SlideShare a Scribd company logo
1 of 52
Mobile Transport Layer
Prepared By :
Maulik Patel
Outline
 TCP and its Usability : Congestion Avoidance, Flow control
 Slow Start and Retransmission
 TCP Variants : Tahoe, Reno and Vegas
 Indirect TCP
 Snoop TCP and Mobile TCP
 Transaction Oriented TCP and TCP over 2.5G/3G
TCP and Its Usability
 Reliable ordered delivery
 TCP has built-in mechanisms to behave in a ‗network friendly‘
manner.
 Guarantees that packet will be delivered in same order in
which they were sent
 Implements congestion avoidance and control
 Reliability achieved by means of retransmissions if necessary
Cont…
 End-to-end semantics
Acknowledgements sent to TCP sender confirm delivery
of data received by TCP receiver
Ack for data sent only after data has reached receiver
Congestion
 Congestion in a network may occur if the load on the
network—the number of packets sent to the network—is
greater than the capacity of the network—the number of
packets a network can handle.
 Congestion occurs when bandwidth is insufficient and
network data traffic exceeds capacity.
Effect of Congestion
 Congestion causes packet loss
 Results in retransmission
 Reduces data throughput
Congestion Avoidance
 In the congestion avoidance algorithm, the size of congestion
window increases additively until congestion is detected.
 It maintains a network congestion state after reducing the
initial data load.
Flow Control
 Flow control refers to a set of procedures used to restrict the
amount of data that the sender can send before waiting for
acknowledgment.
 limits the rate a sender transfers data to guarantee reliable
delivery.
 The receiver continually hints the sender on how much data can be
received.
 When the receiving host's buffer fills, the next acknowledgment
contains a 0 in the window size, to stop transfer.
 TCP uses an end-to-end flow control protocol to avoid having the
sender send data too fast for the TCP receiver to receive and
process it reliably
Slow Start
 Linear additive increase takes too long to ramp up a new TCP
connection from cold start
 Beginning with TCP Tahoe, the slow start mechanism was
added to provide an initial exponential increase in the size of
Congestion Window(cwnd).
 Moreover, slow start is slower than sending a full advertised
window‘s worth of packets all at once.
Cont…
 The source starts with cwnd = 1.
 Every time an ACK arrives, cwnd is incremented.
 cwnd is effectively doubled per RTT.
 Two slow start situations:
 At the very beginning of a connection.
 When the connection goes dead waiting for a timeout to
occur (i.e, the advertized window goes to zero!)
Slow Start
Add one packet
per ACK
Slow Start
Source Destination
Cont…
 However, in the second case the source has more
information. The current value of cwnd can be saved as a
congestion threshold.
 This is also known as the ―slow start threshold‖ ssthresh.
Retransmission
 Coarse timeouts remained a problem, and Fast retransmit
was added with TCP Tahoe.
 Since the receiver responds every time a packet arrives, this
implies the sender will see duplicate ACKs.
 Generally, fast retransmit eliminates about half the coarse-
grain timeouts.
 Fast retransmit does not eliminate all the timeouts due to
small window sizes at the source.
Fast Retransmission
Based on three
duplicate ACKs
 Receipt of three duplicate ACKs, the TCP Sender
retransmits the lost packet.
Packet 1
Packet 2
Packet 3
Packet 4
Packet 5
Packet 6
Retransmit
packet 3
ACK 1
ACK 2
ACK 2
ACK 2
ACK 6
ACK 2
Sender Receiv er
TCP Recap...
 TCP is a reliable protocol
 Ensuring reliability by requiring receiver‘s acknowledgement
 TCP uses cumulative ack. schema
 TCP start timer, maintains for retransmission
 TCP is end-to-end delivery oriented mechanism
 TCP can work directly on wireless but it require some
modification in TCP as it have mobility so high bit error rate
occurs
TCP Algorithms:
Four algorithms used commonly in TCP implementations
 Slow Start - Every ack increases the sender‘s window (cwnd)
size by 1
 Congestion Avoidance - Reducing sender‘s window size by
half at experience of loss, and increase the sender‘s window at
the rate of about one packet per RTT
 Fast Retransmit - Don‘t wait for retransmit timer to go off,
retransmit packet if 3 duplicate acks received
 Fast Recovery - Since duplicate ack came through, one packet
has left the wire. Perform congestion avoidance, don‘t jump
down to slow start
TCP Variants :
 TCP-Tahoe:
implements the slow start, congestion avoidance,
and fast retransmit algorithms
 TCP-Reno:
implements the slow start, congestion avoidance,
fast retransmit, and fast recovery algorithms
 TCP-Vegas:
Improvement of TCP Reno
New Retransmission mechanism.
TCP Tahoe
 Two major congestion control schema use
Slow start and congestion avoidance
Increase cwnd size
Fast Retransmission
Detect congestion
 Problem
Take a complete timeout interval to detect a packet loss
TCP Tahoe‘s Fast Retransmit
1. Sender
receives 3
dupACKS.
2. Sender infers
that the
segment is
lost.
3. Sender re-
sends the
segment
immediately!
4. Sender
returns to
slow-start.
cwnd = 1
cwnd = 2
cwnd = 4
3 duplicate
ACKs
fast-retransmit
of segment 4
S R
TCP Tahoe’s Graph
(TCP Reno)
Fast Retransmit & Fast Recovery
 After receiving 3 dupACKS:
1. Retransmit the lost segment.
2. Set ssthresh = flight size/2.
3. Set cwnd = ssthresh, and ndupacks = 3.
 If dupACK arrives:
 ++ ndupacks
 Transmit new segment, if allowed.
 If new ACK arrives:
 ndupacks = 0
 Exit fast recovery.
 If RTO expires:
 ndupacks = 0
 Perform slow-start - ( ssthresh = flight size/2, cwnd = 1 )
TCP Reno vs TCP Tahoe
TCP Vegas
 Developed by Brakmo, O'Malley & Peterson
[SIGCOMM,1994]
 TCP Vegas emphasis on packet delay, not packet loss.
 Sender-side protocol
Inter-operates with other TCP variants
 Depends heavily on accurate calculation of the Base RTT
value.
If it is too small then throughput of the connection will be
less than the bandwidth available while if the value is too
large then it will overrun the connection.
TCP Vegas
 Adjust window size even before packet loss
 Adjust window based on difference between actual
and expected throughput
 Advantage
Detects losses faster than TCP Reno and also
recover from multiple drops more efficiently.
 Disadvantage
On heavily traffic it react same as TCP Reno.
Vegas are not stabilize if buffer are too small.
Fairness issues of Vegas still unresolved
TCP Vegas new
retransmission mechanism
 Keeps track of when each segment was sent and it also
calculates an estimate of the RTT.
 Whenever a duplicate acknowledgement is received it checks
to see if the (current time-segment transmission time)> RTT
estimate
 So no need to wait for 3 dupack, send retransmite packet
Indirect TCP
