SlideShare a Scribd company logo
1 of 52
Mobile Transport Layer
Prepared By :
Maulik Patel
Outline
 TCP and its Usability : Congestion Avoidance, Flow control
 Slow Start and Retransmission
 TCP Variants : Tahoe, Reno and Vegas
 Indirect TCP
 Snoop TCP and Mobile TCP
 Transaction Oriented TCP and TCP over 2.5G/3G
TCP and Its Usability
 Reliable ordered delivery
 TCP has built-in mechanisms to behave in a ‗network friendly‘
manner.
 Guarantees that packet will be delivered in same order in
which they were sent
 Implements congestion avoidance and control
 Reliability achieved by means of retransmissions if necessary
Cont…
 End-to-end semantics
Acknowledgements sent to TCP sender confirm delivery
of data received by TCP receiver
Ack for data sent only after data has reached receiver
Congestion
 Congestion in a network may occur if the load on the
network—the number of packets sent to the network—is
greater than the capacity of the network—the number of
packets a network can handle.
 Congestion occurs when bandwidth is insufficient and
network data traffic exceeds capacity.
Effect of Congestion
 Congestion causes packet loss
 Results in retransmission
 Reduces data throughput
Congestion Avoidance
 In the congestion avoidance algorithm, the size of congestion
window increases additively until congestion is detected.
 It maintains a network congestion state after reducing the
initial data load.
Flow Control
 Flow control refers to a set of procedures used to restrict the
amount of data that the sender can send before waiting for
acknowledgment.
 limits the rate a sender transfers data to guarantee reliable
delivery.
 The receiver continually hints the sender on how much data can be
received.
 When the receiving host's buffer fills, the next acknowledgment
contains a 0 in the window size, to stop transfer.
 TCP uses an end-to-end flow control protocol to avoid having the
sender send data too fast for the TCP receiver to receive and
process it reliably
Slow Start
 Linear additive increase takes too long to ramp up a new TCP
connection from cold start
 Beginning with TCP Tahoe, the slow start mechanism was
added to provide an initial exponential increase in the size of
Congestion Window(cwnd).
 Moreover, slow start is slower than sending a full advertised
window‘s worth of packets all at once.
Cont…
 The source starts with cwnd = 1.
 Every time an ACK arrives, cwnd is incremented.
 cwnd is effectively doubled per RTT.
 Two slow start situations:
 At the very beginning of a connection.
 When the connection goes dead waiting for a timeout to
occur (i.e, the advertized window goes to zero!)
Slow Start
Add one packet
per ACK
Slow Start
Source Destination
Cont…
 However, in the second case the source has more
information. The current value of cwnd can be saved as a
congestion threshold.
 This is also known as the ―slow start threshold‖ ssthresh.
Retransmission
 Coarse timeouts remained a problem, and Fast retransmit
was added with TCP Tahoe.
 Since the receiver responds every time a packet arrives, this
implies the sender will see duplicate ACKs.
 Generally, fast retransmit eliminates about half the coarse-
grain timeouts.
 Fast retransmit does not eliminate all the timeouts due to
small window sizes at the source.
Fast Retransmission
Based on three
duplicate ACKs
 Receipt of three duplicate ACKs, the TCP Sender
retransmits the lost packet.
Packet 1
Packet 2
Packet 3
Packet 4
Packet 5
Packet 6
Retransmit
packet 3
ACK 1
ACK 2
ACK 2
ACK 2
ACK 6
ACK 2
Sender Receiv er
TCP Recap...
 TCP is a reliable protocol
 Ensuring reliability by requiring receiver‘s acknowledgement
 TCP uses cumulative ack. schema
 TCP start timer, maintains for retransmission
 TCP is end-to-end delivery oriented mechanism
 TCP can work directly on wireless but it require some
modification in TCP as it have mobility so high bit error rate
occurs
TCP Algorithms:
Four algorithms used commonly in TCP implementations
 Slow Start - Every ack increases the sender‘s window (cwnd)
size by 1
 Congestion Avoidance - Reducing sender‘s window size by
half at experience of loss, and increase the sender‘s window at
the rate of about one packet per RTT
 Fast Retransmit - Don‘t wait for retransmit timer to go off,
retransmit packet if 3 duplicate acks received
 Fast Recovery - Since duplicate ack came through, one packet
has left the wire. Perform congestion avoidance, don‘t jump
down to slow start
TCP Variants :
 TCP-Tahoe:
implements the slow start, congestion avoidance,
and fast retransmit algorithms
 TCP-Reno:
implements the slow start, congestion avoidance,
fast retransmit, and fast recovery algorithms
 TCP-Vegas:
Improvement of TCP Reno
New Retransmission mechanism.
TCP Tahoe
 Two major congestion control schema use
Slow start and congestion avoidance
Increase cwnd size
Fast Retransmission
Detect congestion
 Problem
Take a complete timeout interval to detect a packet loss
TCP Tahoe‘s Fast Retransmit
1. Sender
receives 3
dupACKS.
2. Sender infers
that the
segment is
lost.
3. Sender re-
sends the
segment
immediately!
4. Sender
returns to
slow-start.
cwnd = 1
cwnd = 2
cwnd = 4
3 duplicate
ACKs
fast-retransmit
of segment 4
S R
TCP Tahoe’s Graph
(TCP Reno)
Fast Retransmit & Fast Recovery
 After receiving 3 dupACKS:
1. Retransmit the lost segment.
2. Set ssthresh = flight size/2.
3. Set cwnd = ssthresh, and ndupacks = 3.
 If dupACK arrives:
 ++ ndupacks
 Transmit new segment, if allowed.
 If new ACK arrives:
 ndupacks = 0
 Exit fast recovery.
 If RTO expires:
 ndupacks = 0
 Perform slow-start - ( ssthresh = flight size/2, cwnd = 1 )
TCP Reno vs TCP Tahoe
TCP Vegas
 Developed by Brakmo, O'Malley & Peterson
[SIGCOMM,1994]
 TCP Vegas emphasis on packet delay, not packet loss.
 Sender-side protocol
Inter-operates with other TCP variants
 Depends heavily on accurate calculation of the Base RTT
value.
If it is too small then throughput of the connection will be
less than the bandwidth available while if the value is too
large then it will overrun the connection.
TCP Vegas
 Adjust window size even before packet loss
 Adjust window based on difference between actual
and expected throughput
 Advantage
Detects losses faster than TCP Reno and also
recover from multiple drops more efficiently.
 Disadvantage
On heavily traffic it react same as TCP Reno.
Vegas are not stabilize if buffer are too small.
Fairness issues of Vegas still unresolved
TCP Vegas new
retransmission mechanism
 Keeps track of when each segment was sent and it also
calculates an estimate of the RTT.
 Whenever a duplicate acknowledgement is received it checks
to see if the (current time-segment transmission time)> RTT
estimate
 So no need to wait for 3 dupack, send retransmite packet
Indirect TCP
