC - 2008
-
Dynamic source routing ISplit routing into discovering a path and maintaining a path
Discover a pathonly if a path for sending packets to a certain destination is needed and no path is currently available
Maintaining a pathonly while the path is in use one has to make sure that it can be used continuously
No periodic updates needed!
Prof. Dr.-Ing. Jochen H. Schillerwww.jochenschiller.deMC - 2008
-
Dynamic source routing IIPath discoverybroadcast a packet with destination address and unique IDif a station receives a broadcast packetif the station is the receiver (i.e., has the correct destination address) then return the packet to the sender (path was collected in the packet)if the packet has already been received earlier (identified via ID) then discard the packetotherwise, append own address and broadcast packet sender receives packet with the current path (address list)
Optimizationslimit broadcasting if maximum diameter of the network is knowncaching of address lists (i.e. paths) with help of passing packetsstations can use the cached information for path discovery (own paths or paths for other hosts)
Prof. Dr.-Ing. Jochen H. Schillerwww.jochenschiller.deMC - 2008
-
Interference-based routingRouting based on assumptions about interference between signalsS1N5N3N4N1N2R1R2N6N8S2N9N7
Prof. Dr.-Ing. Jochen H. Schillerwww.jochenschiller.deMC - 2008
-
Examples for interference based routingLeast Interference Routing (LIR)calculate the cost of a path based on the number of stations that can receive a transmissionMax-Min Residual Capacity Routing (MMRCR)calculate the cost of a path based on a probability function of successful transmissions and interferenceLeast Resistance Routing (LRR)calculate the cost of a path based on interference, jamming and other transmissions
LIR is very simple to implement, only information from direct neighbors is necessary
Prof. Dr.-Ing. Jochen H. Schillerwww.jochenschiller.deMC - 2008
-
A plethora of ad hoc routing protocolsFlatproactiveFSLS Fuzzy Sighted Link StateFSR Fisheye State RoutingOLSR Optimized Link State Routing Protocol (RFC 3626)TBRPF Topology Broadcast Based on Reverse Path ForwardingreactiveAODV Ad hoc On demand Distance Vector (RFC 3561)DSR Dynamic Source Routing (RFC 4728)DYMO Dynamic MANET On-demandHierarchicalCGSR Clusterhead-Gateway Switch RoutingHSR Hierarchical State RoutingLANMAR Landmark Ad Hoc RoutingZRP Zone Routing ProtocolGeographic position assistedDREAM Distance Routing Effect Algorithm for MobilityGeoCast Geographic Addressing and RoutingGPSR Greedy Perimeter Stateless RoutingLAR Location-Aided RoutingTwo promisingcandidates:OLSRv2 andDYMO
Prof. Dr.-Ing. Jochen H. Schillerwww.jochenschiller.deMC - 2008
-
Further difficulties and research areasAuto-ConfigurationAssignment of addresses, function, profile, program, Service discoveryDiscovery of services and service providersMulticastTransmission to a selected group of receiversQuality-of-ServiceMaintenance of a certain transmission qualityPower controlMinimizing interference, energy conservation mechanismsSecurityData integrity, protection from attacks (e.g. Denial of Service)Scalability10 nodes? 100 nodes? 1000 nodes? 10000 nodes?Integration with fixed networks
Prof. Dr.-Ing. Jochen H. Schillerwww.jochenschiller.deMC - 2008
-
Clustering of ad-hoc networksInternetSuper clusterClusterBase stationCluster head
Prof. Dr.-Ing. Jochen H. Schillerwww.jochenschiller.deMC - 2008
-
The next step: Wireless Sensor Networks (WSN)Commonalities with MANETsSelf-organization, multi-hopTypically wireless, should be energy efficient
Differences to MANETsApplications: MANET more powerful, more general WSN more specificDevices: MANET more powerful, higher data rates, more resources WSN rather limited, embedded, interacting with environmentScale: MANET rather small (some dozen devices) WSN can be large (thousands)Basic paradigms: MANET individual node important, ID centric WSN network important, individual node may be dispensable, data centricMobility patterns, Quality-of Service, Energy, Cost per node Example:www.scatterweb.net
Prof. Dr.-Ing. Jochen H. Schillerwww.jochenschiller.deMC - 2008
-
Properties of wireless sensor networksSensor nodes (SN) monitor and control the environmentNodes process data and forward data via radioIntegration into the environment, typically attached to other networks over a gateway (GW)Network is self-organizing and energy efficientPotentially high number of nodes at very low cost per node
SNGWSNSNSNSNSNSNSNSNSNSNGWGWGWBluetooth, TETRA, EthernetSNGPRSWLANALARM!