 Split a TCP connection at the foreign agent into 2 TCP
connections
 hosts in the fixed part of the network do not notice the
characteristics of the wireless part
 no changes to the TCP protocol for hosts connected to
the wired Internet, millions of computers use (variants
of) this protocol
 optimized TCP protocol for mobile hosts
Cont…
Cont…
 The access point acts as proxy in both directions.
 AP acknowledges to both the sender and receiver.
 Re-transmission on wireless links is handled locally.
 During handover, the buffered packets, as well as the system
state (packet sequence number, acknowledgements, ports,
etc), must migrate the new agent.
I-TCP Socket and State
Migration
Advantages of I-TCP
 No changes in the fixed network necessary, no changes for
the hosts (TCP protocol) necessary, all current optimizations
to TCP still work
 Simple to control, mobile TCP is used only for one hop
between, e.g., a foreign agent and mobile host
 transmission errors on the wireless link do not propagate
into the fixed network
 therefore, a very fast retransmission of packets is possible,
the short delay on the mobile hop is known
Cont…
 It is always dangerous to introduce new mechanisms in a
huge network without knowing exactly how they behave.
 New optimizations can be tested at the last hop, without
jeopardizing the stability of the Internet.
 It is easy to use different protocols for wired and wireless
networks.
Disadvantages of I-TCP
 Loss of end-to-end semantics
 an acknowledgement to a sender no longer means that a
receiver really has received a packet ---foreign agents
might crash.
 Higher latency possible
 due to buffering of data within the foreign agent and
forwarding to a new foreign agent
 Security issue
 The foreign agent must be a trusted entity.
Snoop TCP
 Indirect TCP
 2 TCP sessions.
 Snoop TCP
 One TCP session.
 The access point snoops into the traffic and buffers
packets for fast re-transmission.
Cont…
Cont…
 Transparent extension of TCP within the foreign agent
 changes of TCP only within the foreign agent
 buffering of packets sent to the mobile host
 lost packets on the wireless link (both directions!) will be
retransmitted immediately by the mobile host or foreign
agent, respectively (so called ―local‖ retransmission)
 the foreign agent therefore ―snoops‖ the packet flow and
recognizes acknowledgements in both directions, it also
filters ACKs
Cont…
 Data transfer to the mobile host
 FA buffers data until it receives ACK of the MH, FA detects
packet loss via duplicated ACKs or time-out
 Fast retransmission possible, transparent for the fixed
network
 FA detects packet loss on the wireless link via sequence
numbers, FA answers directly with a NACK to the MH
 MH can now retransmit data with only a very short delay
Snoop TCP: Packet Delivery
Cont…
 Advantages
 End-to-end semantics is preserved.
 Handover is easy. I-TCP requires a careful handover of the
system state. Here it falls back to the standard solution if
no enhancements.
 Problems
 snooping TCP does not isolate the wireless link as good as
I-TCP
 snooping might be useless depending on encryption
schemes
Mobile TCP
 What if the mobile node is disconnected?
 I-TCP
 more packets are buffered at AP.
 Snooping TCP
 no more snooping
 Missing acknowledgement, TCP goes to slow-start.
 Mobile TCP
 Improve efficiency.
 Special handling of lengthy and/or frequent
disconnections.
Cont…
Cont…
 M-TCP splits as I-TCP does
 unmodified TCP fixed network to supervisory host (SH)
 optimized TCP SH to MH
 Supervisory host
 no caching, no local retransmission
 monitors all packets, if disconnection detected
 set sender window size to 0
 sender automatically goes into persistent mode
old or new SH reopen the window
Cont…
 Advantages:
 End-to-end semantics.
 When mobile host is disconnected, it avoids useless
retransmissions and slow-start.
 No buffering, handover is easy.
 Disadvantages:
 Packet loss at the wireless link propagates back to
sender.
 Not a good idea for heavy traffic.
Transaction Oriented TCP
 TCP phases
connection setup, data transmission, connection release
using 3-way-handshake needs 3 packets for setup and
release, respectively
thus, even short messages need a minimum of 7 packets!
 Transaction oriented TCP
RFC1644, T-TCP, describes a TCP version to avoid this
overhead
connection setup, data transfer and connection release
can be combined
thus, only 2 or 3 packets are needed
Cont…
 Advantage
efficiency
 Disadvantage
requires changed TCP
mobility not longer transparent
TCP over 2.5/3G
Wireless Networks
 Fine tuning today‘s TCP
 Learn to live with
 Data rates: 64 kbit/s up, 115-384 kbit/s down; asymmetry: 3-6, but also up
to 1000 (broadcast systems), periodic allocation/release of channels
 High latency, high jitter, packet loss
 Suggestions
 Large (initial) sending windows, large maximum transfer unit, selective
acknowledgement, explicit congestion notification, time stamp, no header
compression
 Widespread use
 i-mode running over FOMA
Performance
Enhancing Proxies
 RFC 3135
Transport layer
Local retransmissions and acknowledgements
Additionally on the application layer
Content filtering, compression, picture downscaling
E.g., Internet/WAP gateways
Web service gateways?
Mobile system
PEP
Comm. partner
wireless
Internet
Cont…
Big problem: breaks end-to-end semantics
Disables use of IP security
Choose between PEP and security!
 RFC 3150 (slow links)
Recommends header compression, no timestamp
 RFC 3155 (links with errors)
States that explicit congestion notification cannot be used
Summary
 TCP is a complex protocol
Minimal support from underlying protocols
Indirect observation of network environment
Large number of competing flows from different hosts
Congestion avoidance is still a research issue
Cont…
 TCP does not perform well in a wireless environment where
packets are usually lost due to bit errors, not congestion
 Schemes have been proposed to address TCP performance
problems
Link-level recovery
Split protocols
End-to-end protocols
References
 [1]IEEE:TCP-FIT: An improved TCP congestion control algorithm and its
performance
 [2]IEEE: Fast TCP flow control with differentiated services
 [3]Afanasyev, A.; N. Tilley, P. Reiher, and L. Kleinrock (2010). "Host-to-host
congestion control for TCP―
 [4] Jacobson, Van; Karels, MJ (1988). ―Congestion avoidance and control‖
 [5]http://www.scribd.com/doc/63483753/Indirect-TCP-Snooping-TCP-Mobile-
TCP-Mobile-Transport-Layer#download
 [6]Jian Ma, "A simple Fast TCP flow control in IP network or IP/ATM subnet – a
significant improvement over IP", November, 1997
 [7]A Comparative Analysis of TCP Tahoe, Reno, New-Reno, SACK and Vegas
http://inst.eecs.berkeley.edu/~ee122/fa05/projects/Project2/SACKRENEVEGAS.p
df
Thank You

