SlideShare a Scribd company logo
Session: 15 Prof. Sridhar Iyer 15.1
IT 601: Mobile Computing
TCP over wireless
TCP and mobility
Slides from Prof. Sridhar Iyer’s lecture
IIT Bombay
Session: 15 Prof. Sridhar Iyer 15.2
Effect of Mobility on Protocol Stack
• Application: new applications and adaptations
• Transport: congestion and flow control
• Network: addressing and routing
• Link: media access and handoff
• Physical: transmission errors and interference
Session: 15 Prof. Sridhar Iyer 15.3
TCP basics
• Reliable, ordered delivery
– uses sequence numbers, acknowledgements,
timeouts and retransmissions
– End-to-end semantics (ACK after data recd)
• Provides flow and congestion control
– uses sliding window based buffers and feedback
from receiver/network to adjust transmission rate
Session: 15 Prof. Sridhar Iyer 15.4
Window based flow control
• Window size minimum of
– receiver’s advertised window - determined by
available buffer space at the receiver
– congestion window - determined by sender, based on
network feedback
2 3 4 5 6 7 8 9 10 11 13
1 12
Sender’s window
Acks received Not transmitted
Session: 15 Prof. Sridhar Iyer 15.5
Timeouts and retransmission
• TCP manages four different timers for each
connection
– retransmission timer: when awaiting ACK
– persist timer: keeps window size information flowing
– keepalive timer: when other end crashes or reboots
– 2MSL timer: for the TIME_WAIT state
Session: 15 Prof. Sridhar Iyer 15.6
TCP: retransmission scenarios
Host A
loss
timeout
lost ACK scenario
Host B
X
Host A
Seq=92
timeout
premature timeout,
cumulative ACKs
Host B
Seq=100
timeout
Session: 15 Prof. Sridhar Iyer 15.7
RTT estimation
Exponential Averaging Filter:
• Measure SampleRTT for segment/ACK pair
• Compute weighted average of RTT
• EstimatedRTT = α PrevEstimatedRTT + (1 – α)
SampleRTT
– RTO = β * EstimatedRTT
• Typically α = 0.9; β = 2
Session: 15 Prof. Sridhar Iyer 15.8
Ideal window size
• Ideal size = delay * bandwidth
– delay-bandwidth product
• If window size < delay*bw
– Inefficiency (wasted bandwidth)
• If window size > delay*bw
– Queuing at intermediate routers (increased RTT)
– Potentially, packet loss
Session: 15 Prof. Sridhar Iyer 15.9
Congestion control
• On detecting a packet loss, TCP sender assumes
that network congestion has occurred
• On detecting packet loss, TCP sender drastically
reduces the congestion window
• Reducing congestion window reduces amount of
data that can be sent per RTT
Session: 15 Prof. Sridhar Iyer 15.10
Typical TCP behaviour
0
5
10
15
20
25
0
3
6
9
1
2
1
5
2
0
2
2
2
5
Time (round trips)
Congestion
window
(segments)
ssthresh = 8 ssthresh = 10
cwnd = 20
After timeout
Session: 15 Prof. Sridhar Iyer 15.11
0
2
4
6
8
10
0 2 4 6 8 10 12 14
Time (round trips)
Window
size
(segments)
advertised window
After fast recovery
Fast retransmit and Fast recovery
Session: 15 Prof. Sridhar Iyer 15.12
Typical mobile wireless scenario
• FH: Fixed Host
• MH: Mobile Host
• BS: Base Station (gateway)
Session: 15 Prof. Sridhar Iyer 15.13
Burst errors may cause Timeouts
• If wireless link remains unavailable for extended
duration, a window worth of data may be lost
– driving through a tunnel; passing a truck
• Timeout results in slow start
– Slow start reduces congestion window to 1 MSS,
reducing throughput
• Reduction in window in response to errors
unnecessary
Session: 15 Prof. Sridhar Iyer 15.14
Random errors may cause
Fast Retransmit or Timeout
• If a packet is lost due to transient link conditions
– Channel noise leading to CRC error
• Fast retransmit results in fast recovery
– Fast recovery reduces congestion window to 1/2
• If multiple packets losses happen in a window,
– Results in timeout
• Reduction in window in response to errors
unnecessary
Session: 15 Prof. Sridhar Iyer 15.15
Example: Random errors
40 39 37
38
37
34
42 41 39
40
37
37
41
37
37
42
44 43
37
Session: 15 Prof. Sridhar Iyer 15.16
TCP and wireless/mobility
TCP assumes congestion if packets dropped
• typically wrong in wireless networks
– often packet loss due to transmission errors
• mobility itself can cause packet loss
– nodes roam from one access point or foreign agent
to another with packets in transit
Session: 15 Prof. Sridhar Iyer 15.17
Motivation for TCP adaptation
Performance of an unchanged TCP degrades severely
for wireless/mobile environments
• TCP cannot be changed fundamentally
– Widely deployed in the fixed network
– Internet interoperability requirement
• TCP for wireless/mobility has to be compatible with
“standard” TCP
Session: 15 Prof. Sridhar Iyer 15.18
Adaptation for TCP over wireless
Several proposals to adapt TCP to wireless
environments
• Modifications to TCP implementation at
– Fixed Host
– Base Station
– Mobile Host
• Approaches
– Hide error losses from the sender
– Let sender know the cause of packet loss
Session: 15 Prof. Sridhar Iyer 15.19
Ideal behavior
• Ideal TCP behavior: TCP sender should simply retransmit a
packet lost due to transmission errors, without taking any
congestion control actions
– Ideal TCP typically not realizable
• Ideal network behavior: Transmission errors should be
hidden from the sender
– Errors should be recovered transparently and efficiently
• Proposed schemes attempt to approximate one of the
above two ideals
Session: 15 Prof. Sridhar Iyer 15.20
Link Layer mechanisms
• Forward Error Correction (FEC)
– Can be use to correct small number of errors
– Incurs overhead even when errors do not occur
• Link Level Retransmissions
– Retransmit a packet at the link layer, if errors are
detected
– Retransmission overhead incurred only if errors occur
Session: 15 Prof. Sridhar Iyer 15.21
Link Level Retransmissions
wireless
physical
link
network
transport
application
physical
link
network
transport
application
physical
link
network
transport
application
rxmt
TCP connection
Link layer state
Session: 15 Prof. Sridhar Iyer 15.22
Issues
• How many times to retransmit at the link level
before giving up?
• What triggers link level retransmissions?
• How much time is required for a link layer
retransmission?
• Should the link layer deliver packets as they arrive,
or deliver them in-order?
Session: 15 Prof. Sridhar Iyer 15.23
Split connection approach
• End-to-end TCP connection is broken into one
connection on the wired part of route and one over
wireless part of the route
• FH-MH = FH-BS + BS-MH
FH MH
BS
Base Station Mobile Host
Fixed Host
Session: 15 Prof. Sridhar Iyer 15.24
I-TCP: Split connection
wireless
physical
link
network
transport
application
physical
link
network
transport
application
physical
link
network
transport
application
rxmt
Per-TCP connection state
TCP connection TCP connection
Source: Vaidya
Session: 15 Prof. Sridhar Iyer 15.25
I-TCP advantages
• No changes to TCP for FH
• BS-MH connection can be optimized independent of
FH-BS connection
– Different flow / error control on the two connections
– Faster recovery due to relatively shorter RTT on
wireless link
Session: 15 Prof. Sridhar Iyer 15.26
I-TCP disadvantages
• End-to-end semantics violated
– ack may be delivered to sender, before data
delivered to the receiver
• BS retains hard state
– Buffer space required at BS on a per-TCP-
connection basis
– BS failure can result in permanent loss of data
(unreliability)
– Hand-off latency increases
Session: 15 Prof. Sridhar Iyer 15.27
Hand-off in I-TCP
• Data that has been ack’d to sender, must be moved to new
base station
FH MH
BS
40
39
37
38
37
41
MH
New base station
Hand-off
40
39
Session: 15 Prof. Sridhar Iyer 15.28
Snoop Protocol
• Retains local recovery of Split Connection approach
and uses link level retransmission
• Improves on split connection
– end-to-end semantics retained
– soft state at base station, instead of hard state
Session: 15 Prof. Sridhar Iyer 15.29
Snoop Protocol
• Buffers data packets at the base station BS
– to allow link layer retransmission
• When duplicate ACK received by BS from MH
– retransmit on wireless link, if packet present in buffer
– drop duplicate ACK
• Prevents fast retransmit at TCP sender FH
FH MH
BS
Session: 15 Prof. Sridhar Iyer 15.30
Snoop Protocol
FH MH
BS
wireless
physical
link
network
