MOBILITY AND SERVICE MANAGEMENT FOR FUTURE ALL-IP BASED WIRELESS NETWORKS Weiping He Preliminary Proposal, Dec. 12, 2006 Committee: Dr. Ing-Ray Chen, Committee Chair Dr. Csaba Egyhazy Dr. Mohamed Eltoweissy Dr. Chang-Tien Lu Dr. Gregory Kulczycki 1 Outline Introduction Research Statement and Methods Related Works Dynamic Mobility Anchor Points IMSA: Integrated Mobility and Service Management Architecture Applications of Proxy for Integrated Cache Consistency and Mobility Management Conclusion and Future Work 2 Mobility Management Enables networks to locate the MN for service delivery and to maintain active connections as the MN is moving. Location Management. Keep track the location of MNs. Include location registration and call delivery. Handoff Management. An MN keeps the connection active when the MN moves. Four tasks Deciding when to handoff Selecting a new AP Acquiring resources Informing the old AP reroute the packet and transfer state information. 3 Service Management Ensures mobile nodes to get data services reliably, correctly and efficiently. Service request management Request handling: accept service requests and transform requests into proper form. Request delivery: forward server replies to the MN. Request accounting, authentication and authorization (AAA) Service handoff management An MN keeps its services connection when it moves from one access point to another one. 4 Research Statement Develop new mobility and service management schemes for future all-IP systems to minimize the overall network cost. Future all-IP based wireless networks provide network services based on the ubiquitous communication protocol: IP. Using per user based proxy to integrate mobility and service management to minimize the overall cost. 5 Future All-IP based Wireless Network Architecture Home agent IP Network Home Agent Registration Current location Forward packets Correspond node Correspondent Node Provides various services Access Router Access router Offers IP connectivity to MNs Powerful and flexible to host proxies to perform cross layers functions. Access Point Mobile Node Access Point Offers the wireless link connection to MNs 6 Research Challenges and Motivations Mobile connectivity is highly variable. Mobile nodes are relative resource-poor. Workload to ARs is highly variable. Mobility and service characteristics of MNs are highly variable Vast majority of terminals will be mobile in a few years. The vast majority of traffic will originate from IP-based applications. 7 Research Methods Extensive background research. Investigate of new techniques. Performance study via modeling and analysis. Demonstration of the applicability of proposed mobility and service management schemes. Simulation to validate analytical results. 8 Contribution Propose and analyze per-user regional registration schemes for integrated mobility and service management. Given a set of parameters characterizing the operational and workload conditions of a MN, there exists an optimal regional area size for the MN such that the network communication cost is minimized. Our scheme outperforms basic Mobile IPv6, Mobile IPv6 Regional Registration, and Hierarchical Mobile IPv6. 9 Network Layer Solutions (1) MIPv4 An MN is identified by its home address. If the MN is not in its home area, it has another address named Care of Address (CoA) associated with its current foreign location. The Home Agent maintains a dynamic mapping between the home address and CoA. A corresponding node always sends packets to the MN by the MN's home address. Pros: transparent to mobile applications. Cons: Triangle routing issue, CN HAFAMN , slow handover. Correspondent Node Global Internet Home Agent Foreign Agent 1 Mobile Node Foreign Agent 2 Mobile Node 10 Network Layer Solutions (2) Mobile IP Regional Registration Purpose: to reduce the location handoff overhead. Moves within the regional registration area, MN only performs a regional registration to the GFA. Moves to another regional area, MN will perform a home registration. Packets path: CNHAGFAFAMN Correspondent Node Global Internet Home Agent Gateway Foreign Agent 1 Foreign Agent 1 Foreign Agent 1 Mobile Node Foreign Agent 1 Gateway Foreign Agent 2 Foreign Agent 1 Foreign Agent 1 Foreign Agent 1 Mobile Node 11 Network Layer Solutions (3) MIPv6 The MN determines its current location using the IPv6 router discovery protocol. The MN uses the IPv6 address auto configuration mechanism to acquire a care of