 Split a TCP connection at the foreign agent into 2 TCP
connections
 hosts in the fixed part of the network do not notice the
characteristics of the wireless part
 no changes to the TCP protocol for hosts connected to
the wired Internet, millions of computers use (variants
of) this protocol
 optimized TCP protocol for mobile hosts
Cont…
Cont…
 The access point acts as proxy in both directions.
 AP acknowledges to both the sender and receiver.
 Re-transmission on wireless links is handled locally.
 During handover, the buffered packets, as well as the system
state (packet sequence number, acknowledgements, ports,
etc), must migrate the new agent.
I-TCP Socket and State
Migration
Advantages of I-TCP
 No changes in the fixed network necessary, no changes for
the hosts (TCP protocol) necessary, all current optimizations
to TCP still work
 Simple to control, mobile TCP is used only for one hop
between, e.g., a foreign agent and mobile host
 transmission errors on the wireless link do not propagate
into the fixed network
 therefore, a very fast retransmission of packets is possible,
the short delay on the mobile hop is known
Cont…
 It is always dangerous to introduce new mechanisms in a
huge network without knowing exactly how they behave.
 New optimizations can be tested at the last hop, without
jeopardizing the stability of the Internet.
 It is easy to use different protocols for wired and wireless
networks.
Disadvantages of I-TCP
 Loss of end-to-end semantics
 an acknowledgement to a sender no longer means that a
receiver really has received a packet ---foreign agents
might crash.
 Higher latency possible
 due to buffering of data within the foreign agent and
forwarding to a new foreign agent
 Security issue
 The foreign agent must be a trusted entity.
Snoop TCP
 Indirect TCP
 2 TCP sessions.
 Snoop TCP
 One TCP session.
 The access point snoops into the traffic and buffers
packets for fast re-transmission.
Cont…
Cont…
 Transparent extension of TCP within the foreign agent
 changes of TCP only within the foreign agent
 buffering of packets sent to the mobile host
 lost packets on the wireless link (both directions!) will be
retransmitted immediately by the mobile host or foreign
agent, respectively (so called ―local‖ retransmission)
 the foreign agent therefore ―snoops‖ the packet flow and
recognizes acknowledgements in both directions, it also
filters ACKs
Cont…
 Data transfer to the mobile host
 FA buffers data until it receives ACK of the MH, FA detects
packet loss via duplicated ACKs or time-out
 Fast retransmission possible, transparent for the fixed
network
 FA detects packet loss on the wireless link via sequence
numbers, FA answers directly with a NACK to the MH
 MH can now retransmit data with only a very short delay
Snoop TCP: Packet Delivery
Cont…
 Advantages
 End-to-end semantics is preserved.
 Handover is easy. I-TCP requires a careful handover of the
system state. Here it falls back to the standard solution if
no enhancements.
 Problems
 snooping TCP does not isolate the wireless link as good as
I-TCP
 snooping might be useless depending on encryption
schemes
Mobile TCP
 What if the mobile node is disconnected?
 I-TCP
 more packets are buffered at AP.
 Snooping TCP
 no more snooping
 Missing acknowledgement, TCP goes to slow-start.
 Mobile TCP
 Improve efficiency.
 Special handling of lengthy and/or frequent
disconnections.
Cont…
Cont…
 M-TCP splits as I-TCP does
 unmodified TCP fixed network to supervisory host (SH)
 optimized TCP SH to MH
 Supervisory host
 no caching, no local retransmission
 monitors all packets, if disconnection detected
 set sender window size to 0
 sender automatically goes into persistent mode
old or new SH reopen the window
Cont…
 Advantages:
 End-to-end semantics.
 When mobile host is disconnected, it avoids useless
retransmissions and slow-start.
 No buffering, handover is easy.
 Disadvantages:
 Packet loss at the wireless link propagates back to
sender.
 Not a good idea for heavy traffic.
Transaction Oriented TCP
 TCP phases
connection setup, data transmission, connection release
using 3-way-handshake needs 3 packets for setup and
release, respectively
thus, even short messages need a minimum of 7 packets!
 Transaction oriented TCP
RFC1644, T-TCP, describes a TCP version to avoid this
overhead
connection setup, data transfer and connection release
can be combined
thus, only 2 or 3 packets are needed
Cont…
 Advantage
efficiency
 Disadvantage
requires changed TCP
mobility not longer transparent
TCP over 2.5/3G
Wireless Networks
 Fine tuning today‘s TCP
 Learn to live with
 Data rates: 64 kbit/s up, 115-384 kbit/s down; asymmetry: 3-6, but also up
to 1000 (broadcast systems), periodic allocation/release of channels
 High latency, high jitter, packet loss
 Suggestions
 Large (initial) sending windows, large maximum transfer unit, selective
acknowledgement, explicit congestion notification, time stamp, no header
compression
 Widespread use
 i-mode running over FOMA
Performance
Enhancing Proxies
 RFC 3135
Transport layer
Local retransmissions and acknowledgements
Additionally on the application layer
Content filtering, compression, picture downscaling
E.g., Internet/WAP gateways
Web service gateways?
Mobile system
PEP
Comm. partner
wireless
Internet
Cont…
Big problem: breaks end-to-end semantics
Disables use of IP security
Choose between PEP and security!
 RFC 3150 (slow links)
Recommends header compression, no timestamp
 RFC 3155 (links with errors)
States that explicit congestion notification cannot be used
Summary
 TCP is a complex protocol
Minimal support from underlying protocols
Indirect observation of network environment
Large number of competing flows from different hosts
Congestion avoidance is still a research issue
Cont…
 TCP does not perform well in a wireless environment where
packets are usually lost due to bit errors, not congestion
 Schemes have been proposed to address TCP performance
problems
Link-level recovery
Split protocols
End-to-end protocols
References
 [1]IEEE:TCP-FIT: An improved TCP congestion control algorithm and its
performance
 [2]IEEE: Fast TCP flow control with differentiated services
 [3]Afanasyev, A.; N. Tilley, P. Reiher, and L. Kleinrock (2010). "Host-to-host
congestion control for TCP―
 [4] Jacobson, Van; Karels, MJ (1988). ―Congestion avoidance and control‖
 [5]http://www.scribd.com/doc/63483753/Indirect-TCP-Snooping-TCP-Mobile-
TCP-Mobile-Transport-Layer#download
 [6]Jian Ma, "A simple Fast TCP flow control in IP network or IP/ATM subnet – a
significant improvement over IP", November, 1997
 [7]A Comparative Analysis of TCP Tahoe, Reno, New-Reno, SACK and Vegas
http://inst.eecs.berkeley.edu/~ee122/fa05/projects/Project2/SACKRENEVEGAS.p
df
Thank You

