SlideShare a Scribd company logo
1 of 33
Mobile Transport Layers
ANU TS
IT A
42
Contents
 Introduction
 comparison between tcp and udp
 Conjestion strategies
 I –TCP
 Snooping
 Mobile tcp
 2.5/3g ether networks
 Points from journals
 Conclusion

2
WHAT IS A TRANSPORT LAYER
• In computer networking, the transport layer is a conceptual
division of methods in the layered architecture of protocols in
the network stack in the Internet Protocol Suite and the Open
Systems Interconnection (OSI). The protocols of the layer
provides host-to-host communication services for
applications.[1] It provides services such as connection-
oriented data stream support, reliability, flow control,
and multiplexing.
 (source wikipedia)
3
(
TCP UDP
 It is a connection oriented
protocol
 TCP is used in case of
applications in which fast
transmission of data is not
required
 HTTP, FTP, SMTP Telnet etc
 It rearranges data packets in the
order specified
 Comparatively slow
 Reliable (defines that data will
be definitely sent across)
 It is a connection less protocol
 It is preferred in case of the
applications which have the
priority of sending the data on
time and on faster rates
 DHCP, TFTP, SNMP, RIP, VOIP
etc
 No inherent ordering, the data
packets of same message may be
ordered differently
 Comparatively faster
 Unreliable 4
 TCP header size is 20 bytes
 1. Sequence Number, 2. AcK
number, 3. Data offset, 4.
Reserved, 5. Control bit, 6.
Window, 7. Urgent Pointer, 8.
Options, 9. Padding, 10. Check
Sum, 11. Source port, 12.
Destination port.
• UDP Header size is 8 bytes
 1 Length, 2. Source port, 3.
Destination port
5
.,
Con..
 Data is read as a byte stream,
thus no distinguishing
indications are transmitted to
the signal message
 It is heavier as it requires
three packets to set up a
socket connection, before any
user data can be sent. TCP
handles reliability and
congestion control.
 TCP controls the flow of data
 Packets are sent individually
and after the arrival the
packets are rearranged
 UDP is lightweight due to no
ordering of messages,
no tracking connections, etc.
 UDP does not have an option
for flow control
6
Sliding window method
 This window covers unacknowledged data and the data it
can send keeping in mind the window size advertised by
the receiver.
 Following figure should give you an idea about how a
sliding window looks like :
7
Con..
 The receiver can send acknowledgement even before its
window fills up completely.
 The left edge of the window can move towards right.
 Neither left edge should move towards left nor right edge
should move towards left.
8
CONJESTION STRATEGY
 Slow-start is part of the congestion control strategy used by
TCP, the data transmission protocol used by
many Internet applications. Slow-start is used in conjunction
with other algorithms to avoid sending more data than the
network is capable of transmitting, that is, to avoid
causing network congestion. Slow-start begins initially with
a congestion window size (cwnd) of 1, 2 or 10. The value of the
Congestion Window will be increased by one with,
9
Con..
 each acknowledgement (ACK) received effectively
doubling the window size each round-trip time . The
transmission rate will be increased with slow-start
algorithm until either a loss is detected, or the receiver's
advertised window (rwnd) is the limiting factor, or the slow
start threshold (ssthresh) is reached. If a loss event occurs,
TCP assumes that it is due to network congestion and takes
steps to reduce the offered load on the network. These
measurements depend on the used TCP congestion
avoidance algorithm.
10
Con..
 Once ss thresh is reached, TCP changes from slow-start
algorithm to the linear growth (congestion avoidance)
algorithm. At this point, the window is increased by 1
segment for each RTT.
 Although the strategy is referred to as "Slow-Start", its
congestion window growth is quite aggressive, more
aggressive than the congestion avoidance phase.[9] Before
slow-start was introduced in TCP, the initial pre-congestion
avoidance phase was even faster.
 The behavior upon packet loss depends on the TCP
congestion avoidance algorithm that is used.
11
Fast retransmit
 Fast Retransmit is an enhancement to TCP that reduces
the time a sender waits before retransmitting a
lost segment.
 A TCP sender uses a timer to recognize lost segments. If an
acknowledgement is not received for a particular segment
within a specified time (a function of the estimated round-
trip delay time), the sender will assume the segment was
lost in the network, and will retransmit the segment.
 Duplicate acknowledgement is the basis for the fast
retransmit mechanism which works as follows: after
receiving a packet (e.g. with sequence number 1), the
receiver sends an acknowledgement by adding 1 to the
sequence number (i.e., acknowledgement number 2) which
means that the receiver received the packet number 1 and it
expects packet number 2 from the sender 12
CON…
Let's assume that three subsequent packets have been lost. In
the meantime the receiver receives packet numbers 5 and
6. After receiving packet number 5, the receiver sends an
acknowledgement, but still only for sequence number 2.
When the receiver receives packet number 6, it sends yet
another acknowledgement value of 2. Because the sender
receives more than one acknowledgement with the same
sequence number (2 in this example) this is
called duplicate acknowledgement.
13
14
The fast retransmit enhancement works as follows: if a
TCP sender receives a specified number of
acknowledgements which is usually set to three duplicate
acknowledgements with the same acknowledge number
(that is, a total of four acknowledgements with the same
acknowledgement number), the sender can be reasonably
confident that the segment with the next higher sequence
number was dropped, and will not arrive out of order. The
sender will then retransmit the packet that was presumed
dropped before waiting for its timeout.
I -TCP
