98 research outputs found

    Analysis of IPv6 Neighbor Discovery for Mobile and Wireless Networks

    Get PDF
    The majority of the current 3GPP and M2M networks use or will use IPv6 for accessing the internet. These IPv6 networks use Neighbor Discovery as defined in RFC 4861 to identify their neighbors on the link and see if they are active. The increase in the complexity of wireless networks and introduction of battery operated devices sets forth notable challenges to certain assumptions in the RFC 4861. The RFC 4861 is more suited for wired networks and its implementation in wireless networks makes it more inefficient. This thesis work focuses on the energy efficient implementation of RFC 4861 using the protocols mentioned in draft-chakrabarti-nordmark-6man-efficient-nd-06. The draft suggests a method of registering all the nodes in the network to their default router, so that the router takes care of all the basic neighbor discovery functionalities without disturbing the battery operated devices which are in sleepy mode. Alongside the legacy Neighbor Discovery, the optimizations proposed by the draft are implemented, on a RADVD based router and an Ubuntu host, to reduce redundant multicast signaling in mobile networks. These optimizations are theoretically analyzed to check if the draft is beneficial for the scalability and transient nature of the wireless networks.Popular Science Report With the rise of Internet of Things (IoT) and Machine to Machine communication (M2M) based networks, more and more wireless devices are communicating to each other and hence there is a need for IPv6 (Internet Protocol version 6) addressing. This new type of addressing forces us to make some design changes in the existing protocols. Wireless devices are mostly mobile, battery operated (hence a power constraint exists) and can undergo several disconnections and reconnections while moving inside the network, whereas wired devices are less prone to network instabilities and almost always connected to a power source. Because of these differences, the protocols of wired devices are not always suitable for wireless networks. Still today’s wireless devices often use protocols that were designed for wired devices and tend to be inefficient. This thesis work deals with one such protocol called Internet Control Message Protocol (ICMP), which is widely used to send control messages across the network between different nodes. Neighbor Discovery Protocol (NDP) is a part of ICMPv6 that helps a node in the network identify its Neighbors on the other side of the link. Present generation wireless devices use the protocols defined in RFC 4861 (a common reference used by major communication companies while creating products) for Neighbor discovery. But this protocol proves to be inefficient by flooding the network with unwanted multicast control messages. Hence we analyze a modified version of the existing NDP against the legacy protocol. RFC 4861 based ‘legacy NDP’ works based on multicasting. Every IPv6 host is a part of several solicited node multicast groups. All nodes with the same last 24 IPv6 address bits belong to the same solicited node multicast group. NDP is also performed based on 4 major control message packets namely, Router Solicitation (RS), Router Advertisement (RA), Neighbor Solicitation (NS) and Neighbor Advertisement (NA). RA is the packet from the router which contains all the information about the network and the router. It is flooded periodically through an all node multicast group to all IPv6 nodes. When a node wants a particular router to send some information about the network immediately without waiting for periodic RAs, it sends an RS. Neighbor Advertisement is used by a node to send information about itself to other nodes in the network. Neighbor Solicitation, as name suggests, is used by a particular node to request for information about another node. Consider the case of a network with a host and a router, and a new node enters the network. It sends out RS to the all routers multicast group, and the router responds with an RA. The new host reads the information about the network and begins address configuration. Stateless Address Auto Configuration (SLAAC) is the most suitable method of address configuration for M2M networks. Hence according to SLAAC, the new host chooses an IP address and checks if the address has already been used by some other host. This process is called as Duplicate Address Detection (DAD) and is carried out by sending out NS for that chosen IP address at the solicited node multicast group address. This means that the new host asks information about a node with that IP address, which may or may not exist at all. If a reply comes, it means that there is a node using this address. If a reply does not come, then it is free to choose the address. The response NA in case of a duplicate address, will be broadcast to all IPv6 nodes. A NS-NA pair is also used to resolve each other’s IP addresses against their MAC addresses. One of the major reasons why this method seems to be inefficient is that current wireless devices are programmed to be in sleep modes when not in use. The flow of control messages to unrelated nodes (because of multicast) will only lead to disrupted sleep. Consider a host A in the network which is in sleep mode, and has an IP address aaaa::aaaa:aaaa:a. When a new host arrives and wants to register itself with an address of aaaa::baaa:aaaa:a, it sends out NS to the multicast group of A (because A has the same last 24 bits). When a packet reaches A, it wakes up from sleep mode, reads the message and identifies that this message was not destined to it. If there was another host in the group which used the same IP address, then host A will also receive another NA, which again is not of any use. Hence this protocol proves to be inefficient. The new proposed protocol works with an efficient implementation of the NDP. It introduces a concept of registering a host with a router. And the router sends out NS and NA instead of the host. Hence each router’s NCE will be the source of information for those hosts which are registered to that router. If a node will request for details about another host, the details will either be fetched from that router’s NCE or the NS will be forwarded to that particular host instead of being multicast. The router to whom the destination host is registered will then send NAs on behalf of its host. Hence in this protocol, the router performs more work and the host less, allowing the host to stay in sleep modes without any problems. The analysis of the two protocols begins with their implementation. We decided to test the working of the two protocols at two specific case scenarios: when several hosts join the network and when the channel links are unsteady. Both protocols were implemented and compared. The implementation of the legacy NDP began with a router and a host system. We used an Ubuntu PC (which generally works as a host) as a router. RADVD is an open source software that helps to generate RAs and Wireshark the software used to analyze packets in the network. To make a host work as a router, the following changes were made: 1. Turn on forwarding in the PC 2. Configure the router with a static IP address 3. Configure the interfaces and add corresponding routing information 4. Install RADVD and include all the network parameters in the config file 5. Turn on Wireshark 6. Turn on RADVD Once all these steps are done in order, the RADVD sends out periodic RAs that can be viewed on the Wireshark. When the host is connected to the network, the entire process of address configuration and DAD can be identified. When pinged, the address resolution process can also be verified. To implement the new protocol, we downloaded the source code of the open source RADVD from GitHub and change the packet formats of the RA, NS and NA. When the router works as a NEAR (Neighbor Discovery Efficiency Aware Router), the host has to understand that it should not use legacy NDP anymore and must act as an Efficiency Aware host (EAH). This information comes with the RA in the form of a flag. When this is done, the host sends an NS in the form of registration request. The details of the host go in the Address Resolution Option (ARO) of the NS. The router responds with an NA which is the acknowledgement for the registration request. Now the host can enter into sleep mode and the router will send control packets to it only when required. When the registration expires, a new registration process has to be setup or a de-registration process has to happen by setting the ARO option in the NS to 0. To implement the changes in the host side, we downloaded the source code for Linux from GitHub and led the decoder side. The process ends by making all the necessary code changes, recompiling a new Kernel and installing the new version of Linux on the hosts. However, the complete reprogramming of the kernel is not handled in this thesis work. But the entire plan for the programming and the rest of the implementation is included in this report. The theoretical analysis of the protocols is also included in this report. This report concludes with a general analysis of the whole protocol. The whole protocol which was completely decentralized has a certain degree of centralized control now. As with all systems, centralization introduces better control but there is always a problem of device failure which can completely collapse the system. The protocol also provides solutions for router failure and recovery and hence the system is a good compromise between centralized and decentralized systems. If properly implemented, there will be an increase in the network efficiency (inversely proportional to the number of control packets for every single data point). This thesis ends with the theoretical analysis. A proper implementation followed by a practical analysis would be a natural future amendment to the projec