More Related Content

What's hot

IT6601 Mobile Computing Unit III
IT6601 Mobile Computing Unit IIIIT6601 Mobile Computing Unit III
IT6601 Mobile Computing Unit IIIpkaviya
 
How PSTN phone works?
How PSTN phone works?How PSTN phone works?
How PSTN phone works?mahipal9
 
Mobile Computing UNIT-7
Mobile Computing UNIT-7Mobile Computing UNIT-7
Mobile Computing UNIT-7Ramesh Babu
 
Presentation Rf Optimization And Planning
Presentation  Rf Optimization And PlanningPresentation  Rf Optimization And Planning
Presentation Rf Optimization And PlanningUmmaarraa Raa
 
Interference and system capacity
Interference and system capacityInterference and system capacity
Interference and system capacityAJAL A J
 
Differentiate between 2G, 3G, 4G,5G with Pros and Cons
Differentiate between 2G, 3G, 4G,5G with Pros and ConsDifferentiate between 2G, 3G, 4G,5G with Pros and Cons
Differentiate between 2G, 3G, 4G,5G with Pros and Consshahzaibahsan3
 
146661638 configuring-rbs-6201-gsm-with-rus
146661638 configuring-rbs-6201-gsm-with-rus146661638 configuring-rbs-6201-gsm-with-rus
146661638 configuring-rbs-6201-gsm-with-rusSyed Ahmad
 
Transmission media
Transmission mediaTransmission media
Transmission mediakinish kumar
 
Introduction To Cellular Networks
Introduction To Cellular NetworksIntroduction To Cellular Networks
Introduction To Cellular NetworksYoram Orzach
 
Prof. Andy Sutton: 5G RAN Architecture Evolution - Jan 2019
Prof. Andy Sutton: 5G RAN Architecture Evolution - Jan 2019Prof. Andy Sutton: 5G RAN Architecture Evolution - Jan 2019
Prof. Andy Sutton: 5G RAN Architecture Evolution - Jan 20193G4G
 
IS95 CDMA Technology
IS95 CDMA TechnologyIS95 CDMA Technology
IS95 CDMA TechnologyAditya Sharat
 
IT8602 Mobile Communication Unit II
IT8602 Mobile Communication   Unit II IT8602 Mobile Communication   Unit II
IT8602 Mobile Communication Unit II pkaviya
 

What's hot (20)

IT6601 Mobile Computing Unit III
IT6601 Mobile Computing Unit IIIIT6601 Mobile Computing Unit III
IT6601 Mobile Computing Unit III
 
Wtls
WtlsWtls
Wtls
 
How PSTN phone works?
How PSTN phone works?How PSTN phone works?
How PSTN phone works?
 
Igrp
IgrpIgrp
Igrp
 
Mobile Computing UNIT-7
Mobile Computing UNIT-7Mobile Computing UNIT-7
Mobile Computing UNIT-7
 
1G,2G,3G,4G technologies
1G,2G,3G,4G technologies1G,2G,3G,4G technologies
1G,2G,3G,4G technologies
 
Presentation Rf Optimization And Planning
Presentation  Rf Optimization And PlanningPresentation  Rf Optimization And Planning
Presentation Rf Optimization And Planning
 
Cooperative communication
Cooperative communicationCooperative communication
Cooperative communication
 
Interference and system capacity
Interference and system capacityInterference and system capacity
Interference and system capacity
 
UMTS, Introduction.
UMTS, Introduction.UMTS, Introduction.
UMTS, Introduction.
 