 Indirect TCP or I-TCP segments the connection (figure
1)
 no changes to the TCP protocol for hosts connected to
the wired Internet, millions of computers use (variants
of) this protocol
 optimized TCP protocol for mobile hosts
 splitting of the TCP connection at, e.g., the foreign
agent into 2 TCP connections, no real end-to-end
connection any longer
 hosts in the fixed part of the net do not notice the
characteristics of the wireless part
15
16
17
If CN sends packet, FA acknowledges packet and forwards
packet to MN
If MN receives packet,it acknowledges
This acknowledgement only used by CN
Similarly if MN sends packet, FA acknowledges packet and
forwards it to CN
I-TCP requires several actions as soon a handover
takes place:
The packets have to be redirected using mobile IP
The access point acts as a proxy bufferring packets for
retransmission
After handover, the old proxy forwards data to new proxy
The sockets(current state of TCP) of old proxy also migrate
to new foreign agent
18
19
Snooping TCP
“Transparent” extension of TCP within the foreign agent
• buffering of packets sent to the mobile host
• lost packets on the wireless link (both directions!) will
be retransmitted immediately by the mobile host or
foreign agent, respectively (so called “local”
retransmission)
• the foreign agent therefore “snoops” the packet flow
and recognizes acknowledgements in both directions,
it also filters ACKs
• changes of TCP only within the foreign agent
20
Snooping TCP
 Data transfer from the mobile host
 FA detects packet loss on the wireless link via sequence
numbers, FA answers directly with a NACK to the MH
 MH can now retransmit data with only a very short delay
 Integration with MAC layer
 MAC layer often has similar mechanisms to those of TCP
 thus, the MAC layer can already detect duplicated packets
due to retransmissions and discard them
 Problems
 snooping TCP does not isolate the wireless link as good as
I-TCP
 snooping might be tough if packets are encrypted
21
Snooping TCP
22
Mobile TCP
 Mobile TCP:
 The M-TCP splits up the connection into two parts:
 An unmodified TCP is used on the Standard host-
Supervisory Host section
 An optimised TCP is used on the Supervisory Host-
Mobile Host section.
 The Supervisory Host (SH) adorns the same role as the
proxy (Foreign Agent) in I-TCP.
 The SH is responsible for exchanging data to both the
Standard host and the Mobile host.
 .
23
Con..
 Here in this approach, we assume that the error bit rate is less as
compared to other wireless links.
 So if any packet is lost, the retransmission has to occur from the
original sender and not by the SH. (This also maintains the end-
to-end TCP semantic)
 The SH monitors the ACKs (ACK means acknowledgement)
being sent by the MH. If for a long period ACKs have not been
received, then the SH assumes that the MH has been
disconnected (maybe due to failure or moved out of range, etc...).
 If so the SH chokes the sender by setting its window size to 0.
 Because of this the sender goes into persistent mode i.e. the
sender’s state will not change no matter how long the receiver is
disconnected.
 This means that the sender will not try to retransmit the data
24
Con..
 Now when the SH detects a connectivity established again
with the MH (the old SH or new SH if handover), the
window of the sender is restored to original value.
25
2.5/3g ethernetworks
 Tcp over 2.5g/3g ethernetworks
 Learn to live with:
 • Data rates: 64 kbit/s up, 115-384 kbit/s down
 asymmetry: 3-6, but also up to 1000 (broadcast
 systems), periodic allocation/release of channels
 • High latency, high jitter, packet loss
 – Suggestions:
 • Large (initial) sending windows, large maximum transfer unit, selective
 acknowledgement, explicit congestion notification (ECN), time stamp, no
 header compression
 – Already in use:
 • i-mode running over FOMA
 • WAP 2.0 (“TCP with wireless profile)
26
Points from journals
 [1]The mobile TCP will dramatically improve the
throughput performance under error condition due to
wireless transmission. The mobile TCP solution introduces
a three key technologies, these are, header
conversion,selective retransmission and no slow start
mechanism, while keeping a compatibility against user
interface and inside of the Internet.Thus these network
and transport layers solution in this paper will provide a
chance to create a new type ofcommunication life based on
mobile computing.
27
Con..
 [2] TIAP for achieving interoperability between TCP and
ATP. TAIP can be implemented as a thin layer between the
network layer and transport layer in the TCP/IP stack and
it is transparen
[3] The employment of DTLS to secure CoAP
communications raises various issues, as addressed
throughout the article, that are also recognized and the
focus of research to both the sender and the receiver
28
Con..
 [4]
29
LS-SCTP includes path monitoring and
packet assignment mechanisms. These mechanisms monitor
the paths and stripe the packets according to their condition.
Simulation results demonstrated the effectiveness of our
proposed mechanism in providing throughput and
reliability
to mobile applications.
Con..
[5] A special code class, which is used for erasure decoding,
are LDPC codes, which can be described via its sparse parity
check matrix H.
30
REFERENCES
[1] A NETWORK AND TRANSPORT LAYERS FOR MOBILE
COMPUTING OVER INTERNET byT. OHSAWA*, K OKANOUE and
K.TAKEDA
[2] A Transport Layer Interoperability Model For Mobile
Ad-hoc Environment by Haidar Safa, Marcel Karam, Rawad
Abou
[3] End-to-end transparent transport-layer security for
Internet integrated mobile sensing devices by Jorge Granjal
and Edmundo Monteiro
[4] A Transport Layer Load Sharing Mechanism for Mobile
Wireless Hosts by Ahmed Abd El Al, Tarek Saadawi,
Myung Lee
31
Con…
[5] Transport Layer Coding for the Land Mobile Satellite
Channel by Harald Emst, Luca Sartorello and Sandro
Scalise
[6]wikipedia
[7] Raj Kamal, Mobile Computing, Oxford University Press,
2007
32
33
THANK YOU ALL

