Conference Paper

MSOCKS: An architecture for transport layer mobility

Authors:
To read the full-text of this research, you can request a copy directly from the authors.

Abstract

Mobile nodes of the future will be equiped with multiple network interfaces to take advantage of overlay networks, yet no current mobility systems provide full support for the simultaneous use of multiple interfaces. The need for such support arises when multiple connectivity options are available with different cost, coverage, latency and bandwidth characteristics, and applications want their data to flow over the interface that best matches the characteristics of the data. We present an architecture called transport layer mobility that allows mobile nodes to not only change their point of attachment to the Internet, but also to control which network interfaces are used for the different kinds of data leaving from and arriving at the mobile node. We implement our transport layer mobility scheme using a split connection proxy architecture and a new technique called TCP splice that gives split connection proxy systems the same end to-end semantics as normal TCP connections

No full-text available

Request Full-text Paper PDF

To read the full-text of this research,
you can request a copy directly from the authors.

... Performing TCP processing substantially reduces throughput compared to simple forwarding, although the overhead is not as high if the NF does not need to track the bytestream. The TCP Splicer NF uses DPDK library and acts as a Splicer [9,18], initially responding to the client, and then replaying the TCP handshake with a server. This has high overhead when requests are small (since extra work needs to be done to setup each new connection), but performs fairly well when the request size is large since it simply relays data packets after the connection is set up. ...
... TCP Splicer: A desirable operation for proxy-type middleboxes is the ability to redirect a TCP connection after the handshake has been established. For example, an HTTP proxy might observe the contents of a GET request before selecting a server and forwarding the request [9,18]. The Microboxes TCP Splicer stack simplifies this operation by extending the TCP Monitor stack, without requiring the complexity of a full TCP endpoint. ...
... Once the Splicer obtains this information, it initiates a new TCP handshake with the selected destination server. All subsequent packets in the flow can then go through a fast path in the Splicer that requires only simple modifications to the TCP header sequence numbers [18], allowing zero-copy TCP splicing. ...
Conference Paper
Existing network service chaining frameworks are based on a "packet-centric" model where each NF in a chain is given every packet for processing. This approach becomes both inefficient and inconvenient for more complex network functions that operate at higher levels of the protocol stack. We propose Microboxes, a novel service chaining abstraction designed to support transport- and application-layer middle-boxes, or even end-system like services. Simply including a TCP stack in an NFV platform is insufficient because there is a wide spectrum of middlebox types-from NFs requiring only simple TCP bytestream reconstruction to full endpoint termination. By exposing a publish/subscribe-based API for NFs to access packets or protocol events as needed, Microboxes eliminates redundant processing across a chain and enables a modular design. Our implementation on a DPDK-based NFV framework can double throughput by consolidating stack operations and provide a 51% throughput gain by customizing TCP processing to the appropriate level.
... All non-trivial costs of the protocol are borne by the client, so it is reasonable to deploy in production servers, and it does not interfere with network infrastructure such as network address translation (NAT) devices[5]or firewalls[6]. The protocol is general purpose: it can be used by other mobility systems such as MSOCKS[10]or mobile TCP sockets[19,20], and it can support systems that enhance sockets with other functionality such as compression, encryption, or quality-of-service. For example, the EDP could end the common practice of reserving two ports, one encrypted and one non-encrypted, for network services such as IMAP[4]. ...
... The main idea is to use a packet filter to manipulate the packets that are exchanged between the kernel-level socket endpoints of the connection, instead of trying to control the behavior of the sockets API seen by applications. This idea is similar to the use of packet manipulation in the TCP migrate option[21]and the TCP splice of the MSOCKS proxy[10]. The main differences are that racks perform packet manipulations without kernel modifications and they provide additional functionality including interoperability, long-term connection suspension, and automatic failure detection and reconnection. ...
... If it is, it handles the SYN as an incoming reconnection. To maintain consistency with the local socket, the rackd rewrites the packets of the new connection to match the source IP address, port numbers, and sequence numbers to those expected by the receiving socket, a function similar to that performed by the TCP splice in MSOCKS[10]. ...
Conference Paper
Full-text available
... Other approaches address the above mentioned "change of identity" issue by exploiting (and enhancing) protocols of the current Internet stack, e.g. ABPS [11], DCCP [12], SIP-IAPP [13,14], I-TCP [15], MMUSE [16], MPTCP [17,18], m-SCTP [19], MSOCKS [20], TCP-migrate [21]. These latter approaches can be classified based on their ability to support the use of a single NIC at a time, or the (possibly concurrent) use of multiple NICs. ...
... Table 2 summarizes all the techniques described in this section, classified based on the protocol layer they operate on. An extension of MIPv6, called Multiple Care of Address registration (mon-ami6) [62,63,69,70,71] has been proposed for supporting host mobility and [43], TMSP [59], [46], [44], MMUSE [16] Transport DCCP [12], m-SCTP [19], TCP-migrate [21], MPTCP [17,18], MSOCKS [20], I-TCP [15], ECCP [60] Between Network and Transport HIP [2,3], Hi3 [4], LIN6 [61], MILSA [7], NIIA [8,9], RANGI [10], Shim6 [36] Network monami6 [62,63], FlowMob [64], GSE [65], ILNP [5], GLI-Split [1], hidden proxy [66], UPMT [67], FRHP [68] multihoming. If a MN configures several IPv6 global addresses on one or more of its NICs, it can register these addresses with its HA as CoAs. ...
... MSOCKS uses an external proxy that performs TCP connection redirection [20]. Such an external proxy is employed to split the end-to-end communication into two communications: namely MN-proxy and proxy-CN. ...
