MC 1
MC 1
Upkar Varshney
Computer Information Sciences
Washburn University of Topeka
Topeka, KS 66621
E-mail: zzvars@acc.wuacc.edu
Abstract the network and is allowed to roam around from one place
There has been a trend to support ‘computing on move’ to the other [3]. The mobile user is provided with a
or mobile computing, where a user is free to roam and he wireless connection to a fixed part of the network and
or she still expects an uninterrupted access to the Internet. possibly to other mobile users. The mobile computing
To support mobile computing over the Internet, two environment can be described by the following attributes:
possible approaches can be considered. One is to use (a) mobile hosts (MHs), (b) mobile support stations
mobile version of IP (Internet Protocol), which could (MSSs) or base stations serving an area (a cell), (c) a
support typical Internet applications. The second approach wireless interface, (d) wireless medium with varying
is to use Wireless ATM (Asynchronous Transfer Mode), channel characteristics (due to fading, noise, interference,
an emerging technology where ATM cells are transmitted etc.), and (e) various applications running on MHs
over wireless links and part of the ATM connection lies in requiring different quality of service (QoS).
the wireless network. Wireless ATM has received Mobile computing environment creates several
attention due to the need to support mobile multimedia interesting addressing and network routing challenges. The
services and also because of an increasing deployment of mobility can affect various layers of protocols including
ATM technology in the Internet and other networks. The data link layer (loss due to wireless medium and link-by-
paper discusses the challenges and issues that must be link retransmission issues), network layer (addressing and
considered before Wireless ATM can be widely deployed in routing issues) and transport layer (end-to-end congestion,
the Internet environment. flow control and retransmission issues).
IETF (Internet Engineering Task Force) has introduced
1. Introduction Mobile IP (Internet Protocol) to support forwarding of IP
datagrams to the current location of a mobile user [4]. The
Mobile Computing refers to a distributed environment functioning of mobile IP is shown in Figure 1, which
where a user does not have to maintain a fixed position in includes all the necessary steps.
Subnetwork 1 Subnetwork 3
Sending
host Registration
Checking/verifying Foreign completed Current location
agent of mobile host
Registration
request
Routing Home Forwarding
agent
Subnetwork 2
Former location
of mobile host
Figure 1. Functioning of mobile IP
VPI: Virtual Path Identifier “ATM everywhere” is an interesting and important idea
VCI: Virtual Channel Identifier in the sense that it could lead to simple and high speed
PT: Payload Type interfaces to connect different networks together. Also the
CLP: Cell Loss Priority advantages of ATM such as support for real time delivery
HEC: Header Error Control can be extended to other networks. These reasons along
with the desire to support mobile multimedia computing
Figure 4. ATM cell format at the network- have motivated researchers to introduce the ATM
network interface technology in wireless environment also [1, 2, 7, 9].
Wireless ATM is an emerging technology where ATM
cells are transmitted over wireless channels and part(s) of
In the last few years, there has been an increasing the ATM connection lies in the wireless network. This
deployment of ATM (Asynchronous Transfer Mode) introduction of ATM in wireless environment creates
technology in the local as well as wide area environments. many interesting challenges. These include how to
Many campus based ATM LANs (Local Area Networks) maintain the end-to-end ATM connection as the user
have been designed and implemented. The backbone of the moves from one location to the other, how to provide
Internet, termed vBNS (very high speed Backbone quality of service, and the choice of transport protocol if
Network Service), interconnects 5 major NSF needed to support mobile computing environment.
supercomputing centers as shown in Figure 5. The current
Cornell Theory
Center
San Diego
Supercomputing Center
Higher
Higher
Layers
Layers
AAL AAL
W-ATM Layer W-ATM Layer
ATM Layer ATM Layer LLC LLC
ATM Layer
MAC Layer MAC Layer
Wired Wired Wired Wireless Wireless
Physical Layer Physical Layer Physical Layer Physical Layer Physical Layer
PBS
PBS
PBS
PBS
Mobile Users
The introduction of ATM in wireless environment ATM technology is primarily designed for low error
presents many interesting challenges such as how to rate and high bandwidth communication environment.
maintain end-to-end ATM connection when the two ends This is why ATM cell does not employ error control for
of the connection are not stationary any more, how to deal the entire cell as the HEC (Header Error Control) field
with poor wireless links, how to guarantee quality of covers possible errors in the cell header only. So the data
service (QoS) if needed by a mobile computing part of ATM cell is not covered be a error control field.
application, how to resequence misordered ATM cells, and However, wireless links are known for high and variable
what MAC and transport protocols be used. error rates, so when ATM cells are transmitted over
wireless links, a high rate of cell loss may occur. There
4.1. Supporting user mobility could be several different ways to deal with this cell loss.
One way to counteract this loss is the use of forward error
ATM technology is designed to support connections correction (FEC) algorithms to allow receiver to detect and
between fixed end points, where VPI (Virtual Path correct communication errors. Another possible approach
Identifier) and VCI (Virtual Circuit Identifier) are allocated to make this cell loss transparent to the applications/users
to a virtual path involving switches and links. But in is to use an error detection scheme (e.g. CRC) followed
wireless networks, a mobile user moves from a cell to the by buffering and selective retransmission of ATM cells.