    Design and implementation of multicast listener discovery protocol on constrained devices

    Get PDF
    Para la aplicación y apoyo del uso de IPv6 en 6LoWPANs (Low-power Wireless Personal Area Networks), ha habido numerosas investigaciones y se han desarrollado protocolos y mecanismos estandarizados. Sin embargo para la comunicación multicast en estas redes, el tema esta aún bastante abierto a la investigación. La comunicación multicast permite conectar routers con hosts preseleccionados por grupos. La comunicación multicast es muy beneficiosa para aplicaciones con dispositivos con recursos limitados ya que ahorra energía y ancho de banda. A continuación mostramos posibles ejemplos de estas aplicaciones, la iluminación de un edificio organizada por plantas, una red de sensores de temperatura organizados por áreas y un largo número de aplicaciones basadas en la comunicación de un punto a varios puntos preseleccionados. El grupo de investigación de la universidad de Aalto (Finlandia) llamado MAMMoTH (Massive Scale Machine-to-Machine Service) tiene como uno de sus objetivos construir un protocolo multicast para dispositivos con recursos limitados. Para el desarrollo de este protocolo, es necesario un protocolo de encaminamiento multicast y un protocolo de gestión de grupos multicast. Este último, es el protocolo que he desarrollado como “research assistant” para mi proyecto final de carrera. En este proyecto final de carrera, se ha diseñado, implementado y evaluado el protocolo MLD para dispositivos con recursos limitados. MLD permite a un router IPv6 gestionar grupos multicast. No obstante, el uso de MLD en LoWPANs tiene varios problemas como la definición del area local, el tamaño de los paquete y la complejidad del comportamiento del router. El protocolo ha sido implementado en Contiki, un sistema operativo para desarrollar para el “Internet of Things”. Contiki permite conectar sistemas pequeños de poco coste con poca potencia a Internet. Hemos ampliado la pila TCP/IP de Contiki para respaldar MLD. El protocolo ha sido evaluado y analizado sobre un simulador en diferentes topologías para validar el funcionamiento. Del mismo modo, también se ha verificado que el tamaño del objeto creado no ocupaba más memoria de la disponible en los dispositivos Z1 Zolertia