Article
This work presents a comprehensive and structured taxonomy of available techniques for managing the handover process in mobility architectures. Representative works from the existing literature have been divided into appropriate categories, based on their ability to support horizontal handovers, vertical handovers and multihoming. We describe approaches designed to work on the current Internet (i.e. IPv4-based networks), as well as those that have been devised for the "future" Internet (e.g. IPv6-based networks and extensions). Quantitative measures and qualitative indicators are also presented and used to evaluate and compare the examined approaches. This critical review provides some valuable guidelines and suggestions for designing and developing mobility architectures, including some practical expedients (e.g. those required in the current Internet environment), aimed to cope with the presence of NAT/firewalls and to provide support to legacy systems and several communication protocols working at the application layer.
... These protocols eliminate the need for tunneling of the data packets. An architecture called MSOCKS is proposed in [6] for transport layer handoff management. ...
... MSOCKS implements transport layer handoff using a split-connection proxy architecture and a new technique called TCP Splice that gives split-connection proxy systems the same end-to-end semantics as usual TCP connections [6]. ...
Article
Full-text available
In the integrated next-generation wireless systems (NGWS), users are always connected to the best available networks and switch between different networks based on their service needs. It is an important and challenging issue to support seamless handoff management in NGWS. The objective of this paper is to develop a seamless handoff management protocol for NGWS. In this work, a fuzzy logic-based adaptive handoff (FLAH) management protocol is developed which is then integrated with an existing cross layer handoff protocol. Afterward, the handoff performance comparison of the existing protocol and our proposed protocol is carried out. The simulation results exhibit that, proposed fuzzy logic-based handoff management protocol has much better performance than conventional protocols for both intra and intersystem handoffs.
... The Transmission Control Protocol (TCP) and User Datagram Protocol (UDP) are both protocols residing in the transport layer of the OSI model.TCP (Transmission Control Protocol) is a connection-oriented protocol that ensures reliable and ordered delivery of data (Maltz et al. 1998; Kurose and Ross. 2012;Welzl et al. 2021). ...
Article
Full-text available
The exponential growth in internet usage has reshaped daily transactions, prompting individuals and companies to increasingly engage in cyberspace rather than traditional real-world settings. This shift has been notably accelerated by factors such as the COVID-19 pandemic. The widespread adoption of the digital environment has led to a shift in criminal activities, with traditional crimes now extending into the digital space. Cybercrime has become a significant concern as criminals exploit vulnerabilities in the online world. The emergence of technologies like cloud computing, Internet of Things (IoT), social media, wireless communication, and cryptocurrencies has heightened security concerns in cyberspace. The trend of cyber criminals offering cyber attacks as a service reflects a concerning shift toward automation for broader impact. Exploiting vulnerabilities across hardware, software, and communication layers amplifies the potential impact of these attacks, emphasizing the need for robust cybersecurity defenses. The landscape of cyber threats encompasses various types of attacks. These include distributed denial of service (DDoS), phishing, man-in-the-middle, password attacks, remote attacks, privilege escalation, and the use of malware. The evolving landscape of cyber threats and advanced evasion techniques has rendered traditional protection systems, including firewalls, intrusion detection systems, antivirus software, and access control lists, less effective in detecting sophisticated attacks. Addressing the urgent need for innovative and effective solutions to prevent cyber attacks is crucial.Reviewing recent attacks, understanding attack patterns, and exploring detection techniques are World Scientific News 190(1) (2024) 1-69-2-essential steps in staying ahead of cyber threats. The article's discussion of both technical and non-technical solutions for early recognition is key to developing a comprehensive and proactive cybersecurity framework. Leveraging trending technologies like machine learning, deep learning, cloud platforms, big data, and block-chain holds promise as a solution for addressing current and future cyber attacks. The mentioned technological solutions, including machine learning and deep learning, can play a crucial role in various aspects of cybersecurity. They offer capabilities for detecting malware, intrusion detection, spam identification, DNS attack classification, fraud detection, recognizing hidden channels, and distinguishing advanced persistent threats, enhancing the overall defense against sophisticated cyber attacks. While machine learning and deep learning show promise in cybersecurity, their susceptibility to evasion techniques is a critical consideration. Developing robust solutions requires addressing the challenges posed by intelligent cyber attacks and continuously evolving evasion methods.
... The Transmission Control Protocol (TCP) and User Datagram Protocol (UDP) are in this layer, and they are critical protocols for the OSI model [100] [146,147]. While UDP is a connectionless protocol, TCP is the protocol that prioritizes data quality rather than speed. ...
Article
Full-text available
Internet usage has grown exponentially, with individuals and companies performing multiple daily transactions in cyberspace rather than in the real world. The coronavirus (COVID-19) pandemic has accelerated this process. As a result of the widespread usage of the digital environment, traditional crimes have also shifted to the digital space. Emerging technologies such as cloud computing, the Internet of Things (IoT), social media, wireless communication, and cryptocurrencies are raising security concerns in cyberspace. Recently, cyber criminals have started to use cyber attacks as a service to automate attacks and leverage their impact. Attackers exploit vulnerabilities that exist in hardware, software, and communication layers. Various types of cyber attacks include distributed denial of service (DDoS), phishing, man-in-the-middle, password, remote, privilege escalation, and malware. Due to new-generation attacks and evasion techniques, traditional protection systems such as firewalls, intrusion detection systems, antivirus software, access control lists, etc., are no longer effective in detecting these sophisticated attacks. Therefore, there is an urgent need to find innovative and more feasible solutions to prevent cyber attacks. The paper first extensively explains the main reasons for cyber attacks. Then, it reviews the most recent attacks, attack patterns, and detection techniques. Thirdly, the article discusses contemporary technical and nontechnical solutions for recognizing attacks in advance. Using trending technologies such as machine learning, deep learning, cloud platforms, big data, and blockchain can be a promising solution for current and future cyber attacks. These technological solutions may assist in detecting malware, intrusion detection, spam identification, DNS attack classification, fraud detection, recognizing hidden channels, and distinguishing advanced persistent threats. However, some promising solutions, especially machine learning and deep learning, are not resistant to evasion techniques, which must be considered when proposing solutions against intelligent cyber attacks.