More Related Content

What's hot

Mobile transportlayer
Mobile transportlayerMobile transportlayer
Mobile transportlayerRahul Hada
 
Tcp snoop protocols
Tcp snoop protocols  Tcp snoop protocols
Tcp snoop protocols Amr Nasr
 
Jaimin chp-6 - transport layer- 2011 batch
Jaimin   chp-6 - transport layer- 2011 batchJaimin   chp-6 - transport layer- 2011 batch
Jaimin chp-6 - transport layer- 2011 batchJaimin Jani
 
C10 transport protocols
C10 transport protocolsC10 transport protocols
C10 transport protocolsRio Nguyen
 
Connection Establishment & Flow and Congestion Control
Connection Establishment & Flow and Congestion ControlConnection Establishment & Flow and Congestion Control
Connection Establishment & Flow and Congestion ControlAdeel Rasheed
 
TCP Over Wireless
TCP Over WirelessTCP Over Wireless
TCP Over WirelessFarooq Khan
 
Analytical Research of TCP Variants in Terms of Maximum Throughput
Analytical Research of TCP Variants in Terms of Maximum ThroughputAnalytical Research of TCP Variants in Terms of Maximum Throughput
Analytical Research of TCP Variants in Terms of Maximum ThroughputIJLT EMAS
 
User datagram protocol
User datagram protocolUser datagram protocol
User datagram protocolIshtdeep Hora
 
Chapter03 sg
Chapter03 sgChapter03 sg
Chapter03 sgDang Hop
 
Transport Layer In Computer Network
Transport Layer In Computer NetworkTransport Layer In Computer Network
Transport Layer In Computer NetworkDestro Destro
 
Tcp Immediate Data Transfer
Tcp Immediate Data TransferTcp Immediate Data Transfer
Tcp Immediate Data TransferRam Dutt Shukla
 
Mobile computing-tcp data flow control
Mobile computing-tcp data flow controlMobile computing-tcp data flow control
Mobile computing-tcp data flow controlSushant Kushwaha
 

What's hot (20)

transport protocols
transport protocolstransport protocols
transport protocols
 
TCP Vs UDP
TCP Vs UDP TCP Vs UDP
TCP Vs UDP
 
Mobile transportlayer
Mobile transportlayerMobile transportlayer
Mobile transportlayer
 
Tcp snoop protocols
Tcp snoop protocols  Tcp snoop protocols
Tcp snoop protocols
 
Jaimin chp-6 - transport layer- 2011 batch
Jaimin   chp-6 - transport layer- 2011 batchJaimin   chp-6 - transport layer- 2011 batch
Jaimin chp-6 - transport layer- 2011 batch
 
Udp vs-tcp
Udp vs-tcpUdp vs-tcp
Udp vs-tcp
 
C10 transport protocols
C10 transport protocolsC10 transport protocols
C10 transport protocols
 
Connection Establishment & Flow and Congestion Control
Connection Establishment & Flow and Congestion ControlConnection Establishment & Flow and Congestion Control
Connection Establishment & Flow and Congestion Control
 
TCP Over Wireless
TCP Over WirelessTCP Over Wireless
TCP Over Wireless
 
Analytical Research of TCP Variants in Terms of Maximum Throughput
Analytical Research of TCP Variants in Terms of Maximum ThroughputAnalytical Research of TCP Variants in Terms of Maximum Throughput
Analytical Research of TCP Variants in Terms of Maximum Throughput
 
User datagram protocol
User datagram protocolUser datagram protocol
User datagram protocol
 
Chapter03 sg
Chapter03 sgChapter03 sg
Chapter03 sg
 
Congestion control in TCP
Congestion control in TCPCongestion control in TCP
Congestion control in TCP
 
Tcp
TcpTcp
Tcp
 
Transport Layer In Computer Network
Transport Layer In Computer NetworkTransport Layer In Computer Network
Transport Layer In Computer Network
 
udp , tcp ,sctp
udp , tcp ,sctpudp , tcp ,sctp
udp , tcp ,sctp
 
Mobile Transport layer
Mobile Transport layerMobile Transport layer
Mobile Transport layer
 
Tcp Immediate Data Transfer
Tcp Immediate Data TransferTcp Immediate Data Transfer
Tcp Immediate Data Transfer
 
Cs8591 u4
Cs8591 u4Cs8591 u4
Cs8591 u4
 
Mobile computing-tcp data flow control
Mobile computing-tcp data flow controlMobile computing-tcp data flow control
Mobile computing-tcp data flow control
 

Similar to Mcseminar

Mobile transport layer .
Mobile transport layer .Mobile transport layer .
Mobile transport layer .junnubabu
 
