Vous êtes sur la page 1sur 8

1. (15 points) Mobile IP. a.

Discuss the performance inefficiency of mobile IP regarding data forwarding from a correspondent node to a mobile node. Answer: Triangular routing causes mobile IP inefficient. It is made of the three segments, CN to HA, HA to COA/MN, and MN back to CN. With the basic mobile IP protocol all packets to the MN have to go through the HA. This can cause unnecessary overheads for the network between CN and HA, but also between HA and COA, depending on the current location of the MN. As the example shown in the textbook, latency can increase dramatically. This is particularly unfortunate if the MNs and has are separated by, e.g. transatlantic links. (7 points ) b. Discuss an optimization to improve the performance of mobile IP as well any problem(s) brought in by the optimization. Answer: One way to optimize the route is to inform the CN of the current location of the MN. The CN can learn the location by caching it in a binding cache which is a part of the local routing table for the CN. The appropriate entity to inform the CN of the location is the HA. The detail process is: CN can request the current location from the HA. If allowed by the MN, the HA returns the COA of the MN via an update message. The CN can send its data directly to the cur rent FA, FA forwards the packets to the MN. This scenario shows a COA located at an FA. Encapsulation of data for tunneling to the COA is now done by the CN, not the HA. (4 points) This optimization of mobile IP causes several security problems. Not all users of mobile communication systems want to reveal their current location( in the sense of an IP subnet ) to a communication partner. (4 points) 2. (15 points) DHCP and its uses to support mobility. a. What is the basic purpose of DHCP? Names the entities of DHCP. Answer: DHCP is a mechanism for configuring nodes. It is mainly used to simplify the installation and maintenance of networked computers. (4 points) The entities acquired via DHCP are, e.g., DHCP relay, DHCP server etc. (4 points) b. How can DHCP be used for mobility and support of mobile IP? Answer: DHCP is a good candidate for support the acquisition of COA for mobile nodes. The same holds for all other parameters needed, such as address of the default router, DNS servers etc. A DHCP server should be located in the subnet of the access point of the mobile node, or at least a DHCP relay should provide forwarding of the messages. (7 points) 3. (20 points) Transmission loss in wired and wireless networks.

a. State and compare different types of transmission l ss in TCP that can o occur in wired and wireless networks. Answer: Packet loss due to congestion: Congestion may appear from time to time even in carefully designed networks. The packets buffers of a router are filled and the router can not forward the packets fast enough because the sum of the input rates of packets destined for one output link is higher than the capacity of the output link. The only thing a router can do in this situation is to drop packets. This kind of packet loss can occur in both wireless and wired networks. Packet loss due to random loss The random loss is due to bit corruption and link errors. In wired network, the transmission error rate (10-10-10-12) is generally very low so that it can be neglected. However it is not true for the wireless network (10-2 -10-4 ). Packet loss due to burst loss The burst loss may be initiated by signal fading. Prolonged uncontrolled channel interference can lead to correlated packet losses. Yet it generally occurs over a very short duration, leading a loss of several consecutive segments at a time. In an infrastructure network, when a mobile host is moved from the coverage of a base station to another, all subsequent communications are routed via the new base station and the handoff process is completed. However the packet may be lost as they are routed to the old station during the process of the handoff. Therefore a handoff event can initiate a burst loss event. In ad hoc network, same situation can happen. During to the mobility of the mobile host, the network connectivity and the network topology can change. The transmission path for a traffic flow may be affected. Some time is necessary to complete the rerouting process for the traffic flow. Thus some packet belong to the same traffic flow may be lost during the process. As a result, a burst loss event occurs in this case. (6 points) b. What is the reaction of TCP Reno in case of segment loss? Answer: When sender receives three duplicate ACKs, fast retransmit is triggered such that inferred loss segment is retransmitted immediately. Fast recovery is also combined with fast retransmit. A fast retransmit suggests the presence of mild congestion. The slow start threshold is set to half of the amount of outstanding data sent to the network. Since the reception of a duplicate ACK indicates the departure of a segment from the network, congestion window is set to the sum of the slow start threshold and the number of the duplicate ACK received.

