SlideShare a Scribd company logo
1 of 15
Download to read offline
Mobile Transport Layer
Introduction
●

●

Mobility support on only lower layer is not
enough to provide mobility support for
applications.
As application is directly communicates
with transport Layer only.
Traditional TCP
Congestion Control
●

●

●

●

●

TCP designed for fixed n/w with fixed end-systems.
Congestion may appear from time to time even in carefully
designed networks.
Sender notices the missing ACK for the lost packet and
assumes a packet loss due to congestion.
Retransmitting the missing packets , might only increase the
congestion.
Solution – TCP show down the transmission rate
dramatically.
Traditional TCP
Slow start
●

●

Sender always calculates a congestion
window for a receiver.
The start size of the congestion window is
one segment.

●

Double the window size after receiving ACK.

●

Maintain the congestion threshold.
Traditional TCP
Fast retransmit/fast recovery
●

Two things lead to a reduction of the
congestion threshold :–

Fast retransmit – continious receving of ACK for
the same packet.

–

Fast recovery – receipt of ACK shows that there
is no congestion to justify slow start. The sender
perform fast recovery from the packet loss.
Implication on mobility
●

Slow start is not a solution in case of mobility

●

The reason for this is of using wrong assumptions.

●

●

●

●

Error rate on wireless links are higher as compare
to wired links.
Retransmittion may increase duplicates at layer 2 and
more connection are end-to-end encryption.
Mobility itself cause packet loss.
TCP detects missing ACK via time-outs and concluding
packet loss due to congestion control only.
Classical TCP improvements

Indirect TCP
●

●

I-TCP segments a TCP connection into a fixed part and a wireless part.
Standard TCP is used between the fixed computer and the access
point/FA.

●

Now access point/FA terminates the standard TCP connection.

●

It means access point/FA now seen as the mobile host for the fixed host.

●

Access point/FA work as a proxy.

●

●

If the packet is lost on the wireless link, the mobile hosts notice this much
faster due to much lower RTT.
In case of handover , AP/FA act as a proxy buffering packets for
retransmission after the handover to the new AP/FA.
Advantages of I-TCP
●

●

●

●

Does not require any change in the TCP protocol.
Due to strict partitioning into two connections,
transmission error on wireless link cannot
propogate into the fixed network.
Short delay between mobile node and AP/FA,
independent of other traffice streams.
Partitioning of two connection allow us to use
different TCP.
Disadvantages of I-TCP
●
●

●

Loss of end-to-end functionality of TCP.
If sender receive the ACK it means AP/FA
receive the packet.
Foreign agent must be a trusted entity
Snooping TCP

●

●

●

●

●

This method based on end-to-end TCP semantic.
Objective – is to buffer data close to the mobile host to
perform fast local retransmission in cse of packet loss.
FA/AP buffers all packets with destination mobile host
and additionally 'snoop' the packet flow in both
directions.
FA not ACK data to the corresponent host.
FA/AP will retransmits the packet to mobile host directly
form the buffer.
Snooping TCP
●

Data transfer from the mobile host with
destination correspondent host
–

FA snoops into packet stream to detect gaps in the
seq. no. of TCP.

–

If FA detect missing packet,

–

then , it return a NACK to the mobile host.

–

Now mobile host retransmit the missing packet
immediately.
Advantage/Disadvantage of
Snooping TCP

●

Advantage
–
–

●

End-to-End TCP semantic is preserved.
Need no modification on FA/AP and correspondent node

Disadvantage
–

It takes some time until the FA/AP can successfully
retransmit a packet from its buffer due to problem in
wireless link.

–

Have to manage time-out at FA/AP and correspondent
Node

–

If sender using end-to-end encryption scheme then
TCP protocol header will be encrypted – this
approach will not work.
Mobile TCP
●

●

●

Dropping of packets due to a handover or higher bit error
rate is not the only problem occurs.
The occurence of lengthy and/or frequent
disconnections in another problem.
I-TCP when mobile disconnected:–

●

Has to buffer more and more data – need more buffer.

Snooping TCP when mobile disconnected:–

Mobile will not able to send ACK.
Working of Mobile TCP
●

●

●

●

It splits the TCP connection into two parts as ITCP
An unchanged TCP is used between HostSupervisory Host while an optimized TCP is used
on the SH-MH connection.
Assumption – M-TCP assumes low bit error rate
on wireless link.
M-TCP does not perform caching/retransmission
of data.
Working of Mobile TCP (Cont.)
●

●

●

●

SH monitors all packets sent to the MH and
ACKs returned from the MH.
If the SH does not receive an ACK for some
time , it assumes that the MH is disconnected.
It chokes the sender by setting the sender's
windows size 0.
It means sender will not retrasmit data.