More Related Content

What's hot

Introduction to Data-Link Layer
Introduction to Data-Link LayerIntroduction to Data-Link Layer
Introduction to Data-Link Layer
Abdullaziz Tagawy
 

What's hot (20)

cluster based routing protocol for ad hoc networks
cluster based routing protocol for ad hoc networkscluster based routing protocol for ad hoc networks
cluster based routing protocol for ad hoc networks
 
MTU (maximum transmission unit) & MRU (maximum receive unit)
MTU (maximum transmission unit) & MRU (maximum receive unit)MTU (maximum transmission unit) & MRU (maximum receive unit)
MTU (maximum transmission unit) & MRU (maximum receive unit)
 
Computer Networks Unit 2 UNIT II DATA-LINK LAYER & MEDIA ACCESS
Computer Networks Unit 2 UNIT II DATA-LINK LAYER & MEDIA ACCESSComputer Networks Unit 2 UNIT II DATA-LINK LAYER & MEDIA ACCESS
Computer Networks Unit 2 UNIT II DATA-LINK LAYER & MEDIA ACCESS
 
Ipv4 header
Ipv4 headerIpv4 header
Ipv4 header
 
MPLS VPN
MPLS VPNMPLS VPN
MPLS VPN
 
Introduction to Data-Link Layer
Introduction to Data-Link LayerIntroduction to Data-Link Layer
Introduction to Data-Link Layer
 
POP3 Post Office Protocol
POP3 Post Office ProtocolPOP3 Post Office Protocol
POP3 Post Office Protocol
 
Tcp Udp Icmp And The Transport Layer
Tcp Udp Icmp And The Transport LayerTcp Udp Icmp And The Transport Layer
Tcp Udp Icmp And The Transport Layer
 
Real time transport protocol
Real time transport protocolReal time transport protocol
Real time transport protocol
 
Computer networks unit iii
Computer networks    unit iiiComputer networks    unit iii
Computer networks unit iii
 
QUIC protocol.pptx
QUIC protocol.pptxQUIC protocol.pptx
QUIC protocol.pptx
 
Routing Protocols in WSN
Routing Protocols in WSNRouting Protocols in WSN
Routing Protocols in WSN
 
Congestion control
Congestion controlCongestion control
Congestion control
 
web communication protocols in IoT
web communication protocols in IoTweb communication protocols in IoT
web communication protocols in IoT
 