    A Cross-System Approach for Multimedia Services with IP Multicast in 4G Networks

    Get PDF
    The increased demand for multimedia services by mobile end users in recent years have driven both Broadcast and Wireless Network operators to develop new systems and architectures for the deployment of such services. The proposed solutions are nonetheless limited either in terms of QoS or Capabilities to deliver new interactive services. This paper highlights strengths and drawbacks of the existing technologies in terms of QoS, Security and Mobility. In order to fill the gap between current solutions we propose a new architecture that builds itself on the synergies created by a heterogeneous network made of existing delivering technologies, such as 3GPP/MBMS and DVB, where services can be delivered to end-users in the most appropriate way for end-users and operators alike. A prototype implementation is further described.EU project - IST-2002- 506997 Daidalos I

    Evaluación de mecanismos de soporte de tráfico multicast con movilidad basada en red

    Get PDF
    Con el auge actual de Internet y el incremento en el uso de dispositivos móviles ha aumentado el consumo de contenido multimedia, del cual cabe destacar el streaming de vídeo, el vídeo bajo demanda y la IPTV. Muchos de estos servicios hacen uso de Multicast, un método de transmisión de datos a múltiples redes y destinatarios de manera simultánea. Para poder realizar transmisiones de datos multicast hay direcciones IP reservadas, tanto en IPv4 como en IPv6. El funcionamiento de multicast es muy sencillo, el host que quiere recibir tráfico manda un mensaje a su router y se suscribe al grupo multicast (IP dentro de un rango reservado), a partir de ahí el router ya sabe que tiene que enviar el tráfico multicast de ese grupo a ese host en particular. El protocolo multicast en el que nos vamos a centrar es MLD (Multicast Listener Discovery). MLD es una herramienta que utilizan los routers IPv6 para descubrir subscriptores multicast en un enlace directo, es el equivalente a IGMP en IPv4. Se usará la versión más reciente de este protocolo MLDv2. El objetivo final de este Trabajo Fin de Grado es evaluar estos mecanismos de envío de tráfico multicast (MLD), en un escenario real bajo un protocolo de movilidad basado en red (PMIPv6). Para desplegar este escenario se utilizará un prototipo con routers empleando la distribución OpenWRT.With the current boom of Internet and the rising use of mobile devices, the media content consumption has increased, including video streaming, video on demand and IPTV. Many of this services use Multicast. Multicast is a method of sending IP datagrams to a group of interested receivers in a single transmission. To do multicast data transmissions are reserved a range of IP addresses, both in IPv4 and in IPv6. Multicast operation is simple, the host who wants to receive traffic sends a message to its router and it subscribes to the multicast group (IP's reserved range). Then the router knows how to send multicast traffic for that group to that particular host. We are going to focus in the multicast protocol MLD (Multicast Listener Discovery). MLD is tool used by IPv6 routers to discover multicast listeners in a direct link, it is equivalent to IGMP in IPv4. We focus on the latest version of this protocol, MLDv2. The final objective of this Bachelor Thesis is to evaluate this multicast sending mechanisms (MLD), in a real scenario running a network-based mobility management protocol (PMIPv6). To deploy the scenario we will utilize a prototype with routers using a OpenWRT distribution.Ingeniería Telemátic

    Multicast Mobility in Mobile IP Version 6 (MIPv6) : Problem Statement and Brief Survey