address (CoA) on the foreign link. The MN notifies its home agent and CN for CoA change. Mobile Node move Home Link Link A Router Router Internet Link B Link C Router Home Agent Correspondent Node 12 Compare MIPv6 with MIPv4 Mobile IPv4 Mobile IPv6 Mobile Node, Home Agent same MN's home address Globally routeable home address and link-local home address Foreign Agent A “plain” IPv6 router on the foreign link (Foreign Agents no long exist) Foreign Agent care-of address vs. Collocated care-of address All care-of address are collocated Care-of address obtained via Agent Discovery, DHCP, or manually Care-of address obtained via stateless address autoconfiguration, DHCP , or manually Agent Discovery Router Discovery Authenticated registration with home agent Authenticated notification of home agent and other correspondents Routing to mobile node via tunneling Routing to mobile node via tunneling and source routing Route optimization via separate protocol specification Integrated support for route optimization 13 Hierarchical Mobile IPv6 (HMIPv6) HA RCOA_1 Internet MAP AR CN AR MAP binding RCOA_2 binding binding AP AP AP AR AP AR AR AR AR AR RCOA_1 LCOA’ AP AP Micro mobility Access network RCOA_1 LCOA Macro mobility RCOA_2 LCOA’’ Access network Mobility Anchor Point (MAP) 14 http://www.ietf.org/rfc/rfc4140.txt Application Layer Solutions Session Initiation Protocol (SIP) An application layer protocol used to initiate, modify and terminate network sessions. Four elements: users agents, registrars, proxy servers and redirect servers. To support mobility. SIP server in MN's home network receives registrations from the MN whenever the MN changes its location. When the CN send an INVITE SIP message to the MN, the redirect server knows the current location information of the MN and forwards the INVITE message to the MN. If a MN moves during an active session, it must send a new INVITE message to the CN using the same call ID. The new IP address is put in the contact field of the SIP messages. The CN will send future SIP messages to the new address. If the MN is far away from the home network, every time it moves, it will send a new registration to the home SIP server. This may incur a high load. 15 Summary of the mobility support approaches Mobility support Link Layer Solutions IAPP Network Layer Solutions Base protocol MIPv4 MIPv6 …... Tunnel based Regional Registration HMIPv6 Transport Layer Solutions Multicasting approach …... MSOCKS Applicatoin Layer Solutions SIP …... End to End Solutions …... Per Host Forwading IDMP …... Cellular IP HAWAII …... 16 Service Management Approaches Result Delivery Protocol (RDP) Using a service proxy to provide reliable message delivery to MNs. Created when a MN initiates a new series of service requests. Provide a fixed location for the reception of server replies, keep track of pending requests, store the request results, and forward the results to the MSS. Runs on the application layer, suitable only for connectionless request-reply communications. The proxy moves whenever the MN moves across a location boundary, may incur a high communication cost. 17 Service Management Approaches (continued) Mobile service management schemes based on location-aware mobile service proxies in PCS. The personal proxies work as intelligent client-side agents to communicate with services. The proxies cooperate with location management system, it is location-aware and can optimally decide when and how often it should move with the roaming user. Per-user integrated location and service management in PCS networks A per-user service proxy is created to serve as a gateway between the mobile user and all client-server applications The service proxy co-located with location database. When there is a location handoff, a service handoff also happens to co-locate the service proxy with the location db. This allows the proxy to know the location of the mobile user to reduce the communication cost for service delivery. 18 Service Management Approaches (continued) The above approaches are in the context of HLR/VLR based PCS networks, MSS, VLR and HLR in PCS networks are powerful devices to perform both routing and computational functions. Routers in IP networks normally are specific routing devices. PCS networks have regular shapes. IP subnets are shapeless. Distance can be used to measure network cost in PCS. In IP networks, the network cost is normally measured by hops, which do not equal to distances. 