transport
application
physical
link
network
transport
application
physical
link
network
transport
application
rxmt
Per TCP-connection state
TCP connection
Source: Vaidya
Session: 15 Prof. Sridhar Iyer 15.31
Snoop : Example
FH MH
BS
40 39 37
38
37
35
36
37
38
35 TCP state
maintained at
link layer
Session: 15 Prof. Sridhar Iyer 15.32
Snoop : Example
FH MH
BS
41
37
37
37
44 43
37
37
38
39
40
41
42
Discard
dupack
Session: 15 Prof. Sridhar Iyer 15.33
Snoop advantages
• Local recovery from wireless losses
• Fast retransmit not triggered at sender despite out-of-
order link layer delivery
• High throughput can be achieved
• End-to-end semantics retained
• Soft state at base station
– loss of the soft state affects performance, but not
correctness
Session: 15 Prof. Sridhar Iyer 15.34
Snoop disadvantages
• Link layer at base station needs to be TCP-aware
• Not useful if TCP headers are encrypted (IPsec)
Session: 15 Prof. Sridhar Iyer 15.35
Delayed Dupacks
• Attempts to imitate Snoop, without making the base
station TCP-aware
• Delayed Dupacks implements the same two
features
– at BS : link layer retransmission
– at MH : reducing interference between TCP and link
layer retransmissions (by delaying dupacks)
Session: 15 Prof. Sridhar Iyer 15.36
Delayed Dupacks
• TCP receiver delays dupacks for interval D, when
out-of-order packets received
– Dupack delay intended to give link level retransmit
time to succeed
• Benefit: can result in recovery from a transmission
loss without triggering a response from the TCP
sender
Session: 15 Prof. Sridhar Iyer 15.37
Delayed dupacks advantages
• Link layer need not be TCP-aware
• Can be used even if TCP headers are encrypted
• Works well for relatively small wireless RTT
(compared to end-to-end RTT)
– relatively small delay D sufficient in such cases
Session: 15 Prof. Sridhar Iyer 15.38
Delayed dupacks disadvantages
• Right value of dupack delay D dependent on the
wireless link properties
• Mechanisms to automatically choose D needed
• Delays dupacks for congestion losses too, delaying
congestion loss recovery
Session: 15 Prof. Sridhar Iyer 15.39
Mobility and handoff
• Hand-offs may result in temporary loss of route to MH
– with non-overlapping cells, it may be a while before the
mobile host receives a beacon from the new BS
• While routes are being reestablished during handoff,
MH and old BS may attempt to send packets to each
other, resulting in loss of packets
Session: 15 Prof. Sridhar Iyer 15.40
Impact of handoff
• Split connection approach
– hard state at base station must be moved to new
base station
• Snoop protocol
– soft state need not be moved
– while the new base station builds new state, packet
losses may not be recovered locally
Session: 15 Prof. Sridhar Iyer 15.41
Handoff issues
• During the long delay for a handoff to complete
– a whole window worth of data may be lost
• After handoff is complete
– acks are not received by the TCP sender
• Sender eventually times out, and retransmits
– If handoff still not complete, another timeout will occur
• Performance penalty
– Time wasted until timeout occurs
– Window shrunk after timeout
Session: 15 Prof. Sridhar Iyer 15.42
Using Fast Retransmit
• When MH is the TCP receiver:
– after handoff is complete, it sends 3 dupacks to the
sender
– this triggers fast retransmit at the sender
• When MH is the TCP sender:
– invoke fast retransmit after completion of handoff
Session: 15 Prof. Sridhar Iyer 15.43
Mobile TCP (M-TCP)
• Handling of lengthy or frequent disconnections
• M-TCP splits as I-TCP does
– unmodified TCP for FH to BS
– optimized TCP for BS to MH
• BS (Foreign Agent)
– monitors all packets, if disconnection detected
• set advertised window size to 0
• sender automatically goes into persistent mode
– no caching, no retransmission at the BS
• If a packet is lost on the wireless link, it has to be
retransmitted by the original sender
Session: 15 Prof. Sridhar Iyer 15.44
M-TCP
• BS does not send an ack to FH, unless BS has received
an ack from MH
– maintains end-to-end semantics
• BS withholds ack for the last byte ack’d by MH
• When BS does not receive ACK for sometime, it chokes
sender by setting advertise window to 0
FH MH
BS
Ack 1000
Ack 999
Session: 15 Prof. Sridhar Iyer 15.45
M-TCP
• When a new ack is received with receiver’s advertised
window = 0, the sender enters persist mode
• Sender does not send any data in persist mode
– except when persist timer goes off
• When a positive window advertisement is received, sender
exits persist mode
• On exiting persist mode, RTO and cwnd are same as
before the persist mode
Session: 15 Prof. Sridhar Iyer 15.46
M-TCP
• Avoids reduction of congestion window due to
handoff, unlike the fast retransmit scheme
• Is not reducing the window a good idea?
– When host moves, route changes, and new route
may be more congested
– It is not obvious that starting full window after handoff
is right
Session: 15 Prof. Sridhar Iyer 15.47
FreezeTCP
• M-TCP needs help from base station (BS)
– BS withholds ack for one byte
– BS uses this ack to send a zero window advertisement
when MH moves to another cell
• FreezeTCP
– Receiver sends zero window advertisement (ZWA),
upon impending disconnection
– Receiver sends full window advertisement (FWA),
upon reconnection
Session: 15 Prof. Sridhar Iyer 15.48
FreezeTCP
• TCP receiver determines if a handoff is about to
happen
– determination may be based on signal strength
• Receiver should attempt to send ZWA 1 RTT before
handoff
• Receiver sends 3 dupacks when route is
reestablished
• No help needed from the base station
Session: 15 Prof. Sridhar Iyer 15.49
Multi-hop Wireless (MANET)
• Mobility causes route changes
Session: 15 Prof. Sridhar Iyer 15.50
TCP Issues
• Route changes due to mobility
• Wireless transmission errors
– problem compounded with multiple hops
• Out-of-order packet delivery
– frequent route changes may cause out-of-order
delivery
• Multiple access protocol
– choice of MAC protocol can impact TCP
performance significantly
Session: 15 Prof. Sridhar Iyer 15.51
TCP over multi hop wireless
• When contention-based MAC protocol is used,
connections over multiple hops are at a
disadvantage compared to shorter connections
– because they have to contend for wireless access at
each hop
– extent of packet delay or drop increases with number
of hops
Session: 15 Prof. Sridhar Iyer 15.52
Impact of Multi-Hop Wireless Paths
0
200
400
600
800
1000
1200
1400
1600
1 2 3 4 5 6 7 8 9 10
Number of hops
TCP Throughtput
(Kbps)
TCP Throughput using 2 Mbps 802.11 MAC
Session: 15 Prof. Sridhar Iyer 15.53
mobility causes
link breakage,
resulting in route
failure
TCP data and acks
en route discarded
Impact of mobility
TCP sender times out.
Starts sending packets again
Route is
repaired
No throughput
No throughput
despite route repair
Session: 15 Prof. Sridhar Iyer 15.54
Positive impact of mobility
C
B
D
A
C
B
D
A
C
B
D
A
1.5 second route failure
Route from A to D is broken for ~1.5 second.
When TCP sender times out after 1 second, route still broken.
TCP times out after another 2 seconds, and only then resumes.
Throughput improves because number of hops reduced.
Session: 15 Prof. Sridhar Iyer 15.55
Improving throughput
• Network feedback
• Inform TCP of route failure by explicit message
• Let TCP know when route is repaired
– Probing
– Explicit notification
• Reduces repeated TCP timeouts and backoff
Session: 15 Prof. Sridhar Iyer 15.56
Network Feedback
• Network feedback beneficial
• Need to modify transport & network layer to
receive/send feedback
• Need mechanisms for information exchange
between layers
Session: 15 Prof. Sridhar Iyer 15.57
References
• Bakre, A., Badrinath, B., “I-TCP: Indirect TCP for mobile hosts”- IEEE ICDCS 1995.
• Balakrishnan, H., Srinivasan, S., Amir, E., and Katz, R., “Improving TCP/IP
Performance over Wireless Networks” – ACM Mobicom 1995.
• Brown, K., Singh, S., “M-TCP: TCP for mobile cellular networks” – ACM Computer
Communication Review, 27 (5), 1997.
• Goff, T. Moronski, J. Phatak, D.S. Gupta, V. “Freeze-TCP: a true end-to-end TCP
enhancement mechanism for mobile environments” – IEEE Infocom 2000.