More Related Content

What's hot

Lecture 19 22. transport protocol for ad-hoc
Lecture 19 22. transport protocol for ad-hoc Lecture 19 22. transport protocol for ad-hoc
Lecture 19 22. transport protocol for ad-hoc Chandra Meena
 
Mobile computing unit2,SDMA,FDMA,CDMA,TDMA Space Division Multi Access,Frequ...
Mobile computing unit2,SDMA,FDMA,CDMA,TDMA  Space Division Multi Access,Frequ...Mobile computing unit2,SDMA,FDMA,CDMA,TDMA  Space Division Multi Access,Frequ...
Mobile computing unit2,SDMA,FDMA,CDMA,TDMA Space Division Multi Access,Frequ...Pallepati Vasavi
 
Mobile computing : Indirect TCP
Mobile computing : Indirect TCPMobile computing : Indirect TCP
Mobile computing : Indirect TCPSushant Kushwaha
 
Routing in Mobile Ad hoc Networks
Routing in Mobile Ad hoc NetworksRouting in Mobile Ad hoc Networks
Routing in Mobile Ad hoc NetworksSayed Chhattan Shah
 
Zone Routing Protocol
Zone Routing ProtocolZone Routing Protocol
Zone Routing Protocolnitss007
 
IEEE 802.11 Architecture and Services
IEEE 802.11 Architecture and ServicesIEEE 802.11 Architecture and Services
IEEE 802.11 Architecture and ServicesSayed Chhattan Shah
 
Routing protocols for ad hoc wireless networks
Routing protocols for ad hoc wireless networks Routing protocols for ad hoc wireless networks
Routing protocols for ad hoc wireless networks Divya Tiwari
 
WIRELESS TRANSMISSION
WIRELESS TRANSMISSIONWIRELESS TRANSMISSION
WIRELESS TRANSMISSIONjunnubabu
 
Multicast routing protocols in adhoc networks
Multicast routing protocols in adhoc networksMulticast routing protocols in adhoc networks
Multicast routing protocols in adhoc networksPradeep Kumar TS
 
ENCAPSULATION AND TUNNELING
ENCAPSULATION AND TUNNELINGENCAPSULATION AND TUNNELING
ENCAPSULATION AND TUNNELINGMohammad Adil
 
Destination Sequenced Distance Vector Routing (DSDV)
Destination Sequenced Distance Vector Routing (DSDV)Destination Sequenced Distance Vector Routing (DSDV)
Destination Sequenced Distance Vector Routing (DSDV)ArunChokkalingam
 
Security issues in manet
Security issues in manetSecurity issues in manet
Security issues in manetflowerjaan
 
Agent discovery& registration
Agent discovery& registrationAgent discovery& registration
Agent discovery& registrationrajisri2
 
Geographic Routing in WSN
Geographic Routing in WSNGeographic Routing in WSN
Geographic Routing in WSNMahbubur Rahman
 
Fisheye State Routing (FSR) - Protocol Overview
Fisheye State Routing (FSR) - Protocol OverviewFisheye State Routing (FSR) - Protocol Overview
Fisheye State Routing (FSR) - Protocol OverviewYoav Francis
 

What's hot (20)

Lecture 19 22. transport protocol for ad-hoc
Lecture 19 22. transport protocol for ad-hoc Lecture 19 22. transport protocol for ad-hoc
Lecture 19 22. transport protocol for ad-hoc
 
Mobile computing unit2,SDMA,FDMA,CDMA,TDMA Space Division Multi Access,Frequ...
Mobile computing unit2,SDMA,FDMA,CDMA,TDMA  Space Division Multi Access,Frequ...Mobile computing unit2,SDMA,FDMA,CDMA,TDMA  Space Division Multi Access,Frequ...
Mobile computing unit2,SDMA,FDMA,CDMA,TDMA Space Division Multi Access,Frequ...
 