19 Dynamic Mobility Anchor Points Scheme Assumption: access routers are restricted to perform network layer functions. Determine best DMAP domain size per MN dynamically according to its mobility and service characteristics to reduce network and signaling cost Dynamic Mobility Anchor Points (Access routers chosen) for each MN MN determines dynamically when and where to launch DMAP for minimizing network cost DMAP domain size depends on MN’s mobility and service characteristics HA and CN know MN by RCoA 20 DMAP (continued) After service area is crossed, MN selects AR of subnet just crossed as DMAP: MN determines size of new service area Obtains RCoA & CoA from current subnet registers (RCoA,CoA) to current DMAP by binding request message Inform HA and CN of new RCoA using standard Mipv6 Packet delivery route: CN->DMAP->MN (tunneling or direct) 21 DMAP (continued) MN’s service area - K, IP subnets Goal : Dynamically determine optimal service area (K) per MN Special case : K is constant for all MN’s Degenerates to HMIPv6 K is 1 Degenerates to MIPv6 22 Diagram HA Internet RCOA_1 Access network AR DMAP binding CN binding AR DMAP RCOA_2 tunneling AR AR AR AP tunneling AP RCOA_1 LCOA’ AP AP AP RCOA_2 LCOA’’ Access network RCOA_1 LCOA Dynamic Mobility Anchor Point (DMAP) 23 Trade-off Large Service area : DMAP not change often Communication cost for service data delivery high : CN->DMAP->MN Location update cost is low Small Service area : DMAP changed often Communication cost for service data delivery low Cost of informing HA and CN of DMAP change is high 24 Stochastic Petri Net Model K (Guard:Mark(Xs) < K-1 tmp Pi=1 A Xs K Moves MN2DMAP Pj=1 NewDMAP Move B (Guard:Mark(Xs) = K-1) (Guard:mark(Xs)=K) 25 Service Cost C i,service : Network communication overhead to service a data packet when MN in i th subnet in service area Communication delay in the wireless link from the AR to the MN Delay between the DMAP and a CN in the fixed network Delay from DMAP to the AR of the MN’s current subnet in the fixed network 26 Location Cost C i,location : Network signaling overhead to service a location handoff when MN in i th subnet in service area Clocation : Average communication cost to service a move operation by MN weighted by respective Pi probabilities i = K : Location + Service to inform HA and N CNs of RCoA change i < K : MN inform DMAP of CoA change 27 Total communication cost Total communication cost per time unit : Data packet rate between MN and CNs : MN’s mobility rate 28 Comparing DMAP with Basic MIPv6 and HMIPv6 DMAP area large (mobility cost reduction) DMAP degenerates to HMIPv6 DMAP stays close to MN to avoid CNDMAP-MN(service cost reduction) Degenerates to Basic MIPv6 29 Justify the assumption of F(K) Cost difference curves are not sensitive to form of F(k) Assumption of F(k) justified 30 IMSA: Integrated Mobility and Service Management Architecture Assumption: Access routers are powerful and flexible. Mobile proxies can be dynamically downloaded and roam the access routers to perform network layer and application layer functions on behalf of users and applications. 31 IMSA on Mobile IP v4 A client-side proxy is created to serve as a GFA as in the MIP-RR to maintain the location information of the MN. The proxy will communicate with the correspondent node on behalf of the MN. The proxy will move only when the MN crosses a service area thus incurring a service handoff. The service area size depends on the mobility and service characteristics of the MN. Goal: network cost associated with mobility and service handoffs will be minimized. Correspondent Node Home Agent IP Network IP Access Router A B Service Area 1 D C Service Area 2 IP Access Wireless Network 32 Message Flow in IMSA-MIPv4 Foreign FA Agent Mobile Node Service Proxy Home Agent Correspondent Node 1. Service Request 2. Forward to Proxy 3. Request to CN Service Request 4. CN Response 5. Forward Response 6. Forward Response Foreign Agent 1 Mobile Node Foreign Agent 2 1.Location register Move within a service area Service Proxy Home Agent Correspondent Node 2. Foward to proxy 3.send ACK to FA2 4. Proxy send cancel msg to FA1 5. FA2 send ACK msg to MN 6. FA1 return cancel ACK to proxy 33 Service Handoff Process when Crossing a Service Area in IMSA-MIPv4 Foreign Agent 1 Mobile Node Service Proxy 1 Foreign Agent 2 Service Proxy 2 Home Agent Correspondent Node 1. Location update msg 2. Location update Handoff to another location area - mobility