More Related Content

Similar to 06-mobile-TCP.ppt

Computer networks Module 3 Transport layer
Computer networks Module 3 Transport layerComputer networks Module 3 Transport layer
Computer networks Module 3 Transport layer
claudle200415
 
Aceleracion TCP Mikrotik.pdf
Aceleracion TCP Mikrotik.pdfAceleracion TCP Mikrotik.pdf
Aceleracion TCP Mikrotik.pdf
WifiCren
 
RIPE 80: Buffers and Protocols
RIPE 80: Buffers and ProtocolsRIPE 80: Buffers and Protocols
RIPE 80: Buffers and Protocols
APNIC
 
Part 9 : Congestion control and IPv6
Part 9 : Congestion control and IPv6Part 9 : Congestion control and IPv6
Part 9 : Congestion control and IPv6
Olivier Bonaventure
 
08. DRIVE TEST Analysis
08. DRIVE TEST Analysis08. DRIVE TEST Analysis
08. DRIVE TEST Analysis
Amit vishwakarma
 
Network performance overview
Network  performance overviewNetwork  performance overview
Network performance overview
My cp
 
Transport layer protocol
Transport layer protocolTransport layer protocol
Transport layer protocol
N.Jagadish Kumar
 
High performance browser networking ch1,2,3
High performance browser networking ch1,2,3High performance browser networking ch1,2,3
High performance browser networking ch1,2,3
Seung-Bum Lee
 
Dccp evaluation for sip signaling ict4 m
Dccp evaluation for sip signaling   ict4 m Dccp evaluation for sip signaling   ict4 m
Dccp evaluation for sip signaling ict4 m
Agus Awaludin
 
MODULE-4_CCN.pptx
MODULE-4_CCN.pptxMODULE-4_CCN.pptx
MODULE-4_CCN.pptx
Dr. Shivashankar
 
Core-Stateless Fair Queueing
Core-Stateless Fair QueueingCore-Stateless Fair Queueing
Core-Stateless Fair Queueing
Yuanxuan Wang
 
TCP protocol flow control
TCP protocol flow control TCP protocol flow control
TCP protocol flow control
anuragjagetiya
 
EC 6802 WIRELESS NETWORK_ BABU M_ unit 3 ,4 & 5 PPT
EC 6802 WIRELESS NETWORK_ BABU M_ unit 3 ,4 & 5 PPTEC 6802 WIRELESS NETWORK_ BABU M_ unit 3 ,4 & 5 PPT
EC 6802 WIRELESS NETWORK_ BABU M_ unit 3 ,4 & 5 PPT
babuece
 