Token ring protocol
Token ring protocolToken ring protocol
Token ring protocol
 
The Data Link Layer
The Data Link LayerThe Data Link Layer
The Data Link Layer
 
Bgp protocol
Bgp protocolBgp protocol
Bgp protocol
 
Precision Time Protocol
Precision Time ProtocolPrecision Time Protocol
Precision Time Protocol
 
Traffic profiles, congestion and network performance
Traffic profiles, congestion and network performanceTraffic profiles, congestion and network performance
Traffic profiles, congestion and network performance
 
Mobile transport layer
Mobile transport layerMobile transport layer
Mobile transport layer
 

Viewers also liked

Mobile transportlayer
Mobile transportlayerMobile transportlayer
Mobile transportlayer
Rahul Hada
 
TCP Over Wireless
TCP Over WirelessTCP Over Wireless
TCP Over Wireless
Farooq Khan
 
C10 transport protocols
C10 transport protocolsC10 transport protocols
C10 transport protocols
Rio Nguyen
 

Viewers also liked (20)

Mobile transport layer - traditional TCP
Mobile transport layer - traditional TCPMobile transport layer - traditional TCP
Mobile transport layer - traditional TCP
 
Mobile transportlayer
Mobile transportlayerMobile transportlayer
Mobile transportlayer
 
Mobile network layer (mobile comm.)
Mobile network layer (mobile comm.)Mobile network layer (mobile comm.)
Mobile network layer (mobile comm.)
 
Mobile IP
Mobile IPMobile IP
Mobile IP
 
Snooping TCP
Snooping TCPSnooping TCP
Snooping TCP
 
It6601 mobile computing unit2
It6601 mobile computing unit2It6601 mobile computing unit2
It6601 mobile computing unit2
 
Mobile ip
Mobile ipMobile ip
Mobile ip
 
Tcp snoop protocols
Tcp snoop protocols  Tcp snoop protocols
Tcp snoop protocols
 
IT6601 MOBILE COMPUTING
IT6601 MOBILE COMPUTINGIT6601 MOBILE COMPUTING
IT6601 MOBILE COMPUTING
 
Mobile IP Presentation
Mobile IP Presentation Mobile IP Presentation
Mobile IP Presentation
 
Analysis of 1G, 2G, 3G & 4G
Analysis of 1G, 2G, 3G & 4GAnalysis of 1G, 2G, 3G & 4G
Analysis of 1G, 2G, 3G & 4G
 
Ad-Hoc Networks
Ad-Hoc NetworksAd-Hoc Networks
Ad-Hoc Networks
 
SIP (Session Initiation Protocol) - Study Notes
SIP (Session Initiation Protocol) - Study NotesSIP (Session Initiation Protocol) - Study Notes
SIP (Session Initiation Protocol) - Study Notes
 
Course on TCP Dynamic Performance
Course on TCP Dynamic PerformanceCourse on TCP Dynamic Performance
Course on TCP Dynamic Performance
 
TCP Over Wireless
TCP Over WirelessTCP Over Wireless
TCP Over Wireless
 
Mobile transport layer
 Mobile transport layer Mobile transport layer
Mobile transport layer
 
It2402 mobile communication unit 4
It2402 mobile communication unit 4It2402 mobile communication unit 4
It2402 mobile communication unit 4
 
Wap 1
Wap 1Wap 1
Wap 1
 
C10 transport protocols
C10 transport protocolsC10 transport protocols
C10 transport protocols
 
TCP Congestion Control By Owais Jara
TCP Congestion Control By Owais JaraTCP Congestion Control By Owais Jara
TCP Congestion Control By Owais Jara
 

Similar to Mobile Transpot Layer

Lecture 19 22. transport protocol for ad-hoc
Lecture 19 22. transport protocol for ad-hoc Lecture 19 22. transport protocol for ad-hoc
Lecture 19 22. transport protocol for ad-hoc
Chandra Meena
 
Computer network (13)
Computer network (13)Computer network (13)
Computer network (13)
NYversity
 
Congestion control avoidance
Congestion control avoidanceCongestion control avoidance
Congestion control avoidance
Anthony-Claret Onwutalobi
 

Similar to Mobile Transpot Layer (20)

Mcseminar
McseminarMcseminar
Mcseminar
 
Lecture 19 22. transport protocol for ad-hoc
Lecture 19 22. transport protocol for ad-hoc Lecture 19 22. transport protocol for ad-hoc
Lecture 19 22. transport protocol for ad-hoc
 
Mobile Transport layer
Mobile Transport layerMobile Transport layer
Mobile Transport layer
 
High Performance Networking with Advanced TCP
High Performance Networking with Advanced TCPHigh Performance Networking with Advanced TCP
High Performance Networking with Advanced TCP
 
Analytical Research of TCP Variants in Terms of Maximum Throughput
Analytical Research of TCP Variants in Terms of Maximum ThroughputAnalytical Research of TCP Variants in Terms of Maximum Throughput
Analytical Research of TCP Variants in Terms of Maximum Throughput
 
Tcp Congestion Avoidance
Tcp Congestion AvoidanceTcp Congestion Avoidance
Tcp Congestion Avoidance
 
Congestion Control
Congestion ControlCongestion Control
Congestion Control
 
Tcp congestion avoidance
Tcp congestion avoidanceTcp congestion avoidance
Tcp congestion avoidance
 
Computer network (13)
Computer network (13)Computer network (13)
Computer network (13)
 
mobile_transport_layer (1).pptx
mobile_transport_layer (1).pptxmobile_transport_layer (1).pptx
mobile_transport_layer (1).pptx
 
Mobile transport layer .
Mobile transport layer .Mobile transport layer .
Mobile transport layer .
 