Mobile computing : Indirect TCP
Mobile computing : Indirect TCPMobile computing : Indirect TCP
Mobile computing : Indirect TCP
 
Routing in Mobile Ad hoc Networks
Routing in Mobile Ad hoc NetworksRouting in Mobile Ad hoc Networks
Routing in Mobile Ad hoc Networks
 
Zone Routing Protocol
Zone Routing ProtocolZone Routing Protocol
Zone Routing Protocol
 
IEEE 802.11 Architecture and Services
IEEE 802.11 Architecture and ServicesIEEE 802.11 Architecture and Services
IEEE 802.11 Architecture and Services
 
Routing protocols for ad hoc wireless networks
Routing protocols for ad hoc wireless networks Routing protocols for ad hoc wireless networks
Routing protocols for ad hoc wireless networks
 
WIRELESS TRANSMISSION
WIRELESS TRANSMISSIONWIRELESS TRANSMISSION
WIRELESS TRANSMISSION
 
Gprs architecture ppt
Gprs architecture pptGprs architecture ppt
Gprs architecture ppt
 
Multicast routing protocols in adhoc networks
Multicast routing protocols in adhoc networksMulticast routing protocols in adhoc networks
Multicast routing protocols in adhoc networks
 
ENCAPSULATION AND TUNNELING
ENCAPSULATION AND TUNNELINGENCAPSULATION AND TUNNELING
ENCAPSULATION AND TUNNELING
 
Mobile computing (Wireless) Medium Access Control (MAC)
Mobile computing (Wireless) Medium Access Control (MAC)Mobile computing (Wireless) Medium Access Control (MAC)
Mobile computing (Wireless) Medium Access Control (MAC)
 
UMTS, Introduction.
UMTS, Introduction.UMTS, Introduction.
UMTS, Introduction.
 
Destination Sequenced Distance Vector Routing (DSDV)
Destination Sequenced Distance Vector Routing (DSDV)Destination Sequenced Distance Vector Routing (DSDV)
Destination Sequenced Distance Vector Routing (DSDV)
 
Mobile IP
Mobile IPMobile IP
Mobile IP
 
Security issues in manet
Security issues in manetSecurity issues in manet
Security issues in manet
 
Routing Protocols in WSN
Routing Protocols in WSNRouting Protocols in WSN
Routing Protocols in WSN
 
Agent discovery& registration
Agent discovery& registrationAgent discovery& registration
Agent discovery& registration
 
Geographic Routing in WSN
Geographic Routing in WSNGeographic Routing in WSN
Geographic Routing in WSN
 
Fisheye State Routing (FSR) - Protocol Overview
Fisheye State Routing (FSR) - Protocol OverviewFisheye State Routing (FSR) - Protocol Overview
Fisheye State Routing (FSR) - Protocol Overview
 

Viewers also liked (6)

3.Medium Access Control
3.Medium Access Control3.Medium Access Control
3.Medium Access Control
 
Snooping TCP
Snooping TCPSnooping TCP
Snooping TCP
 
Lecture 6
Lecture 6Lecture 6
Lecture 6
 
Unit 4
Unit 4Unit 4
Unit 4
 
Unit 2
Unit 2Unit 2
Unit 2
 
Mobile network layer (mobile comm.)
Mobile network layer (mobile comm.)Mobile network layer (mobile comm.)
Mobile network layer (mobile comm.)
 

Similar to Mobile transportlayer

Mobile transport layer .
Mobile transport layer .Mobile transport layer .
Mobile transport layer .junnubabu
 
Ch7-Transport_Protocols.ppt
Ch7-Transport_Protocols.pptCh7-Transport_Protocols.ppt
Ch7-Transport_Protocols.pptRituParna42
 
Mobile transport layer
Mobile transport layerMobile transport layer
Mobile transport layerVikram Nandini
 
EC 6802 WIRELESS NETWORK_ BABU M_ unit 3 ,4 & 5 PPT
EC 6802 WIRELESS NETWORK_ BABU M_ unit 3 ,4 & 5 PPTEC 6802 WIRELESS NETWORK_ BABU M_ unit 3 ,4 & 5 PPT
EC 6802 WIRELESS NETWORK_ BABU M_ unit 3 ,4 & 5 PPTbabuece
 
mobile_transport_layer (1).pptx
mobile_transport_layer (1).pptxmobile_transport_layer (1).pptx
mobile_transport_layer (1).pptxsinghram281982
 
Mobile Transpot Layer
Mobile Transpot LayerMobile Transpot Layer
Mobile Transpot LayerMaulik Patel
 