Get into Networking by Clearing Comptia Network+ Test
Get into Networking by Clearing Comptia Network+ TestGet into Networking by Clearing Comptia Network+ Test
Get into Networking by Clearing Comptia Network+ Test
certblaster
 
vulnerabilities in IP.pdf
vulnerabilities in IP.pdfvulnerabilities in IP.pdf
vulnerabilities in IP.pdf
MuhammadSufyanAbbasi1
 
Pre-Con Education: Recognizing Your Network's Key Performance Indicators Th...
Pre-Con Education: Recognizing Your Network's Key Performance Indicators Th...Pre-Con Education: Recognizing Your Network's Key Performance Indicators Th...
Pre-Con Education: Recognizing Your Network's Key Performance Indicators Th...
CA Technologies
 
presentationphysicallyer.pdf talked about computer networks
presentationphysicallyer.pdf talked about computer networkspresentationphysicallyer.pdf talked about computer networks
presentationphysicallyer.pdf talked about computer networks
HetfieldLee
 
Manet
ManetManet
Manet
ManetManet
UAV Data Link Design for Dependable Real-Time Communications
UAV Data Link Design for Dependable Real-Time CommunicationsUAV Data Link Design for Dependable Real-Time Communications
UAV Data Link Design for Dependable Real-Time Communications
Gerardo Pardo-Castellote
 

Similar to 06-mobile-TCP.ppt (20)

Computer networks Module 3 Transport layer
Computer networks Module 3 Transport layerComputer networks Module 3 Transport layer
Computer networks Module 3 Transport layer
 
Aceleracion TCP Mikrotik.pdf
Aceleracion TCP Mikrotik.pdfAceleracion TCP Mikrotik.pdf
Aceleracion TCP Mikrotik.pdf
 
RIPE 80: Buffers and Protocols
RIPE 80: Buffers and ProtocolsRIPE 80: Buffers and Protocols
RIPE 80: Buffers and Protocols
 
Part 9 : Congestion control and IPv6
Part 9 : Congestion control and IPv6Part 9 : Congestion control and IPv6
Part 9 : Congestion control and IPv6
 
08. DRIVE TEST Analysis
08. DRIVE TEST Analysis08. DRIVE TEST Analysis
08. DRIVE TEST Analysis
 
Network performance overview
Network  performance overviewNetwork  performance overview
Network performance overview
 
Transport layer protocol
Transport layer protocolTransport layer protocol
Transport layer protocol
 
High performance browser networking ch1,2,3
High performance browser networking ch1,2,3High performance browser networking ch1,2,3
High performance browser networking ch1,2,3
 
Dccp evaluation for sip signaling ict4 m
Dccp evaluation for sip signaling   ict4 m Dccp evaluation for sip signaling   ict4 m
Dccp evaluation for sip signaling ict4 m
 
MODULE-4_CCN.pptx
MODULE-4_CCN.pptxMODULE-4_CCN.pptx
MODULE-4_CCN.pptx
 
Core-Stateless Fair Queueing
Core-Stateless Fair QueueingCore-Stateless Fair Queueing
Core-Stateless Fair Queueing
 
TCP protocol flow control
TCP protocol flow control TCP protocol flow control
TCP protocol flow control
 
EC 6802 WIRELESS NETWORK_ BABU M_ unit 3 ,4 & 5 PPT
EC 6802 WIRELESS NETWORK_ BABU M_ unit 3 ,4 & 5 PPTEC 6802 WIRELESS NETWORK_ BABU M_ unit 3 ,4 & 5 PPT
EC 6802 WIRELESS NETWORK_ BABU M_ unit 3 ,4 & 5 PPT
 
Get into Networking by Clearing Comptia Network+ Test
Get into Networking by Clearing Comptia Network+ TestGet into Networking by Clearing Comptia Network+ Test
Get into Networking by Clearing Comptia Network+ Test
 
vulnerabilities in IP.pdf
vulnerabilities in IP.pdfvulnerabilities in IP.pdf
vulnerabilities in IP.pdf
 
Pre-Con Education: Recognizing Your Network's Key Performance Indicators Th...
Pre-Con Education: Recognizing Your Network's Key Performance Indicators Th...Pre-Con Education: Recognizing Your Network's Key Performance Indicators Th...
Pre-Con Education: Recognizing Your Network's Key Performance Indicators Th...
 
presentationphysicallyer.pdf talked about computer networks
presentationphysicallyer.pdf talked about computer networkspresentationphysicallyer.pdf talked about computer networks
presentationphysicallyer.pdf talked about computer networks
 
Manet
ManetManet
Manet
 
Manet
ManetManet
Manet
 
UAV Data Link Design for Dependable Real-Time Communications
UAV Data Link Design for Dependable Real-Time CommunicationsUAV Data Link Design for Dependable Real-Time Communications
UAV Data Link Design for Dependable Real-Time Communications
 

Recently uploaded

Embedded machine learning-based road conditions and driving behavior monitoring
Embedded machine learning-based road conditions and driving behavior monitoringEmbedded machine learning-based road conditions and driving behavior monitoring
Embedded machine learning-based road conditions and driving behavior monitoring
IJECEIAES
 
BRAIN TUMOR DETECTION for seminar ppt.pdf
BRAIN TUMOR DETECTION for seminar ppt.pdfBRAIN TUMOR DETECTION for seminar ppt.pdf
BRAIN TUMOR DETECTION for seminar ppt.pdf
LAXMAREDDY22
 
IEEE Aerospace and Electronic Systems Society as a Graduate Student Member
IEEE Aerospace and Electronic Systems Society as a Graduate Student MemberIEEE Aerospace and Electronic Systems Society as a Graduate Student Member
IEEE Aerospace and Electronic Systems Society as a Graduate Student Member
VICTOR MAESTRE RAMIREZ
 
哪里办理(csu毕业证书)查尔斯特大学毕业证硕士学历原版一模一样
哪里办理(csu毕业证书)查尔斯特大学毕业证硕士学历原版一模一样哪里办理(csu毕业证书)查尔斯特大学毕业证硕士学历原版一模一样
哪里办理(csu毕业证书)查尔斯特大学毕业证硕士学历原版一模一样
insn4465
 
Rainfall intensity duration frequency curve statistical analysis and modeling...
Rainfall intensity duration frequency curve statistical analysis and modeling...Rainfall intensity duration frequency curve statistical analysis and modeling...
Rainfall intensity duration frequency curve statistical analysis and modeling...
bijceesjournal
 
artificial intelligence and data science contents.pptx
artificial intelligence and data science contents.pptxartificial intelligence and data science contents.pptx
artificial intelligence and data science contents.pptx
GauravCar
 