... MSOCK+ is a transport layer mobility solution that uses a proxy between mobile node and static correspondent node [62,63]. For each data stream from mobile node to the static correspondent node, proxy maintains a stable data stream to/from the static host, isolating it from the mobility management issues. ...
Thesis
Full-text available
Mobile devices with the support of multiple network interfaces have become common these days. Applications on mobile devices can utilize the existence of these multiple network interfaces for many useful services like mobility management and bandwidth aggregation. However, currently available implementation of networking communication protocol stack is not capable of simultaneously utilizing these multiple network interfaces. Although many schemes have been proposed for providing the mobility management and bandwidth aggregation services to multihomed mobile devices, however, these schemes have limitations that hinder their large-scale deployment. Some schemes depend on the deployment of additional network entities in network infrastructure while others require changes in networking communication protocol stack implemented in current operating system kernels. The end-to-end architecture presented in this thesis not only overcomes these limitations but also fills some existing gaps that make the proposed architecture feasible for implementation in real scenarios. The proposed architecture utilizes the simultaneous transmission over multiple network interfaces for providing the services of vertical handover, simultaneous movement of communicating nodes, wilful handover, location updates, and bandwidth aggregation. In order to provide these services, the proposed architecture neither requires the deployment of additional entities in network infrastructure nor it requires changes in the communication protocol stack implemented in the operating system kernel. Moreover, in order to make timely handover decisions, this thesis also presents a prediction technique that intelligently generates IEEE 802.21 MIH Link Going Down trigger. For evaluating its performance in various handover and bandwidth aggregation scenarios, the architecture presented in this thesis is implemented and evaluated on Linux and Windows platforms. Performance analysis shows the ability of the proposed architecture to perform a seamless handover in regions of the overlapping coverage area of two access networks. Similarly, significant throughput gain is observed during bandwidth aggregation over multiple network interfaces. Towards the end of the thesis, performance of the proposed architecture in terms of handover delay, service disruption time, protocol overhead, etc. has been compared with existing end-to-end mobility management protocols. With the capability to support simultaneous transmission over multiple network interfaces and intelligent prediction of IEEE 802.21 MIH Link Going Down trigger, the proposed architecture performed significantly better than the existing protocols.
... У разі, коли реальна швидкість значно нижче очікуваної, мережа стає перевантаженою та швидкість відправки даних джерелом потрібно знижувати. Після установки з'єднання, протокол TCP Freeze може перебувати в двох фазах: фазі повільного старту і в фазі запобігання перевантажень [14]. ...
Article
Full-text available
У даній статті розглянуто протокол TCP, розглянуті його недоліки, а, зокрема, розриви TCP з'єднань. Розглянуто існуючі модифікації, які дозволяють усунути такі недоліки. Виявлено недоліки існуючих методів. Запропоновано метод управління передачею даних, в протоколі TCP Freeze, що дозволяє підвищити надійність передачі даних. Такий метод заснований на динамічній зміні, в залежності від умов, параметрів протоколу, які в своїй незміненій версії задаються статично. Висновки. Ефективність методу управління передачею даних, що використовується в протоколі TCP Freeze, може бути поліпшена в бездротовому гетерогенному середовищі за допомогою варіювання параметрів. Виявлено, що за умови рівності параметрів і їх значенні близькому до 20 , пропускні спроможності протоколів TCP Freeze і TCP Reno будуть практично рівними. При більш низьких значеннях параметрів протокол TCP Reno показує кращу ефективність, ніж TCP Freeze, а при великих значеннях параметрів пропускна здатність протоколу TCP Freeze буде перевищувати таку у TCP Reno. Використання запропонованого методу дозволяє зменшити час передачі даних в мережі внаслідок реалізації алгоритму управління розміром плаваючого вікна протоколу, що згладжує флуктуації останнього і приводить до меншого числа повторних передач пакетів даних, а також обробку події хендовера.
... When regarding approaches that are based on proxy services, we note that they originally date back to the advent of "Green IT," with a focus on wired networking, see, e.g., [11] and [12] for a recent overview. In addition, a proxy-based approach allows for potentially saving energy when utilizing heterogeneous networks while mobile by intelligently switching between them without interrupting an ongoing stream, see, e.g., [13]. In addition, a standards-based and applicationtransparent proxying based on the SOCKSv5 standard was presented in [14]. ...
... This may negatively affect the behavior of transport protocols that implement flow control mechanisms, such as TCP. Thus, integrating mobility with these protocols could enhance their performance [7,8]. ...
Conference Paper
Full-text available
The Internet is required to support an ever increasing number of multimedia applications in the near future, but the legacy network architecture has already shown its limitations. The need for ubiquitous and pervasive communications is expected to lead the future Internet towards user-centric paradigms. Users will be always " connected " , but this is not enough to realize pervasive communication environments. Mobility will be one of the key issues in such evolution. Current mobility protocols have a number of limitations and drawbacks; until now, there is not any general solution that could face all aspects of mobility. The only notable examples are targeted to specific applications. We believe that mobility could be effectively managed through overlay networks at the application layer. In this paper, we motivate our idea and depict some preliminary scenario about this topic.
... TCP Migration also tries to maintain connections when servers fail or in the presence of IP mobility. But they require changes at the clients transport layer [44,45] or socket API [33] or assigning the same IP to all servers [35,47] which cannot work in the cloud. ...