Prof. Dr.-Ing. Jochen H. Schillerwww.jochenschiller.deMC - 2008
-
Promising applications for WSNsMachine and vehicle monitoringSensor nodes in moveable partsMonitoring of hub temperatures, fluid levels
Health & medicineLong-term monitoring of patients with minimal restrictionsIntensive care with relative great freedom of movement
Intelligent buildings, building monitoringIntrusion detection, mechanical stress detectionPrecision HVAC with individual climate
Environmental monitoring, person trackingMonitoring of wildlife and national parksCheap and (almost) invisible person monitoringMonitoring waste dumps, demilitarized zones
and many more: logistics (total asset management, RFID), telematics WSNs are quite often complimentary to fixed networks!
Prof. Dr.-Ing. Jochen H. Schillerwww.jochenschiller.deMC - 2008
-
Prof. Dr.-Ing. Jochen H. Schiller cst.mi.fu-berlin.de 2008-03-12Sensor Networks: Research AreasReal-World IntegrationGaming, TourismEmergency, RescueMonitoring, Surveillance
Self-configuring networksRobust routingLow-power data aggregationSimple indoor localization
Managing wireless sensor networksTools for access and programmingUpdate distribution
Long-lived, autonomous networksUse environmental energy sourcesEmbed and forget
Prof. Dr.-Ing. Jochen H. Schillerwww.jochenschiller.deMC - 2008
-
WSN: Earthquake detectionThe occurrence of an earthquake can be detected automatically by accelerometers. Earthquake speed: around 5-10km/sIf the epicenter of an earthquake is in an unpopulated area 200km from a city center, an instantaneous detection system can give a warning up to 30 seconds before the shockwave hits the city.If a proper municipal actuation network is in place:Sirens go offTraffic lights go to redElevators open at the nearest floorPipeline valves are shutEven with a warning of a few seconds, the effects of the earthquake can be mitigated.Similar concept can be applied to Forest fireLandslidesEtc.C.S. Raghavendra, K.M. Sivalinguam and T. Znati Editors. Wireless Sensor Networks. Springer, 2006
Prof. Dr.-Ing. Jochen H. Schillerwww.jochenschiller.deMC - 2008
-
WSN: Cold Chain ManagementSupermarket chains need to track the storage temperature of perishable goods in their warehouses and stores.Tens if not hundreds of fridges should be monitored in real-timeWhenever the temperature of a monitored item goes above a thresholdAn alarm is raised and an attendant is warned (pager, SMS)The refrigeration system is turned onHistory of data is kept in the system for legal purpose
Similar concept can be applied to pressure and temperature monitoring inProduction chainsContainersPipelines www.ip01.com
Prof. Dr.-Ing. Jochen H. Schillerwww.jochenschiller.deMC - 2008
-
WSN: Home automationTemperature managementMonitor heating and cooling of a building in an integrated wayTemperature in different rooms is monitored centrally A power consumption profile is to be drawn in order to save energy in the future
Lighting management:Detect human presence in a room to automatically switch lights on and offResponds to manual activation/ deactivation of switchesTracks movement to anticipate the activation of light-switches on the path of a person
Similar concept can be applied toIntrusion detection
Prof. Dr.-Ing. Jochen H. Schillerwww.jochenschiller.deMC - 2008
-
WSN: Precision Agriculture managementFarming decisions depend on environmental data (typically photo-synthesis):Solar radiationTemperatureHumiditySoil moisture
These data evolve continu- ously over time and spaceA farmers means of action to influence crop yield :IrrigationFertilizationPest treatmentTo be optimal, these actions should be highly localized (homogenous parcels can be as small as one hectare or less)Environmental impact is also to be taken into accountSalinization of soilsGroundwater depletionWell contamination
Prof. Dr.-Ing. Jochen H. Schillerwww.jochenschiller.deMC - 2008
-
Routing in WSNs is differentNo IP addressing, but simple, locally valid IDsExample: directed diffusionInterest MessagesInterest in sensor data: Attribute/Value pairGradient: remember direction of interested nodeData MessagesSend back data using gradientsHop count guarantees shortest path
Sink