C10 transport protocols
C10 transport protocolsC10 transport protocols
C10 transport protocolsRio Nguyen
 
Transport protocols
Transport protocolsTransport protocols
Transport protocolstrupti patil
 
Improving Performance of TCP in Wireless Environment using TCP-P
Improving Performance of TCP in Wireless Environment using TCP-PImproving Performance of TCP in Wireless Environment using TCP-P
Improving Performance of TCP in Wireless Environment using TCP-PIDES Editor
 
Mobile transport layer
 Mobile transport layer Mobile transport layer
Mobile transport layerSonaliAjankar
 
AN EXPLICIT LOSS AND HANDOFF NOTIFICATION SCHEME IN TCP FOR CELLULAR MOBILE S...
AN EXPLICIT LOSS AND HANDOFF NOTIFICATION SCHEME IN TCP FOR CELLULAR MOBILE S...AN EXPLICIT LOSS AND HANDOFF NOTIFICATION SCHEME IN TCP FOR CELLULAR MOBILE S...
AN EXPLICIT LOSS AND HANDOFF NOTIFICATION SCHEME IN TCP FOR CELLULAR MOBILE S...IJCNCJournal
 
Proposition of an Adaptive Retransmission Timeout for TCP in 802.11 Wireless ...
Proposition of an Adaptive Retransmission Timeout for TCP in 802.11 Wireless ...Proposition of an Adaptive Retransmission Timeout for TCP in 802.11 Wireless ...
Proposition of an Adaptive Retransmission Timeout for TCP in 802.11 Wireless ...IJERA Editor
 

Similar to Mobile transportlayer (20)

Mobile transport layer .
Mobile transport layer .Mobile transport layer .
Mobile transport layer .
 
Cs8601 4
Cs8601 4Cs8601 4
Cs8601 4
 
transport protocols
transport protocolstransport protocols
transport protocols
 
Ch7-Transport_Protocols.ppt
Ch7-Transport_Protocols.pptCh7-Transport_Protocols.ppt
Ch7-Transport_Protocols.ppt
 
Unit 4
Unit 4Unit 4
Unit 4
 
Mobile transport layer
Mobile transport layerMobile transport layer
Mobile transport layer
 
EC 6802 WIRELESS NETWORK_ BABU M_ unit 3 ,4 & 5 PPT
EC 6802 WIRELESS NETWORK_ BABU M_ unit 3 ,4 & 5 PPTEC 6802 WIRELESS NETWORK_ BABU M_ unit 3 ,4 & 5 PPT
EC 6802 WIRELESS NETWORK_ BABU M_ unit 3 ,4 & 5 PPT
 
mobile_transport_layer (1).pptx
mobile_transport_layer (1).pptxmobile_transport_layer (1).pptx
mobile_transport_layer (1).pptx
 
Mobile Transpot Layer
Mobile Transpot LayerMobile Transpot Layer
Mobile Transpot Layer
 
Mc unit 4-jwfiles
Mc unit 4-jwfilesMc unit 4-jwfiles
Mc unit 4-jwfiles
 
Mcseminar
McseminarMcseminar
Mcseminar
 
C10 transport protocols
C10 transport protocolsC10 transport protocols
C10 transport protocols
 
Transport protocols
Transport protocolsTransport protocols
Transport protocols
 
Improving Performance of TCP in Wireless Environment using TCP-P
Improving Performance of TCP in Wireless Environment using TCP-PImproving Performance of TCP in Wireless Environment using TCP-P
Improving Performance of TCP in Wireless Environment using TCP-P
 
Mobile transport layer
 Mobile transport layer Mobile transport layer
Mobile transport layer
 
Raj
RajRaj
Raj
 
AN EXPLICIT LOSS AND HANDOFF NOTIFICATION SCHEME IN TCP FOR CELLULAR MOBILE S...
AN EXPLICIT LOSS AND HANDOFF NOTIFICATION SCHEME IN TCP FOR CELLULAR MOBILE S...AN EXPLICIT LOSS AND HANDOFF NOTIFICATION SCHEME IN TCP FOR CELLULAR MOBILE S...
AN EXPLICIT LOSS AND HANDOFF NOTIFICATION SCHEME IN TCP FOR CELLULAR MOBILE S...
 
unit-2 mc.pdf
unit-2 mc.pdfunit-2 mc.pdf
unit-2 mc.pdf
 
Transport layer
Transport layerTransport layer
Transport layer
 
Proposition of an Adaptive Retransmission Timeout for TCP in 802.11 Wireless ...
Proposition of an Adaptive Retransmission Timeout for TCP in 802.11 Wireless ...Proposition of an Adaptive Retransmission Timeout for TCP in 802.11 Wireless ...
Proposition of an Adaptive Retransmission Timeout for TCP in 802.11 Wireless ...
 