Comparative analysis between traditional aquaponics and reconstructed aquapon...
Comparative analysis between traditional aquaponics and reconstructed aquapon...Comparative analysis between traditional aquaponics and reconstructed aquapon...
Comparative analysis between traditional aquaponics and reconstructed aquapon...
bijceesjournal
 
Software Quality Assurance-se412-v11.ppt
Software Quality Assurance-se412-v11.pptSoftware Quality Assurance-se412-v11.ppt
Software Quality Assurance-se412-v11.ppt
TaghreedAltamimi
 
Data Driven Maintenance | UReason Webinar
Data Driven Maintenance | UReason WebinarData Driven Maintenance | UReason Webinar
Data Driven Maintenance | UReason Webinar
UReason
 
An improved modulation technique suitable for a three level flying capacitor ...
An improved modulation technique suitable for a three level flying capacitor ...An improved modulation technique suitable for a three level flying capacitor ...
An improved modulation technique suitable for a three level flying capacitor ...
IJECEIAES
 
Advanced control scheme of doubly fed induction generator for wind turbine us...
Advanced control scheme of doubly fed induction generator for wind turbine us...Advanced control scheme of doubly fed induction generator for wind turbine us...
Advanced control scheme of doubly fed induction generator for wind turbine us...
IJECEIAES
 
Data Control Language.pptx Data Control Language.pptx
Data Control Language.pptx Data Control Language.pptxData Control Language.pptx Data Control Language.pptx
Data Control Language.pptx Data Control Language.pptx
ramrag33
 
People as resource Grade IX.pdf minimala
People as resource Grade IX.pdf minimalaPeople as resource Grade IX.pdf minimala
People as resource Grade IX.pdf minimala
riddhimaagrawal986
 
Unit-III-ELECTROCHEMICAL STORAGE DEVICES.ppt
Unit-III-ELECTROCHEMICAL STORAGE DEVICES.pptUnit-III-ELECTROCHEMICAL STORAGE DEVICES.ppt
Unit-III-ELECTROCHEMICAL STORAGE DEVICES.ppt
KrishnaveniKrishnara1
 
Mechanical Engineering on AAI Summer Training Report-003.pdf
Mechanical Engineering on AAI Summer Training Report-003.pdfMechanical Engineering on AAI Summer Training Report-003.pdf
Mechanical Engineering on AAI Summer Training Report-003.pdf
21UME003TUSHARDEB
 
Use PyCharm for remote debugging of WSL on a Windo cf5c162d672e4e58b4dde5d797...
Use PyCharm for remote debugging of WSL on a Windo cf5c162d672e4e58b4dde5d797...Use PyCharm for remote debugging of WSL on a Windo cf5c162d672e4e58b4dde5d797...
Use PyCharm for remote debugging of WSL on a Windo cf5c162d672e4e58b4dde5d797...
shadow0702a
 
原版制作(Humboldt毕业证书)柏林大学毕业证学位证一模一样
原版制作(Humboldt毕业证书)柏林大学毕业证学位证一模一样原版制作(Humboldt毕业证书)柏林大学毕业证学位证一模一样
原版制作(Humboldt毕业证书)柏林大学毕业证学位证一模一样
ydzowc
 
Optimizing Gradle Builds - Gradle DPE Tour Berlin 2024
Optimizing Gradle Builds - Gradle DPE Tour Berlin 2024Optimizing Gradle Builds - Gradle DPE Tour Berlin 2024
Optimizing Gradle Builds - Gradle DPE Tour Berlin 2024
Sinan KOZAK
 
Computational Engineering IITH Presentation
Computational Engineering IITH PresentationComputational Engineering IITH Presentation
Computational Engineering IITH Presentation
co23btech11018
 
CEC 352 - SATELLITE COMMUNICATION UNIT 1
CEC 352 - SATELLITE COMMUNICATION UNIT 1CEC 352 - SATELLITE COMMUNICATION UNIT 1
CEC 352 - SATELLITE COMMUNICATION UNIT 1
PKavitha10
 

Recently uploaded (20)

Embedded machine learning-based road conditions and driving behavior monitoring
Embedded machine learning-based road conditions and driving behavior monitoringEmbedded machine learning-based road conditions and driving behavior monitoring
Embedded machine learning-based road conditions and driving behavior monitoring
 
BRAIN TUMOR DETECTION for seminar ppt.pdf
BRAIN TUMOR DETECTION for seminar ppt.pdfBRAIN TUMOR DETECTION for seminar ppt.pdf
BRAIN TUMOR DETECTION for seminar ppt.pdf
 
IEEE Aerospace and Electronic Systems Society as a Graduate Student Member
IEEE Aerospace and Electronic Systems Society as a Graduate Student MemberIEEE Aerospace and Electronic Systems Society as a Graduate Student Member
IEEE Aerospace and Electronic Systems Society as a Graduate Student Member
 
哪里办理(csu毕业证书)查尔斯特大学毕业证硕士学历原版一模一样
哪里办理(csu毕业证书)查尔斯特大学毕业证硕士学历原版一模一样哪里办理(csu毕业证书)查尔斯特大学毕业证硕士学历原版一模一样
哪里办理(csu毕业证书)查尔斯特大学毕业证硕士学历原版一模一样
 
Rainfall intensity duration frequency curve statistical analysis and modeling...
Rainfall intensity duration frequency curve statistical analysis and modeling...Rainfall intensity duration frequency curve statistical analysis and modeling...
Rainfall intensity duration frequency curve statistical analysis and modeling...
 
artificial intelligence and data science contents.pptx
artificial intelligence and data science contents.pptxartificial intelligence and data science contents.pptx
artificial intelligence and data science contents.pptx
 
Comparative analysis between traditional aquaponics and reconstructed aquapon...
Comparative analysis between traditional aquaponics and reconstructed aquapon...Comparative analysis between traditional aquaponics and reconstructed aquapon...
Comparative analysis between traditional aquaponics and reconstructed aquapon...
 
Software Quality Assurance-se412-v11.ppt
Software Quality Assurance-se412-v11.pptSoftware Quality Assurance-se412-v11.ppt
Software Quality Assurance-se412-v11.ppt
 
Data Driven Maintenance | UReason Webinar
Data Driven Maintenance | UReason WebinarData Driven Maintenance | UReason Webinar
Data Driven Maintenance | UReason Webinar
 
An improved modulation technique suitable for a three level flying capacitor ...
An improved modulation technique suitable for a three level flying capacitor ...An improved modulation technique suitable for a three level flying capacitor ...
An improved modulation technique suitable for a three level flying capacitor ...
 