Conference Paper
Layer-7 load balancing is a foundational building block of online services. The lack of offerings from major public cloud providers have left online services to build their own load balancers (LB), or use third-party LB design such as HAProxy. The key problem with such proxy-based design is each proxy instance is a single point of failure, as upon its failure, the TCP flow state for the connections with the client and server is lost which breaks the user flows. This significantly affects user experience and online services revenue. In this paper, we present Yoda, a highly available, scalable and low-latency L7-LB-as-a-service in a public cloud. Yoda is based on two design principles we propose for achieving high availability of a L7 LB: decoupling the flow state from the LB instances and storing it in a persistent storage, and leveraging the L4 LB service to enable each L7 LB instance to use the virtual IP in interacting with both the client and the server (called front-and-back indirection). Our evaluation of Yoda prototype on a 60-VM testbed in Windows Azure shows the overhead of decoupling TCP state into a persistent storage is very low (<1 msec), and Yoda maintains all flows during LB instance failures, addition, removal, as well as user policy updates. Our simulation driven by a one-day trace from production online services show that compared to using Yoda by each tenant, Yoda-as-a-service reduces L7 LB instance cost for the tenants by 3.7x while providing 4x more redundancy.
... This framework process achieves the handover/handoff's goal which is to maintain unbroken communications while mobile devices move through heterogeneous networks. Similar researches to Yousaf and Qayyum, (2008) were conducted by several researches such as in (Snoeren and Balakrishnan, 2000;Maltz and Bhagwat, 1998 Some handoff techniques have their specific definition of handover procedures (Prasad and Prasad, 2005;Choi et al, 2005;Steele et al, 2001). Such examples of these techniques include: WCDMA/CDMA2000, WiMAX, GSM/GPRS, IEEE 802.11 and WLAN. ...
Article
Full-text available
One of the most common and significant topic in the network environment domain is the mobile wireless communication systems. These seamless systems aroused so that to facilitate the way of accessing the internet of where an end-user could easily get connected through an enhanced mobile device. The early start of changing the way the internet is being used has been changed since varieties of mobile devices have emerged to take such a place for such a development that can efficiently benefit the organizations and the endusers. The rapid improvement of the mobile generations was for the purpose of supporting as many mobile devices as possible that could benefit the users at anytime and anywhere in terms of common practical applications such as internet access, video-on-demand, video conferencing system and many more applications. In this paper, a survey for the mobile generations in the wireless communications is presented in order to highlight and compare the issues and challenges that are involved in each generation and also in order to understand how solutions and improvements were successfully performed to these issues starting from the earlier generations along to the following generations and finally till the current available generation.
... Among the mobility solutions proposed for TCP are TCP-Redirection (TCP-R)[132], MSOCKS[133], Mobile TCP[134] and TCP-Migrate[135].TCP enhancements for wireless networks include Lightweight Mobility Detection and Response (LMDR) TCP[136], Indirect TCP (I-TCP)[137], Snoop TCP[118] and Freeze TCP[138]. TCP versions supporting real-time applications are TCP with realtime mode (TCP-RTM)[139] and TCP-MR (Minimum Rate)[140].Mobility support solutions with improved reliability have been also proposed for the User Datagram Protocol (UDP) protocol as well. ...
Article
The latest advances in wireless data access technologies and increased popularity of mobile computing have enabled the development of the future mobile Internet. The various wireless technologies and standards already developed or under development support the existence of a highly heterogeneous wireless communication environment in which mobile users access the network from diverse devices and exchange data of various types. In the context of such a heterogeneous wireless and mobile environment, maintaining certain level of Quality of Service required by some applications and consequently providing high user Quality of Experience is very challenging. This chapter analyzes the state of the art in quality-oriented mobility management in heterogeneous wireless environments in the context of mobile multimedia applications. Most important wireless access technologies and multimedia support systems and protocols for wireless delivery are presented, while requirements for quality-oriented mobility management are identified. Handover management is discussed as the component of the mobility management system with the greatest impact on the quality as measured by the user. Finally a novel multimedia mobility management framework is presented which aims at maintaining high user perceived quality while efficiently exploiting all the communication resources available in a heterogeneous wireless environment.
... Proxy TCP : MSOCKS et I-TCPMSOCKS[77] est une proposition basée sur une architecture proxy et utilise une technique appelé TCP-Splice[78] pour diviser une connexion TCP en deux.Le protocole MSOCKS est construit autour du protocole SOCKS[79] pour la traversée de pare-feux. MSOCKS y rajoute un identificateur logique qui permet de garder la trace des connexions ouvertes entre l'hôte mobile et le proxy. ...
Article
This thesis was motivated by the new ubiquitous context of ambient wireless networks. The Internet protocols were designed 30 years ago without taking into consideration the nomadic use of networks and do not respond to the new constraints of mobility. We aimed to conceive mechanisms to make the mobility transparent to the applications and users. A part of our work was focused on the improvement of handoff delay of physical layer 802.11 to about 20 ms. Host mobility and network changes often require the reconfiguration of several parameters at IP layer. For the local mobility we chosen to allow the hosts to keep theirs IP address unchanged and to propagate host routes in the local domain. On the contrary, for global mobility, the optimal routing in Internet force us to conceive a solution where the mobile hosts change their IP addresses according to the subnet there are connected to. Our solution is based on "end-to-end" paradigm where the two hosts implied in a connection are the only ones to ensure the connection transfer to the new attachment points. It use interception of calls to the socket library and of DNS requests as well as local address translation to virtualise IP addresses into stable host identifiers that are presented to upper layers.
... Nevertheless, the use of proxy or middleware is not a totally new idea in supporting user mobility. For instance, MSOCKS [22] handles mobility management at the transport layer and introduces a proxy in-between the client and server. SLM [9] operates above TCP and switches TCP streams between the MH and CH. ...