EC 6802 WIRELESS NETWORK_ BABU M_ unit 3 ,4 & 5 PPT
EC 6802 WIRELESS NETWORK_ BABU M_ unit 3 ,4 & 5 PPTEC 6802 WIRELESS NETWORK_ BABU M_ unit 3 ,4 & 5 PPT
EC 6802 WIRELESS NETWORK_ BABU M_ unit 3 ,4 & 5 PPT
 
Congestion control avoidance
Congestion control avoidanceCongestion control avoidance
Congestion control avoidance
 
Tcp
TcpTcp
Tcp
 
Chapter03 sg
Chapter03 sgChapter03 sg
Chapter03 sg
 
Unit 4
Unit 4Unit 4
Unit 4
 
chapter 3.2 TCP.pptx
chapter 3.2 TCP.pptxchapter 3.2 TCP.pptx
chapter 3.2 TCP.pptx
 
NE #1.pptx
NE #1.pptxNE #1.pptx
NE #1.pptx
 
A Performance Comparison of TCP Protocols
A Performance Comparison of TCP Protocols A Performance Comparison of TCP Protocols
A Performance Comparison of TCP Protocols
 
Comparison of TCP congestion control mechanisms Tahoe, Newreno and Vegas
Comparison of TCP congestion control mechanisms Tahoe, Newreno and VegasComparison of TCP congestion control mechanisms Tahoe, Newreno and Vegas
Comparison of TCP congestion control mechanisms Tahoe, Newreno and Vegas
 

More from Maulik Patel (9)

Mobile ip group_3
Mobile ip group_3Mobile ip group_3
Mobile ip group_3
 
Designing Application over mobile environment
Designing Application over mobile environmentDesigning Application over mobile environment
Designing Application over mobile environment
 
fundamenatals of cellular enginering
fundamenatals of cellular engineringfundamenatals of cellular enginering
fundamenatals of cellular enginering
 
Gsm system and radio frequency
Gsm system and radio frequency Gsm system and radio frequency
Gsm system and radio frequency
 
wireless cellular network
wireless cellular networkwireless cellular network
wireless cellular network
 
V Model
V Model V Model
V Model
 
i Image
i Imagei Image
i Image
 
blutooth based sensor network
blutooth based sensor networkblutooth based sensor network
blutooth based sensor network
 
blutooth based smart sensor network
blutooth based smart sensor networkblutooth based smart sensor network
blutooth based smart sensor network
 

Recently uploaded

+97470301568>> buy weed in qatar,buy thc oil qatar,buy weed and vape oil in d...
+97470301568>> buy weed in qatar,buy thc oil qatar,buy weed and vape oil in d...+97470301568>> buy weed in qatar,buy thc oil qatar,buy weed and vape oil in d...
+97470301568>> buy weed in qatar,buy thc oil qatar,buy weed and vape oil in d...
Health
 
scipt v1.pptxcxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx...
scipt v1.pptxcxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx...scipt v1.pptxcxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx...
scipt v1.pptxcxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx...
HenryBriggs2
 
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
ssuser89054b
 
Integrated Test Rig For HTFE-25 - Neometrix
Integrated Test Rig For HTFE-25 - NeometrixIntegrated Test Rig For HTFE-25 - Neometrix
Integrated Test Rig For HTFE-25 - Neometrix
Neometrix_Engineering_Pvt_Ltd
 
notes on Evolution Of Analytic Scalability.ppt
notes on Evolution Of Analytic Scalability.pptnotes on Evolution Of Analytic Scalability.ppt
notes on Evolution Of Analytic Scalability.ppt
MsecMca
 
Cara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak Hamil
Cara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak HamilCara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak Hamil
Cara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak Hamil
Cara Menggugurkan Kandungan 087776558899
 

Recently uploaded (20)

COST-EFFETIVE and Energy Efficient BUILDINGS ptx
COST-EFFETIVE  and Energy Efficient BUILDINGS ptxCOST-EFFETIVE  and Energy Efficient BUILDINGS ptx
COST-EFFETIVE and Energy Efficient BUILDINGS ptx
 
DC MACHINE-Motoring and generation, Armature circuit equation
DC MACHINE-Motoring and generation, Armature circuit equationDC MACHINE-Motoring and generation, Armature circuit equation
DC MACHINE-Motoring and generation, Armature circuit equation
 
+97470301568>> buy weed in qatar,buy thc oil qatar,buy weed and vape oil in d...
+97470301568>> buy weed in qatar,buy thc oil qatar,buy weed and vape oil in d...+97470301568>> buy weed in qatar,buy thc oil qatar,buy weed and vape oil in d...
+97470301568>> buy weed in qatar,buy thc oil qatar,buy weed and vape oil in d...
 
A Study of Urban Area Plan for Pabna Municipality
A Study of Urban Area Plan for Pabna MunicipalityA Study of Urban Area Plan for Pabna Municipality
A Study of Urban Area Plan for Pabna Municipality
 
scipt v1.pptxcxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx...
scipt v1.pptxcxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx...scipt v1.pptxcxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx...
scipt v1.pptxcxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx...
 