Differentiate between 2G, 3G, 4G,5G with Pros and Cons
Differentiate between 2G, 3G, 4G,5G with Pros and ConsDifferentiate between 2G, 3G, 4G,5G with Pros and Cons
Differentiate between 2G, 3G, 4G,5G with Pros and Cons
 
146661638 configuring-rbs-6201-gsm-with-rus
146661638 configuring-rbs-6201-gsm-with-rus146661638 configuring-rbs-6201-gsm-with-rus
146661638 configuring-rbs-6201-gsm-with-rus
 
ADVANCED TELECOM BSNL
ADVANCED TELECOM BSNLADVANCED TELECOM BSNL
ADVANCED TELECOM BSNL
 
Transmission media
Transmission mediaTransmission media
Transmission media
 
Introduction To Cellular Networks
Introduction To Cellular NetworksIntroduction To Cellular Networks
Introduction To Cellular Networks
 
Gprs
GprsGprs
Gprs
 
Prof. Andy Sutton: 5G RAN Architecture Evolution - Jan 2019
Prof. Andy Sutton: 5G RAN Architecture Evolution - Jan 2019Prof. Andy Sutton: 5G RAN Architecture Evolution - Jan 2019
Prof. Andy Sutton: 5G RAN Architecture Evolution - Jan 2019
 
IS95 CDMA Technology
IS95 CDMA TechnologyIS95 CDMA Technology
IS95 CDMA Technology
 
IT8602 Mobile Communication Unit II
IT8602 Mobile Communication   Unit II IT8602 Mobile Communication   Unit II
IT8602 Mobile Communication Unit II
 
Wimax
WimaxWimax
Wimax
 

Viewers also liked (20)

Mobile transport layer - traditional TCP
Mobile transport layer - traditional TCPMobile transport layer - traditional TCP
Mobile transport layer - traditional TCP
 
Mobile transportlayer
Mobile transportlayerMobile transportlayer
Mobile transportlayer
 
Mobile network layer (mobile comm.)
Mobile network layer (mobile comm.)Mobile network layer (mobile comm.)
Mobile network layer (mobile comm.)
 
Mobile IP
Mobile IPMobile IP
Mobile IP
 
Snooping TCP
Snooping TCPSnooping TCP
Snooping TCP
 
It6601 mobile computing unit2
It6601 mobile computing unit2It6601 mobile computing unit2
It6601 mobile computing unit2
 
Mobile ip
Mobile ipMobile ip
Mobile ip
 
Tcp snoop protocols
Tcp snoop protocols  Tcp snoop protocols
Tcp snoop protocols
 
IT6601 MOBILE COMPUTING
IT6601 MOBILE COMPUTINGIT6601 MOBILE COMPUTING
IT6601 MOBILE COMPUTING
 
Mobile IP Presentation
Mobile IP Presentation Mobile IP Presentation
Mobile IP Presentation
 
Analysis of 1G, 2G, 3G & 4G
Analysis of 1G, 2G, 3G & 4GAnalysis of 1G, 2G, 3G & 4G
Analysis of 1G, 2G, 3G & 4G
 
Ad-Hoc Networks
Ad-Hoc NetworksAd-Hoc Networks
Ad-Hoc Networks
 
Unit 4
Unit 4Unit 4
Unit 4
 
SIP (Session Initiation Protocol) - Study Notes
SIP (Session Initiation Protocol) - Study NotesSIP (Session Initiation Protocol) - Study Notes
SIP (Session Initiation Protocol) - Study Notes
 
Course on TCP Dynamic Performance
Course on TCP Dynamic PerformanceCourse on TCP Dynamic Performance
Course on TCP Dynamic Performance
 
TCP Over Wireless
TCP Over WirelessTCP Over Wireless
TCP Over Wireless
 
Mobile transport layer
 Mobile transport layer Mobile transport layer
Mobile transport layer
 
It2402 mobile communication unit 4
It2402 mobile communication unit 4It2402 mobile communication unit 4
It2402 mobile communication unit 4
 
Wap 1
Wap 1Wap 1
Wap 1
 
C10 transport protocols
C10 transport protocolsC10 transport protocols
C10 transport protocols
 

Similar to Mobile Transpot Layer

Lecture 19 22. transport protocol for ad-hoc
Lecture 19 22. transport protocol for ad-hoc Lecture 19 22. transport protocol for ad-hoc
Lecture 19 22. transport protocol for ad-hoc Chandra Meena
 
High Performance Networking with Advanced TCP
High Performance Networking with Advanced TCPHigh Performance Networking with Advanced TCP
High Performance Networking with Advanced TCPDilum Bandara
 
Analytical Research of TCP Variants in Terms of Maximum Throughput
Analytical Research of TCP Variants in Terms of Maximum ThroughputAnalytical Research of TCP Variants in Terms of Maximum Throughput
Analytical Research of TCP Variants in Terms of Maximum ThroughputIJLT EMAS
 
Tcp Congestion Avoidance
Tcp Congestion AvoidanceTcp Congestion Avoidance
Tcp Congestion AvoidanceRam Dutt Shukla
 
Computer network (13)
Computer network (13)Computer network (13)
Computer network (13)NYversity
 
mobile_transport_layer (1).pptx
mobile_transport_layer (1).pptxmobile_transport_layer (1).pptx
mobile_transport_layer (1).pptxsinghram281982
 
Mobile transport layer .
Mobile transport layer .Mobile transport layer .
Mobile transport layer .junnubabu
 
EC 6802 WIRELESS NETWORK_ BABU M_ unit 3 ,4 & 5 PPT
EC 6802 WIRELESS NETWORK_ BABU M_ unit 3 ,4 & 5 PPTEC 6802 WIRELESS NETWORK_ BABU M_ unit 3 ,4 & 5 PPT
EC 6802 WIRELESS NETWORK_ BABU M_ unit 3 ,4 & 5 PPTbabuece
 
Chapter03 sg
Chapter03 sgChapter03 sg
Chapter03 sgDang Hop
 
chapter 3.2 TCP.pptx
chapter 3.2 TCP.pptxchapter 3.2 TCP.pptx
chapter 3.2 TCP.pptxTekle12
 