management 3. Location update request 5. Location update ACK 6. Location Update ACK 4. Location update ACK 7. cancel msg 8. cancel msg 1. service handoff request Handoff to another service area - service management 2. service handoff request 3. service handoff request 4. service handoff ACK 6. service Update ACK 5. service handoff ACK 7. cancel msg 8. cancel msg Boundary 34 Performance Model for IMSA-MIPv4 35 Optimal Service Area Size Kopt with varying SMR and nct in IMSA There exists an optimal proxy service area size to minimize the overall communication cost when given a set of parameter values characterizing the mobility and service behaviors of the MN and the network conditions of the Mobile IP network. 36 Comparison of the IMSA-MIPv4 with Mobile IP v4. The total cost increases with the increase of SMR for both schemes Less communication overhead, especially pronounced when SMR is high. 37 Comparison of the IMSA-MIPv4 with MIPRR with Route Optimization. Total cost increases with the increase of either λor σ. IMSA-MIPv4 incurs less communication overhead than MIPRR, especially pronounced when λor σis high. 38 Optimal Service Area Size as a Function of nct Initially increases. Context transfer cost becomes high, stay in a large service area to avoid handoff. The cost of context transfer would dominate the cost if nct is large. 39 Optimal Service Area Size as a Function of SMR When SMR increases, Kopt decreases. When SMR is small, the σis high compared to the λ; thus, the mobility management cost is larger than the service management cost. The proxy likes to stay at a larger service area to reduce the location handoff cost. 40 IMSA on Mobile IP v6 IMSA-MIPv6 and the DMAP are similar. They differ only by the way of mapping a MN's RCoA to its CoA. The DMAP design maps RCoA to CoA by having the current MAP maintain an internal table, so the MAP can intercept a packet destined for RCoA and forward it to the MN's CoA. The IMSA-MIPv6 design maps RCoA to CoA by having a proxy run on the MAP directly receive a packet destined for RCoA, so the proxy can in turn forward the packet to the MN's CoA. 41 PICMM: Proxy-Based Integrated Cache Consistency and Mobility Management Scheme in Mobile IP Systems Stateful cache consistency strategy: cache invalidation messages are asynchronously sent by the server the MN whenever data get updated. A per-user proxy to buffer invalidation messages to reduce uplink requests when reconnected. The proxy serves as a gateway foreign agent to keep track of the address of the MN in a region. Identify the optimal regional area size to minimize the overall network traffic cost, due to cache consistency management, mobility management, and query requests/replies. 42 Cache invalidation strategies Stateful strategy: When there is an update to a data object, the server will send an invalidation message to those MNs that keep a cache copy. Stateless strategy: The server will broadcast information on data objects that have been updated either periodically or asynchronously. Problem: if an MN misses invalidation reports while it is disconnected, it will have to discard the cache content after it reconnects. 43 The proxy’s three functions Working as a GFA as in regional registration to keep tracking MN's location; Acting as a service proxy for services engaged by the MN; Allocating a buffer space to store service context information for each MN. The proxy will receive invalidation reports from the server on behalf of the MN. If the MN is connected, the proxy will forward them to the MN. If the MN is disconnected, the proxy will store them in the buffer. Once the MN is reconnected, the MN will get the latest invalidation reports from the proxy. 44 Integrated cache and mobility management scheme Correspondent Node Home Agent IP Network Foreign Agent Foreign Agent Foreign Agent Proxy Proxy ProxyCache ProxyCache A B MNCache MN MNCache MN C MNCache MN Service Area 2 Service Area 1 IP Access Wireless Network 45 Cache invalidation process The client-side proxy receives an invalidation report from the CN when there is an update to a cached data object; MN is connected? N Y The proxy forwards the invalidation report to the MN The proxy stores the invalidation report in ProxyCache; When the MN wakes up, the proxy forwards the invalidation report. 