EC 6802 WIRELESS NETWORK_ BABU M_ unit 3 ,4 & 5 PPT
EC 6802 WIRELESS NETWORK_ BABU M_ unit 3 ,4 & 5 PPTEC 6802 WIRELESS NETWORK_ BABU M_ unit 3 ,4 & 5 PPT
EC 6802 WIRELESS NETWORK_ BABU M_ unit 3 ,4 & 5 PPTbabuece
 
mobile_transport_layer (1).pptx
mobile_transport_layer (1).pptxmobile_transport_layer (1).pptx
mobile_transport_layer (1).pptxsinghram281982
 
Lecture 19 22. transport protocol for ad-hoc
Lecture 19 22. transport protocol for ad-hoc Lecture 19 22. transport protocol for ad-hoc
Lecture 19 22. transport protocol for ad-hoc Chandra Meena
 
A THROUGHPUT ANALYSIS OF TCP IN ADHOC NETWORKS
A THROUGHPUT ANALYSIS OF TCP IN ADHOC NETWORKSA THROUGHPUT ANALYSIS OF TCP IN ADHOC NETWORKS
A THROUGHPUT ANALYSIS OF TCP IN ADHOC NETWORKScsandit
 
A throughput analysis of tcp in adhoc networks
A throughput analysis of tcp in adhoc networksA throughput analysis of tcp in adhoc networks
A throughput analysis of tcp in adhoc networkscsandit
 
Transport_Layer_Protocols.pptx
Transport_Layer_Protocols.pptxTransport_Layer_Protocols.pptx
Transport_Layer_Protocols.pptxAnkitKumar891632
 
NetWork Design Question2.) How does TCP prevent Congestion Dicuss.pdf
NetWork Design Question2.) How does TCP prevent Congestion Dicuss.pdfNetWork Design Question2.) How does TCP prevent Congestion Dicuss.pdf
NetWork Design Question2.) How does TCP prevent Congestion Dicuss.pdfoptokunal1
 
IMPACT OF CONTENTION WINDOW ON CONGESTION CONTROL ALGORITHMS FOR WIRELESS ADH...
IMPACT OF CONTENTION WINDOW ON CONGESTION CONTROL ALGORITHMS FOR WIRELESS ADH...IMPACT OF CONTENTION WINDOW ON CONGESTION CONTROL ALGORITHMS FOR WIRELESS ADH...
IMPACT OF CONTENTION WINDOW ON CONGESTION CONTROL ALGORITHMS FOR WIRELESS ADH...cscpconf
 
Ch7-Transport_Protocols.ppt
Ch7-Transport_Protocols.pptCh7-Transport_Protocols.ppt
Ch7-Transport_Protocols.pptRituParna42
 
Comparative Analysis of Different TCP Variants in Mobile Ad-Hoc Network
Comparative Analysis of Different TCP Variants in Mobile Ad-Hoc Network Comparative Analysis of Different TCP Variants in Mobile Ad-Hoc Network
Comparative Analysis of Different TCP Variants in Mobile Ad-Hoc Network partha pratim deb
 
Studying_the_TCP_Flow_and_Congestion_Con.pdf
Studying_the_TCP_Flow_and_Congestion_Con.pdfStudying_the_TCP_Flow_and_Congestion_Con.pdf
Studying_the_TCP_Flow_and_Congestion_Con.pdfIUA
 
Improving Performance of TCP in Wireless Environment using TCP-P
Improving Performance of TCP in Wireless Environment using TCP-PImproving Performance of TCP in Wireless Environment using TCP-P
Improving Performance of TCP in Wireless Environment using TCP-PIDES Editor
 
Tcp Congestion Avoidance
Tcp Congestion AvoidanceTcp Congestion Avoidance
Tcp Congestion AvoidanceRam Dutt Shukla
 

Similar to Mcseminar (20)

Mobile transport layer .
Mobile transport layer .Mobile transport layer .
Mobile transport layer .
 
EC 6802 WIRELESS NETWORK_ BABU M_ unit 3 ,4 & 5 PPT
EC 6802 WIRELESS NETWORK_ BABU M_ unit 3 ,4 & 5 PPTEC 6802 WIRELESS NETWORK_ BABU M_ unit 3 ,4 & 5 PPT
EC 6802 WIRELESS NETWORK_ BABU M_ unit 3 ,4 & 5 PPT
 
mobile_transport_layer (1).pptx
mobile_transport_layer (1).pptxmobile_transport_layer (1).pptx
mobile_transport_layer (1).pptx
 
Tcp
TcpTcp
Tcp
 
Unit 4
Unit 4Unit 4
Unit 4
 
Lecture 19 22. transport protocol for ad-hoc
Lecture 19 22. transport protocol for ad-hoc Lecture 19 22. transport protocol for ad-hoc
Lecture 19 22. transport protocol for ad-hoc
 
Mc unit 4-jwfiles
Mc unit 4-jwfilesMc unit 4-jwfiles
Mc unit 4-jwfiles
 
A THROUGHPUT ANALYSIS OF TCP IN ADHOC NETWORKS
A THROUGHPUT ANALYSIS OF TCP IN ADHOC NETWORKSA THROUGHPUT ANALYSIS OF TCP IN ADHOC NETWORKS
A THROUGHPUT ANALYSIS OF TCP IN ADHOC NETWORKS
 