Comparison of TCP congestion control mechanisms Tahoe, Newreno and Vegas
Comparison of TCP congestion control mechanisms Tahoe, Newreno and VegasComparison of TCP congestion control mechanisms Tahoe, Newreno and Vegas
Comparison of TCP congestion control mechanisms Tahoe, Newreno and VegasIOSR Journals
 

Similar to Mobile Transpot Layer (20)

Mcseminar
McseminarMcseminar
Mcseminar
 
Lecture 19 22. transport protocol for ad-hoc
Lecture 19 22. transport protocol for ad-hoc Lecture 19 22. transport protocol for ad-hoc
Lecture 19 22. transport protocol for ad-hoc
 
Mobile Transport layer
Mobile Transport layerMobile Transport layer
Mobile Transport layer
 
High Performance Networking with Advanced TCP
High Performance Networking with Advanced TCPHigh Performance Networking with Advanced TCP
High Performance Networking with Advanced TCP
 
Analytical Research of TCP Variants in Terms of Maximum Throughput
Analytical Research of TCP Variants in Terms of Maximum ThroughputAnalytical Research of TCP Variants in Terms of Maximum Throughput
Analytical Research of TCP Variants in Terms of Maximum Throughput
 
Tcp Congestion Avoidance
Tcp Congestion AvoidanceTcp Congestion Avoidance
Tcp Congestion Avoidance
 
Congestion Control
Congestion ControlCongestion Control
Congestion Control
 
Tcp congestion avoidance
Tcp congestion avoidanceTcp congestion avoidance
Tcp congestion avoidance
 
Computer network (13)
Computer network (13)Computer network (13)
Computer network (13)
 
mobile_transport_layer (1).pptx
mobile_transport_layer (1).pptxmobile_transport_layer (1).pptx
mobile_transport_layer (1).pptx
 
Mobile transport layer .
Mobile transport layer .Mobile transport layer .
Mobile transport layer .
 
EC 6802 WIRELESS NETWORK_ BABU M_ unit 3 ,4 & 5 PPT
EC 6802 WIRELESS NETWORK_ BABU M_ unit 3 ,4 & 5 PPTEC 6802 WIRELESS NETWORK_ BABU M_ unit 3 ,4 & 5 PPT
EC 6802 WIRELESS NETWORK_ BABU M_ unit 3 ,4 & 5 PPT
 
Congestion control avoidance
Congestion control avoidanceCongestion control avoidance
Congestion control avoidance
 
Tcp
TcpTcp
Tcp
 
Chapter03 sg
Chapter03 sgChapter03 sg
Chapter03 sg
 
Unit 4
Unit 4Unit 4
Unit 4
 
chapter 3.2 TCP.pptx
chapter 3.2 TCP.pptxchapter 3.2 TCP.pptx
chapter 3.2 TCP.pptx
 
NE #1.pptx
NE #1.pptxNE #1.pptx
NE #1.pptx
 
A Performance Comparison of TCP Protocols
A Performance Comparison of TCP Protocols A Performance Comparison of TCP Protocols
A Performance Comparison of TCP Protocols
 
Comparison of TCP congestion control mechanisms Tahoe, Newreno and Vegas
Comparison of TCP congestion control mechanisms Tahoe, Newreno and VegasComparison of TCP congestion control mechanisms Tahoe, Newreno and Vegas
Comparison of TCP congestion control mechanisms Tahoe, Newreno and Vegas
 

More from Maulik Patel

Designing Application over mobile environment
Designing Application over mobile environmentDesigning Application over mobile environment
Designing Application over mobile environmentMaulik Patel
 
fundamenatals of cellular enginering
fundamenatals of cellular engineringfundamenatals of cellular enginering
fundamenatals of cellular engineringMaulik Patel
 
Gsm system and radio frequency
Gsm system and radio frequency Gsm system and radio frequency
Gsm system and radio frequency Maulik Patel
 
wireless cellular network
wireless cellular networkwireless cellular network
wireless cellular networkMaulik Patel
 
blutooth based sensor network
blutooth based sensor networkblutooth based sensor network
blutooth based sensor networkMaulik Patel
 
blutooth based smart sensor network
blutooth based smart sensor networkblutooth based smart sensor network
blutooth based smart sensor networkMaulik Patel
 

More from Maulik Patel (9)

Mobile ip group_3
Mobile ip group_3Mobile ip group_3
Mobile ip group_3
 
Designing Application over mobile environment
Designing Application over mobile environmentDesigning Application over mobile environment
Designing Application over mobile environment
 
fundamenatals of cellular enginering
fundamenatals of cellular engineringfundamenatals of cellular enginering
fundamenatals of cellular enginering
 
Gsm system and radio frequency
Gsm system and radio frequency Gsm system and radio frequency
Gsm system and radio frequency
 
wireless cellular network
wireless cellular networkwireless cellular network
wireless cellular network
 
V Model
V Model V Model
V Model
 
i Image
i Imagei Image
i Image
 
blutooth based sensor network
blutooth based sensor networkblutooth based sensor network
blutooth based sensor network
 
blutooth based smart sensor network
blutooth based smart sensor networkblutooth based smart sensor network
blutooth based smart sensor network
 

Recently uploaded

An experimental study in using natural admixture as an alternative for chemic...
An experimental study in using natural admixture as an alternative for chemic...An experimental study in using natural admixture as an alternative for chemic...
An experimental study in using natural admixture as an alternative for chemic...Chandu841456
 
Biology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptxBiology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptxDeepakSakkari2
 
Oxy acetylene welding presentation note.
Oxy acetylene welding presentation note.Oxy acetylene welding presentation note.
Oxy acetylene welding presentation note.eptoze12
 
Call Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile serviceCall Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile servicerehmti665
 
pipeline in computer architecture design
pipeline in computer architecture  designpipeline in computer architecture  design
pipeline in computer architecture designssuser87fa0c1
 