46 Query Process Query request for a data object Data object requested is in the MN's cache and valid? Y Cache hit; The MN returns the query result N Cache miss; User request is sent to the proxy Proxy forwards the request to the CN; CN returns a copy of the requested object to the proxy; Proxy forwards the data object to MN; MN stores data object in MNCache and returns query result. 47 Disconnection Support MN just reconnects to wireless network; MN is in the same subnet as the proxy? N Y The MN gets invalidation reports from ProxyCache Proxy moves to MN's current subnet; ProxyCache is moved with the proxy; The proxy informs the HA and CNs of its address change The MN gets invalidation reports from ProxyCache. 48 Parameters The on/off (or wake/sleep) behavior of the MN: while the MN is in a wake state, it will go to sleep with rate ωw, while the MN is in a sleep state, it will wake up with rateωs. The residence time that the MN stays in a subnet while it is in a wake state. Service traffic between the MN and server applications 49 Parameters 50 Performance model Just Wake up Sleep Wake2Sleep ωw Sleep2Wake ωs InquiryingProxy #(Xs) Moves Moving Xs MN2Proxy K MovingProxy K 51 Cost Function Derivation Total cost Effective data query rate is query arrival rate multiplied with the probability of the MN is being awake, λQ is the aggregate query arrival rate Probability of the MN being in the awake state The effective mobility rate is the mobility rate multiplied with the probability of the MN being awake Effective data update rate is simply the aggregate data update rate 52 Query Cost Cquery can be calculated as a weighted average in all states No query is issued while the MN is in sleep If cache miss, the query cost will be MNProxyCN Competition between effective query arrival rate and the update rate When the MN just wakes up, the MN will first check with the proxy for the cache status when answering a query, and, if cache miss, will get a copy from the server. 53 Mobility cost Cmobility can be calculated as a weighted average in all states When the MN is in the sleep state, there is no location cost When the MN just wakes up, it will look for its proxy. If the MN does not move during sleep, the cost is contacting the current AR If move within service area, MN only informs the proxy of the CoA change Just wakes up, If moves during sleep, proxy is moved to the current subnet, the cost includes context transfer cost and informing the HA and CNs the change of the proxy’s CoA If moved K subnets, location handoff also triggers a service handoff, the cost includes context transfer cost and informing the HA and CNs the change of the proxy’s CoA 54 Invalidation cost Cinvalidation can be calculated as a weighted average in all states If the MN is in sleep or just wake-up mode, then the invalidation report is buffered in the proxy. Otherwise, the cost is from the CN through the proxy to the MN 55 Numerical results (1) Kopt vs. λ{q,i} . Kopt decreases slowly λ{q,i} increases. As λ{q,i} increases, the query cost increases, and subsequently the MN prefers a small service area size to reduce the query cost. 56 Numerical results (2) Kopt vs. σ Kopt increases as σ increases. When the mobility rate is high, the mobility management cost is also high. The proxy likes to stay at a large service area to reduce the location handoff cost 57 Numerical results (3) Kopt vs. the sleep ratio. Kopt decreases as the MN sleeps longer. Data in MN's local cache are more likely to be outof-date when the MN sleeps longer. The MN will stay close to the proxy to reduce the triangular CN-proxy-MN communication cost 58 Numerical results (4) Kopt vs. cache size. Kopt decreases as the number of cached data objects increases. As the cache size increases, more invalidation reports will be sent from the CN to the MN, given the same update rate for all data objects. To reduce the triangular CN-proxy-MN cost, the MN tends to stay closer to the proxy. 59 Performance Comparison Compare our scheme with three schemes: No-proxy no-caching (NPNC) scheme: basic MIPv6 scheme Proxy no-caching (PNC) scheme: proxy-based regional registration scheme using a proxy for mobility management. No-proxy caching (NPC) management scheme: cached data objects maintained by the MN for cache management, no proxy used. 60 Performance Comparison (2) No-proxy no-caching (NPNC) scheme proxy no-caching (PNC) scheme 61 Generated Network Traffic as a Function of λq,i Caching based schemes (NPC and PICMM) achieve much better performance, especially when λq,i is large. NPC or PICMM increases slowly, PNC or NPNC increases drastically. 