other, thus causing a change in its access point. Therefore, The retransmission will require the use of sequence
the issue of maintaining an end-to-end ATM connection number in ATM cells. One more reason behind the need
between a mobile user in the wireless network and a fixed for sequence number is the fact that ATM cells may be
user in ATM network arises. misordered in wireless network. The addition of sequence
Some researchers have started to address the user numbers (2-4 bytes long) would certainly add some
mobility problem [1, 2, 9]. These schemes involve overhead, which may be in addition to overhead caused by
rerouting or rearrangement of end-to-end ATM connection FEC. It may be possible to package sequence number,
using following approaches: (a) by providing multiple FEC overhead and 53 bytes long ATM cell together in a
paths for communications in the wireless network (virtual larger envelope (e.g. 64 bytes or smaller) for transmission
connection tree approach) [1], where the mobile user in wireless ATM environment [7].
chooses one of many paths based on its current location, If efficiency is an issue then some of the ATM header
(b) forwarding of ATM cells by a designated source base fields may have to be removed (or compressed) to give
station to the current location of the mobile user (homing way to wireless specific error correction and sequence
algorithm) [2], (c) rerouting the connection in wireless number fields. For example, if FEC field is being used for
network as the mobile user moves from one location to the entire ATM cell then HEC (Header Error Correction)
the other [9]. These schemes are discussed in more detail field, which covers only the cell header, may not be needed
in section V, where a qualitative comparison of in the ATM cell. A possible cell format for wireless ATM
connection rerouting schemes is presented. environment is shown in Figure 9.
MAC specific header will vary based on the type of of resources in the neighboring wireless cells so that the
media access control used for sharing of wireless QoS can be supported when the mobile user has moved to
bandwidth. FEC (or error correction) should be chosen one of the neighboring cells.
over CRC (or error detection) if the propagation delay Another approach involves using admission control
between two users is high (e.g. ATM-based satellite algorithms by base stations in wireless cells so that a
network) making error detection and subsequent sudden movement of many mobile users into a wireless
retransmission very inefficient as far as the throughput is cell does not severely impact the QoS of existing users
concerned. For smaller network (or networks with lower [1]. If a wireless cell is overloaded (more users than it can
propagation delay), the choice of using error detection support), then some ATM cells can be discarded. This
versus correction does depend on several factors such as discarding may be random, or can be made selective if
the amount of complexity added by FEC, amount of certain mobile users, which can tolerate higher cell loss,
buffering available at intermediate base stations etc. It’s may be identified by the base station.
the old debate of amount of processing overhead versus Wireless ATM introduces some more requirements on
bandwidth overhead. Length of sequence number field MAC protocol such as reduced access delay for real time
depends on the number of ATM cells in the pipeline traffic (CBR: constant bit rate, and VBR: variable bit rate)
before a retransmission is requested. As the network speed and acceptable bandwidth for non real time traffic (ABR:
goes up, the sequence number field has to be increased to available bit rate) to allow the transmission of ATM cells
give unique number to at least each ATM cell between the over wireless channels. The sharing of wireless bandwidth
source and the receiver. The standard ATM cell header may has to be efficient to support more customers and or
be compressed to 4 bytes by removing HEC as other error application requirements. In reality, reducing access delay
detecting or correcting schemes are already there in the cell may not lead to the most effective utilization of the
to cover the entire cell. wireless bandwidth. So a MAC protocol should give
priority to real time traffic as non real time traffic can wait
4.3. Supporting quality of service & MAC for longer duration. Some efforts have been made in
protocol designing MAC protocols for wireless ATM environment
[2, 6]. In [6], a TDMA (Time Division Multiple Access)
In (wired) ATM networks, QoS may include CTD approach is suggested where the channel bandwidth is
(Cell Transfer Delay), CDV (Cell Delay Variation) and divided into frames of slots and these slots are dynamically
CLR (Cell Loss Ratio). Even if the loss of ATM cells be allocated based on the priority and the amount of traffic.
counteracted using FEC or retransmission schemes, One other way to solve the problem is to redefine the
wireless network may still not support or guarantee QoS whole concept of QoS by dividing the it into two classes,
as defined in ATM standards due to the limited and shared Hard QoS and Soft QoS [9]. The Hard QoS is
radio bandwidth. guaranteeing the negotiated parameters, while the Soft
However, there are several ways which can be helpful QoS implies a prioritized probabilistic service based on
in supporting QoS. These are (a) advance resource available resources. If the end-to-end connection lies
reservation in neighboring cells [5], (b) admission control mostly or completely within the wireline ATM network,
[1], (c) design of suitable MAC protocols [2, 6], and (d) then a user’s request for Hard QoS can be supported.
redefining the whole concept of QoS [9]. However, if a part of the end-to-end connection uses
There has been some work in designing resource wireless link(s), then user should be informed that only a
management schemes for wireless environment to provide Soft QoS may be supported.
some QoS [5]. This scheme involves advance reservation
W X W X
Y Y
Z Z
Figure 10: (a) An example of triangular routing (b) Eliminating triangular routing