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
 
Work-Permit-Receiver-in-Saudi-Aramco.pptx
Work-Permit-Receiver-in-Saudi-Aramco.pptxWork-Permit-Receiver-in-Saudi-Aramco.pptx
Work-Permit-Receiver-in-Saudi-Aramco.pptx
 
Online food ordering system project report.pdf
Online food ordering system project report.pdfOnline food ordering system project report.pdf
Online food ordering system project report.pdf
 
Computer Lecture 01.pptxIntroduction to Computers
Computer Lecture 01.pptxIntroduction to ComputersComputer Lecture 01.pptxIntroduction to Computers
Computer Lecture 01.pptxIntroduction to Computers
 
Thermal Engineering -unit - III & IV.ppt
Thermal Engineering -unit - III & IV.pptThermal Engineering -unit - III & IV.ppt
Thermal Engineering -unit - III & IV.ppt
 
Hostel management system project report..pdf
Hostel management system project report..pdfHostel management system project report..pdf
Hostel management system project report..pdf
 
Minimum and Maximum Modes of microprocessor 8086
Minimum and Maximum Modes of microprocessor 8086Minimum and Maximum Modes of microprocessor 8086
Minimum and Maximum Modes of microprocessor 8086
 
Integrated Test Rig For HTFE-25 - Neometrix
Integrated Test Rig For HTFE-25 - NeometrixIntegrated Test Rig For HTFE-25 - Neometrix
Integrated Test Rig For HTFE-25 - Neometrix
 
School management system project Report.pdf
School management system project Report.pdfSchool management system project Report.pdf
School management system project Report.pdf
 
Bridge Jacking Design Sample Calculation.pptx
Bridge Jacking Design Sample Calculation.pptxBridge Jacking Design Sample Calculation.pptx
Bridge Jacking Design Sample Calculation.pptx
 
Block diagram reduction techniques in control systems.ppt
Block diagram reduction techniques in control systems.pptBlock diagram reduction techniques in control systems.ppt
Block diagram reduction techniques in control systems.ppt
 
Double Revolving field theory-how the rotor develops torque
Double Revolving field theory-how the rotor develops torqueDouble Revolving field theory-how the rotor develops torque
Double Revolving field theory-how the rotor develops torque
 
notes on Evolution Of Analytic Scalability.ppt
notes on Evolution Of Analytic Scalability.pptnotes on Evolution Of Analytic Scalability.ppt
notes on Evolution Of Analytic Scalability.ppt
 
Cara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak Hamil
Cara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak HamilCara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak Hamil
Cara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak Hamil
 
Thermal Engineering-R & A / C - unit - V
Thermal Engineering-R & A / C - unit - VThermal Engineering-R & A / C - unit - V
Thermal Engineering-R & A / C - unit - V
 