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort serviceGurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort servicejennyeacort
 
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdfCCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdfAsst.prof M.Gokilavani
 
Call Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call GirlsCall Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call Girlsssuser7cb4ff
 
Churning of Butter, Factors affecting .
Churning of Butter, Factors affecting  .Churning of Butter, Factors affecting  .
Churning of Butter, Factors affecting .Satyam Kumar
 
Artificial-Intelligence-in-Electronics (K).pptx
Artificial-Intelligence-in-Electronics (K).pptxArtificial-Intelligence-in-Electronics (K).pptx
Artificial-Intelligence-in-Electronics (K).pptxbritheesh05
 
Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024hassan khalil
 
Introduction to Machine Learning Unit-3 for II MECH
Introduction to Machine Learning Unit-3 for II MECHIntroduction to Machine Learning Unit-3 for II MECH
Introduction to Machine Learning Unit-3 for II MECHC Sai Kiran
 
Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...VICTOR MAESTRE RAMIREZ
 
Sachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective IntroductionSachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective IntroductionDr.Costas Sachpazis
 
Introduction-To-Agricultural-Surveillance-Rover.pptx
Introduction-To-Agricultural-Surveillance-Rover.pptxIntroduction-To-Agricultural-Surveillance-Rover.pptx
Introduction-To-Agricultural-Surveillance-Rover.pptxk795866
 
Electronically Controlled suspensions system .pdf
Electronically Controlled suspensions system .pdfElectronically Controlled suspensions system .pdf
Electronically Controlled suspensions system .pdfme23b1001
 
DATA ANALYTICS PPT definition usage example
DATA ANALYTICS PPT definition usage exampleDATA ANALYTICS PPT definition usage example
DATA ANALYTICS PPT definition usage examplePragyanshuParadkar1
 

Recently uploaded (20)

An experimental study in using natural admixture as an alternative for chemic...
An experimental study in using natural admixture as an alternative for chemic...An experimental study in using natural admixture as an alternative for chemic...
An experimental study in using natural admixture as an alternative for chemic...
 
Biology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptxBiology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptx
 
Oxy acetylene welding presentation note.
Oxy acetylene welding presentation note.Oxy acetylene welding presentation note.
Oxy acetylene welding presentation note.
 
Call Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile serviceCall Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile service
 
pipeline in computer architecture design
pipeline in computer architecture  designpipeline in computer architecture  design
pipeline in computer architecture design
 
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort serviceGurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
 
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdfCCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
 
Call Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call GirlsCall Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call Girls
 
Churning of Butter, Factors affecting .
Churning of Butter, Factors affecting  .Churning of Butter, Factors affecting  .
Churning of Butter, Factors affecting .
 
🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...
🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...
🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...
 
Artificial-Intelligence-in-Electronics (K).pptx
Artificial-Intelligence-in-Electronics (K).pptxArtificial-Intelligence-in-Electronics (K).pptx
Artificial-Intelligence-in-Electronics (K).pptx
 
Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024
 
Introduction to Machine Learning Unit-3 for II MECH
Introduction to Machine Learning Unit-3 for II MECHIntroduction to Machine Learning Unit-3 for II MECH
Introduction to Machine Learning Unit-3 for II MECH
 
Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...
 
Sachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective IntroductionSachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
 
Introduction-To-Agricultural-Surveillance-Rover.pptx
Introduction-To-Agricultural-Surveillance-Rover.pptxIntroduction-To-Agricultural-Surveillance-Rover.pptx
Introduction-To-Agricultural-Surveillance-Rover.pptx
 
Electronically Controlled suspensions system .pdf
Electronically Controlled suspensions system .pdfElectronically Controlled suspensions system .pdf
Electronically Controlled suspensions system .pdf
 
young call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Service
young call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Serviceyoung call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Service
young call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Service
 
DATA ANALYTICS PPT definition usage example
DATA ANALYTICS PPT definition usage exampleDATA ANALYTICS PPT definition usage example
DATA ANALYTICS PPT definition usage example
 
POWER SYSTEMS-1 Complete notes examples
POWER SYSTEMS-1 Complete notes  examplesPOWER SYSTEMS-1 Complete notes  examples
POWER SYSTEMS-1 Complete notes examples
 