Article
Full-text available
Due to the lack of support in mobility and quality of service, today's IP-based networks have some inherent limitations for delivering multimedia services in a mobile environment. In the past few years, these issues have been addressed in the research community and the resulting techniques are being standardised. However, these developments have been done in isolation and become incompatible with each other. In addition to these technical issues, the future infrastructure for charging and accounting mobile multimedia services is expected to be increasingly complicated. In this paper we present a home-proxy based framework which can facilitate the integration of mobility support and QoS management. Furthermore, it enables centralised accounting, which simplifies the cost recovery processes of roaming services. To prove the viability of our design, we have built and tested this framework on a DiffServ wide-area backbone using an MP3 streaming application.
... One example is MSOCKS [46] for TCP connections proposed by Maltz and Bhagwat. The architecture is built around a split-connection proxy that is inserted into the communication path between a MN and its CN. ...
... Existing works that attempt to eliminate the negative effect of switching network interface requiring either additional infrastructure or network support. For instance, 2 International Journal of Distributed Sensor Networks mobility gateways [3,4] were acted as a proxy between mobile devices and the Internet, and extending the TCP/IP protocol supported networks switching, such as the Mobile IP [5,6]. However, these approaches cannot be immediately deployable and engineering projects cost extremely large and modify largely existing infrastructure and network protocol. ...
Article
Full-text available
Owing to complementary characteristics of wireless networks, it is deserved to achieve automatic handoff on the modern smartphone for taking full exploitation of these accessible technologies. In this paper, we have proposed the closed loop model on smartphone switching heterogeneous wireless networks, which is full-client based without requiring additional support from the access points or gateways and modification of the network protocols. It only intuitively takes advantage of user scheme as the feedback adjustment approach to handoff policy. Furthermore, we have analyzed the closed loop handoff model to illustrate and evaluate how the user feedback of the policy acts on adapting to change context. In the experiment, we have evaluated four metrics on the closed loop handoff policy in real smartphone device: performance, energy saving, data offloading, and user experience.
... Maltz et al. [23] propose TCP Splice to split a TCP connection at a proxy by dividing the host-to-host communication into host-proxy and proxy-host communications. MSOCKS [2] uses TCP Splice for connection migration and supports multiple IP addresses for multiple interfaces. ...
Article
Full-text available
A brief survey of existing protocols for providing seamless mobility in IP based network is carried out with an emphasis on mobility management in IPv6. The paper covers evolving mobility protocols at network layer, their improvements over the predecessor. Apart from this various transport layer mobility protocols have also been studied so that the role of higher layers in mobility management can be exploited to make the process of mobility simpler and less prone to infrastructural change.
... Mobility management contains two components one of them is called location management while the other is called handover management [3]. Mobility management protocols can operate from different layers of the protocol stack data link layer [4], network layer, transport layer [5] and application layer [6]. Recently, new handover algorithms are raised based on advanced techniques such as pattern recognition [7], neural networks and fuzzy logic system as well [8]- [10]. ...
Article
Nowadays, the battery life time becomes one of the most important challenges of the next generation wireless networks especially for mobile equipments that support more than wireless technologies. Different wireless technologies have different battery energy consumption levels. In this paper we propose a methodology for triggering the handover process among different wireless technologies based on the user terminal battery level status. Our study will efficiently saves the battery life time of the user terminal based on its surrounding wireless access technologies and its mobile terminal capabilities. Moreover we introduce a simple and easy concept for how to exchange this handover information from the user terminal to the network node to guarantee the smooth handover process.
... Nevertheless, the use of proxy or middleware is not a totally new idea in supporting user mobility. For instance, MSOCKS [MALT98] handles mobility management at the transport layer and introduces a proxy in-between the client and server. SLM [LAND99] operates above TCP and switches TCP streams between the MH and CH. ...
... running at the application layer at both the MN and the CN. MSOCKS [43] is yet another architecture for transport layer mobility management. MSOCKS is built on top of the SOCKS protocol for firewall traversal and uses a proxy server between the mobile client and the server. ...
Article
Full-text available
Fourth generation (4G) wireless systems targeting 100 Mb/s for highly mobile scenarios and 1 Gb/s for low mobility communication are soon to be deployed on a broad basis with LTE-Advanced and IEEE 802.16m as the two candidate systems. Traditional applications spanning everything from voice, video, and data to new machine-to-machine (M2M) applications with billions of connected de-vices transmitting sensor data will in a soon future use these networks. Still, interworking solutions integrating those new 4G networks with existing legacy wireless networks are important building blocks in order to achieve cost-efficient solutions, offer smooth migration paths from legacy systems, and to provide means for load balancing among different radio access technologies. This article categorizes and analyzes different interworking solutions for heterogeneous wireless networks and provides suggestions for further research.
... In such an environment, devices with embedded computing capabilities must have seamless usability. Several architectures have been proposed for supporting personal mobility or service mobility [1]- [4]. We have investigated an architecture for supporting seamless service mobility between various types of devices. ...
Article
Full-text available
We investigated an architecture for cross-device handover using the service mobility proxy , which is a proxy -based approach to seamless cross-device handover between various types of terminals of any service application. The service mobility proxy has functions for specifying the destination terminal to receive the service, transcoding the service data, authenticating use of the candidate devices, and so on. In this framework, the destination devices require only a function for receiving data forwarded from the proxy. The format of the forwarded data is adaptively changed at the proxy depending on the capabilities of the destination device or the transmission speed for connecting to the device. Therefore, cross-device handover is supported for various types of devices. The optimum destination device can be selected automatically based on the location of the user, the user interfaces of the candidate devices, the bandwidth required by the service, and so on. In our prototype implementation, we introduced application-level transcoding, so cross-device handover of almost any application program is supported.
... Once in the persistent operation the CN sends zero window probes (ZWPs) to check the availability of the MN, and on the reception of a positive response immediately starts sending data. • Gateway-based mobility schemes, as, e.g., the Mobile Socket Service (MSOCKS) scheme [Maltz and Bhagwat, 1998], introduce a dedicated gateway in the network for handling the mobility. Gateway splits the connection between the CN and the MN, allowing the latter to change its connection with the gateway when performing the handover. ...