A throughput analysis of tcp in adhoc networks
A throughput analysis of tcp in adhoc networksA throughput analysis of tcp in adhoc networks
A throughput analysis of tcp in adhoc networks
 
Transport_Layer_Protocols.pptx
Transport_Layer_Protocols.pptxTransport_Layer_Protocols.pptx
Transport_Layer_Protocols.pptx
 
NetWork Design Question2.) How does TCP prevent Congestion Dicuss.pdf
NetWork Design Question2.) How does TCP prevent Congestion Dicuss.pdfNetWork Design Question2.) How does TCP prevent Congestion Dicuss.pdf
NetWork Design Question2.) How does TCP prevent Congestion Dicuss.pdf
 
IMPACT OF CONTENTION WINDOW ON CONGESTION CONTROL ALGORITHMS FOR WIRELESS ADH...
IMPACT OF CONTENTION WINDOW ON CONGESTION CONTROL ALGORITHMS FOR WIRELESS ADH...IMPACT OF CONTENTION WINDOW ON CONGESTION CONTROL ALGORITHMS FOR WIRELESS ADH...
IMPACT OF CONTENTION WINDOW ON CONGESTION CONTROL ALGORITHMS FOR WIRELESS ADH...
 
Ch7-Transport_Protocols.ppt
Ch7-Transport_Protocols.pptCh7-Transport_Protocols.ppt
Ch7-Transport_Protocols.ppt
 
TCP/IP & UDP
TCP/IP & UDPTCP/IP & UDP
TCP/IP & UDP
 
Ba25315321
Ba25315321Ba25315321
Ba25315321
 
TCP Congestion Control
TCP Congestion ControlTCP Congestion Control
TCP Congestion Control
 
Comparative Analysis of Different TCP Variants in Mobile Ad-Hoc Network
Comparative Analysis of Different TCP Variants in Mobile Ad-Hoc Network Comparative Analysis of Different TCP Variants in Mobile Ad-Hoc Network
Comparative Analysis of Different TCP Variants in Mobile Ad-Hoc Network
 
Studying_the_TCP_Flow_and_Congestion_Con.pdf
Studying_the_TCP_Flow_and_Congestion_Con.pdfStudying_the_TCP_Flow_and_Congestion_Con.pdf
Studying_the_TCP_Flow_and_Congestion_Con.pdf
 
Improving Performance of TCP in Wireless Environment using TCP-P
Improving Performance of TCP in Wireless Environment using TCP-PImproving Performance of TCP in Wireless Environment using TCP-P
Improving Performance of TCP in Wireless Environment using TCP-P
 
Tcp Congestion Avoidance
Tcp Congestion AvoidanceTcp Congestion Avoidance
Tcp Congestion Avoidance
 

More from Ankit Anand

More from Ankit Anand (20)

Voice oriented data communication
Voice oriented data communicationVoice oriented data communication
Voice oriented data communication
 
Wireless gateways and mobile appl. servers
Wireless gateways and mobile appl. serversWireless gateways and mobile appl. servers
Wireless gateways and mobile appl. servers
 
Internet protocol security
Internet protocol securityInternet protocol security
Internet protocol security
 
Wireless lan security
Wireless lan securityWireless lan security
Wireless lan security
 
Wtls
WtlsWtls
Wtls
 
Wap wml-6
Wap wml-6Wap wml-6
Wap wml-6
 
Data (1)
Data (1)Data (1)
Data (1)
 
Mc
McMc
Mc
 
Mc seminar
Mc seminarMc seminar
Mc seminar
 
Middleware final
Middleware finalMiddleware final
Middleware final
 
Web services
Web servicesWeb services
Web services
 
Wap wml
Wap wmlWap wml
Wap wml
 
Vpn 3
Vpn 3Vpn 3
Vpn 3
 
Vpn
VpnVpn
Vpn
 
Enhanced data gsm environment
Enhanced data gsm environmentEnhanced data gsm environment
Enhanced data gsm environment
 
Seminar gprs
Seminar gprsSeminar gprs
Seminar gprs
 
Seminar mc palm
Seminar mc palmSeminar mc palm
Seminar mc palm
 
Guided media
Guided mediaGuided media
Guided media
 
12 mobile os
12 mobile os12 mobile os
12 mobile os
 
10 mobile agents
10 mobile agents10 mobile agents
10 mobile agents
 

Recently uploaded

NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...
NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...
NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...Amil baba
 
OSCM Unit 2_Operations Processes & Systems
OSCM Unit 2_Operations Processes & SystemsOSCM Unit 2_Operations Processes & Systems
OSCM Unit 2_Operations Processes & SystemsSandeep D Chaudhary
 
Interdisciplinary_Insights_Data_Collection_Methods.pptx
Interdisciplinary_Insights_Data_Collection_Methods.pptxInterdisciplinary_Insights_Data_Collection_Methods.pptx
Interdisciplinary_Insights_Data_Collection_Methods.pptxPooja Bhuva
 
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptxHMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptxEsquimalt MFRC
 
How to Add New Custom Addons Path in Odoo 17
How to Add New Custom Addons Path in Odoo 17How to Add New Custom Addons Path in Odoo 17
How to Add New Custom Addons Path in Odoo 17Celine George
 
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...Nguyen Thanh Tu Collection
 