When an ACK for a new segment arrives, congestion window is reset to the slow start threshold and congestion avoidance is triggered. When the retransmission timer expires, the inferred loss segment is retransmitted. At the same the slow start is triggered. The slow start is performed starting with congestion window equal to one until it approaches to a predefined threshold. The congestion avoidance phase is then carried out where congestion window is increased by one for each RTT. ( 6 points ) c. In what situation does this reaction make sense and why it is quite often problematic in the case of wireless networks? Answer: The reaction makes sense if the packet loss is due to network congestion. However in wireless network, non-congestive segment loss becomes nonnegligible because of the following problems as below: Channel contention: In wireless network, signals are broadcast and interfere with each others. A collision will be sensed and transmission may fail when there exists concurrent transmission within the interference range of either sender. This problem can be exacerbated in TDMA based multi- hop wireless networks. The number of segment that can be in flight concurrently is limited from a source to a destination, thereby constraining the achievable throughput for a TCP connection. Furthermore the correlated arrivals of data segments and their ACKs lead to contention for the wireless channel, causing excessive collisions and packet losses. Signal Fading: Signal transmitted over the wireless medium may be distorted or weakened because they are propagated over an open unprotected and ever changing medium with irregular boundary. Besides the same signal may disperse and travel on different paths may take different times to reach the destination. Thus the resultant signal after summing up all dispersed signals may have been significantly distorted and attenuated when compared with the transmitted signal. The receiver may not recognize the signal and hence the transmitted data can not be received. Mobility: In infrastructure network, a handoff occurs when a mobile host moved from the coverage of a base station to another. In some occasions, the packets are lost during the handoff. In ad hoc network, the network topology changes when a mobile host moves. The same situation will happens in this case as the infrastructure network. Limited Power and Energy: A mobile host is generally handy, small size and dedicated to perform a certain set of functions. So the power source is limited for mobile host. To conserve the energy, it should be able to transmit an d receive in an intelligent manner so as to minimize the number of the retransmissions and receptions for certain communication operation. (8 points ) 4. (25 points) Compare and contrast ATCP, Freeze -TCP, TCP-Casablanca, TCPDOOR, and TCP-Peach in terms of their solution approaches, devices involved,

control information needed, and merits and drawbacks. Answer: Solution approach: ( 5 points ) In TCP-Peach, dummy segment, which are low-priority segments with a copy of the recently transmitted data, is employed to probe network. A successfully delivered dummy segment indicates that unused network resources exist and the transmission rate can then be increased accordingly. In TCP-Casablanca, a biased queue management scheme is applied to discriminate congestion losses from random losses. Congestion losses are de-randomized so that the distribution of congestive losses differs from that of random wireless losses. Such information is then used to determine whether congestion occurs. So these two solutio ns are congestion detection approaches. In Freeze-TCP, the receiver continuously monitors the signal strength and detects any impending handoffs. ZWA is sent to force the sender into the persist mode. Then all retransmission timers and the size of congestion windows are frozen until the advertised window is opened in the receiver. In TCP-DOOR, the receiver detects the out-of-order and then notifies the sender. The sender can either temporally disable congestion control or perform recovery during congestion avoidance. During disabling congestion control, the sender will keep it state unchanged for a time period. By instant recovery during congestion avoidance, the source recovers immediately to the state before the congestion response. The signal strength in Freeze-TCP and the out of order information in TCP-DOOR are used to decide the communication activity of a TCP connection may/may not be readjusted based on the network conditions after the suspension. So these two methods can be considered as the state suspension approach. In ATCP, the problem in ad hoc network is revolved by a sender-side, all-in-one solution. The key idea of ATCP is to introduce an ATCP layer between TCP and IP at the sender protocol stack. The current TCP state can be monitored and ECN/ICMP s can be employed to sense the onset of the network congestion. Based on the above information, the network can go to one of the four different states. The 4 states includes disconnect state, congestion control state, loss state and normal state. Different mechanisms can be triggered in the different states. So this method can be considered as the hybrid approach. Device involved and Control Information: ( 10 points ) ATCP : ATCP layer is introduced between IP and TCP at the sender protocol stack. s When network congestion is experienced, a router sets the ECN flag when it processes a packet. Moreover an ICMP source quench message is sent to the sender directly by the router when the transmission path is unstable or/and the network is partitioned. So the sender and router are involved. Freeze-TCP: Freeze-TCP is devised as a receiver-side solution to improve the TCP performance. The receiver continuously monitors the signal strengths of its wireless antenna. When the impending handoff is experienced, the receiver can detect it. The

ZWA can be sent to se nder. As a result, the sender is forced i to persist mode, n whenever possible about one RTT before a handoff is expected to occur. In this case, the receiver is involved. TCP-Casablanca: TCP-Casablanca applies a simple biased queue management scheme to discriminate congestion losses from random loss. The data segments are marked either or in outby sender by the specific marking pattern. Moreover the retransmitted segments are always marked . When network congestion is in experienced, a router will drop the p ackets labeled out before packets. By in doing so, the dropping sequence will show correlated losses. Such correlation can be detected in receiver by computing a discriminator function. When the transmission path is unstable, the receiver can also find by computing the discriminator function. The reason is there is no correlation between the loss type of a segment and the dropping probability. In this case, the sender, receiver and router are involved. TCP-DOOR: TCP-DOOR is developed with detection of OOO and response for adhoc network. The OOO event is deemed to imply routing changes in the network. The TCP packet sequence number and ACK duplication sequence number, or current timestamps are inserted into each data and ACK segments. The sender/receiver based OOO detection can be employed OOO events. If the receiver detects the OOO event, it should notify the sender. So the sender and receiver are involved. TCP-Peach: TCP-Peach is developed to deal with the adverse effect with long propagation delays and high link error rates. The dummy segments and their ACKs are used to probe the available network resources. In the beginning, Sudden Start is done by the sender sends (rwnd-1) dummy segments after the first data segment. The receiver sends their ACKs back to sender. When a segment loss is detected through duplicate ACKs, the Fast retransmit is done and then Rapid Recovery is applied until the ACK for the lost data segment is received. Moreover when the network congestion is experienced, the Dummy segments and their ACKs are of lower priority than regular segments and should be dropped first. So router receiver and sender will be involved. Merits: ( 5 points ) ATCP is only an existing proposal that attempt to handle most of the problems relating to wireless networks. Since ATCP take over the control for segment retransmission whenever three duplicate ACKs are received or a retransmission timeout is going to occur, it successfully avoids taking any spurious congestion control measures which shrink the congestion window size unnecessarily. Freeze-TCP: The sender is frozen until a non-zero window size is advertised by receiver. The burst loss can be resolved and no modification is necessary for the intermediate nodes. TCP-Casablanca: It can give a highly congestion prediction accuracy.