Thesis
Full-text available
This dissertation investigates and evaluates the idea of handling mobility at the transport layer, using mobile Stream Control Transmission Protocol (mSCTP) as an example of a handover transport layer protocol. To this end, (the first part of) this thesis provides the reader with a necessary background for IP mobility-related aspects, surveying detailedly the most popular of the existing solutions. Provided overview includes Mobile IP (MIP) and its most important derivatives to represent the networklayer- based schemes, as well as Session Initiation Protocol (SIP) as an example of an applicationlayer approach. The details of the most important transport layer solutions are given on continuation, along with the motivation for the development of such mobility management schemes. Among presented transport-layer approaches, the one based on the mSCTP is chosen as a representative for the analysis performed in this dissertation. This choice is additionally motivated by two interesting features that SCTP protocol introduces, and that are interesting in the context of handover applications: multihoming and multistreaming (to some extent). (Still in the introductory part) a detailed state-of-the-art of the SCTP protocol is provided, stressing its signaling background and original scope of use that did not consider mobility related application. The described transition from the signaling to a general purpose transport protocol illustrates the dynamics of the development of this relatively recent proposal, and explains why SCTP is currently one of the most interesting innovative transport protocols. The core of this dissertation outlines major mobility-related considerations in the context of future heterogeneous wireless networks, identifying all important handover scenarios, and specifying the most representative one to conduct the proposed analysis. Several transport-layer handover schemes based on SCTP are analyzed in the selected scenario. First of the discussed schemes, provided also as a reference model for evaluations presented in the following sections of this work, reuses the standard SCTP failover, a mechanism originally devised to increase protocol robustness. Next, the details of transport-layer loadsharing are explained, to facilitate the introduction of the mSCTP-CMT-PF handover scheme, an essential improvement for transport layer mobility suggested by this work. The devised proposal incorporates one of the most popular loadsharing schemes provided for SCTP, the Concurrent Multipath Transfer (CMT), that originally does not target wireless networks. Evaluation exposes the main challenges of such a design, pointing out the most important constraints limiting its scope of application. Finally, a quantitative comparison of all identified mSCTP-based handover schemes and two of the most representative network-layer solutions is given in a series of analysis that involves mobility models of different grade of complexity.
... Maltz et al. [25] proposed Transport Control Protocol (TCP) connection that can divide the end to end connection into two connections: end to proxy and proxy to end. In [26], Multimedia Sockets (MSOCKS) uses Maltz technique for connection migration that can support multiple IP addresses. Seamless IP diversity based Generalized Mobility Architecture (SIGMA) [27] and Mobile Stream Control Transmission Protocol (mSCTP) [28] support soft handoff using IP diversity. ...
Article
The handover issue is one of the most important challenges in the next generation mobile networks. Traditional handover triggering conditions mainly based on signal strength, while the requirements for other triggering conditions such as user controlled handover or service based handover become an urgent need; especially when the handover is required among different networks. We propose a simple and easy mechanism for exchanging the handover metrics using proof of concept and logical visibility. This handover metrics represent the base in which the handover decision algorithms are constituted on. Metrics information can be transferred not only among different nodes that belong to the same radio access technology but also among different wireless access technologies as well. In this paper, we introduce new fields in the IP option header which are used for the handover metrics information exchange. We focus on some important metrics and how they can be read and written in the IP header. This allows any handover decision algorithm to openly use our scheme in a flexible way. The choice of the IP protocol comes from the trend of the next generation networks, which is based on IP networks.
... MSOCKS by Maltz et al. is an architecture for Transport Layer Mobility [118]. The idea behind this architecture is to hide the movement of the wireless end system from the corresponding host and to allow the wireless end systems to use an arbitrary network interface. ...
Chapter
The services offered by cloud computing and its usage are increasing day-by-day. Due to the elasticity characteristic of cloud computing, many organizations are now moving their services on cloud data centers. A cloud disaster recovery requires migration of a VM from one data center to another without disconnecting the user. Live VM migration is a key concept to transfer VM without disrupting services. Server consolidation and scheduled maintenance are added advantages of it. In cloud computing, moving large size of VM from one data center to other data center over a wide area network is a challenging task.
Article
Full-text available
When users flood in cloud data centers, how to efficiently manage hardware resources and Virtual Machines (VMs) in a data center to both lower economical cost and ensure a high service quality becomes an inevitable work for cloud providers. VM migration is a cornerstone technology for the majority of cloud management tasks. It frees a VM from the underlying hardware. This feature brings a plenty of benefits to cloud providers and users. Many researchers are focusing on pushing its cutting edge. In this paper, we firstly give an overview of VM migration and discuss both its benefits and challenges. VM migration schemes are classified from three perspectives: manner, distance, and granularity. The studies on non-live migration are simply reviewed, and then those on live migration are comprehensively surveyed based on the three main challenges it faces: memory data migration, storage data migration, and network connection continuity. The works on quantitative analysis of VM migration performance are also elaborated. With the development and evolution of cloud computing, user mobility becomes an important motivation for live VM migration in some scenarios (e.g., fog computing). Thus, the studies regarding linking VM migration to user mobility are summarized as well. At last, we list the open issues which are waiting for solutions or further optimizations on live VM migration.
Chapter
This chapter is dedicated to transport-layer mobility support schemes, which follow an end-to-end philosophy, putting the notion of mobility at the end nodes, and without any requirements on network infrastructure devices such as routers and servers. The existing schemes are introduced, along with explanations of their technical principles. The mSCTP (mobile Stream Control Transmission Protocol) is chosen as a representative mobility management protocol at transport layer with a detailed introduction and in-depth analysis.