    Get PDF
    Publisher PD

    Mathematical evaluation of context transfer and multicast fast reroute in multicast enabled network mobility management

    Get PDF
    Internet applications such as web based monitoring; live internet video, online video, video conference, webcam viewing and internet video to TV are highly used in today’s IP communication. The trends of these applications are, that they are played on mobile devices and distributed to many end users. Multicast communication over IP contributes to the end users applications distribution. It has been discovered by a CISCO research that mobile multicast traffic will soon reach zetabyte in 2019. The aim of this paper is to introduce new method that enable multicast in network mobility management. The new method is using context transfer and multicast fast reroute technique. The proposed method is quantitatively evaluated in terms of packet loss and service recovery tim

    Scalability Improvement Of Multicast Source Movement Over Mobile Ipv6 Using Clustering Technique

    Get PDF
    Mobile IPv6 (MIPv6) describes how a mobile node can change its point of attachment to the Internet. While MIPv6 focuses on unicast communications, it also proposes two basic mechanisms, known as bi-directional tunnelling and remote subscription, to handle multicast communications with mobile members. In the mean time, the deployment of Source-Specific Multicast (SSM) is of great interest, using the Protocol Independent Multicast-Sparse Mode (PIM-SM) and Multicast Listener Discovery (MLDv2) protocols. In the particular case of mobile IPv6 SSM sources, the mechanism proposed in MIPv6 to support multicast communications introduced a number of problems that need to be addressed. First, in most scenarios the MIPv6 solution leads to suboptimal routing by setting up a tunnel to forward packets between the home agent in its home network and the current location in the foreign network. The use of a third party when roaming which is the home agent leads to suboptimal routing. Second, it introduces a central point of failure (i.e. the Home Agent (HA)) that is not to be neglected. The proposed MIPv6 solution also induces a great traffic concentration around this central point. Third, the processing task of the central point increases with the number of mobile sources it serves, thus reducing the efficiency of multicast delivery. The objective of this thesis is to remove some of the obstacles encountered in the way of multicast deployment in the Internet, thereby making Mobile IPv6 better equipped to support mobile SSM sources. Recent proposals to provide multicasting over mobile IP focuses mainly on recipient mobility but little attention has been given to the case of source mobility. This thesis attempts to address this problem. The basic essence of the problem is that while the effect of receiver movement on the multicast tree is local, the effect of source movement may be global and it may affect the complete multicast delivery tree. The initial design was motivated by the need to support one-to-many and many-to-many applications in a scalable fashion. Such applications cannot be serviced efficiently with unicast delivery. As the overall problem statement of “Scalability Improvement of Multicast Source Movement over IPv6 Using Clustering Technique” is extremely complex, we divide the problem into the following components: build the multicast delivery tree for source specific multicast which is a routing issue; clustering receivers based on their IPv6 addresses; improve the state scalability of these clusters which is a deployment issue; find an efficient way for service distribution which is a deployment issue as well; and finally, the seamless integration of the work with Mobile IPv6 allowing it to support multicast efficiently for mobile nodes. The combined solution provides a comprehensive procedure for planning and managing a multicast-based IPv6 network. The outcome of this thesis are: a software to represent an architecture of a multicast delivery tree for one-to-many type of group communication, a group management scheme that could handle the end nodes subscription/un-subscription process with the required updates, an average subscription delay of between 0.255 ms-0.530 ms and un-subscription delay of between 0.0456 ms-0.087 ms for up to 50000 nodes, an approach to multicast forwarding state reduction that could support small-size groups as well as large-size groups, and finally the integration of the work with Mobile IPv6 to handle the multicast source movement

    Accessing the Internet through Moving Networks

    Get PDF
    Poster at IST Mobile & Wireless Communications Summit 2007, Budapest, Hungary, 1-5 July 2007.The success of cellular communications networks shows the interest of users in mobility. Host mobility support in IP networks is a first step in the adaptation of these networks to the needs of users in this field. But, there exists also the need of supporting the movement of a complete network that changes its point of attachment to the fixed infrastructure. This paper describes the architecture designed in the EU DAIDALOS II project to provide Internet access through moving networks. The designed moving networks architecture support the following main features: Route Optimisation, Multicast traffic delivery, security and authentication integration, end-to-end QoS and interaction with Localised Mobility Management solutions.Publicad
    corecore