Graduate Outcomes Presentation Slides - English
Graduate Outcomes Presentation Slides - EnglishGraduate Outcomes Presentation Slides - English
Graduate Outcomes Presentation Slides - Englishneillewis46
 
How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17Celine George
 
SOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning PresentationSOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning Presentationcamerronhm
 
Understanding Accommodations and Modifications
Understanding  Accommodations and ModificationsUnderstanding  Accommodations and Modifications
Understanding Accommodations and ModificationsMJDuyan
 
Wellbeing inclusion and digital dystopias.pptx
Wellbeing inclusion and digital dystopias.pptxWellbeing inclusion and digital dystopias.pptx
Wellbeing inclusion and digital dystopias.pptxJisc
 
21st_Century_Skills_Framework_Final_Presentation_2.pptx
21st_Century_Skills_Framework_Final_Presentation_2.pptx21st_Century_Skills_Framework_Final_Presentation_2.pptx
21st_Century_Skills_Framework_Final_Presentation_2.pptxJoelynRubio1
 
Philosophy of china and it's charactistics
Philosophy of china and it's charactisticsPhilosophy of china and it's charactistics
Philosophy of china and it's charactisticshameyhk98
 
FSB Advising Checklist - Orientation 2024
FSB Advising Checklist - Orientation 2024FSB Advising Checklist - Orientation 2024
FSB Advising Checklist - Orientation 2024Elizabeth Walsh
 
How to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POSHow to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POSCeline George
 
Single or Multiple melodic lines structure
Single or Multiple melodic lines structureSingle or Multiple melodic lines structure
Single or Multiple melodic lines structuredhanjurrannsibayan2
 
How to Add a Tool Tip to a Field in Odoo 17
How to Add a Tool Tip to a Field in Odoo 17How to Add a Tool Tip to a Field in Odoo 17
How to Add a Tool Tip to a Field in Odoo 17Celine George
 
Spellings Wk 4 and Wk 5 for Grade 4 at CAPS
Spellings Wk 4 and Wk 5 for Grade 4 at CAPSSpellings Wk 4 and Wk 5 for Grade 4 at CAPS
Spellings Wk 4 and Wk 5 for Grade 4 at CAPSAnaAcapella
 
This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.christianmathematics
 

Recently uploaded (20)

NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...
NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...
NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...
 
OSCM Unit 2_Operations Processes & Systems
OSCM Unit 2_Operations Processes & SystemsOSCM Unit 2_Operations Processes & Systems
OSCM Unit 2_Operations Processes & Systems
 
Interdisciplinary_Insights_Data_Collection_Methods.pptx
Interdisciplinary_Insights_Data_Collection_Methods.pptxInterdisciplinary_Insights_Data_Collection_Methods.pptx
Interdisciplinary_Insights_Data_Collection_Methods.pptx
 
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptxHMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
 
How to Add New Custom Addons Path in Odoo 17
How to Add New Custom Addons Path in Odoo 17How to Add New Custom Addons Path in Odoo 17
How to Add New Custom Addons Path in Odoo 17
 
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
 
Graduate Outcomes Presentation Slides - English
Graduate Outcomes Presentation Slides - EnglishGraduate Outcomes Presentation Slides - English
Graduate Outcomes Presentation Slides - English
 
How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17
 
SOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning PresentationSOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning Presentation
 
Understanding Accommodations and Modifications
Understanding  Accommodations and ModificationsUnderstanding  Accommodations and Modifications
Understanding Accommodations and Modifications
 
Wellbeing inclusion and digital dystopias.pptx
Wellbeing inclusion and digital dystopias.pptxWellbeing inclusion and digital dystopias.pptx
Wellbeing inclusion and digital dystopias.pptx
 
21st_Century_Skills_Framework_Final_Presentation_2.pptx
21st_Century_Skills_Framework_Final_Presentation_2.pptx21st_Century_Skills_Framework_Final_Presentation_2.pptx
21st_Century_Skills_Framework_Final_Presentation_2.pptx
 
Philosophy of china and it's charactistics
Philosophy of china and it's charactisticsPhilosophy of china and it's charactistics
Philosophy of china and it's charactistics
 
Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024
 
FSB Advising Checklist - Orientation 2024
FSB Advising Checklist - Orientation 2024FSB Advising Checklist - Orientation 2024
FSB Advising Checklist - Orientation 2024
 
How to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POSHow to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POS
 
Single or Multiple melodic lines structure
Single or Multiple melodic lines structureSingle or Multiple melodic lines structure
Single or Multiple melodic lines structure
 
How to Add a Tool Tip to a Field in Odoo 17
How to Add a Tool Tip to a Field in Odoo 17How to Add a Tool Tip to a Field in Odoo 17
How to Add a Tool Tip to a Field in Odoo 17
 
Spellings Wk 4 and Wk 5 for Grade 4 at CAPS
Spellings Wk 4 and Wk 5 for Grade 4 at CAPSSpellings Wk 4 and Wk 5 for Grade 4 at CAPS
Spellings Wk 4 and Wk 5 for Grade 4 at CAPS
 
This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.
 