Advanced control scheme of doubly fed induction generator for wind turbine us...
Advanced control scheme of doubly fed induction generator for wind turbine us...Advanced control scheme of doubly fed induction generator for wind turbine us...
Advanced control scheme of doubly fed induction generator for wind turbine us...
 
Data Control Language.pptx Data Control Language.pptx
Data Control Language.pptx Data Control Language.pptxData Control Language.pptx Data Control Language.pptx
Data Control Language.pptx Data Control Language.pptx
 
People as resource Grade IX.pdf minimala
People as resource Grade IX.pdf minimalaPeople as resource Grade IX.pdf minimala
People as resource Grade IX.pdf minimala
 
Unit-III-ELECTROCHEMICAL STORAGE DEVICES.ppt
Unit-III-ELECTROCHEMICAL STORAGE DEVICES.pptUnit-III-ELECTROCHEMICAL STORAGE DEVICES.ppt
Unit-III-ELECTROCHEMICAL STORAGE DEVICES.ppt
 
Mechanical Engineering on AAI Summer Training Report-003.pdf
Mechanical Engineering on AAI Summer Training Report-003.pdfMechanical Engineering on AAI Summer Training Report-003.pdf
Mechanical Engineering on AAI Summer Training Report-003.pdf
 
Use PyCharm for remote debugging of WSL on a Windo cf5c162d672e4e58b4dde5d797...
Use PyCharm for remote debugging of WSL on a Windo cf5c162d672e4e58b4dde5d797...Use PyCharm for remote debugging of WSL on a Windo cf5c162d672e4e58b4dde5d797...
Use PyCharm for remote debugging of WSL on a Windo cf5c162d672e4e58b4dde5d797...
 
原版制作(Humboldt毕业证书)柏林大学毕业证学位证一模一样
原版制作(Humboldt毕业证书)柏林大学毕业证学位证一模一样原版制作(Humboldt毕业证书)柏林大学毕业证学位证一模一样
原版制作(Humboldt毕业证书)柏林大学毕业证学位证一模一样
 
Optimizing Gradle Builds - Gradle DPE Tour Berlin 2024
Optimizing Gradle Builds - Gradle DPE Tour Berlin 2024Optimizing Gradle Builds - Gradle DPE Tour Berlin 2024
Optimizing Gradle Builds - Gradle DPE Tour Berlin 2024
 
Computational Engineering IITH Presentation
Computational Engineering IITH PresentationComputational Engineering IITH Presentation
Computational Engineering IITH Presentation
 
CEC 352 - SATELLITE COMMUNICATION UNIT 1
CEC 352 - SATELLITE COMMUNICATION UNIT 1CEC 352 - SATELLITE COMMUNICATION UNIT 1
CEC 352 - SATELLITE COMMUNICATION UNIT 1
 