Mobile Transpot Layer

  • 2. Outline  TCP and its Usability : Congestion Avoidance, Flow control  Slow Start and Retransmission  TCP Variants : Tahoe, Reno and Vegas  Indirect TCP  Snoop TCP and Mobile TCP  Transaction Oriented TCP and TCP over 2.5G/3G
  • 3. TCP and Its Usability  Reliable ordered delivery  TCP has built-in mechanisms to behave in a ‗network friendly‘ manner.  Guarantees that packet will be delivered in same order in which they were sent  Implements congestion avoidance and control  Reliability achieved by means of retransmissions if necessary
  • 4. Cont…  End-to-end semantics Acknowledgements sent to TCP sender confirm delivery of data received by TCP receiver Ack for data sent only after data has reached receiver
  • 5. Congestion  Congestion in a network may occur if the load on the network—the number of packets sent to the network—is greater than the capacity of the network—the number of packets a network can handle.  Congestion occurs when bandwidth is insufficient and network data traffic exceeds capacity.
  • 6. Effect of Congestion  Congestion causes packet loss  Results in retransmission  Reduces data throughput
  • 7. Congestion Avoidance  In the congestion avoidance algorithm, the size of congestion window increases additively until congestion is detected.  It maintains a network congestion state after reducing the initial data load.
  • 8.
  • 9. Flow Control  Flow control refers to a set of procedures used to restrict the amount of data that the sender can send before waiting for acknowledgment.  limits the rate a sender transfers data to guarantee reliable delivery.  The receiver continually hints the sender on how much data can be received.  When the receiving host's buffer fills, the next acknowledgment contains a 0 in the window size, to stop transfer.  TCP uses an end-to-end flow control protocol to avoid having the sender send data too fast for the TCP receiver to receive and process it reliably
  • 10. Slow Start  Linear additive increase takes too long to ramp up a new TCP connection from cold start  Beginning with TCP Tahoe, the slow start mechanism was added to provide an initial exponential increase in the size of Congestion Window(cwnd).  Moreover, slow start is slower than sending a full advertised window‘s worth of packets all at once.
  • 11. Cont…  The source starts with cwnd = 1.  Every time an ACK arrives, cwnd is incremented.  cwnd is effectively doubled per RTT.  Two slow start situations:  At the very beginning of a connection.  When the connection goes dead waiting for a timeout to occur (i.e, the advertized window goes to zero!)
  • 12. Slow Start Add one packet per ACK Slow Start Source Destination
  • 13. Cont…  However, in the second case the source has more information. The current value of cwnd can be saved as a congestion threshold.  This is also known as the ―slow start threshold‖ ssthresh.
  • 14. Retransmission  Coarse timeouts remained a problem, and Fast retransmit was added with TCP Tahoe.  Since the receiver responds every time a packet arrives, this implies the sender will see duplicate ACKs.  Generally, fast retransmit eliminates about half the coarse- grain timeouts.  Fast retransmit does not eliminate all the timeouts due to small window sizes at the source.
  • 15. Fast Retransmission Based on three duplicate ACKs  Receipt of three duplicate ACKs, the TCP Sender retransmits the lost packet. Packet 1 Packet 2 Packet 3 Packet 4 Packet 5 Packet 6 Retransmit packet 3 ACK 1 ACK 2 ACK 2 ACK 2 ACK 6 ACK 2 Sender Receiv er
  • 16. TCP Recap...  TCP is a reliable protocol  Ensuring reliability by requiring receiver‘s acknowledgement  TCP uses cumulative ack. schema  TCP start timer, maintains for retransmission  TCP is end-to-end delivery oriented mechanism  TCP can work directly on wireless but it require some modification in TCP as it have mobility so high bit error rate occurs
  • 17. TCP Algorithms: Four algorithms used commonly in TCP implementations  Slow Start - Every ack increases the sender‘s window (cwnd) size by 1  Congestion Avoidance - Reducing sender‘s window size by half at experience of loss, and increase the sender‘s window at the rate of about one packet per RTT  Fast Retransmit - Don‘t wait for retransmit timer to go off, retransmit packet if 3 duplicate acks received  Fast Recovery - Since duplicate ack came through, one packet has left the wire. Perform congestion avoidance, don‘t jump down to slow start
  • 18. TCP Variants :  TCP-Tahoe: implements the slow start, congestion avoidance, and fast retransmit algorithms  TCP-Reno: implements the slow start, congestion avoidance, fast retransmit, and fast recovery algorithms  TCP-Vegas: Improvement of TCP Reno New Retransmission mechanism.
  • 19. TCP Tahoe  Two major congestion control schema use Slow start and congestion avoidance Increase cwnd size Fast Retransmission Detect congestion  Problem Take a complete timeout interval to detect a packet loss
  • 20. TCP Tahoe‘s Fast Retransmit 1. Sender receives 3 dupACKS. 2. Sender infers that the segment is lost. 3. Sender re- sends the segment immediately! 4. Sender returns to slow-start. cwnd = 1 cwnd = 2 cwnd = 4 3 duplicate ACKs fast-retransmit of segment 4 S R
  • 22. (TCP Reno) Fast Retransmit & Fast Recovery  After receiving 3 dupACKS: 1. Retransmit the lost segment. 2. Set ssthresh = flight size/2. 3. Set cwnd = ssthresh, and ndupacks = 3.  If dupACK arrives:  ++ ndupacks  Transmit new segment, if allowed.  If new ACK arrives:  ndupacks = 0  Exit fast recovery.  If RTO expires:  ndupacks = 0  Perform slow-start - ( ssthresh = flight size/2, cwnd = 1 )
  • 23. TCP Reno vs TCP Tahoe
  • 24. TCP Vegas  Developed by Brakmo, O'Malley & Peterson [SIGCOMM,1994]  TCP Vegas emphasis on packet delay, not packet loss.  Sender-side protocol Inter-operates with other TCP variants  Depends heavily on accurate calculation of the Base RTT value. If it is too small then throughput of the connection will be less than the bandwidth available while if the value is too large then it will overrun the connection.
  • 25. TCP Vegas  Adjust window size even before packet loss  Adjust window based on difference between actual and expected throughput  Advantage Detects losses faster than TCP Reno and also recover from multiple drops more efficiently.  Disadvantage On heavily traffic it react same as TCP Reno. Vegas are not stabilize if buffer are too small. Fairness issues of Vegas still unresolved
  • 26. TCP Vegas new retransmission mechanism  Keeps track of when each segment was sent and it also calculates an estimate of the RTT.  Whenever a duplicate acknowledgement is received it checks to see if the (current time-segment transmission time)> RTT estimate  So no need to wait for 3 dupack, send retransmite packet