Mcseminar

  • 2. Contents  Introduction  comparison between tcp and udp  Conjestion strategies  I –TCP  Snooping  Mobile tcp  2.5/3g ether networks  Points from journals  Conclusion  2
  • 3. WHAT IS A TRANSPORT LAYER • In computer networking, the transport layer is a conceptual division of methods in the layered architecture of protocols in the network stack in the Internet Protocol Suite and the Open Systems Interconnection (OSI). The protocols of the layer provides host-to-host communication services for applications.[1] It provides services such as connection- oriented data stream support, reliability, flow control, and multiplexing.  (source wikipedia) 3 (
  • 4. TCP UDP  It is a connection oriented protocol  TCP is used in case of applications in which fast transmission of data is not required  HTTP, FTP, SMTP Telnet etc  It rearranges data packets in the order specified  Comparatively slow  Reliable (defines that data will be definitely sent across)  It is a connection less protocol  It is preferred in case of the applications which have the priority of sending the data on time and on faster rates  DHCP, TFTP, SNMP, RIP, VOIP etc  No inherent ordering, the data packets of same message may be ordered differently  Comparatively faster  Unreliable 4
  • 5.  TCP header size is 20 bytes  1. Sequence Number, 2. AcK number, 3. Data offset, 4. Reserved, 5. Control bit, 6. Window, 7. Urgent Pointer, 8. Options, 9. Padding, 10. Check Sum, 11. Source port, 12. Destination port. • UDP Header size is 8 bytes  1 Length, 2. Source port, 3. Destination port 5 .,
  • 6. Con..  Data is read as a byte stream, thus no distinguishing indications are transmitted to the signal message  It is heavier as it requires three packets to set up a socket connection, before any user data can be sent. TCP handles reliability and congestion control.  TCP controls the flow of data  Packets are sent individually and after the arrival the packets are rearranged  UDP is lightweight due to no ordering of messages, no tracking connections, etc.  UDP does not have an option for flow control 6
  • 7. Sliding window method  This window covers unacknowledged data and the data it can send keeping in mind the window size advertised by the receiver.  Following figure should give you an idea about how a sliding window looks like : 7
  • 8. Con..  The receiver can send acknowledgement even before its window fills up completely.  The left edge of the window can move towards right.  Neither left edge should move towards left nor right edge should move towards left. 8
  • 9. CONJESTION STRATEGY  Slow-start is part of the congestion control strategy used by TCP, the data transmission protocol used by many Internet applications. Slow-start is used in conjunction with other algorithms to avoid sending more data than the network is capable of transmitting, that is, to avoid causing network congestion. Slow-start begins initially with a congestion window size (cwnd) of 1, 2 or 10. The value of the Congestion Window will be increased by one with, 9
  • 10. Con..  each acknowledgement (ACK) received effectively doubling the window size each round-trip time . The transmission rate will be increased with slow-start algorithm until either a loss is detected, or the receiver's advertised window (rwnd) is the limiting factor, or the slow start threshold (ssthresh) is reached. If a loss event occurs, TCP assumes that it is due to network congestion and takes steps to reduce the offered load on the network. These measurements depend on the used TCP congestion avoidance algorithm. 10
  • 11. Con..  Once ss thresh is reached, TCP changes from slow-start algorithm to the linear growth (congestion avoidance) algorithm. At this point, the window is increased by 1 segment for each RTT.  Although the strategy is referred to as "Slow-Start", its congestion window growth is quite aggressive, more aggressive than the congestion avoidance phase.[9] Before slow-start was introduced in TCP, the initial pre-congestion avoidance phase was even faster.  The behavior upon packet loss depends on the TCP congestion avoidance algorithm that is used. 11
  • 12. Fast retransmit  Fast Retransmit is an enhancement to TCP that reduces the time a sender waits before retransmitting a lost segment.  A TCP sender uses a timer to recognize lost segments. If an acknowledgement is not received for a particular segment within a specified time (a function of the estimated round- trip delay time), the sender will assume the segment was lost in the network, and will retransmit the segment.  Duplicate acknowledgement is the basis for the fast retransmit mechanism which works as follows: after receiving a packet (e.g. with sequence number 1), the receiver sends an acknowledgement by adding 1 to the sequence number (i.e., acknowledgement number 2) which means that the receiver received the packet number 1 and it expects packet number 2 from the sender 12
  • 13. CON… Let's assume that three subsequent packets have been lost. In the meantime the receiver receives packet numbers 5 and 6. After receiving packet number 5, the receiver sends an acknowledgement, but still only for sequence number 2. When the receiver receives packet number 6, it sends yet another acknowledgement value of 2. Because the sender receives more than one acknowledgement with the same sequence number (2 in this example) this is called duplicate acknowledgement. 13
  • 14. 14 The fast retransmit enhancement works as follows: if a TCP sender receives a specified number of acknowledgements which is usually set to three duplicate acknowledgements with the same acknowledge number (that is, a total of four acknowledgements with the same acknowledgement number), the sender can be reasonably confident that the segment with the next higher sequence number was dropped, and will not arrive out of order. The sender will then retransmit the packet that was presumed dropped before waiting for its timeout.