Chapter
The Internet is growing ever more mobile - meaning, that an ever greater proportion of Internet devices are mobile devices. This trend necessitates new designs and will produce new and even unpredictable conceptions about the very nature of the Internet and, more fundamentally, the nature of social interaction. The engineering response to growing mobility and complexity is difficult to predict. This chapter summarizes the past and the present ways of dealing with mobility, and uses that as context for trying to understand what needs to be done for the future. Central to the conception of future mobility is the notion of "always available" and highly interactive applications. Part of providing acceptable service in that conception of the mobile Internet will require better ways to manage handovers as the device moves around the Internet, and ways to better either hide or make available a person's identity depending on who is asking.
Conference Paper
Multi party videoconference systems use MCU (Multipoint Control Unit) devices to forward media streams. In this paper we describe a mechanism that allows the mobility of such streams between MCU devices. This mobility is especially useful when redistribution of streams is needed due to scalability requirements. These requirements are mandatory in Cloud scenarios to adapt the number of MCUs and their capabilities to variations in the user demand. Our mechanism is based on TURN (Traversal Using Relay around NAT) standard and adapts MICE (Mobility with ICE) specification to the requirements of this kind of scenarios. We conclude that this mechanism achieves the stream mobility in a transparent way for client nodes and without interruptions for the users.
Article
IntroductionLink-Layer SolutionsNetwork-Layer SolutionsTransport-Layer SolutionsApplication-Layer SolutionCross-Layer SolutionsChallenges of Mobility DesignConclusion GlossaryCross References
Article
Seamless communication is becoming the main aspect for the next generation of the mobile and wireless networks. Roaming among multiple wireless access networks connected together through one IP core makes the mobility support for the internet is very critical and more important research topics nowadays. Mobile IP is one of the most successful solutions for the mobility support in the IP based networks, but it has poor performance in term of handover delay. Many improvements have been done to reduce the handover delay, which result in two new standards: the Hierarchical MIP (HMIPv6) and the Fast MIP (FMIPv6). In this paper we present an analysis of handoff management protocols HMIPv6 and FMIPv6 in supporting mobility and latency reduction.
Article
Modern life makes people internet-dependents. They want to move connected and care for always getting the best options for connectivity, hoping between providers. Freedom for choosing providers and the business options which these exchanges can offer are the motivations for this chapter. After pointing out some characteristics which make the basics of the current handover technologies, we describe an information infrastructure, based on context and ontologies which can be used to foster an intelligent, efficient and profitable scenario for managing handovers in the Next Generation Networks. Some experiments are described and the potential of using these technologies are evaluated.
Article
Increasingly, mobile users interact with more than their primary mobile device, a trend that will likely continue with the growth of the internet of things. We introduce an application data forwarding framework, which is based on a mobile user's primary device and geared towards energy savings for the multitude of devices a mobile user interacts with. Based on the need to have a recent copy of application data available on a mobile user's primary device, e. g., a smartphone, our framework forwards, e. g., Facebook status updates, to external devices in vicinity. We provide an evaluation of the energy consumption and potentials for savings using our proposed approach by means of cost-based evaluations. Assuming that external devices could derive the data through cellular or wireless LAN connections as alternatives, we find that significant savings for the group of devices could be realised. Specifically, for an active social network account with frequent updates, we find that the external devices would be able to conserve power, while the additional burden on the primary device's battery remains reasonably low.
Chapter
ExamplesTypes of FederationsRequirementsArchitecture of a FederationLife Cycle of a FederationFederation Access ControlFederation Implementation ApproachesSecuritySummary
Article
Personal communication devices are extensively used for mobile computing thanks to ever increasing wireless coverage and processing capability. However, they are constrained in terms of both human interaction (screen size and resolution, keyboard) and lifetime; hence mobile computing often relies on the possibility to migrate applications and communication sessions among several (fixed or mobile) devices. Session migration is a challenging feature, especially when communication with other hosts is involved, and the current Internet architecture does not support natively this paradigm. In this paper, we address seamless and transparent session migration for the Transmission Control Protocol (TCP) that maintains compatibility with current Internet; hence, our work keeps the remote TCP peer unaware of the migration process. We describe the latest features of the Linux kernel that allow the migration of a TCP session and a couple of aLTErnatives to divert network packets towards the new destination.
Article
Mobility of Internet hosts allows computing nodes to move between subnets while being connected to the remote nodes. To provide seamless connectivity to the roaming users, several mobility protocols have been developed at different layers. Some schemes have been proposed in the transport layer. However, no research has been performed to analyze different transport layer mobility schemes. In this paper, we have discussed a number of transport layer mobility protocols. We have identified different mobility related issues and have chosen a number of evaluation criteria to critically analyze existing transport layer mobility schemes. Our critical analysis can help reader understand the stengths and weaknesses of these mobility schemes.
Research
Bibliography on TCP/IP Mobility, January 17, 2006
Conference Paper
This paper proposes a data flow migrating optimization scheme for CDN system in wireless network. NAT device is introduced as proxy to help CDN mirror supporting mobility functions which are not supported originally. And a virtual IP scheme is also designed to decouple the position and content so that the session can be migrated over different mirrors and user can obtain the data from the nearest one. Thus the user can not only get benefit from routing optimization but also obtain the nearest mirror transmission always. The result of NS-2 Simulation shows that proposed scheme can reduce the latency of packet delivery obviously, compared to the existing optimization schemes.
Article
We have created Zap, a novel system for transparent migration of legacy and networked applications. Zap provides a thin virtualization layer on top of the operating system that introduces pods, which are groups of processes that are provided a consistent, virtualized view of the system. This decouples processes in pods from dependencies to the host operating system and other processes on the system. By integrating Zap virtualization with a checkpoint-restart mechanism, Zap can migrate a pod of processes as a unit among machines running independent operating systems without leaving behind any residual state after migration. We have implemented a Zap prototype in Linux that supports transparent migration of unmodified applications without any kernel modifications. We demonstrate that our Linux Zap prototype can provide general-purpose process migration functionality with low overhead. Our experimental results for migrating pods used for running a standard user's X windows desktop computing environment and for running an Apache web server show that these kinds of pods can be migrated with subsecond checkpoint and restart latencies.