06-mobile-TCP.ppt

  • 1. Session: 15 Prof. Sridhar Iyer 15.1 IT 601: Mobile Computing TCP over wireless TCP and mobility Slides from Prof. Sridhar Iyer’s lecture IIT Bombay
  • 2. Session: 15 Prof. Sridhar Iyer 15.2 Effect of Mobility on Protocol Stack • Application: new applications and adaptations • Transport: congestion and flow control • Network: addressing and routing • Link: media access and handoff • Physical: transmission errors and interference
  • 3. Session: 15 Prof. Sridhar Iyer 15.3 TCP basics • Reliable, ordered delivery – uses sequence numbers, acknowledgements, timeouts and retransmissions – End-to-end semantics (ACK after data recd) • Provides flow and congestion control – uses sliding window based buffers and feedback from receiver/network to adjust transmission rate
  • 4. Session: 15 Prof. Sridhar Iyer 15.4 Window based flow control • Window size minimum of – receiver’s advertised window - determined by available buffer space at the receiver – congestion window - determined by sender, based on network feedback 2 3 4 5 6 7 8 9 10 11 13 1 12 Sender’s window Acks received Not transmitted
  • 5. Session: 15 Prof. Sridhar Iyer 15.5 Timeouts and retransmission • TCP manages four different timers for each connection – retransmission timer: when awaiting ACK – persist timer: keeps window size information flowing – keepalive timer: when other end crashes or reboots – 2MSL timer: for the TIME_WAIT state
  • 6. Session: 15 Prof. Sridhar Iyer 15.6 TCP: retransmission scenarios Host A loss timeout lost ACK scenario Host B X Host A Seq=92 timeout premature timeout, cumulative ACKs Host B Seq=100 timeout
  • 7. Session: 15 Prof. Sridhar Iyer 15.7 RTT estimation Exponential Averaging Filter: • Measure SampleRTT for segment/ACK pair • Compute weighted average of RTT • EstimatedRTT = α PrevEstimatedRTT + (1 – α) SampleRTT – RTO = β * EstimatedRTT • Typically α = 0.9; β = 2
  • 8. Session: 15 Prof. Sridhar Iyer 15.8 Ideal window size • Ideal size = delay * bandwidth – delay-bandwidth product • If window size < delay*bw – Inefficiency (wasted bandwidth) • If window size > delay*bw – Queuing at intermediate routers (increased RTT) – Potentially, packet loss
  • 9. Session: 15 Prof. Sridhar Iyer 15.9 Congestion control • On detecting a packet loss, TCP sender assumes that network congestion has occurred • On detecting packet loss, TCP sender drastically reduces the congestion window • Reducing congestion window reduces amount of data that can be sent per RTT
  • 10. Session: 15 Prof. Sridhar Iyer 15.10 Typical TCP behaviour 0 5 10 15 20 25 0 3 6 9 1 2 1 5 2 0 2 2 2 5 Time (round trips) Congestion window (segments) ssthresh = 8 ssthresh = 10 cwnd = 20 After timeout
  • 11. Session: 15 Prof. Sridhar Iyer 15.11 0 2 4 6 8 10 0 2 4 6 8 10 12 14 Time (round trips) Window size (segments) advertised window After fast recovery Fast retransmit and Fast recovery
  • 12. Session: 15 Prof. Sridhar Iyer 15.12 Typical mobile wireless scenario • FH: Fixed Host • MH: Mobile Host • BS: Base Station (gateway)
  • 13. Session: 15 Prof. Sridhar Iyer 15.13 Burst errors may cause Timeouts • If wireless link remains unavailable for extended duration, a window worth of data may be lost – driving through a tunnel; passing a truck • Timeout results in slow start – Slow start reduces congestion window to 1 MSS, reducing throughput • Reduction in window in response to errors unnecessary
  • 14. Session: 15 Prof. Sridhar Iyer 15.14 Random errors may cause Fast Retransmit or Timeout • If a packet is lost due to transient link conditions – Channel noise leading to CRC error • Fast retransmit results in fast recovery – Fast recovery reduces congestion window to 1/2 • If multiple packets losses happen in a window, – Results in timeout • Reduction in window in response to errors unnecessary
  • 15. Session: 15 Prof. Sridhar Iyer 15.15 Example: Random errors 40 39 37 38 37 34 42 41 39 40 37 37 41 37 37 42 44 43 37
  • 16. Session: 15 Prof. Sridhar Iyer 15.16 TCP and wireless/mobility TCP assumes congestion if packets dropped • typically wrong in wireless networks – often packet loss due to transmission errors • mobility itself can cause packet loss – nodes roam from one access point or foreign agent to another with packets in transit
  • 17. Session: 15 Prof. Sridhar Iyer 15.17 Motivation for TCP adaptation Performance of an unchanged TCP degrades severely for wireless/mobile environments • TCP cannot be changed fundamentally – Widely deployed in the fixed network – Internet interoperability requirement • TCP for wireless/mobility has to be compatible with “standard” TCP
  • 18. Session: 15 Prof. Sridhar Iyer 15.18 Adaptation for TCP over wireless Several proposals to adapt TCP to wireless environments • Modifications to TCP implementation at – Fixed Host – Base Station – Mobile Host • Approaches – Hide error losses from the sender – Let sender know the cause of packet loss
  • 19. Session: 15 Prof. Sridhar Iyer 15.19 Ideal behavior • Ideal TCP behavior: TCP sender should simply retransmit a packet lost due to transmission errors, without taking any congestion control actions – Ideal TCP typically not realizable • Ideal network behavior: Transmission errors should be hidden from the sender – Errors should be recovered transparently and efficiently • Proposed schemes attempt to approximate one of the above two ideals
  • 20. Session: 15 Prof. Sridhar Iyer 15.20 Link Layer mechanisms • Forward Error Correction (FEC) – Can be use to correct small number of errors – Incurs overhead even when errors do not occur • Link Level Retransmissions – Retransmit a packet at the link layer, if errors are detected – Retransmission overhead incurred only if errors occur
  • 21. Session: 15 Prof. Sridhar Iyer 15.21 Link Level Retransmissions wireless physical link network transport application physical link network transport application physical link network transport application rxmt TCP connection Link layer state
  • 22. Session: 15 Prof. Sridhar Iyer 15.22 Issues • How many times to retransmit at the link level before giving up? • What triggers link level retransmissions? • How much time is required for a link layer retransmission? • Should the link layer deliver packets as they arrive, or deliver them in-order?
  • 23. Session: 15 Prof. Sridhar Iyer 15.23 Split connection approach • End-to-end TCP connection is broken into one connection on the wired part of route and one over wireless part of the route • FH-MH = FH-BS + BS-MH FH MH BS Base Station Mobile Host Fixed Host
  • 24. Session: 15 Prof. Sridhar Iyer 15.24 I-TCP: Split connection wireless physical link network transport application physical link network transport application physical link network transport application rxmt Per-TCP connection state TCP connection TCP connection Source: Vaidya
  • 25. Session: 15 Prof. Sridhar Iyer 15.25 I-TCP advantages • No changes to TCP for FH • BS-MH connection can be optimized independent of FH-BS connection – Different flow / error control on the two connections – Faster recovery due to relatively shorter RTT on wireless link
  • 26. Session: 15 Prof. Sridhar Iyer 15.26 I-TCP disadvantages • End-to-end semantics violated – ack may be delivered to sender, before data delivered to the receiver • BS retains hard state – Buffer space required at BS on a per-TCP- connection basis – BS failure can result in permanent loss of data (unreliability) – Hand-off latency increases
  • 27. Session: 15 Prof. Sridhar Iyer 15.27 Hand-off in I-TCP • Data that has been ack’d to sender, must be moved to new base station FH MH BS 40 39 37 38 37 41 MH New base station Hand-off 40 39
  • 28. Session: 15 Prof. Sridhar Iyer 15.28 Snoop Protocol • Retains local recovery of Split Connection approach and uses link level retransmission • Improves on split connection – end-to-end semantics retained – soft state at base station, instead of hard state
  • 29. Session: 15 Prof. Sridhar Iyer 15.29 Snoop Protocol • Buffers data packets at the base station BS – to allow link layer retransmission • When duplicate ACK received by BS from MH – retransmit on wireless link, if packet present in buffer – drop duplicate ACK • Prevents fast retransmit at TCP sender FH FH MH BS