More from Rahul Hada

Socio-technical System
Socio-technical SystemSocio-technical System
Socio-technical SystemRahul Hada
 
Software Engineering Introduction
Software Engineering IntroductionSoftware Engineering Introduction
Software Engineering IntroductionRahul Hada
 
Socket Programming using Java
Socket Programming using JavaSocket Programming using Java
Socket Programming using JavaRahul Hada
 
Building Complex Topology using NS3
Building Complex Topology using NS3Building Complex Topology using NS3
Building Complex Topology using NS3Rahul Hada
 
Building Topology in NS3
Building Topology in NS3Building Topology in NS3
Building Topology in NS3Rahul Hada
 
1 session installation
1 session installation1 session installation
1 session installationRahul Hada
 
Introduction to Virtualization
Introduction to VirtualizationIntroduction to Virtualization
Introduction to VirtualizationRahul Hada
 
Introduction of Cloud Computing
Introduction of Cloud ComputingIntroduction of Cloud Computing
Introduction of Cloud ComputingRahul Hada
 
Fundamental of Shell Programming
Fundamental of Shell ProgrammingFundamental of Shell Programming
Fundamental of Shell ProgrammingRahul Hada
 
Support formobility
Support formobilitySupport formobility
Support formobilityRahul Hada
 
WLAN - IEEE 802.11
WLAN - IEEE 802.11WLAN - IEEE 802.11
WLAN - IEEE 802.11Rahul Hada
 
Quality planning
Quality planningQuality planning
Quality planningRahul Hada
 

More from Rahul Hada (18)

P4 foundation
P4 foundationP4 foundation
P4 foundation
 
P4 foundation
P4 foundationP4 foundation
P4 foundation
 
Socio-technical System
Socio-technical SystemSocio-technical System
Socio-technical System
 
Software Engineering Introduction
Software Engineering IntroductionSoftware Engineering Introduction
Software Engineering Introduction
 
Inheritance
InheritanceInheritance
Inheritance
 
Socket Programming using Java
Socket Programming using JavaSocket Programming using Java
Socket Programming using Java
 
Building Complex Topology using NS3
Building Complex Topology using NS3Building Complex Topology using NS3
Building Complex Topology using NS3
 
Building Topology in NS3
Building Topology in NS3Building Topology in NS3
Building Topology in NS3
 
NS3 Overview
NS3 OverviewNS3 Overview
NS3 Overview
 
1 session installation
1 session installation1 session installation
1 session installation
 
Introduction to Virtualization
Introduction to VirtualizationIntroduction to Virtualization
Introduction to Virtualization
 
Introduction of Cloud Computing
Introduction of Cloud ComputingIntroduction of Cloud Computing
Introduction of Cloud Computing
 
Fundamental of Shell Programming
Fundamental of Shell ProgrammingFundamental of Shell Programming
Fundamental of Shell Programming
 
Support formobility
Support formobilitySupport formobility
Support formobility
 
WLAN - IEEE 802.11
WLAN - IEEE 802.11WLAN - IEEE 802.11
WLAN - IEEE 802.11
 
Quality planning
Quality planningQuality planning
Quality planning
 
Risk
RiskRisk
Risk
 
Risk
RiskRisk
Risk
 

Recently uploaded

Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024The Digital Insurer
 
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...apidays
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FMESafe Software
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobeapidays
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businesspanagenda
 
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...Zilliz
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...DianaGray10
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Victor Rentea
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProduct Anonymous
 
Ransomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdfRansomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdfOverkill Security
 
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...Orbitshub
 
AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024The Digital Insurer
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoffsammart93
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfRising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfOrbitshub
 
ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesrafiqahmad00786416
 
Exploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusExploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusZilliz
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FMESafe Software
 

Recently uploaded (20)

Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024
 
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
 
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
Ransomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdfRansomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdf
 
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
 
AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfRising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
 
ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challenges
 
Exploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusExploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with Milvus
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 