TCP-DOOR: This approach can avoid invoking unnecessary congestion control by detecting and responding to OOO packet delivery events. TCP-Peach: This approach can maintain ACK-clocking when cwnd is smaller than the number of unacknowledged data segments, and more segment data can be sent during the certain duration after cwnd is halved. Drawback: ( 5 point s ) ATCP: First, ATCP is inefficient in using the ava ilable bandwidth for data transmission in high-speed wireless networks with the presence of frequent route changes and network partition. Second ATCP requires the mobile hosts to be aware of and be implemented with ECN. The destination also needs to interp ret and forward ECN information. Third, ATCP do not allow a sender to send new data when it is in the loss state. The loss state can be frequent for the sender. Hence ACK-clocking can not be maintained. This substantially degrades the TCP performance running in an error-prone wireless network. Freeze-TCP: First, Freeze-TCP needs some cross-layer information so that the network stack of a mobile host must be aware of mobility; second, prediction must be done on when the disconnection occurs; third, the sche me fails to predict an upcoming disconnection even if it happens at a wireless link along the transmission path, where the end -points of the link are neither sender nor receiver; Fourth, the resumed transmission rate may be set inappropriately; Fifth, the scheme can only avoid the performance degradations due to disconnections. TCP-Casablanca: The TCP-Casablanca requires participating routers to have a differentia l packet dropping policy; besides it can not perform well in the presence of other TCP-friend ly flows when the congestive losses are dominant. TCP-DOOR: TCP-DOOR may set the sending rate of a connection inappropriately after a route change; besides it does not perform well in a congested network environment with substantial persistent packet reordering. TCP-Peach: Since the dummy segments are sent at a rate doubled that before a loss event is conjectured, they may be dropped at the routers since such an increase can lead to congestion. Besides, there would be wastage of network resource since the delivery of dummy segments does not result in any gain. Furthermore, all routers have to be configured to implement priority-based scheduling.

5. (25 points) Mobility issues in file systems. a. Why is the strong consistency of file systems problematic in a wireless and mobile environment? Answer:

It is simply too expensive to maintain strong consistency. Continuous updates require permanent connectivity, without connectivity all access must be blocked. (5 points) b. Discuss in detail the alternatives in place of the strong consistency of file systems to support client mobility. Answer: There are several alternatives in places of the strong consistency of file systems to support client mobility such as caching, prefetching, hoarding, automatic reintegration, manual reintegration etc. Caching: Caching means to save a copy of a file when it is downloaded from a server as requested by a client. The operating system on each client intercepts open and close file system calls and forwards them to a cache- management process called Venus in AFS as an example. After a file is opened, read and write operations on its bypass Venus. Venus contacts a server only on a cache miss on open, or on a close after modification. In both cases, the file is transferred in its entity. Cache coherence is maintained by a callback mechanism, whereby servers notify workstations of changes to cached files. Client dynamically determines the location of tiles on servers and cache s this information. Prefetching: Prefetching means fetch files from a server in advance the client makes a request for these files. To improve the caching performance, it is better to put the most important files into the cache. Different strategies are developed to do it. As an example in Coda, the files currently used can be prefetched when the client is strongly connected to the server. The importance of the file is also pre-defined by user. Coda can use such information to explicitly pre- fetch it. Hoarding: To provide all the necessary files for disconnected work, hoarding is employed to offer extensive mechanisms for pre-fetching of files while connected. If the client is connected to the server with a strong connection, hoarding transparently pre- fetches files currently used. This automatic data collection is necessary for it is impossible for a standard user to know all the files currently used. A user can pre-determine a list of files, which Coda should explicitly pre-fetch. Additionally a user can assign priorities to certain programs. Coda now decides on the current cache content using the list and a LRU strategy. Automatic reintegration: When the client is disconnected, the system keeps a record of changed files, but does not maintain a history of changes for each file. The cache always has only one replicate. After reconnection, the system executes a sequence of update operations to make the replicates on the server identical to the cached copy.

Manual reintegration: There are also some conflicts that can not been resolved automatically. As an example i Coda, automatic reintegration can not work n when two users have changed the same file. In this case the systems can saves the changed files as copy on the server to allow for manual reintegration. (20 points)

Vous aimerez peut-être aussi