Prof. Dr.-Ing. Jochen H. Schillerwww.jochenschiller.deMC - 2008
-
Energy-aware routingOnly sensors with sufficient energy forward data for other nodesExample: Routing via nodes with enough solar power is considered for free
Prof. Dr.-Ing. Jochen H. Schillerwww.jochenschiller.deMC - 2008
-
Solar-aware routingSolar-powered nodeSend status updates to neighborsEither proactive or when sniffing ongoing trafficHave neighbor nodes reroute the traffic
Prof. Dr.-Ing. Jochen H. Schillerwww.jochenschiller.deMC - 2008
-
Many different stepsWalkingAt least one foot on the groundLow step frequency
RunningPeriods without ground contactSimilar to jumpingHigher step frequency, wider steps
SprintingSimilar to runningHighest step frequencyOnly short distances
What about crawling, jumping, stumbling
Prof. Dr.-Ing. Jochen H. Schillerwww.jochenschiller.deMC - 2008
-
The Future of WSNsFundamental requirements today only partially fulfilledLong life-time with/without batteriesSelf-configuring, self-healing networksRobust routing, robust data transmissionManagement and integration
Think of new applicationsIntelligent environments for gaming
Still a lot to doIntegration of new/future radio technologiesCheap indoor localization (+/- 10cm)More system aspects (security, middleware, )Prove scalability, robustnessMake it cheaper, simpler to use
Already today: Flexible add-on for existing environmental monitoring networks
Prof. Dr.-Ing. Jochen H. Schillerwww.jochenschiller.deMC - 2008
Universitt KarlsruheInstitut fr TelematikUniversitt KarlsruheInstitut fr TelematikMobilkommunikationSS 1998Prof. Dr. Dr. h.c. G. KrgerE. Dorner / Dr. J. Schiller*Prof. Dr. Dr. h.c. G. KrgerE. Dorner / Dr. J. SchillerUniversitt KarlsruheInstitut fr TelematikUniversitt KarlsruheInstitut fr TelematikMobilkommunikationSS 1998Prof. Dr. Dr. h.c. G. KrgerE. Dorner / Dr. J. Schiller*Prof. Dr. Dr. h.c. G. KrgerE. Dorner / Dr. J. SchillerUniversitt KarlsruheInstitut fr TelematikUniversitt KarlsruheInstitut fr TelematikMobilkommunikationSS 1998Prof. Dr. Dr. h.c. G. KrgerE. Dorner / Dr. J. Schiller**Prof. Dr. Dr. h.c. G. KrgerE. Dorner / Dr. J. SchillerUniversitt KarlsruheInstitut fr TelematikUniversitt KarlsruheInstitut fr TelematikMobilkommunikationSS 1998Prof. Dr. Dr. h.c. G. KrgerE. Dorner / Dr. J. Schiller**Prof. Dr. Dr. h.c. G. KrgerE. Dorner / Dr. J. SchillerUniversitt KarlsruheInstitut fr TelematikUniversitt KarlsruheInstitut fr TelematikMobilkommunikationSS 1998Prof. Dr. Dr. h.c. G. KrgerE. Dorner / Dr. J. Schiller**Prof. Dr. Dr. h.c. G. KrgerE. Dorner / Dr. J. SchillerUniversitt KarlsruheInstitut fr Telematik*Prof. Dr. Dr. h.c. G. KrgerE. Dorner / Dr. J. SchillerUniversitt KarlsruheInstitut fr Telematik*Prof. Dr. Dr. h.c. G. KrgerE. Dorner / Dr. J. SchillerUniversitt KarlsruheInstitut fr Telematik*Prof. Dr. Dr. h.c. G. KrgerE. Dorner / Dr. J. SchillerUniversitt KarlsruheInstitut fr Telematik*Prof. Dr. Dr. h.c. G. KrgerE. Dorner / Dr. J. SchillerUniversitt KarlsruheInstitut fr TelematikUniversitt KarlsruheInstitut fr TelematikMobilkommunikationSS 1998Prof. Dr. Dr. h.c. G. KrgerE. Dorner / Dr. J. Schiller*Interest MessagesInterest in sensor data: Attribute/Value pairGradient: remember direction of interested node Data MessagesSend back data using gradientsHop count guarantees shortest path
Prof. Dr. Dr. h.c. G. KrgerE. Dorner / Dr. J. SchillerUniversitt KarlsruheInstitut fr TelematikUniversitt KarlsruheInstitut fr TelematikMobilkommunikationSS 1998Prof. Dr. Dr. h.c. G. KrgerE. Dorner / Dr. J. Schiller*Energy Battery-driven nodesSome nodes with permanent power supplySolar cells
Implications of using solar energyRouting across solar-powered nodes freeBUT: Sun is moving...
Integrate solar-awareness in routingProf. Dr. Dr. h.c. G. KrgerE. Dorner / Dr. J. SchillerUniversitt KarlsruheInstitut fr TelematikUniversitt KarlsruheInstitut fr TelematikMobilkommunikationSS 1998Prof. Dr. Dr. h.c. G. KrgerE. Dorner / Dr. J. Schiller*Statusleiste erklrenProf. Dr. Dr. h.c. G. KrgerE. Dorner / Dr. J. SchillerUniversitt KarlsruheInstitut fr TelematikUniversitt KarlsruheInstitut fr TelematikMobilkommunikationSS 1998Prof. Dr. Dr. h.c. G. KrgerE. Dorner / Dr. J. Schiller*Gehen:-zweiter Fu sttzt den Krper-f