Technical Report
Full-text available
Chapter
Full-text available
Wireless data services, other than those for electronic mail or paging, have thus far been more of a promise than a success. We believe that future mobile information systems must be built upon heterogeneous wireless overlay networks, extending traditional wired and internetworked processing “islands” to hosts on the move over coverage areas ranging from in-room, in-building, campus, metropolitan, and wide-areas. Unfortunately, network planners continue to think in terms of homogeneous wireless communications systems and technologies. In this paper, we describe our approach towards a new wireless data networking architecture that integrates diverse wireless technologies into a seamless wireless (and wireline) internetwork. In addition, we describe the applications support services needed to make it possible for applications to continue to operate as mobile hosts roam across such networks.
Article
Full-text available
TCP is a reliable transport protocol tuned to perform well in traditional networks where congestion is the primary cause of packet loss. However, networks with wireless links and mobile hosts incur significant losses due to biterrors and handoff. This environment violates many of the assumptions made by TCP, causing degraded end-toend performance. In this paper, we describe the additions and modifications to the standard Internet protocol stack (TCP/IP) to improve end-to-end reliable transport performance in mobile environments. The protocol changes are made to network-layer software at the base station and mobile host, and preserve the end-to-end semantics of TCP. One part of the modifications, called the snoop module, caches packets at the base station and performs local retransmissions across the wireless link to alleviate the problems caused by high bit-error rates. The second part is a routing protocol that enables low-latency handoff to occur with negligible data loss. We have implemented this new protocol stack on a wireless testbed. Our experiments show that this system is significantly more robust at dealing with unreliable wireless links than normal TCP; we have achieved throughput speedups of up to 20 times over regular TCP and handoff latencies over 10 times shorter than other mobile routing protocols. 1.
Conference Paper
Full-text available
Mobile-IP and the Dynamic Host Configuration Protocol (DHCP) are two protocols which are likely to be implemented together for use with wireless computers. We explore the ways that they can be used with in mobile computers. These protocols interact in subtle ways, presenting a system architect with a variety of trade-offs that need careful analysis. We detail the important interactions and system design issues, and also explain the design and implementation of a new DHCP option for mobile computers. The difference between mobility and portability is explained; this paper only emphasizes approaches for mobility. We explore implementation issues that we have encountered.
Article
Full-text available
Describes work in routing packets to mobile hosts in a large internetwork, such as the Internet, and gives an overview of implementation work in this area. The authors discuss the problem of routing in an ad hoc network of wireless mobile hosts, as might be needed in an area without established wireless networking infrastructure; they describe a new protocol developed for routing in such a network and summarize the results from a simulation of the protocol. They then describe work in providing support for adaptive operation of higher-layer protocols and applications; they have developed an inexpensive protocol and application programming interface (API) for notifying higher layers when the quality of a mobile host's network connection changes as it moves between different locations, possibly including changes in the type of network in use at each location. Finally, they compare their work to related mobile networking research elsewhere and present conclusions
Article
Full-text available
In this paper we show that application-aware adaptation, a collaborative partnership between the operating system and applications, offers the most general and effective approach to mobile information access. We describe the design of Odyssey, a prototype implementing this approach, and show how it supports concurrent execution of diverse mobile applications. We identify agility as a key attribute of adaptive systems, and describe how to quantify and measure it. We present the results of our evaluation of Odyssey, indicating performance improvements up to a factor of 5 on a benchmark of three applications concurrently using remote services over a network with highly variable bandwidth.
Chapter
Full-text available
Wireless data services, other than those for electronic mail or paging, have thus far been more promising than successful. We believe that future mobile information systems must be built upon heterogeneous wireless overlay networks', extending traditional wired and internetworked processing "islands" to hosts on the move over coverage areas ranging from in-room, in-building, campus, metropolitan, and wide-areas. Unfortunately, network planners continue to think in terms of homogeneous wireless communications systems and technologies. In this paper, we describe a new wireless data networking architecture that integrates diverse wireless technologies into a seamless internetwork. In addition, we describe the applications support services needed to make it possible for applications to continue to operate as mobile hosts roam across such networks. The architecture described herein is being implemented in a testbed at the University of California, Berkeley under joint government/industry sponsorship.
Conference Paper
Proxies are becoming increasingly common. One use of a proxy is to address network heterogeneity, which can arise especially in mobile computing. In this setting, a proxy can process the traffic flowing to and from a network limited mobile host, damping the variations in application performance as well as providing other benefits such as reduced cost and increased security. We describe the issues we faced in designing such a proxy system, how we solved some problems, and why others could not be solved
Article
Over the past few years, Transmission Control Protocol (TCP) has become the most widely used transport layer protocol on the Internet. TCP performs poorly however, if one of the communicating hosts is a mobile wireless computer [6]. One way to address this performance problem is to modify TCP to make it aware of host mobility.
Bruce Zenel and Dan Duchamp General purpose proxies: Solved and unsolved problems
  • S Addison-Welsley
  • T Thomson
  • Narten
Addison-Welsley, 1994. S. Thomson and T. Narten. IPv6 stateless address autoconfiguration. In-ternet Request For Comments RFC 1971, August 1996. Bruce Zenel and Dan Duchamp. General purpose proxies: Solved and unsolved problems. In Prmeedings uf Hut-OS VI, May 1997. read as http://www.mcl.cs.columbia.edu/ baz/ps/hot-os-vi.ps.
TCP splicing for firewall and HTTP cache performance
  • D A Maltz
  • P Bhagwat