Mobile transportlayer

  • 2. Introduction ● ● Mobility support on only lower layer is not enough to provide mobility support for applications. As application is directly communicates with transport Layer only.
  • 3. Traditional TCP Congestion Control ● ● ● ● ● TCP designed for fixed n/w with fixed end-systems. Congestion may appear from time to time even in carefully designed networks. Sender notices the missing ACK for the lost packet and assumes a packet loss due to congestion. Retransmitting the missing packets , might only increase the congestion. Solution – TCP show down the transmission rate dramatically.
  • 4. Traditional TCP Slow start ● ● Sender always calculates a congestion window for a receiver. The start size of the congestion window is one segment. ● Double the window size after receiving ACK. ● Maintain the congestion threshold.
  • 5. Traditional TCP Fast retransmit/fast recovery ● Two things lead to a reduction of the congestion threshold :– Fast retransmit – continious receving of ACK for the same packet. – Fast recovery – receipt of ACK shows that there is no congestion to justify slow start. The sender perform fast recovery from the packet loss.
  • 6. Implication on mobility ● Slow start is not a solution in case of mobility ● The reason for this is of using wrong assumptions. ● ● ● ● Error rate on wireless links are higher as compare to wired links. Retransmittion may increase duplicates at layer 2 and more connection are end-to-end encryption. Mobility itself cause packet loss. TCP detects missing ACK via time-outs and concluding packet loss due to congestion control only.
  • 7. Classical TCP improvements Indirect TCP ● ● I-TCP segments a TCP connection into a fixed part and a wireless part. Standard TCP is used between the fixed computer and the access point/FA. ● Now access point/FA terminates the standard TCP connection. ● It means access point/FA now seen as the mobile host for the fixed host. ● Access point/FA work as a proxy. ● ● If the packet is lost on the wireless link, the mobile hosts notice this much faster due to much lower RTT. In case of handover , AP/FA act as a proxy buffering packets for retransmission after the handover to the new AP/FA.
  • 8. Advantages of I-TCP ● ● ● ● Does not require any change in the TCP protocol. Due to strict partitioning into two connections, transmission error on wireless link cannot propogate into the fixed network. Short delay between mobile node and AP/FA, independent of other traffice streams. Partitioning of two connection allow us to use different TCP.
  • 9. Disadvantages of I-TCP ● ● ● Loss of end-to-end functionality of TCP. If sender receive the ACK it means AP/FA receive the packet. Foreign agent must be a trusted entity
  • 10. Snooping TCP ● ● ● ● ● This method based on end-to-end TCP semantic. Objective – is to buffer data close to the mobile host to perform fast local retransmission in cse of packet loss. FA/AP buffers all packets with destination mobile host and additionally 'snoop' the packet flow in both directions. FA not ACK data to the corresponent host. FA/AP will retransmits the packet to mobile host directly form the buffer.
  • 11. Snooping TCP ● Data transfer from the mobile host with destination correspondent host – FA snoops into packet stream to detect gaps in the seq. no. of TCP. – If FA detect missing packet, – then , it return a NACK to the mobile host. – Now mobile host retransmit the missing packet immediately.
  • 12. Advantage/Disadvantage of Snooping TCP ● Advantage – – ● End-to-End TCP semantic is preserved. Need no modification on FA/AP and correspondent node Disadvantage – It takes some time until the FA/AP can successfully retransmit a packet from its buffer due to problem in wireless link. – Have to manage time-out at FA/AP and correspondent Node – If sender using end-to-end encryption scheme then TCP protocol header will be encrypted – this approach will not work.
  • 13. Mobile TCP ● ● ● Dropping of packets due to a handover or higher bit error rate is not the only problem occurs. The occurence of lengthy and/or frequent disconnections in another problem. I-TCP when mobile disconnected:– ● Has to buffer more and more data – need more buffer. Snooping TCP when mobile disconnected:– Mobile will not able to send ACK.
  • 14. Working of Mobile TCP ● ● ● ● It splits the TCP connection into two parts as ITCP An unchanged TCP is used between HostSupervisory Host while an optimized TCP is used on the SH-MH connection. Assumption – M-TCP assumes low bit error rate on wireless link. M-TCP does not perform caching/retransmission of data.
  • 15. Working of Mobile TCP (Cont.) ● ● ● ● SH monitors all packets sent to the MH and ACKs returned from the MH. If the SH does not receive an ACK for some time , it assumes that the MH is disconnected. It chokes the sender by setting the sender's windows size 0. It means sender will not retrasmit data.