  • 15. I -TCP  Indirect TCP or I-TCP segments the connection (figure 1)  no changes to the TCP protocol for hosts connected to the wired Internet, millions of computers use (variants of) this protocol  optimized TCP protocol for mobile hosts  splitting of the TCP connection at, e.g., the foreign agent into 2 TCP connections, no real end-to-end connection any longer  hosts in the fixed part of the net do not notice the characteristics of the wireless part 15
  • 16. 16
  • 17. 17 If CN sends packet, FA acknowledges packet and forwards packet to MN If MN receives packet,it acknowledges This acknowledgement only used by CN Similarly if MN sends packet, FA acknowledges packet and forwards it to CN I-TCP requires several actions as soon a handover takes place: The packets have to be redirected using mobile IP The access point acts as a proxy bufferring packets for retransmission After handover, the old proxy forwards data to new proxy The sockets(current state of TCP) of old proxy also migrate to new foreign agent
  • 18. 18
  • 19. 19
  • 20. Snooping TCP “Transparent” extension of TCP within the foreign agent • buffering of packets sent to the mobile host • lost packets on the wireless link (both directions!) will be retransmitted immediately by the mobile host or foreign agent, respectively (so called “local” retransmission) • the foreign agent therefore “snoops” the packet flow and recognizes acknowledgements in both directions, it also filters ACKs • changes of TCP only within the foreign agent 20
  • 21. Snooping TCP  Data transfer from the mobile host  FA detects packet loss on the wireless link via sequence numbers, FA answers directly with a NACK to the MH  MH can now retransmit data with only a very short delay  Integration with MAC layer  MAC layer often has similar mechanisms to those of TCP  thus, the MAC layer can already detect duplicated packets due to retransmissions and discard them  Problems  snooping TCP does not isolate the wireless link as good as I-TCP  snooping might be tough if packets are encrypted 21
  • 23. Mobile TCP  Mobile TCP:  The M-TCP splits up the connection into two parts:  An unmodified TCP is used on the Standard host- Supervisory Host section  An optimised TCP is used on the Supervisory Host- Mobile Host section.  The Supervisory Host (SH) adorns the same role as the proxy (Foreign Agent) in I-TCP.  The SH is responsible for exchanging data to both the Standard host and the Mobile host.  . 23
  • 24. Con..  Here in this approach, we assume that the error bit rate is less as compared to other wireless links.  So if any packet is lost, the retransmission has to occur from the original sender and not by the SH. (This also maintains the end- to-end TCP semantic)  The SH monitors the ACKs (ACK means acknowledgement) being sent by the MH. If for a long period ACKs have not been received, then the SH assumes that the MH has been disconnected (maybe due to failure or moved out of range, etc...).  If so the SH chokes the sender by setting its window size to 0.  Because of this the sender goes into persistent mode i.e. the sender’s state will not change no matter how long the receiver is disconnected.  This means that the sender will not try to retransmit the data 24
  • 25. Con..  Now when the SH detects a connectivity established again with the MH (the old SH or new SH if handover), the window of the sender is restored to original value. 25
  • 26. 2.5/3g ethernetworks  Tcp over 2.5g/3g ethernetworks  Learn to live with:  • Data rates: 64 kbit/s up, 115-384 kbit/s down  asymmetry: 3-6, but also up to 1000 (broadcast  systems), periodic allocation/release of channels  • High latency, high jitter, packet loss  – Suggestions:  • Large (initial) sending windows, large maximum transfer unit, selective  acknowledgement, explicit congestion notification (ECN), time stamp, no  header compression  – Already in use:  • i-mode running over FOMA  • WAP 2.0 (“TCP with wireless profile) 26
  • 27. Points from journals  [1]The mobile TCP will dramatically improve the throughput performance under error condition due to wireless transmission. The mobile TCP solution introduces a three key technologies, these are, header conversion,selective retransmission and no slow start mechanism, while keeping a compatibility against user interface and inside of the Internet.Thus these network and transport layers solution in this paper will provide a chance to create a new type ofcommunication life based on mobile computing. 27
  • 28. Con..  [2] TIAP for achieving interoperability between TCP and ATP. TAIP can be implemented as a thin layer between the network layer and transport layer in the TCP/IP stack and it is transparen [3] The employment of DTLS to secure CoAP communications raises various issues, as addressed throughout the article, that are also recognized and the focus of research to both the sender and the receiver 28
  • 29. Con..  [4] 29 LS-SCTP includes path monitoring and packet assignment mechanisms. These mechanisms monitor the paths and stripe the packets according to their condition. Simulation results demonstrated the effectiveness of our proposed mechanism in providing throughput and reliability to mobile applications.
  • 30. Con.. [5] A special code class, which is used for erasure decoding, are LDPC codes, which can be described via its sparse parity check matrix H. 30
  • 31. REFERENCES [1] A NETWORK AND TRANSPORT LAYERS FOR MOBILE COMPUTING OVER INTERNET byT. OHSAWA*, K OKANOUE and K.TAKEDA [2] A Transport Layer Interoperability Model For Mobile Ad-hoc Environment by Haidar Safa, Marcel Karam, Rawad Abou [3] End-to-end transparent transport-layer security for Internet integrated mobile sensing devices by Jorge Granjal and Edmundo Monteiro [4] A Transport Layer Load Sharing Mechanism for Mobile Wireless Hosts by Ahmed Abd El Al, Tarek Saadawi, Myung Lee 31
  • 32. Con… [5] Transport Layer Coding for the Land Mobile Satellite Channel by Harald Emst, Luca Sartorello and Sandro Scalise [6]wikipedia [7] Raj Kamal, Mobile Computing, Oxford University Press, 2007 32