Mobile Transpot Layer

  • 2. Outline  TCP and its Usability : Congestion Avoidance, Flow control  Slow Start and Retransmission  TCP Variants : Tahoe, Reno and Vegas  Indirect TCP  Snoop TCP and Mobile TCP  Transaction Oriented TCP and TCP over 2.5G/3G
  • 3. TCP and Its Usability  Reliable ordered delivery  TCP has built-in mechanisms to behave in a ‗network friendly‘ manner.  Guarantees that packet will be delivered in same order in which they were sent  Implements congestion avoidance and control  Reliability achieved by means of retransmissions if necessary
  • 4. Cont…  End-to-end semantics Acknowledgements sent to TCP sender confirm delivery of data received by TCP receiver Ack for data sent only after data has reached receiver
  • 5. Congestion  Congestion in a network may occur if the load on the network—the number of packets sent to the network—is greater than the capacity of the network—the number of packets a network can handle.  Congestion occurs when bandwidth is insufficient and network data traffic exceeds capacity.
  • 6. Effect of Congestion  Congestion causes packet loss  Results in retransmission  Reduces data throughput
  • 7. Congestion Avoidance  In the congestion avoidance algorithm, the size of congestion window increases additively until congestion is detected.  It maintains a network congestion state after reducing the initial data load.
  • 8.
  • 9. Flow Control  Flow control refers to a set of procedures used to restrict the amount of data that the sender can send before waiting for acknowledgment.  limits the rate a sender transfers data to guarantee reliable delivery.  The receiver continually hints the sender on how much data can be received.  When the receiving host's buffer fills, the next acknowledgment contains a 0 in the window size, to stop transfer.  TCP uses an end-to-end flow control protocol to avoid having the sender send data too fast for the TCP receiver to receive and process it reliably
  • 10. Slow Start  Linear additive increase takes too long to ramp up a new TCP connection from cold start  Beginning with TCP Tahoe, the slow start mechanism was added to provide an initial exponential increase in the size of Congestion Window(cwnd).  Moreover, slow start is slower than sending a full advertised window‘s worth of packets all at once.
  • 11. Cont…  The source starts with cwnd = 1.  Every time an ACK arrives, cwnd is incremented.  cwnd is effectively doubled per RTT.  Two slow start situations:  At the very beginning of a connection.  When the connection goes dead waiting for a timeout to occur (i.e, the advertized window goes to zero!)
  • 12. Slow Start Add one packet per ACK Slow Start Source Destination
  • 13. Cont…  However, in the second case the source has more information. The current value of cwnd can be saved as a congestion threshold.  This is also known as the ―slow start threshold‖ ssthresh.
  • 14. Retransmission  Coarse timeouts remained a problem, and Fast retransmit was added with TCP Tahoe.  Since the receiver responds every time a packet arrives, this implies the sender will see duplicate ACKs.  Generally, fast retransmit eliminates about half the coarse- grain timeouts.  Fast retransmit does not eliminate all the timeouts due to small window sizes at the source.
  • 15. Fast Retransmission Based on three duplicate ACKs  Receipt of three duplicate ACKs, the TCP Sender retransmits the lost packet. Packet 1 Packet 2 Packet 3 Packet 4 Packet 5 Packet 6 Retransmit packet 3 ACK 1 ACK 2 ACK 2 ACK 2 ACK 6 ACK 2 Sender Receiv er
  • 16. TCP Recap...  TCP is a reliable protocol  Ensuring reliability by requiring receiver‘s acknowledgement  TCP uses cumulative ack. schema  TCP start timer, maintains for retransmission  TCP is end-to-end delivery oriented mechanism  TCP can work directly on wireless but it require some modification in TCP as it have mobility so high bit error rate occurs
  • 17. TCP Algorithms: Four algorithms used commonly in TCP implementations  Slow Start - Every ack increases the sender‘s window (cwnd) size by 1  Congestion Avoidance - Reducing sender‘s window size by half at experience of loss, and increase the sender‘s window at the rate of about one packet per RTT  Fast Retransmit - Don‘t wait for retransmit timer to go off, retransmit packet if 3 duplicate acks received  Fast Recovery - Since duplicate ack came through, one packet has left the wire. Perform congestion avoidance, don‘t jump down to slow start
  • 18. TCP Variants :  TCP-Tahoe: implements the slow start, congestion avoidance, and fast retransmit algorithms  TCP-Reno: implements the slow start, congestion avoidance, fast retransmit, and fast recovery algorithms  TCP-Vegas: Improvement of TCP Reno New Retransmission mechanism.
  • 19. TCP Tahoe  Two major congestion control schema use Slow start and congestion avoidance Increase cwnd size Fast Retransmission Detect congestion  Problem Take a complete timeout interval to detect a packet loss
  • 20. TCP Tahoe‘s Fast Retransmit 1. Sender receives 3 dupACKS. 2. Sender infers that the segment is lost. 3. Sender re- sends the segment immediately! 4. Sender returns to slow-start. cwnd = 1 cwnd = 2 cwnd = 4 3 duplicate ACKs fast-retransmit of segment 4 S R
  • 22. (TCP Reno) Fast Retransmit & Fast Recovery  After receiving 3 dupACKS: 1. Retransmit the lost segment. 2. Set ssthresh = flight size/2. 3. Set cwnd = ssthresh, and ndupacks = 3.  If dupACK arrives:  ++ ndupacks  Transmit new segment, if allowed.  If new ACK arrives:  ndupacks = 0  Exit fast recovery.  If RTO expires:  ndupacks = 0  Perform slow-start - ( ssthresh = flight size/2, cwnd = 1 )
  • 23. TCP Reno vs TCP Tahoe
  • 24. TCP Vegas  Developed by Brakmo, O'Malley & Peterson [SIGCOMM,1994]  TCP Vegas emphasis on packet delay, not packet loss.  Sender-side protocol Inter-operates with other TCP variants  Depends heavily on accurate calculation of the Base RTT value. If it is too small then throughput of the connection will be less than the bandwidth available while if the value is too large then it will overrun the connection.
  • 25. TCP Vegas  Adjust window size even before packet loss  Adjust window based on difference between actual and expected throughput  Advantage Detects losses faster than TCP Reno and also recover from multiple drops more efficiently.  Disadvantage On heavily traffic it react same as TCP Reno. Vegas are not stabilize if buffer are too small. Fairness issues of Vegas still unresolved
  • 26. TCP Vegas new retransmission mechanism  Keeps track of when each segment was sent and it also calculates an estimate of the RTT.  Whenever a duplicate acknowledgement is received it checks to see if the (current time-segment transmission time)> RTT estimate  So no need to wait for 3 dupack, send retransmite packet