  • 30. Session: 15 Prof. Sridhar Iyer 15.30 Snoop Protocol FH MH BS wireless physical link network transport application physical link network transport application physical link network transport application rxmt Per TCP-connection state TCP connection Source: Vaidya
  • 31. Session: 15 Prof. Sridhar Iyer 15.31 Snoop : Example FH MH BS 40 39 37 38 37 35 36 37 38 35 TCP state maintained at link layer
  • 32. Session: 15 Prof. Sridhar Iyer 15.32 Snoop : Example FH MH BS 41 37 37 37 44 43 37 37 38 39 40 41 42 Discard dupack
  • 33. Session: 15 Prof. Sridhar Iyer 15.33 Snoop advantages • Local recovery from wireless losses • Fast retransmit not triggered at sender despite out-of- order link layer delivery • High throughput can be achieved • End-to-end semantics retained • Soft state at base station – loss of the soft state affects performance, but not correctness
  • 34. Session: 15 Prof. Sridhar Iyer 15.34 Snoop disadvantages • Link layer at base station needs to be TCP-aware • Not useful if TCP headers are encrypted (IPsec)
  • 35. Session: 15 Prof. Sridhar Iyer 15.35 Delayed Dupacks • Attempts to imitate Snoop, without making the base station TCP-aware • Delayed Dupacks implements the same two features – at BS : link layer retransmission – at MH : reducing interference between TCP and link layer retransmissions (by delaying dupacks)
  • 36. Session: 15 Prof. Sridhar Iyer 15.36 Delayed Dupacks • TCP receiver delays dupacks for interval D, when out-of-order packets received – Dupack delay intended to give link level retransmit time to succeed • Benefit: can result in recovery from a transmission loss without triggering a response from the TCP sender
  • 37. Session: 15 Prof. Sridhar Iyer 15.37 Delayed dupacks advantages • Link layer need not be TCP-aware • Can be used even if TCP headers are encrypted • Works well for relatively small wireless RTT (compared to end-to-end RTT) – relatively small delay D sufficient in such cases
  • 38. Session: 15 Prof. Sridhar Iyer 15.38 Delayed dupacks disadvantages • Right value of dupack delay D dependent on the wireless link properties • Mechanisms to automatically choose D needed • Delays dupacks for congestion losses too, delaying congestion loss recovery
  • 39. Session: 15 Prof. Sridhar Iyer 15.39 Mobility and handoff • Hand-offs may result in temporary loss of route to MH – with non-overlapping cells, it may be a while before the mobile host receives a beacon from the new BS • While routes are being reestablished during handoff, MH and old BS may attempt to send packets to each other, resulting in loss of packets
  • 40. Session: 15 Prof. Sridhar Iyer 15.40 Impact of handoff • Split connection approach – hard state at base station must be moved to new base station • Snoop protocol – soft state need not be moved – while the new base station builds new state, packet losses may not be recovered locally
  • 41. Session: 15 Prof. Sridhar Iyer 15.41 Handoff issues • During the long delay for a handoff to complete – a whole window worth of data may be lost • After handoff is complete – acks are not received by the TCP sender • Sender eventually times out, and retransmits – If handoff still not complete, another timeout will occur • Performance penalty – Time wasted until timeout occurs – Window shrunk after timeout
  • 42. Session: 15 Prof. Sridhar Iyer 15.42 Using Fast Retransmit • When MH is the TCP receiver: – after handoff is complete, it sends 3 dupacks to the sender – this triggers fast retransmit at the sender • When MH is the TCP sender: – invoke fast retransmit after completion of handoff
  • 43. Session: 15 Prof. Sridhar Iyer 15.43 Mobile TCP (M-TCP) • Handling of lengthy or frequent disconnections • M-TCP splits as I-TCP does – unmodified TCP for FH to BS – optimized TCP for BS to MH • BS (Foreign Agent) – monitors all packets, if disconnection detected • set advertised window size to 0 • sender automatically goes into persistent mode – no caching, no retransmission at the BS • If a packet is lost on the wireless link, it has to be retransmitted by the original sender
  • 44. Session: 15 Prof. Sridhar Iyer 15.44 M-TCP • BS does not send an ack to FH, unless BS has received an ack from MH – maintains end-to-end semantics • BS withholds ack for the last byte ack’d by MH • When BS does not receive ACK for sometime, it chokes sender by setting advertise window to 0 FH MH BS Ack 1000 Ack 999
  • 45. Session: 15 Prof. Sridhar Iyer 15.45 M-TCP • When a new ack is received with receiver’s advertised window = 0, the sender enters persist mode • Sender does not send any data in persist mode – except when persist timer goes off • When a positive window advertisement is received, sender exits persist mode • On exiting persist mode, RTO and cwnd are same as before the persist mode
  • 46. Session: 15 Prof. Sridhar Iyer 15.46 M-TCP • Avoids reduction of congestion window due to handoff, unlike the fast retransmit scheme • Is not reducing the window a good idea? – When host moves, route changes, and new route may be more congested – It is not obvious that starting full window after handoff is right
  • 47. Session: 15 Prof. Sridhar Iyer 15.47 FreezeTCP • M-TCP needs help from base station (BS) – BS withholds ack for one byte – BS uses this ack to send a zero window advertisement when MH moves to another cell • FreezeTCP – Receiver sends zero window advertisement (ZWA), upon impending disconnection – Receiver sends full window advertisement (FWA), upon reconnection
  • 48. Session: 15 Prof. Sridhar Iyer 15.48 FreezeTCP • TCP receiver determines if a handoff is about to happen – determination may be based on signal strength • Receiver should attempt to send ZWA 1 RTT before handoff • Receiver sends 3 dupacks when route is reestablished • No help needed from the base station
  • 49. Session: 15 Prof. Sridhar Iyer 15.49 Multi-hop Wireless (MANET) • Mobility causes route changes
  • 50. Session: 15 Prof. Sridhar Iyer 15.50 TCP Issues • Route changes due to mobility • Wireless transmission errors – problem compounded with multiple hops • Out-of-order packet delivery – frequent route changes may cause out-of-order delivery • Multiple access protocol – choice of MAC protocol can impact TCP performance significantly
  • 51. Session: 15 Prof. Sridhar Iyer 15.51 TCP over multi hop wireless • When contention-based MAC protocol is used, connections over multiple hops are at a disadvantage compared to shorter connections – because they have to contend for wireless access at each hop – extent of packet delay or drop increases with number of hops
  • 52. Session: 15 Prof. Sridhar Iyer 15.52 Impact of Multi-Hop Wireless Paths 0 200 400 600 800 1000 1200 1400 1600 1 2 3 4 5 6 7 8 9 10 Number of hops TCP Throughtput (Kbps) TCP Throughput using 2 Mbps 802.11 MAC
  • 53. Session: 15 Prof. Sridhar Iyer 15.53 mobility causes link breakage, resulting in route failure TCP data and acks en route discarded Impact of mobility TCP sender times out. Starts sending packets again Route is repaired No throughput No throughput despite route repair
  • 54. Session: 15 Prof. Sridhar Iyer 15.54 Positive impact of mobility C B D A C B D A C B D A 1.5 second route failure Route from A to D is broken for ~1.5 second. When TCP sender times out after 1 second, route still broken. TCP times out after another 2 seconds, and only then resumes. Throughput improves because number of hops reduced.
  • 55. Session: 15 Prof. Sridhar Iyer 15.55 Improving throughput • Network feedback • Inform TCP of route failure by explicit message • Let TCP know when route is repaired – Probing – Explicit notification • Reduces repeated TCP timeouts and backoff
  • 56. Session: 15 Prof. Sridhar Iyer 15.56 Network Feedback • Network feedback beneficial • Need to modify transport & network layer to receive/send feedback • Need mechanisms for information exchange between layers
  • 57. Session: 15 Prof. Sridhar Iyer 15.57 References • Bakre, A., Badrinath, B., “I-TCP: Indirect TCP for mobile hosts”- IEEE ICDCS 1995. • Balakrishnan, H., Srinivasan, S., Amir, E., and Katz, R., “Improving TCP/IP Performance over Wireless Networks” – ACM Mobicom 1995. • Brown, K., Singh, S., “M-TCP: TCP for mobile cellular networks” – ACM Computer Communication Review, 27 (5), 1997. • Goff, T. Moronski, J. Phatak, D.S. Gupta, V. “Freeze-TCP: a true end-to-end TCP enhancement mechanism for mobile environments” – IEEE Infocom 2000.