62 Generated Network Traffic as a Function of σ PICMM scheme outperforms all other schemes, especially better when σ is high. 63 Generated Network Traffic as a Function of Cache Size The total cost incurred under PICMM increases as the number of cached data items increases. Better performance especially when Ndata is large because caching saves much of the uplink cost for query processing. 64 Generated Network Traffic as a Function of μi The generated network traffic in non-caching based scheme (NPNC or PNC) is insensitive to μi. The generated network traffic in caching schemes becomes sensitive to μi. because the query traffic to the server depends on if cached data objects are valid. If data are updated frequently, a caching scheme will not perform good. 65 Generated Network Traffic as a Function of ωs/ωw. When the sleep ratio is ωs/ωw extremely large, MN is mostly sleeping all the time. The cache is mostly invalid due to long sleep. PICMM would perform worse than PNC because of the CNproxy-MN triangular cost for routing query inquiries/replies and invalidation reports under PICMM. At a reasonable range of sleep ratio (<2), PICMM outperforms all other schemes. 66 Publications Conferences Paper I.R. Chen, W. He, and B. Gu, DMAP: A Scalable and Efficient Integrated Mobility and Service Management Scheme for Mobile IPv6 Systems, 2nd IEEE International Workshop on Performance Management of Wireless and Mobile Networks, Tempa, FL, November 2006 Submitted papers I.R. Chen, W. He, B. Gu. Proxy-based Regional Registration for Integrated Mobility and Service Management in Mobile IP Systems. (Submitted to Computer Journal) I.R. Chen, W. He, B. Gu. IMSA-MIPv6: Integrated Mobility and Service Management Architecture for Mobile IPv6 Systems. (Submitted to Wireless Personal Communications Journal) W. He, I.R. Chen, B. Gu. A Proxy-Based Integrated Cache Consistency and Mobility Management Scheme for Mobile IP Systems (Submitted to the IEEE 21st International Conference on Advanced Information Networking and Applications ) 67 To be Completed and Future Work Evaluate our designs by simulation with ns-2. Extend two-level regional registration design to more than two levels as in HMIPv6 and identify the optimal level to use to maximize the system performance. Investigate context-aware database applications that can benefit from knowledge of the MN's location and service context. Add fault tolerance and recovery into our designs. Experiment with mobile database query applications and the design of PICMM to decide which it is more beneficial whether to forward a copy of the data object instead of an invalidation report to the MN. 68 Schedule Deadline Research Activity January, 2005 Surveyed and analyzed existing mobility/service management in wireless networks. May, 2005 Studied the characteristic of future all-IP based wireless networks. September, 2005 Proposed and analyzed IMSA-MIPv4: proxy-based integrated mobility and service management scheme in Mobile IPv4 systems January, 2006 Proposed and analyzed IMSA-MIPv6: proxy-based integrated mobility and service management scheme in Mobile IPv6 systems April, 2006 Proposed and analyzed DMAP for the case in which ARs can perform only network-layer functions: DMAP November, 2006 Proposed and analyzed PICMM for the case in which ARs can perform application-layer functions allowing proxies to carry service context information regarding cached data objects for mobile database applications. December, 2006 Preliminary exam 69 Schedule (continued) March, 2007 Completion of design and analysis of hierarchical DMAP and IMSA for MIPv6 June 2007 Completion of design and analysis of fault tolerance and recovery of DMAP and IMSA for MIPv6 Completion of extension to PICMM to deal with the case that September, 2007 data objects are forwarded to the MN instead of invalidation reports for mobile database query applications Completion of the applicability study by identifying context November, 2007 aware database applications that can benefit from DMAP and IMSA designs; completion of algorithm design and analysis for such applications identified. December, 2007 Research Defense Completion of simulation studies based on ns-2 to validate analytical results as well as to compare DMAP, IMSA and March, 2008 PICMM and new algorithms extended against basic MIPv6, MIP-RR, HMIPv6 and other existing algorithms in MIPv6 for mobility and service management. May, 2008 Final defense. 70 Thank you 71