  • 27. Indirect TCP  Split a TCP connection at the foreign agent into 2 TCP connections  hosts in the fixed part of the network do not notice the characteristics of the wireless part  no changes to the TCP protocol for hosts connected to the wired Internet, millions of computers use (variants of) this protocol  optimized TCP protocol for mobile hosts
  • 29. Cont…  The access point acts as proxy in both directions.  AP acknowledges to both the sender and receiver.  Re-transmission on wireless links is handled locally.  During handover, the buffered packets, as well as the system state (packet sequence number, acknowledgements, ports, etc), must migrate the new agent.
  • 30. I-TCP Socket and State Migration
  • 31. Advantages of I-TCP  No changes in the fixed network necessary, no changes for the hosts (TCP protocol) necessary, all current optimizations to TCP still work  Simple to control, mobile TCP is used only for one hop between, e.g., a foreign agent and mobile host  transmission errors on the wireless link do not propagate into the fixed network  therefore, a very fast retransmission of packets is possible, the short delay on the mobile hop is known
  • 32. Cont…  It is always dangerous to introduce new mechanisms in a huge network without knowing exactly how they behave.  New optimizations can be tested at the last hop, without jeopardizing the stability of the Internet.  It is easy to use different protocols for wired and wireless networks.
  • 33. Disadvantages of I-TCP  Loss of end-to-end semantics  an acknowledgement to a sender no longer means that a receiver really has received a packet ---foreign agents might crash.  Higher latency possible  due to buffering of data within the foreign agent and forwarding to a new foreign agent  Security issue  The foreign agent must be a trusted entity.
  • 34. Snoop TCP  Indirect TCP  2 TCP sessions.  Snoop TCP  One TCP session.  The access point snoops into the traffic and buffers packets for fast re-transmission.
  • 36. Cont…  Transparent extension of TCP within the foreign agent  changes of TCP only within the foreign agent  buffering of packets sent to the mobile host  lost packets on the wireless link (both directions!) will be retransmitted immediately by the mobile host or foreign agent, respectively (so called ―local‖ retransmission)  the foreign agent therefore ―snoops‖ the packet flow and recognizes acknowledgements in both directions, it also filters ACKs
  • 37. Cont…  Data transfer to the mobile host  FA buffers data until it receives ACK of the MH, FA detects packet loss via duplicated ACKs or time-out  Fast retransmission possible, transparent for the fixed network  FA detects packet loss on the wireless link via sequence numbers, FA answers directly with a NACK to the MH  MH can now retransmit data with only a very short delay
  • 38. Snoop TCP: Packet Delivery
  • 39. Cont…  Advantages  End-to-end semantics is preserved.  Handover is easy. I-TCP requires a careful handover of the system state. Here it falls back to the standard solution if no enhancements.  Problems  snooping TCP does not isolate the wireless link as good as I-TCP  snooping might be useless depending on encryption schemes
  • 40. Mobile TCP  What if the mobile node is disconnected?  I-TCP  more packets are buffered at AP.  Snooping TCP  no more snooping  Missing acknowledgement, TCP goes to slow-start.  Mobile TCP  Improve efficiency.  Special handling of lengthy and/or frequent disconnections.
  • 42. Cont…  M-TCP splits as I-TCP does  unmodified TCP fixed network to supervisory host (SH)  optimized TCP SH to MH  Supervisory host  no caching, no local retransmission  monitors all packets, if disconnection detected  set sender window size to 0  sender automatically goes into persistent mode old or new SH reopen the window
  • 43. Cont…  Advantages:  End-to-end semantics.  When mobile host is disconnected, it avoids useless retransmissions and slow-start.  No buffering, handover is easy.  Disadvantages:  Packet loss at the wireless link propagates back to sender.  Not a good idea for heavy traffic.
  • 44. Transaction Oriented TCP  TCP phases connection setup, data transmission, connection release using 3-way-handshake needs 3 packets for setup and release, respectively thus, even short messages need a minimum of 7 packets!  Transaction oriented TCP RFC1644, T-TCP, describes a TCP version to avoid this overhead connection setup, data transfer and connection release can be combined thus, only 2 or 3 packets are needed
  • 45. Cont…  Advantage efficiency  Disadvantage requires changed TCP mobility not longer transparent
  • 46. TCP over 2.5/3G Wireless Networks  Fine tuning today‘s TCP  Learn to live with  Data rates: 64 kbit/s up, 115-384 kbit/s down; asymmetry: 3-6, but also up to 1000 (broadcast systems), periodic allocation/release of channels  High latency, high jitter, packet loss  Suggestions  Large (initial) sending windows, large maximum transfer unit, selective acknowledgement, explicit congestion notification, time stamp, no header compression  Widespread use  i-mode running over FOMA
  • 47. Performance Enhancing Proxies  RFC 3135 Transport layer Local retransmissions and acknowledgements Additionally on the application layer Content filtering, compression, picture downscaling E.g., Internet/WAP gateways Web service gateways? Mobile system PEP Comm. partner wireless Internet
  • 48. Cont… Big problem: breaks end-to-end semantics Disables use of IP security Choose between PEP and security!  RFC 3150 (slow links) Recommends header compression, no timestamp  RFC 3155 (links with errors) States that explicit congestion notification cannot be used
  • 49. Summary  TCP is a complex protocol Minimal support from underlying protocols Indirect observation of network environment Large number of competing flows from different hosts Congestion avoidance is still a research issue
  • 50. Cont…  TCP does not perform well in a wireless environment where packets are usually lost due to bit errors, not congestion  Schemes have been proposed to address TCP performance problems Link-level recovery Split protocols End-to-end protocols
  • 51. References  [1]IEEE:TCP-FIT: An improved TCP congestion control algorithm and its performance  [2]IEEE: Fast TCP flow control with differentiated services  [3]Afanasyev, A.; N. Tilley, P. Reiher, and L. Kleinrock (2010). "Host-to-host congestion control for TCP―  [4] Jacobson, Van; Karels, MJ (1988). ―Congestion avoidance and control‖  [5]http://www.scribd.com/doc/63483753/Indirect-TCP-Snooping-TCP-Mobile- TCP-Mobile-Transport-Layer#download  [6]Jian Ma, "A simple Fast TCP flow control in IP network or IP/ATM subnet – a significant improvement over IP", November, 1997  [7]A Comparative Analysis of TCP Tahoe, Reno, New-Reno, SACK and Vegas http://inst.eecs.berkeley.edu/~ee122/fa05/projects/Project2/SACKRENEVEGAS.p df