  • 27. Indirect TCP  Split a TCP connection at the foreign agent into 2 TCP connections  hosts in the fixed part of the network do not notice the characteristics of the wireless part  no changes to the TCP protocol for hosts connected to the wired Internet, millions of computers use (variants of) this protocol  optimized TCP protocol for mobile hosts
  • 29. Cont…  The access point acts as proxy in both directions.  AP acknowledges to both the sender and receiver.  Re-transmission on wireless links is handled locally.  During handover, the buffered packets, as well as the system state (packet sequence number, acknowledgements, ports, etc), must migrate the new agent.
  • 30. I-TCP Socket and State Migration
  • 31. Advantages of I-TCP  No changes in the fixed network necessary, no changes for the hosts (TCP protocol) necessary, all current optimizations to TCP still work  Simple to control, mobile TCP is used only for one hop between, e.g., a foreign agent and mobile host  transmission errors on the wireless link do not propagate into the fixed network  therefore, a very fast retransmission of packets is possible, the short delay on the mobile hop is known
  • 32. Cont…  It is always dangerous to introduce new mechanisms in a huge network without knowing exactly how they behave.  New optimizations can be tested at the last hop, without jeopardizing the stability of the Internet.  It is easy to use different protocols for wired and wireless networks.
  • 33. Disadvantages of I-TCP  Loss of end-to-end semantics  an acknowledgement to a sender no longer means that a receiver really has received a packet ---foreign agents might crash.  Higher latency possible  due to buffering of data within the foreign agent and forwarding to a new foreign agent  Security issue  The foreign agent must be a trusted entity.
  • 34. Snoop TCP  Indirect TCP  2 TCP sessions.  Snoop TCP  One TCP session.  The access point snoops into the traffic and buffers packets for fast re-transmission.
  • 36. Cont…  Transparent extension of TCP within the foreign agent  changes of TCP only within the foreign agent  buffering of packets sent to the mobile host  lost packets on the wireless link (both directions!) will be retransmitted immediately by the mobile host or foreign agent, respectively (so called ―local‖ retransmission)  the foreign agent therefore ―snoops‖ the packet flow and recognizes acknowledgements in both directions, it also filters ACKs
  • 37. Cont…  Data transfer to the mobile host  FA buffers data until it receives ACK of the MH, FA detects packet loss via duplicated ACKs or time-out  Fast retransmission possible, transparent for the fixed network  FA detects packet loss on the wireless link via sequence numbers, FA answers directly with a NACK to the MH  MH can now retransmit data with only a very short delay
  • 38. Snoop TCP: Packet Delivery
  • 39. Cont…  Advantages  End-to-end semantics is preserved.  Handover is easy. I-TCP requires a careful handover of the system state. Here it falls back to the standard solution if no enhancements.  Problems  snooping TCP does not isolate the wireless link as good as I-TCP  snooping might be useless depending on encryption schemes
  • 40. Mobile TCP  What if the mobile node is disconnected?  I-TCP  more packets are buffered at AP.  Snooping TCP  no more snooping  Missing acknowledgement, TCP goes to slow-start.  Mobile TCP  Improve efficiency.  Special handling of lengthy and/or frequent disconnections.
  • 42. Cont…  M-TCP splits as I-TCP does  unmodified TCP fixed network to supervisory host (SH)  optimized TCP SH to MH  Supervisory host  no caching, no local retransmission  monitors all packets, if disconnection detected  set sender window size to 0  sender automatically goes into persistent mode old or new SH reopen the window
  • 43. Cont…  Advantages:  End-to-end semantics.  When mobile host is disconnected, it avoids useless retransmissions and slow-start.  No buffering, handover is easy.  Disadvantages:  Packet loss at the wireless link propagates back to sender.  Not a good idea for heavy traffic.
  • 44. Transaction Oriented TCP  TCP phases connection setup, data transmission, connection release using 3-way-handshake needs 3 packets for setup and release, respectively thus, even short messages need a minimum of 7 packets!  Transaction oriented TCP RFC1644, T-TCP, describes a TCP version to avoid this overhead connection setup, data transfer and connection release can be combined thus, only 2 or 3 packets are needed
  • 45. Cont…  Advantage efficiency  Disadvantage requires changed TCP mobility not longer transparent
  • 46. TCP over 2.5/3G Wireless Networks  Fine tuning today‘s TCP  Learn to live with  Data rates: 64 kbit/s up, 115-384 kbit/s down; asymmetry: 3-6, but also up to 1000 (broadcast systems), periodic allocation/release of channels  High latency, high jitter, packet loss  Suggestions  Large (initial) sending windows, large maximum transfer unit, selective acknowledgement, explicit congestion notification, time stamp, no header compression  Widespread use  i-mode running over FOMA
  • 47. Performance Enhancing Proxies  RFC 3135 Transport layer Local retransmissions and acknowledgements Additionally on the application layer Content filtering, compression, picture downscaling E.g., Internet/WAP gateways Web service gateways? Mobile system PEP Comm. partner wireless Internet
  • 48. Cont… Big problem: breaks end-to-end semantics Disables use of IP security Choose between PEP and security!  RFC 3150 (slow links) Recommends header compression, no timestamp  RFC 3155 (links with errors) States that explicit congestion notification cannot be used
  • 49. Summary  TCP is a complex protocol Minimal support from underlying protocols Indirect observation of network environment Large number of competing flows from different hosts Congestion avoidance is still a research issue
  • 50. Cont…  TCP does not perform well in a wireless environment where packets are usually lost due to bit errors, not congestion  Schemes have been proposed to address TCP performance problems Link-level recovery Split protocols End-to-end protocols
  • 51. References  [1]IEEE:TCP-FIT: An improved TCP congestion control algorithm and its performance  [2]IEEE: Fast TCP flow control with differentiated services  [3]Afanasyev, A.; N. Tilley, P. Reiher, and L. Kleinrock (2010). "Host-to-host congestion control for TCP―  [4] Jacobson, Van; Karels, MJ (1988). ―Congestion avoidance and control‖  [5]http://www.scribd.com/doc/63483753/Indirect-TCP-Snooping-TCP-Mobile- TCP-Mobile-Transport-Layer#download  [6]Jian Ma, "A simple Fast TCP flow control in IP network or IP/ATM subnet – a significant improvement over IP", November, 1997  [7]A Comparative Analysis of TCP Tahoe, Reno, New-Reno, SACK and Vegas http://inst.eecs.berkeley.edu/~ee122/fa05/projects/Project2/SACKRENEVEGAS.p df